Try our new research platform with insights from 80,000+ expert users
Chief Information Security Officer at Abcl
Real User
Top 20
Secures and segments corporate and personal data, offers remote secure-wipe capabilities, but the reporting is complicated
Pros and Cons
  • "Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet."
  • "The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not."

What is our primary use case?

The primary use case is to enable access to any corporate application hosted on-premises or in the cloud using a mobile device with single sign-on (SSO) capabilities.

It provides IT admins capabilities for granting access to corporate applications or data on mobile devices and should be able to securely monitor and manage the mobile devices that access sensitive business data. It includes storing essential information about mobile devices, deciding which apps can be present on the devices, and locating devices.

This product should be able to remove corporate applications and data on enrolled devices remotely, known as an enterprise wipe, in case a device is stolen, lost, or if the user leaves the organization.

Corporate data should be securely stored on mobile devices and the user should not be able to share data from corporate apps/data to personal storage.

How has it helped my organization?

Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet.

A separate workspace is created on the enrolled mobile, which partitions corporate data from personal data. Policies can restrict users from copying any app/data from corporate to personal storage and vise versa. 

Users are able to login to corporate applications using single sign-on.

DLP policy prevents data leakage issues, which cannot be prevented if applications are published directly without any MDM solution.

Enterprise wipe gives us the capability to remove applications and data from enrolled devices remotely in cases where one is lost, stolen, or for any other reason. 

Organizations can prevent device enrollment in cases where a device is rooted/jailbroken.

What is most valuable?

Enrollment is based on the user name and the admin needs to create an enrollment policy. The enrollment email goes to users who are entitled to enrollment via Capsule. Each user needs to manually click and add the Token, which is sent via email and used for providing and restricting access.

Licenses are taken from Check Point for the number of users who need to be enrolled via Capsule. 

No additional hardware or setup is required for Capsule configuration, as it can be enabled on the same security gateway. This reduces any additional hardware cost, as well as for setup and connectivity.

Configuration is straightforward and can be controlled on the same NGFW as Capsule. This is used for providing access to users.

What needs improvement?

Reporting is quite complicated once more users are enrolled and they need disparate access. It needs to be maintained separately, which adds work for the admin and can lead to errors.

Enrollment emails are sent for each device, which means that when a user needs to change devices or enroll more than one, admins need to generate and send additional tokens.

The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not.

For example:

  • HR sharing certain learning videos or documents to a group of users. The solution does not provide reports as to whether these have been accessed by the user or not.
  • It does not provide a solution in the case where a device is being shared by multiple users
  • A site where one iPad is being shared between five users is a problem. Each user has their own access to the device but this solution does not have the capabilities of providing each user with specific access to data or applications.
Buyer's Guide
Check Point Harmony Mobile
August 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.

For how long have I used the solution?

We are not using Check Point Harmony Mobile for now.

What do I think about the stability of the solution?

This product is stable, just like any other Check Point solution.

What do I think about the scalability of the solution?

It can be scaled by adding more security gateways and enabling the license. It is done in the same manner as a Check Point firewall.

How are customer service and support?

The technical support is excellent.

Which solution did I use previously and why did I switch?

We used this solution and then moved to a different one.

How was the initial setup?

The initial setup is straightforward.

The process involves getting a license from Check Point and enabling a module/blade on the security gateway. After this, start on the configuration (Published data, which needs to be made available on the endpoint to access).

What about the implementation team?

Our in-house team completed the deployment with OEM support.

What was our ROI?

Using this firewall improves productivity and availability for enrolled endpoints. Published data can be accessed anytime on a mobile device.

What's my experience with pricing, setup cost, and licensing?

Check Point provides a separate license in cases where organizations want to use this only on mobile devices, or laptops/desktops. Check Point Total includes both mobile devices and endpoints. 

Setup can be done on the existing security gateway or it can be done on a dedicated security gateway where there are a large number of users.

Checkpoint provides five user licenses by default.

What other advice do I have?

The organization should be clear on the requirements. If it is only for publishing a few web apps, URLs, email, or for a few shared drives, then the solution works absolutely fine. However, it is not a full-fledged MDM solution like VMware AirWatch/Citrix/Blackberry and more.

These solutions all provide more MDM capabilities than Capsule.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Project Manager at Junta de Andalucia
Real User
Easy to set up, good support, and allows for both personal and professional device profiles
Pros and Cons
  • "The Check Point SandBlast Mobile solution supports Android and iOS operating systems and allows for integration with Mobile Device Management (MDM)."
  • "Compatibility with other Mobile Device Management (MDM) products on the market should be improved, ensuring correct operation between SandBlast Mobile and MDM."

What is our primary use case?

We have implemented Check Point Harmony Mobile due to the numerous phishing attacks that our users were suffering, both by email and by fake text messages, pretending to be the Post Office, Amazon, banks, etc...

With this product, we have tried to avoid this type of attack and therefore have our business environment more secure.

Currently, we have users in various territorial locations and we were looking for a solution that would allow us to secure their mobile devices with a minimum level of intrusiveness in the terminals. The solution should be for both Android and iOS.

How has it helped my organization?

With the Check Point Harmony Mobile solution, we have been able to protect users' mobile terminals, both Android and iOS, from the various attacks they suffered. This has achieved a higher level of security on these devices and prevents access to user data or sensitive information accessible from mobile phones.

With this Check Point product, we can apply similar security policies that the company's desktops or laptops have to mobile phones. Both iOS and Android to be able to use them safely.

Check Point Harmony Mobile helps employees' mobile devices avoid running malicious applications and attacks on their network or operating system.

What is most valuable?

The Check Point SandBlast Mobile solution supports Android and iOS operating systems and allows for integration with Mobile Device Management (MDM).

It has APIs to carry out operations in applications that connect to mobile terminals and performs the tasks that are specified. For example, avoid activating Wi-Fi or installing applications.

When mobile devices are configured, two profiles are created for each of them. There is the personal profile and the professional profile, which means that different security policies can be applied to each profile.

What needs improvement?

Check Point SandBlast Mobile solution is not a Mobile Device Management (MDM), it only takes care of device security. It should have the main functions of Mobile Device Management (MDM), such as automating tasks, automatic updates of applications, etc...

Compatibility with other Mobile Device Management (MDM) products on the market should be improved, ensuring correct operation between SandBlast Mobile and MDM.

Another aspect to take into account is the increased load on old terminals, causing them to work slowly.

What do I think about the stability of the solution?

It is a fairly stable solution, although you have to take into account the increased load that it causes in older mobiles.

What do I think about the scalability of the solution?

It is an easily scalable solution because it allows for integration with any mobile management solution (MDM / UEM).

How are customer service and technical support?

Our experience with customer service / technical support has been very good. They respond quickly and offer us their help in everything we need.

Which solution did I use previously and why did I switch?

We did not have any solutions for mobile devices and after reviewing some, we chose Check Point Harmony Mobile.

How was the initial setup?

The initial setup was relatively easy, with no issues to review.

What about the implementation team?

The implementation was done with a vendor team and their level of knowledge is very high.

What was our ROI?

We currently do not have any ROI forecast. We will see this as the incidents on mobile devices decrease.

What's my experience with pricing, setup cost, and licensing?

Regarding the cost of licenses, each device consumes one, even if it has both professional and personal profiles.

Which other solutions did I evaluate?

We have been evaluating other solutions, such as Palo Alto Networks and Broadcom (Symantec).

What other advice do I have?

My advice is that before installing, a complete analysis of the requirements should be carried out. This should be done in order to correctly define user groups and the respective policies from the beginning. This will help to avoid individual policies.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Mobile
August 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
Rodrigo Nalda - PeerSpot reviewer
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees
Real User
Quick and efficient support, transparent to the end-user, and priced well
Pros and Cons
  • "The best thing about the product is that it is transparent and does not impact the users."
  • "The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU."

What is our primary use case?

We are deploying the solution on all corporate mobiles. We began the deployment with the most critical users for the business and we are expanding according to our needs. We have an organization differentiated by countries and we monitor the incidents reported from our SIEM.

The main objective is to have a security mechanism in these devices that prevents users from falling into attempts to steal credentials, infection by malware, etc.

With this tool, we consider that the systems are protected and so far, we have already been able to stop a good number of attacks.

How has it helped my organization?

Before having this tool, our users were exposed to any type of infection on corporate mobile devices and tablets. With the incorporation of Check Point Harmony Mobile technology, we have minimized these risks and both users and administrators feel calmer.

We also know that any incident that occurs is sent to our SIEM, which is monitored 24x7x365 by a security services company, which, if necessary, will act immediately to solve the incident detected.

All of this adds great value to the company in terms of security.

What is most valuable?

The best thing about the product is that it is transparent and does not impact the users. After analyzing the battery consumption and resource load, we found that it is practically negligible.

On some occasions, we have had to contact the user to solve a problem with the system. It is quite simple, which facilitates the resolution of problems.

What needs improvement?

Based on the fact that we do not have an MDM system, the deployment of the solution has been a bit difficult. The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU.

For how long have I used the solution?

We have been using Check Point Harmony Mobile for more than a year.

What do I think about the stability of the solution?

The solution is very stable and in the time we have been using it, we have not had significant problems.

What do I think about the scalability of the solution?

There is no problem in terms of the scalability of the solution, as it is only necessary to acquire a greater number of licenses.

How are customer service and technical support?

The support has attended to us quickly and efficiently in the few cases that we have needed it. It seems that this is the usual case for Check Point support.

How was the initial setup?

Not having an MDM is somewhat more complex as it cannot automate, and in the iOS environment, it is more complex than in Android.

What about the implementation team?

We carry out the deployment of the solution with our own internal teams supported by the CAU.

What's my experience with pricing, setup cost, and licensing?

The quality, price, and support ratio are very good.

What other advice do I have?

At the moment, we have not detected a specific need for new features within our environment. With the last update, the possibility of analyzing applications developed by us or even requesting an analysis of an application already published in stores was incorporated, which is a great improvement. It is good, for example, to anticipate possible problems with third-party applications, as well as for checking the security status of our applications.

In any case, we trust that in the next versions that Check Point publishes, useful functionalities will appear.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1523535 - PeerSpot reviewer
IP LAN and Integrity Specialist at Chevron
Real User
Good scanning capabilities, impressive performance, low battery consumption
Pros and Cons
  • "I really like the application scanning feature that scans all of the installed applications, and not only what appears in the add or remove apps, and then reports the results in the console."
  • "Some configuration options inside the management console are a little confusing because the interface is not always user-friendly."

What is our primary use case?

We use SandBlast Mobile, integrated with our MDM for automatic deployment of solutions on our devices. This is for our corporate mobile devices, and also for BYOD (Bring your own device) cases. This works well for the users that want access to our corporate repositories for accessing information.

SandBlast is always monitoring their activity including the applications that are installed or they are trying to install, not allowing apps that are not 100% trusted, receiving logging alerts, etc., to take care of our devices and avoid their comprise. 

How has it helped my organization?

SandBlast Is providing a real security approach, not only AV like other vendor solutions.

Continuously, we are monitoring the apps and rate them, obtain reports, etc., to see the security posture of the devices and apply compliance policies. This prevents users from installing fake applications or non-approved software.

It also monitors all of the user navigation inside the phone, controlling non-permitted connections like fake Wi-Fi, etc. It also manages the enterprise e-mail in a secure way to avoid unauthorized access from the mobile device.

What is most valuable?

I really like the application scanning feature that scans all of the installed applications, and not only what appears in the Add or Remove Apps section, and then reports the results in the console.

The performance of this solution is absolutely impressive, especially in terms of battery consumption. It has less consumption than I was expecting

It is a very stable solution that integrates well with the most standard MDM solutions in the current market.

It offers good support for Apple devices and multiple Android versions, which is quite important if you have a disparate set of devices.

What needs improvement?

There are more features for Android devices than Apple, but, think is more related to the Apple API than Check Point.

Some configuration options inside the management console are a little confusing because the interface is not always user-friendly.

Some policies that can cause problems on the devices, like remediation, cannot be implemented by the administrator and are required to be done by Check Point. This is inconvenient because in some cases, we need a remediation policy immediately and we cannot wait for Check Point to implement it.

For how long have I used the solution?

We have been using Check Point Harmony Mobile for approximately two years.

What do I think about the stability of the solution?

It is a stable solution and we have experienced no problems with our mobile devices.

What do I think about the scalability of the solution?

SandBlast can scale without any kind of problems.

How are customer service and technical support?

We have had no problems with the support to this point.

Which solution did I use previously and why did I switch?

We did not use another similar solution prior to this one.

How was the initial setup?

The initial setup is very easy. The cloud solution is easy to deploy and integrate with our MDM.

What about the implementation team?

This was implemented directly by Check Point Professional Services. The team is very experienced with the solution.

What's my experience with pricing, setup cost, and licensing?

This is a very expensive product.

Which other solutions did I evaluate?

We also evaluated an Intel security solution.

What other advice do I have?

In summary, this is a very good solution that works as expected, although it is very expensive.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Engineer at LTTS
Real User
Good support, facilitates secure access of company resources and working from home
Pros and Cons
  • "We have applied MFA so that no one can bypass this security and the users/employees can access their resources very easily, securely, and seamlessly."
  • "We can say that this is a very good solution but Check Point has to reduce the cost."

What is our primary use case?

We are a technology services company and our clients and employees are working from across the world. We have Check Point as a perimeter Firewall device in all our offices and all the devices are with R80.30 with the latest hotfix. 

During this Covid-19 pandemic, we have enabled Check Point Remote access for our employees, so that they can access the office resources from their mobile device, home desktop, or laptop.

Now, they are able to access our resources from their own machine or remote devices and we can say that our employees are doing work from anywhere. 

How has it helped my organization?

We have the Check Point perimeter firewall, which is in a cluster.

Our internal resources or applications we have published over SSL VPN and we have enabled remote desktop for those users who are working from home. This means that they are able to access our local applications and remote desktop.

This is also clientless, so users/employees can work from their mobile devices as well.

We also make sure that proper security is in place as well.

What is most valuable?

In Check Point Mobile access, we are using the SSL VPN for our onsite/work from home users/employees, and in this scenario, we have to secure our organization as well as our users.

In this SSL VPN, multifactor authentication (MFA) is one of the very good and valuable features for us. We have applied MFA so that no one can bypass this security and the users/employees can access their resources very easily, securely, and seamlessly. This feature is the most valuable for Remote Access

What needs improvement?

We can say that this is a very good solution but Check Point has to reduce the cost. The cost is huge compared to other products, and it seems this solution is only for companies with a large budget.

If Check Point can reduce the cost with all of the required security software blades then this product can be used by companies with a medium level of budget, as well.

For how long have I used the solution?

We are using Check Point Mobile Access from April 2020.

What do I think about the stability of the solution?

This is a stable product.

What do I think about the scalability of the solution?

This solution is scalable. We have 300+ users.

How are customer service and technical support?

The technical support is good.

Which solution did I use previously and why did I switch?

We did not use another similar solution prior to this one.

How was the initial setup?

The initial setup is very easy and straightforward.

What about the implementation team?

We had assistance from the vendor team.

What other advice do I have?

This is a very good solution for WFX.

In the time that we have been using this product, we can say that there have been no major challenges or issues that we have faced. All of our clients' and employees' feedback is very positive and they are very satisfied with this solution.

They are accessing the company resources seamlessly, and we are also planning to better secure our clients. We are evaluating this feature with remote access, and it is effective.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Centralized management with good monitoring and reporting features
Pros and Cons
  • "The solution has clients for both Android and Apple devices, so all of our employees' devices are protected."
  • "The feature set between the Android and Apple devices is not fully equal."

What is our primary use case?

Having the Check Point SandBlast Mobile application installed is mandatory for any smartphone or tablet PC provided to the employees by our company, and for any BYOD device if it is going to be connected to the corporate network. Currently, there are about 500 devices that are running on both Android and Apple devices. 

We decided not to self-host the management center, and onboarded the cloud management solution provided by the Check Point. This runs in their own datacenter, with the SLA provided.

How has it helped my organization?

Before implementing the Check Point SandBlast Mobile, we didn't have any mandatory security software being installed on the corporate mobile devices, and it was a huge security gap we needed to close ASAP because smartphones and tablets are connected to the office Wi-Fi networks on a daily basis, and to the corporate VPN resources occasionally (depending on the user's access level). 

The implementation of the Check Point SandBlast Mobile, as the centralized security solution for the mobile devices, improved the overall security of our network by providing the additional protecting layer on the user devices. 

The management overhead is minimal since there is a central management point, where all the policies are configured and then pushed to the smartphones and tablets when they are online.

What is most valuable?

  1. The solution has clients for both Android and Apple devices, so all of our employees' devices are protected.
  2. The client allows us to detect the rooting/jailbreaking of the OS and prevents the connection of such devices to the corporate network VPN.
  3. The client detects and prevents the various types of the phishing attacks, malicious sites in the browsers, and checks them with the help of the Check Point database (ThreatCloud).
  4. The centralized management portal is rich in configuration options, monitoring, reporting capabilities.

What needs improvement?

  1. Some of our employees reported slow performance of the application on the old Android devices (Android version 2.4 and less), but I think it is mostly connected with the poor hardware resources on the older devices.
  2. The feature set between the Android and Apple devices is not fully equal. For example, with Android, it is possible to configure in the policy the file system tampering and keylogging and credential theft detection options. This is unavailable for the Apple devices. I don't think it is the fault of Check Point, but rather restrictions based on the different operating system capabilities. Nonetheless, I would like the policies to be more alike.

For how long have I used the solution?

We have been using Check Point SandBlast Mobile for about two years.

What do I think about the stability of the solution?

The clients for both Android and Apple operating systems are stable and mature.

What do I think about the scalability of the solution?

The solution is scalable. Now we manage about 500 devices and see no downgrade in the performance of centralized management.

How are customer service and technical support?

We didn't have any support cases opened for Check Point SandBlast Mobile.

Which solution did I use previously and why did I switch?

We did not use another solution prior to this one.

What about the implementation team?

The solution was implemented by the in-house team of security engineers and system administrators.

Which other solutions did I evaluate?

We decided to purchase the Check Point SandBlast Mobile after the demo with the vendor.

What other advice do I have?

The solution is modern and easy to onboard.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Multi-platform support, easy to use, and the VPN portal does not require a client to be installed
Pros and Cons
  • "The most impressive thing is the SSL VPN Portal."
  • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point Mobile Access software blade is one of the numerous blades activated on the NGFWs and serves for providing connectivity to the datacenter for the employees.

How has it helped my organization?

The Check Point Mobile Access is activated on the Check Point HA Clusters and protects our datacenter located in Taiwan. It is used to provide connectivity to the internal resource for our employees, thus Remote Access VPN services.

The blade is easy to enable and configure, and it provides great benefits with the help of the built-in SSL VPN Portal. Now, most of our employees don't even use any client software, but just the browsers on their devices, to access the applications published via the SSL VPN Portal.

The connection is stable and reliable, and the level of security and encryption is still high. We find this solution really useful and helpful.

What is most valuable?

The users in our company like that the VPN client is supported on the different platforms and operational systems, e.g. Android smartphones and tablets, Windows and MacOS PCs and laptops.

The most impressive thing is the SSL VPN Portal. With it, you don't even need any client software, just a browser is enough to connect. We have integrated the SSL VPN Portal with the Microsoft Exchange server, and this covers the needs of 95% of our users regarding remote access to the office.

The authentication is performed via integration with Active Directory, so the employees use the same credentials. It is super easy and everybody likes that.

What needs improvement?

I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

We have also had several support cases opened for software issues, but none of them were connected with Check Point Mobile Access.

For how long have I used the solution?

We have been using this product for about three years, starting in late 2017.

What do I think about the stability of the solution?

The Check Point Mobile Access software blade is stable.

What do I think about the scalability of the solution?

The Check Point Mobile Access software blade scales well with the gateways we use, since it doesn't affect the overall performance much after activation.

How are customer service and technical support?

We have had several support cases opened, but none of them were connected with the Check Point Mobile Access Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

The longest issue took about one month to be resolved, which we consider too long.

Which solution did I use previously and why did I switch?

No, we didn't use any SSL VPN solutions before onboarding Check Point Mobile Access.

How was the initial setup?

The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

What about the implementation team?

Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

What's my experience with pricing, setup cost, and licensing?

Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

Which other solutions did I evaluate?

No, we decided to stick to the Check Point Mobile Access after the demo with the vendor.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1400067 - PeerSpot reviewer
Systems Administrator at a wholesaler/distributor with 201-500 employees
Real User
Provides in-depth, good protection for all three threat vectors: application, network, and device
Pros and Cons
  • "It monitors all the URLs that a user goes to on their phone and so we can see what they're looking at and we can limit that. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit those as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk."
  • "Integration needs improvement. We use Check Point for email. We use Check Point Capsule Workspace and I wish that it tied into that better and was integrated with their email application so that when it's secure, then they're able to access their email and it could be deployed as one group instead of two separate applications. It's a little bit more work for us to deploy both of those so it'd be nice if they could be integrated."

What is our primary use case?

We use SandBlast Mobile to secure our BYOD devices for employees that want to have access to corporate information, as we require them to have SandBlast in order to do that. It is always monitoring their text messages for malicious stuff or their apps, to see if there's anything malicious, and then we receive the logging and alerts so we are able to react and take care of our users' security.

How has it helped my organization?

I don't know if it improved any functions for us besides just securing devices. Previously, we had nothing securing our mobile devices and we just trusted the users to be smart on their phones, and now we have that solution so it's able to help protect those phones and let us know if their software's really out of date and information like that.

It has stopped about five phishing attacks on mobiles in the last month.

What is most valuable?

I would say the most valuable aspect is just the offering itself. We don't have a lot of offerings out there in the mobile world right now to put on cell phones and they filled that gap. Having a really good security control on a mobile device is its greatest asset.

The protection provided by this solution for all three threat vectors, application, network, and device is really good. It's in-depth on all accounts.

It monitors all the URLs that a user goes to on their phone so we can see what they're looking at and we can limit it. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit apps as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk.

The device itself checks to see if the device is jailbroken yet and so that's a good security control they have. It also watches your SMS text messages for phishing so that's another way it's securing the device.

The detection and prevention mechanisms seem very accurate. I remember about a year and a half ago, there was an app that had been found to be malicious, it instantly switched its rating, and was reacting to that change in the vulnerability of that app rather swiftly so it seems to be very accurate and in-depth.

It's super comprehensive. The networking part watches all of its networking and it does a man in the middle attack to be able to see that, but it is extremely comprehensive in being able to see everything that the phone is doing network-wise.

It has a pretty good dashboard. You can maneuver around it quickly and be able to see what you want to see and get to the information you need.

The ease of use is good. It does allow you to send email alerts and I get email alerts when something's going on so I don't have to be watching it all the time and then I'm able to go and work with that user to resolve it. It seems to be a pretty well-built tool.

I haven't seen many false positives, they've all seemed to be pretty accurate.

What needs improvement?

Integration needs improvement. We use Check Point for email. We use Check Point Capsule Workspace and I wish that it tied into that better and was integrated with their email application so that when it's secure, then they're able to access their email and it could be deployed as one group instead of two separate applications. It's a little bit more work for us to deploy both of those so it'd be nice if they could be integrated.

With that, I think that having the functionality of being able to test the URL would be an improvement. For example, if you had an email with a URL address in it, you can copy and paste it in there and it can test it and tell you if it's a safe site or something like that. 

For how long have I used the solution?

I've been using Check Point SandBlast Mobile for three years. 

We are using the cloud for its management. It's hosted by Check Point.

What do I think about the stability of the solution?

It seems to be very stable, I haven't seen any outages in it.

What do I think about the scalability of the solution?

Being hosted by Check Point, scalability hasn't really been a big concern. It seems to be handling all the devices we've added. We have a very small company so I don't know as far as how it would fit a huge company, but for us, it's been great.

There are fifty users in my company. 

How are customer service and technical support?

I have not used their technical support for this solution.

How was the initial setup?

The initial setup was pretty straightforward. Setting up individual networking is a little bit more complex besides depending on how granular your organization uses it, but for us, it was pretty straightforward.

The installation of the solution on end-user mobile devices was not complex. It's straightforward. It's very simple. Our end-users are able to install it themselves, we don't have to really be involved in that process so they're able to do it without help from IT for the most part. That is super helpful to not have to handhold as an IT team all of our users, they can just do it and it works. 

There is no enforcement mechanism that depends on the user if they installed it or not. We don't enforce it in that way, but we do enforce it based upon if they want to have email access. We require them to have it so we validate that it's installed before we install email, but we don't enforce it.

There was definitely concern from end-users about their privacy. Especially with the networking part, the way that it's able to see everywhere they go is a big security and privacy issue. We addressed it by not requiring all our users to have it, but if they want to email, they have to have it and so that's how we ended up getting around it. We had people that ended up using a company phone and a personal phone separately because of it.

The deployment is still in process actually, but that's mostly on our end, not really Check Point's end. We don't have all the policies in place to have that process set forth of how we're doing it so we're still kind of working on that. 

In terms of our implementation strategy, as of right now, we have emails set up on people's devices using a different application. That application is no longer working and so as users want email, we implement it, but we aren't pushing users to have email on their phone. And I think in the future that's going to be the case, but right now it's not because we don't have company policies in place for that.

I'm responsible for the deployment and maintenance and I'm a system administrator.

What was our ROI?

Our ROI has been great. It really didn't come at a cost for us because we already had the Infinity in place so, at no cost, we had extra security benefits added and visibility into our users' devices that we didn't have before.

What's my experience with pricing, setup cost, and licensing?

As we didn't really compare it with competitors, we bought it as part of our Infinity and so it was included with our other network security. It was basically no cost to us because we were already planning on using the other features of it. It was just an added part of that contract, but I don't have much input beyond that. We didn't compare to anyone else or anything like that.

What other advice do I have?

Having Check Point, at least for us, they implemented two different hosted platforms so that we could have different policies for different users, and that was really helpful to us because we did have privacy concerns from a lot of users. We were able to lock down the network on some devices and other devices we didn't monitor the network.

I would rate it a nine out of ten. It's really in-depth for what it does.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.
Updated: August 2025
Product Categories
Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.