

Find out what your peers are saying about Check Point Software Technologies, Zimperium, Lookout and others in Mobile Threat Defense.
It reduced the cost of data breaches.
Incidents have dropped by around 15% since we started using Check Point Harmony Mobile.
Our ROI with Harmony Mobile has been strong, we have prevented multiple phishing and malware incidents in mobile devices saving time, potential breaches, and compliance-related costs.
Their team is responsive, knowledgeable and proactive in resolving issues and providing guidance.
The support for Check Point Harmony Mobile was excellent, both for technical support and other aspects.
Customer support for Check Point Harmony Mobile is very great.
IBM's support and technical service were helpful when needed.
Check Point Harmony Mobile is scalable and can be integrated with our existing security infrastructure.
Harmony mobile scales easily with growing device fleets making it well suited for both small teams and large enterprises.
Check Point Harmony Mobile's scalability is good, and I have been able to add more users or devices easily as my organization has grown.
Harmony mobile has proven to be highly stable in our environment with consistent performance and no major downtime or crashes.
Check Point Harmony Mobile is absolutely stable with no downtime, and it is working excellently.
Check Point Harmony Mobile is very stable.
Granular admin roles would help, as adding more flexible role-based access control within the Infinity Portal would help large teams delegate responsibilities without overexposing sensitive settings and data.
While it is worth the investment given the increased security and improved user experience, it is definitely a significant expense.
Check Point Harmony Mobile is strong but could improve in reducing alert fatigue, sometimes we get too many notifications which can overwhelm users and IT staff.
It is a significant expense, but it is worth the investment given the increased security and improved user experience.
Harmony Mobile's pricing is per device and generally affordable especially when bundled with other harmony solutions.
The pricing for Check Point Harmony Mobile was higher than expected, but the setup cost and other aspects were a good experience.
The pricing and licensing experience with IBM MaaS360 was satisfactory and not expensive.
Check Point Harmony Mobile's advanced threat prevention capabilities have been very effective in blocking these threats.
Network protection especially against unsafe wifi has been crucial for securing remote work.
Check Point Harmony Mobile has positively impacted my organization by saving time and providing better security.
The main benefit of IBM MaaS360 is phone control and rollout.
| Product | Mindshare (%) |
|---|---|
| Check Point Harmony Mobile | 11.4% |
| Zimperium | 26.1% |
| Lookout | 18.5% |
| Other | 44.0% |
| Product | Mindshare (%) |
|---|---|
| IBM MaaS360 | 6.7% |
| Microsoft Intune | 23.8% |
| Workspace ONE UEM | 10.9% |
| Other | 58.6% |
| Company Size | Count |
|---|---|
| Small Business | 38 |
| Midsize Enterprise | 14 |
| Large Enterprise | 23 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 7 |
| Large Enterprise | 12 |
Check Point Harmony Mobile offers comprehensive protection through real-time threat detection, device encryption, and intuitive use, safeguarding apps and networks by blocking phishing, malicious apps, and unsafe Wi-Fi.
Providing robust mobile security, Check Point Harmony Mobile seamlessly integrates with environments for enhanced protection without compromising performance. It addresses security gaps with features like URL filtering, anti-phishing, and comprehensive reporting. Valuable for BYOD scenarios, it oversees and secures mobile activities against phishing and malware threats, preserving corporate data on iOS and Android.
What are the key features of Check Point Harmony Mobile?Many industries, including those with high data sensitivity such as finance and healthcare, implement Check Point Harmony Mobile for mobile security. Its ability to integrate with mobile device management solutions ensures protection from threats like unauthorized access and malware. Organizations benefit from its real-time capabilities to maintain secure and efficient operations.
IBM MaaS360 enhances mobile device management with tracking, security, app deployment, policy management, and integration with Apple DEP and Android Enterprise. It supports remote control, cost efficiency, and is user-friendly, suitable for both corporate and BYOD environments.
MaaS360 offers a comprehensive suite for managing and securing mobile devices. With features like encryption, passcode enforcement, and containerization, it ensures data security and compliance. MaaS360 simplifies app deployment via distribution groups and integrates seamlessly with Apple and Android systems. Its focus on kiosk mode, application security, and automated provisioning make it a strategic choice for companies prioritizing a robust endpoint management strategy. Though it offers extensive options, improvements in notifications, user management, and Microsoft integration are needed.
What are the most important features of IBM MaaS360?IBM MaaS360 finds applications in industries needing robust mobile device management and security. Enterprises deploy it widely to ensure compliance and safeguard corporate data, providing application control, data leak prevention, and secure email management. It is used for configuring policies for field staff and enabling efficient device enrollment, significantly cutting initial setup costs.
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.