We use SandBlast to protect our mobile devices, as well as our iPads and Samsung tablets.
Easy deployment: We simply send a link through email to a user, they install the software and are protected
Pros and Cons
- "The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected."
- "I would like to see more visibility into the actual devices that it's protecting. In some cases, you don't want to see a lot. However, for our purposes, I would like to see more information about the applications which are installed, then have more control over what can and what cannot be installed."
What is our primary use case?
How has it helped my organization?
We use SandBlast, internally, as a test bed so we can go out and sell it. The ease of the deployment to users has been key, and most beneficial for us.
What is most valuable?
The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected.
What needs improvement?
I would like to see more visibility into the actual devices that it's protecting. In some cases, you don't want to see a lot. However, for our purposes, I would like to see more information about the applications which are installed, then have more control over what can and what cannot be installed. That would be very useful for us.
The GUI could be a bit more intuitive, as far as going from page to page and understanding what you're looking in the beginning. After you use it for a while, you get used it.
Buyer's Guide
Check Point Harmony Mobile
May 2025

Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
We've had it deployed for about three years now. We have had no hiccups nor issues with it at all going down. Also, we have not experienced any difficulties with it protecting devices.
What do I think about the scalability of the solution?
In terms of the scalability, we have not pushed the limits of the product yet. We only have around 20 users deployed at this time.
How are customer service and support?
We deal directly with the Sales Engineers (SEs) for SandBlast. So, we're not a typical user where we are using technical support from Check Point. Therefore, we haven't used their technical support.
How was the initial setup?
The initial setup was very straightforward, not complex at all. For us, it was simply sending out an email link to our users. They installed it from the App Store, and that's it.
What about the implementation team?
Check Point deployed it for us. The experience was simple and easy. Check Point was helpful, as far as explaining the deployment and showing us how to use the software with the GUI.
I was the administrator of the deployment.
What's my experience with pricing, setup cost, and licensing?
We didn't actually purchase the software. It was given to us by Check Point. We are using it as a test bed for possible future customers.
What other advice do I have?
I would rate it a nine of ten because of the ease of installing it. Using it on a daily basis, the administration is quite easy.
I would advise someone considering SandBlast to have some definite use cases in mind before deploying it. That way you can deploy it very specifically towards what you are going to be using it for.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.

Manager, Infrastructure Services at a energy/utilities company with 1,001-5,000 employees
Straightforward to setup with great technical support and an excellent admin portal
Pros and Cons
- "The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly."
- "The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing."
What is our primary use case?
We were lacking threat detection and device-level protection in our mobile device space. We are an Apple shop exclusively and although Apple does a good job at vetting apps and developers in the Apple App Store, we were lacking protection beyond that. The Harmony Mobile Protect suite really gave us the confidence of protection and real-time threat level safeguards. Users have the confidence to know that the data on their devices is safe. It's a great solution that has a proven track record in the mobile space.
How has it helped my organization?
Harmony Mobile Protect has improved the confidence of the users in knowing their mobile device and data is protected. It is shocking to see how many sites, apps, and links to content were vulnerable to threats and security gaps. Users found themselves going to what they thought were innocent sites and in-app purchases that led them to a vulnerability. To be fair, some legitimate apps, links, and content were flagged and all we needed to do is make adjustments to the white lists and users were able to access that data with no issue.
What is most valuable?
The app just runs in the background and keeps the device safe. The real-time scan is awesome and really delivers that value-add component to threat defense and a holistic approach to mobile device protection. The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly. Tracking users, seeing devices and their current state at a glance is very helpful. Reporting is also a great value add to this product. Seeing the areas of concern and making adjustments to tighten the gaps is very helpful and a value add.
What needs improvement?
The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing. A simple refresh of that device corrects the issue and displays real-time data. Overall, it works well and the improvements so far for this product have been great. Allowing the user to control the real-time scan is important. In recent updates of the app version, this can be achieved easily, but the user doesn't always see that. Perhaps making a separate button or leveraging the menu ribbon for this feature may work better.
For how long have I used the solution?
I've worked with the solution for 3 months now.
What do I think about the stability of the solution?
After the initial setup, of course there was some tweaking, but the platform It' very solid. We have had no issues thus far with the stability. There have been a few updates that were low to no impact. More enhancement based updates.
What do I think about the scalability of the solution?
So far, we have found it to be very scalable. That was the main selling point for us on this product.
How are customer service and technical support?
We did have some issues come up and required technical support. The support team was awesome and really knew how to address the issues we were having. The problems were fixed and we were back on the road in no time.
Which solution did I use previously and why did I switch?
We did not. This is our first product for mobile device threat protection and real-time scanning.
How was the initial setup?
It was pretty straightforward. We had a solutions engineer walk us through things and helped us tie into our MDM, which went well.
What about the implementation team?
We implemented through Check Point directly for the POC and then continued with licenses. The setup with Check Point went great and we were very happy to have that level of expertise on hand. Their solutions engineers are top-notch and we were very pleased.
What was our ROI?
We are new to using this product, so we have not been able to capture the ROI as of yet.
What's my experience with pricing, setup cost, and licensing?
We had a very positive experience with this. The cost is the amount of devices times the number of licensing and the setup fees. We were up and running quickly. I do highly recommend leveraging a demo of this product. It really shows the depth of the product and the value-add to the customer.
Which other solutions did I evaluate?
No, we have a vested interest with Check Point Mobile and we looked at their product line first, and was sold.
What other advice do I have?
Harmony Protect is a great solution and really stands up to threat protection and device defense.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Harmony Mobile
May 2025

Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees
Quick and efficient support, transparent to the end-user, and priced well
Pros and Cons
- "The best thing about the product is that it is transparent and does not impact the users."
- "The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU."
What is our primary use case?
We are deploying the solution on all corporate mobiles. We began the deployment with the most critical users for the business and we are expanding according to our needs. We have an organization differentiated by countries and we monitor the incidents reported from our SIEM.
The main objective is to have a security mechanism in these devices that prevents users from falling into attempts to steal credentials, infection by malware, etc.
With this tool, we consider that the systems are protected and so far, we have already been able to stop a good number of attacks.
How has it helped my organization?
Before having this tool, our users were exposed to any type of infection on corporate mobile devices and tablets. With the incorporation of Check Point Harmony Mobile technology, we have minimized these risks and both users and administrators feel calmer.
We also know that any incident that occurs is sent to our SIEM, which is monitored 24x7x365 by a security services company, which, if necessary, will act immediately to solve the incident detected.
All of this adds great value to the company in terms of security.
What is most valuable?
The best thing about the product is that it is transparent and does not impact the users. After analyzing the battery consumption and resource load, we found that it is practically negligible.
On some occasions, we have had to contact the user to solve a problem with the system. It is quite simple, which facilitates the resolution of problems.
What needs improvement?
Based on the fact that we do not have an MDM system, the deployment of the solution has been a bit difficult. The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU.
For how long have I used the solution?
We have been using Check Point Harmony Mobile for more than a year.
What do I think about the stability of the solution?
The solution is very stable and in the time we have been using it, we have not had significant problems.
What do I think about the scalability of the solution?
There is no problem in terms of the scalability of the solution, as it is only necessary to acquire a greater number of licenses.
How are customer service and technical support?
The support has attended to us quickly and efficiently in the few cases that we have needed it. It seems that this is the usual case for Check Point support.
How was the initial setup?
Not having an MDM is somewhat more complex as it cannot automate, and in the iOS environment, it is more complex than in Android.
What about the implementation team?
We carry out the deployment of the solution with our own internal teams supported by the CAU.
What's my experience with pricing, setup cost, and licensing?
The quality, price, and support ratio are very good.
What other advice do I have?
At the moment, we have not detected a specific need for new features within our environment. With the last update, the possibility of analyzing applications developed by us or even requesting an analysis of an application already published in stores was incorporated, which is a great improvement. It is good, for example, to anticipate possible problems with third-party applications, as well as for checking the security status of our applications.
In any case, we trust that in the next versions that Check Point publishes, useful functionalities will appear.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
HM is a excellent security tool, modern and infinity portal is great.
Pros and Cons
- "We have had a lot fewer attacks thanks to this solution."
- "The only language that is available is English."
What is our primary use case?
They can access the information from anywhere, which had to be covered with security to safeguard the company data, for which we obtained the use of Check Point Harmony Mobile to be able to provide this layer of security in a simple way.
How has it helped my organization?
The security provided has helped us to shield the information accessible to mobiles from anywhere, this was a risk to vulnerabilities, which is why the implementation of the Harmony Mobile Check Point solution has been quite important to improve security.
With it, we have been able to establish policies for use, access and anti-malware protection, and modern protection so that the equipment is covered.
We have had a lot fewer attacks thanks to this solution, achieving the main objective.
Users are quite happy with the solution.
What is most valuable?
The costs are adjusted to the organization for each user that is implemented and is really competitive for the features that are implemented.
It is essential to rely on a good vendor so that the provisioning and implementation of security are the best.
What needs improvement?
I feel that the implementation of users in a massive way should improve so that we can easily load some Excel, which can provide all the users that are required to be implemented.
Also, the solution or support service must improve, its newer applications are a little more difficult for the support teams since they take longer to solve.
The only language that is available is English. The hours of attention are somewhat uncomfortable as they are generally on the other side of the world, which is why they are not compatible with Latin America.
For how long have I used the solution?
It has helped us a lot with the issue of controlling the security of both internal and using mobile devices since, through the agent, we can carry out this security governance.
Which solution did I use previously and why did I switch?
It is our first implementation since previously we used an antivirus solution, but they did not meet the requirements of the company or modern threats.
What's my experience with pricing, setup cost, and licensing?
It is important to always implement demo environments to test first before doing it in production so that we can have more experience when migrating it to the most important environment.
The cost is accessible.
Which other solutions did I evaluate?
We really do not doubt the capacity of Check Point. We validate reviews in addition to validating their characteristics, for which we are convinced of their potential. Check Point Harmony Mobile is one of the best.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Information Technologist at a energy/utilities company with 1,001-5,000 employees
Easy to use with zero-touch deployment and excellent assistance
Pros and Cons
- "The other most valuable service so far has been the assistance provided to us by the Check Point Harmony mobile engineers. They have been so awesome and helpful to us during the setup process."
- "It would be super helpful if there were more details around the risks that were found on our mobile devices."
What is our primary use case?
The Checkpoint Harmony mobile application is used to protect and eliminate our corporate iPhone users from malicious attempts such as phishing, malware, malicious websites, anti-bots, and harmful applications. Many users receive malicious text messages and emails prompting them for credentials such as corporate active directory details, banking information, or credit card information. It is important to protect our corporate data on all mobile devices by using Check Point's Harmony Mobile Application.
How has it helped my organization?
It has provided us with an easy-to-use solution that protects our corporate data on all our iPhone mobile devices. The easy-to-manage cloud-based management console provides us with details on the scanning status of our devices and reports all risks that are identified on the mobile devices. It is wonderful to be able to customize the many policies in order for the application to work at it's best for our corporate environment. The scalability has provided us with much protection and flexibility - and that is what we definitely need.
What is most valuable?
The zero-touch deployment system process has been the most valuable feature thus far. The ability to deploy and configure the application with the help of Microsoft's Endpoint Management (our mobile device management solution) has been seamless and has given us the ability to deploy with zero user interaction.
The other most valuable service so far has been the assistance provided to us by the Check Point Harmony mobile engineers. They have been so awesome and helpful to us during the setup process.
What needs improvement?
The area that I find could use the most improvement would be in the forensics section of the administrator console. It would be super helpful if there were more details around the risks that were found on our mobile devices. A simple click to find out more information would be excellent. Also, a reporting option would be beneficial as well. Maybe the option to send an email to the administrators when a high-risk vulnerability is found and also the option to run a monthly report to send to administrators would be great.
For how long have I used the solution?
I've used the solution for about 4 months.
What do I think about the stability of the solution?
The solution is very stable; we have not had any connection issues with the devices reporting into the admin console.
What do I think about the scalability of the solution?
The options to customize the policies are very beneficial.
How are customer service and technical support?
Technical support is great. All have excellent customer service skills and stellar technical abilities.
Which solution did I use previously and why did I switch?
We previously did not have a solution in place.
How was the initial setup?
The initial setup was straightforward and the documentation was excellent.
What about the implementation team?
We did an in-house implementation with support from engineers.
What was our ROI?
In terms of ROI, we do not know this yet.
What's my experience with pricing, setup cost, and licensing?
I'd advise new users to be sure to get all information about the cost and licensing first.
Which other solutions did I evaluate?
No, we did not evaluate other options first.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security Consultant at Wirespeed
Works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use
Pros and Cons
- "I would rate the stability a ten out of ten."
- "While it's great, there's always room for improvement. Adding capabilities for automatic deployment in an enterprise environment would be useful."
What is our primary use case?
Mobile security, on top of MDM, is the primary use case. Some clients use mobile device management, and we provide additional common security capabilities. This includes vendor locking, where the end solution restricts access to corporate resources based on app management. Check Point does this very well, without issues on mobile devices. There aren't many players in this space, so it's a good, stable solution. You get the results you expect, and it's very quick to set up (around 5 minutes).
What needs improvement?
While it's great, there's always room for improvement. Adding capabilities for automatic deployment in an enterprise environment would be useful. Also, the ability to see licenses per mobile device would be handy.
So, in future releases, the ability to see the environment and licensing per device would be good.
For how long have I used the solution?
I have been working with this solution for three years. It's the best solution I have at the moment.
What do I think about the stability of the solution?
I would rate the stability a ten out of ten.
What do I think about the scalability of the solution?
It is a scalable solution. I would rate the scalability a ten out of ten. We have enterprise-level customers.
How are customer service and support?
The solution doesn't require much support.
How was the initial setup?
I would rate my experience with the initial setup a ten out of ten, where one is difficult and ten is easy.
The management console is on the cloud. The deployment takes around five to ten minutes.
What about the implementation team?
For the deployment process, you basically create your account in the Harmony Mobile portal (Infiniti Portal on Check Point).
Then, you configure the user and send them an email containing a QR code for app installation instructions. They download the app from the App Store or Play Store, scan the code, and it configures itself, appearing on the cloud portal. Very quick.
What's my experience with pricing, setup cost, and licensing?
The price is okay. Per user, it should be something like five or ten dollars. But, we usually get discounts that drive the cost down.
What other advice do I have?
It's a very good mobile security solution for protecting phones. It works seamlessly with mobile devices and has good detection capabilities without interrupting your daily phone use. It gives you a lot of visibility into security aspects, including rating every application.
On the cloud portal, you can see a security rating for every application on the phone and get low-level details of what that application has access to on your phone. Overall, it's a very good solution.
Overall, I would rate the solution a ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
A good choice for a phishing and malware-free mobile
What is our primary use case?
If you're looking for ways to ensure that your mobile is phishing-free and malware-free, then Harmony Mobile is a good choice.
What is most valuable?
The feature I find the most valuable is the confirmation of all the apps on your mobile, which is clean.
What needs improvement?
In Harmony Mobile mobile, there is a part for network protection and it actually affects some Messenger apps. For example, in the LINE app, you can receive important messages from friends if you turn on the option in the default settings.
For how long have I used the solution?
I have been using Harmony Mobile for about two years.
What do I think about the stability of the solution?
The solution is stable. I have not had any downtime while using it. The management server only controls the policy changes, so even if the management is down, the app works.
What do I think about the scalability of the solution?
It is a scalable solution.
How are customer service and support?
The technical support is great. I would give it an eight out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup was quite easy for me. It was deployed within one day.
What's my experience with pricing, setup cost, and licensing?
I think that the pricing is neither cheap nor expensive. I would say it's average.
What other advice do I have?
Overall, I would rate the solution a seven out of ten just because I think that certain aspects could be improved.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementor
Information Technology Security Specialist at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Easy to use with an excellent variety of capabilities
Pros and Cons
- "Harmony Mobile's most valuable feature is the variety of capabilities in the platform, including allowing you to track device status."
- "Harmony Mobile could be improved with increased built-in DLP coverage."
What is our primary use case?
I use Harmony Mobile integrated with our MDM platform to manage mobile devices.
What is most valuable?
Harmony Mobile's most valuable feature is the variety of capabilities in the platform, including allowing you to track device status.
What needs improvement?
Harmony Mobile could be improved with increased built-in DLP coverage.
For how long have I used the solution?
I've been using Check Point Harmony Mobile for two and a half years.
What do I think about the stability of the solution?
Harmony Mobile is stable.
What do I think about the scalability of the solution?
Harmony Mobile is scalable.
How was the initial setup?
The initial setup is easy, and deployment takes just a couple of minutes.
What about the implementation team?
We used an in-house team.
Which other solutions did I evaluate?
I also evaluated VMware AirWatch, but I find Harmony Mobile to be a better solution.
What other advice do I have?
Because of its ease of use and the coverage you get for the blurred boundary of mobile devices, Harmony Mobile gives you coverage whether you're using a BYOD, COPE, or COBO framework. I would give Harmony Mobile a rating of nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Product Categories
Mobile Threat DefensePopular Comparisons
McAfee MVISION Mobile
Symantec Endpoint Protection Mobile
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros
sharing their opinions.