Try our new research platform with insights from 80,000+ expert users
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Easy to use with great URL filtering and protects from unauthorized downloads
Pros and Cons
  • "Harmony Mobile presents many innovative features."
  • "One of the improvements that can be made is that they become compatible with Google MDM."

What is our primary use case?

One of the main reasons why the implementation of Check Point Harmony Mobile was chosen was due to the fact that we needed a tool that had control and monitoring over mobile devices. Harmony Mobile provided us with that functionality. In this way, we were able to close a security gap that was affecting our organization. 

With this solution, users could connect to the organization and access the corporate data and thus comply with a more secure standard. 

Each mobile has applied policies through the Harmony Mobile panel and control the access

How has it helped my organization?

One of the great improvements that Harmony Mobile gave us is that it was possible to protect the mobile devices of each one of the users and thus not depend on the users to implement adequate security themselves. With a simple mistake or moment of carelessness, a user can accidentally cause great damage to sensitive company information.

With Harmony Mobile, users do not worry. It transmits all the security to this tool. Currently, with what has been happening in the world with Covid, many workers are working from home and with this solution, we can limit third-party access to devices.

It's important for it to have the main functions of Mobile Device Management (MDM), such as task automation, automatic application updates, they should also improve compatibility with other mobile device management (MDM) products on the market, ensuring correct operation between SandBlast Mobile and MDM. It's important for Point Harmony Mobile to be included in a broader offering so that it is not just a standalone product.

What is most valuable?

Harmony Mobile introduces many innovative features. One of them is URL filtering, which is very valuable in this tool. It offers to filter apps, protect privacy, and reject malicious or unauthorized downloads. It allows us to get an idea of how it protects the application through certain security levels that are threats, network applications and devices. Its administration and configuration is very simple. It is easy to use with its friendly interface, the solutions helped a lot to the security of the company.

What needs improvement?

Harmony Mobile is one of the first tools that we implemented in the organization when we entered into the protection of mobile devices. For many years all our staff did not have any restrictions on mobile devices. 

An improvement would be the compatibility of linking local and cloud solutions to create a hybrid scenario. They should allow adding a SIEM for additional functions. That said, in relation to the characteristics that it currently presents, it satisfactorily complies with the security of mobile devices.

One of the improvements that can be made is that they become compatible with Google MDM. 

When it comes to scanning the network, sometimes my SSI ID does not appear; it would also be a great plus if they could make a unified console where you can manage several Check Point products and thus not be opening different consoles to manage different products.

Buyer's Guide
Check Point Harmony Mobile
May 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.

For how long have I used the solution?

I have been using about three years.

What do I think about the stability of the solution?

The stability of the product is very good and it generates an excellent amount of monitoring reports.

What do I think about the scalability of the solution?

It is a very scalable tool.

How are customer service and support?

With the support, we have had good and bad experiences. Sometimes they take time to respond. Sometimes they give an accurate solution to the error presented.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

A mobile device solution had not previously been implemented.

How was the initial setup?

One of the parts that worried us was its configuration and administration, however, it was extremely simple.

What about the implementation team?

The installation was done with a seller who demonstrated his ability and handling of the tool.

What was our ROI?

The investment made with this tool is very good. The information will be guaranteed, therefore, every penny invested is a good investment.

What's my experience with pricing, setup cost, and licensing?

The cost is affordable. It competes with other technologies and the installation is easy to implement.

Which other solutions did I evaluate?

We have not opted for other technologies since we have implemented the Check Point line into our company.

What other advice do I have?

It is a good tool that can be implemented in the organization and be sure that it will protect your mobile devices.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Avesh Kumar - PeerSpot reviewer
Software Tester at a tech services company with 51-200 employees
Real User
Works with mobile, protects against vulnerabilities, and offers real-time scanning
Pros and Cons
  • "The simple navigation offered by the graphical user interface is excellent."
  • "The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade."

What is our primary use case?

We require a tool that could control and monitor mobile devices, which was one of the primary factors in our decision to adopt Check Point Harmony Mobile. With this tool, we had that capability. We were able to shut down a security hole that was harming our company. The user can connect to the company and access corporate data via this technology, enabling them to adhere to a more secure standard. With the help of the Harmony Mobile panel, each mobile has implemented policies that govern access. It is used by us to control mobile connections. It is a cloud-based solution that is installed on Check Point's cloud.

How has it helped my organization?

Prior to having this solution, our users were vulnerable to infections of any kind on tablets and mobile devices used for business. We have reduced these dangers by utilizing Harmony Mobile's security, which helps both the user and the administrator. With the help of Check Point Harmony, mobile users also have the same level of protection as the business's computers and laptops do and users are also secure to use on both iOS and Android. Observe Point Mobile devices used by employees are protected from dangerous software and attacks on their network or operating system.

What is most valuable?

Check Point's Sandblast Mobile solution integrates with Mobile Device Management and supports Android and iOS operating systems. Two profiles are created for each mobile device when it is configured. There are two types of profiles - personal and professional - and various security guidelines can be applied to each. 

Real-time scanning is only one of the amazing capabilities offered by this tool. 

The simple navigation offered by the graphical user interface is excellent. 

We value the centralization it brings about.

What needs improvement?

The tool is excellent for security purposes, and it gives a lot of information. That said, there needs to be some improvement in everything related to administration and assistance. 

The ability to integrate local and cloud technologies to create a hybrid scenario would be an upgrade. 

Making this tool compatible with Google MDM is one of the enhancements that must be made. 

The increased load on an outdated terminal, which slows them down, is another item to consider. 

It would be preferable if they could incorporate application vulnerability management.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Mobile
May 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Good protection and integration capabilities with an intuitive implementation
Pros and Cons
  • "The use and management of our portal is easy."
  • "We know that for many companies, the management and administration of device and data security have been complex."

What is our primary use case?

Mobile device security is a top concern for our company today - and for good reason. In the new normal, remote workers increasingly access corporate data from their mobile devices, which means the company is more exposed to data breaches than ever before.

This product keeps corporate information safe by protecting employee mobile devices from all areas of attack: applications, networks, and operating systems. Check Point Harmony Mobile has enabled easy-to-manage, scalable security for any mobility management team.

How has it helped my organization?

Our companies have seen the need to give their collaborators the flexibility to work remotely yet the number of cyberattacks has increased in recent years due to the complexity of the administration and visibility of cross-device risks for security managers. This is where Check Point Harmony Mobile is supporting us very closely. With this solution, it is immediately securing the equipment that is connected outside of our organization and thus protects the equipment and data.

What is most valuable?

Check Point Harmony offers an almost intuitive implementation. The use and management of our portal is easy. It is integrating six security products in a unified way to protect all users, connections, devices, and access. Users get protection regardless of where they are, applications they access, or any device they use. Users face endless cyber threats such as malware, phishing, malicious emails, or ransomware zero-day attacks. In addition to detecting unauthorized use of SaaS applications and preventing data leakage, we get instant threat visibility.

What needs improvement?

Having a unified solution developed by one of the most reliable brands in the market gives our organization the peace of mind that data is safe anytime, anywhere. 

We know that for many companies, the management and administration of device and data security have been complex. However, Check Point Harmony Mobile solves and supports is in all this with solutions made for this need. At the moment, I would not change anything; from my perspective, it is complete.

Something that could be improved is the compatibility with older versions. In distribution centers where Android devices with version 4.4.0 used, the solution gives many errors. In newer versions, the tool complies with its proper functioning.

For how long have I used the solution?

I've used the solution for one year.

How are customer service and support?

With the support teams, it is a bit complex due to the absence of support in Spanish. Also, the guides that the support service provides us in many cases are complex and make it difficult to solve problems.

How would you rate customer service and support?

Positive

What other advice do I have?

Harmony is not only great security for devices, it is a great analytics network that protects us from various attacks and that you can try with a simple and easy-to-configure agent on mobile devices.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Reseller
Top 5Leaderboard
Offers ease of management and can be installed effortlessly
Pros and Cons
  • "The product's initial setup phase is very straightforward."
  • "At times, when configuring policies, the tool takes some time to apply the policy."

What is our primary use case?

I use the solution in my company so that whoever the mobile users are and those who use the corporate applications, we can secure communication from the corporate application to the outside network. My company uses Check Point Harmony Mobile through the browser to secure our applications, as well as to secure the communication between customers and other users.

What is most valuable?

The most effective features of the product stem from its ability to deal with areas like data security and application security while also being useful to users who use mobiles in roaming mode and those who use a personal mobile phone with corporate applications in it.

What needs improvement?

At times, when configuring policies, the tool takes some time to apply the policy. If I configure a new policy and apply it to the management console, it may take time. The product should work on policy enforcement so that users can quickly enforce the policies within a fraction of a second.

For how long have I used the solution?

I have been using Check Point Harmony Mobile for three years.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten. Some customers of the tool face some issues in their environment with respect to policy enforcement.

What do I think about the scalability of the solution?

It is a very easily scalable solution. 

My company deals with a very limited set of customers of the product. The tool's competitors have been very aggressive with the mobile browser part, especially the ones offering MDM solutions. Those who use firewall products from Check Point are very happy to acquire and use Check Point Harmony Mobile.

How are customer service and support?

As and when required, the solution's technical support helps users with troubleshooting. The solution's technical support is good, and it responds quickly.

How was the initial setup?

The product's initial setup phase is very straightforward.

For the product's deployment phase, you just need to install the agent to the end user and configure the policy on the cloud management console.

The solution's deployment phase is a one-day task.

What was our ROI?

In terms of ROI, the product helps secure your application, mobile, and data.

What's my experience with pricing, setup cost, and licensing?

There is a need to make yearly payments towards the licensing costs attached to the product. You can opt for a one-year, three-year, or five-year license. There is a separate team that handles the pricing part of the product, and depending on the customers or order quantity they handle, I believe that 60 or 70 percent discounts on the prices are offered. There are no additional costs attached to the product.

What other advice do I have?

The tool helped prevent potential security threats whenever some users communicate from their mobile with someone outside our company since, at such a time, the product secures the communication as well as the data. With the tool, no confidential data goes outside from the inside of our company. Our company can block data leakage from mobile phones to the outside environment of our organization.

The threat detection and response capabilities of the tool benefit the company in scenarios where a user wants to send out some confidential data outside the company through the browser, which would not be possible If the organization uses Check Point Harmony Mobile. The tool shows how our company can secure the user, as well as how we can prevent data leakage from the inside to the outside of the organization.

The product provides users with ease of management. It is a simple tool that allows users to configure some of the policies for a user or a user-based group and apply them to the solution.

According to Gartner's website, the tool's stability and support as a security provider places it in the leader category.

The tool helps respond to emerging corporate threats, especially those who use corporate applications on their personal devices. If you want to secure your corporate applications, you have to adopt Check Point Harmony Mobile.

If you use corporate applications on your personal mobile device and you want to secure your applications and data, then you have to use Check Point Harmony Mobile.

I rate the tool a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Provides great data security, access control, and network security
Pros and Cons
  • "As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more."
  • "One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity."

What is our primary use case?

This solution is required for one of the internal needs of our organization. We need the product based on our need for the control of access to corporate resources. We were looking for a solution that allows us to generate the management of mobile network devices and something that could secure all systems in the best way possible, thus giving us a solution that allows for general device management. With this product, our organization will be able to monitor and control the devices used by each of our employees in the organization, which gives us an level of adequate security configuration and allows us to comply with internal policies.

How has it helped my organization?

As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more. The kinds of features on offer provide us with confidential access to information, ensuring each of the different devices is protected while improving the productivity of employees. In summary, this solution can help us protect business resources in the best way possible, which can be translated into efficient and profitable security.

What is most valuable?

A very important feature that is outstanding and helps our organization is the ability to protect the business data stored on each device. This is especially important since these devices are used to create information, catalogs, products, customer information, and inventory. Every time they are outside the company, the solution provides us with a secure connection from the devices to the database, thereby keeping data safe. In addition, we can improve the productivity of each of the employees remotely. This benefits to the company in terms of sales or productivity even from different locations. 

What needs improvement?

One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity. 

In some cases, devices may be found in areas with little or no signal, which can make it difficult to connect to the network. That makes it difficult to use the solution. We ned to ensue we have something that allows users to work effectively even without a strong network connection. This would allow us to have a solution that adapts to the challenged presented by limited connection environments.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Great for protecting data, securing non-corporate devices, and removing old user permissions
Pros and Cons
  • "One of the features that have given us additional value is being able to encrypt and block how data is shared within cell phones or mobile devices."
  • "I would like to see management and remote administration functions in the same portal."

What is our primary use case?

We were busy protecting many of the devices used today by managers, sales teams, and those departments that have to be moving very frequently due to all these uncertainties. 

We were busy protecting the content, data, and information that was downloaded and all those objects or information that is shared with different departments to be secured in a simple way on the mobile devices to which access was given. 

For this reason, we have searched for solutions that could allow us to secure the departments' devices that have permissions outside the institution (based on the role or position they have).

How has it helped my organization?

One of the features that have given us additional value is being able to encrypt and block how data is shared within cell phones or mobile devices. This means that the data that belongs to the corporation will be encrypted and protected in a portion of the phone, with access to interactions against the data further protected within the device. It's a safe way to encapsulate, within a device, security to protect an organization's information.

What is most valuable?

The most valuable feature is being able to encrypt corporate data on devices that are not company devices (like personal cell phones), and being able to manage it remotely. This way, fired users can be removed and eliminated corporate data without affecting the personal data of its other users, thus being an efficient way to safely manage and administer the information that belongs to the corporation. 

We can easily secure the information of the company and the user's device so that if we find a vulnerability or some insecurity breach in these cell phones, the solution will indicate that the device is compromised and it will remove the corporate data to ensure the integrity of the data.

What needs improvement?

I would like to see management and remote administration functions in the same portal. I would like us to see it from the same centralized portal and be able to share its rules, its characteristics, and the advantages of cloud computing power. That way, we would have a more central way to manage the computers that belong to or are managed by us. Check Point Harmony Mobile is one of the features that we can see that is easy to install. We would like to have that same flexibility when it comes to managing it on the same platform where we share it with other features of Harmony Endpoint, Harmony Browser, or the NGFWs.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Adam Coulibaly - PeerSpot reviewer
Suporta engineer at Novasys
Real User
Provides complete protection and is easy to deploy and manage
Pros and Cons
  • "Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage."
  • "If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful."

What is our primary use case?

We are mainly using it to manage mobile connections. It is a cloud solution, and it is deployed on the Check Point cloud.

How has it helped my organization?

We can manage different mobiles in the Harmony portal. For example, we can fix the version of the OS system that can connect to our network. Some applications are not authorized to be installed by the user. So, we can block those applications or versions.

What is most valuable?

Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage.

What needs improvement?

If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful.

For how long have I used the solution?

I have been using this solution for two years.

What do I think about the stability of the solution?

There is no problem with stability. We have had no issues since we started using this product.

What do I think about the scalability of the solution?

It is very easy to scale. We have 10 users, and it is for our internal use. We are also a Check Point partner, and we use it on our mobile phones to show it to our customers during seminars or presentations.

How are customer service and support?

I'm a support engineer, and I have contacted their technical support. I was with a customer who needed some information about the mobile UEM integration of Harmony Endpoint, and I had to contact their technical support to find out how we can do this easily. 

Their support is very easy to contact. We are a partner, and when we contact their support, they always respond on time. Their support is very good.

Which solution did I use previously and why did I switch?

We were providing Kaspersky and Bitdefender to our customers before becoming a partner of Check Point. I don't know if Bitdefender has protection for mobile, but I know that Kaspersky has recently started developing for mobile. Check Point Harmony Mobile is better and more secure for mobile protection because of its stability and all the functionality. It is easy to deploy and manage.

How was the initial setup?

Its initial setup is very simple. If any additional configuration needs to be done, I just receive an email. When a user is added to the portal, you receive an email with information about the server and the password. You can just click and start the application. It is very easy.

It is pretty fast. It just takes one minute for the installation and the first scan.

What about the implementation team?

I do it myself from the office. I don't need an assistant from Check Point or anyone else. I just need to read the documentation. I can download the documentation from their website, which contains the information for installation and troubleshooting.

The maintenance can be done from the tenants in the cloud. You can do the updates and patching of the product in the portal.

What's my experience with pricing, setup cost, and licensing?

At the moment, the price is good, but there is always scope for amelioration when it comes to pricing. When pricing is lower, it can make a customer buy the product. Customers ask us about the price of the product before allowing us to explain the functionality to them.

What other advice do I have?

I would recommend this solution to others. It is easy to implement, and it is easy to manage. It covers OS protection, network protection, file protection, and application protection. It provides the best protection.

I would rate it a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
IT Security Manager at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Real User
We like the ability to encrypt transactions on all devices
Pros and Cons
  • "We like Harmony's ability to encrypt transactions between mobile devices. All the user's transactions are encrypted. That's an excellent feature. We can detect, quarantine, and address any issues in the handset itself."
  • "Harmony has more support for Android OS as opposed to iOS. You need a third-party MDM solution to integrate with iOS. If you don't have an MDM, your app can't scan on an iOS device. The solution can scan everything on Android. It sees all your apps."

What is our primary use case?

We use Harmony Mobile to protect our workers' mobile devices. There are about 300 users, including everybody from executives to regular engineers. We plan to increase usage, but we are waiting on an executive decision. They'll decide whether to cut costs or increase use. 

What is most valuable?

We like Harmony's ability to encrypt transactions between mobile devices. All the user's transactions are encrypted. That's an excellent feature. We can detect, quarantine, and address any issues in the handset itself. 

What needs improvement?

Harmony has more support for Android OS as opposed to iOS. You need a third-party MDM solution to integrate with iOS. If you don't have an MDM, your app can't scan on an iOS device. The solution can scan everything on Android. It sees all your apps. 

For how long have I used the solution?

We have had Harmony Mobile for about three years. We're both a customer and a partner. The partner is the enterprise division of our organization, and we are a customer, but we cannot purchase it ourselves. We have to go to a third party. Acquisition is more from the customer base, but my company also is a partner.

What do I think about the stability of the solution?

We haven't had any issues with Harmony crashing our system.

How was the initial setup?

Deploying Harmony was straightforward.  You can deploy it using an MDM solution, but we didn't have one at the time. We deployed by email or SMS, and was relatively simple. 

We explored the MDM part with Google but ran into some issues because the feature required for this integration requires an enterprise license. We have three staff members responsible for implementing and managing the solution.  

What's my experience with pricing, setup cost, and licensing?

The license was pretty reasonable. I don't have a figure right now, but I think it was somewhere between $10 and $30 per user. 

Which other solutions did I evaluate?

We evaluated VMware Workspace ONE, and VMware also had an MDM that we looked at at the time. Even the McAfee MVISION right now also comes with mobile device management as well.

What other advice do I have?

I rate Check Point Harmony eight out of 10.

My advice for enterprises thinking about Harmony is to consider your device type. If your users are predominantly on Android, it's a good solution. If it's primarily iOS users, you might need to deploy an MDM before buying it. An MDM that covers both operating systems is a significant factor to consider. It will determine how easy it is to deploy it and how much control you have over the profiles.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2025
Product Categories
Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.