

Find out what your peers are saying about Check Point Software Technologies, Zimperium, Lookout and others in Mobile Threat Defense.
It reduced the cost of data breaches.
Incidents have dropped by around 15% since we started using Check Point Harmony Mobile.
Our ROI with Harmony Mobile has been strong, we have prevented multiple phishing and malware incidents in mobile devices saving time, potential breaches, and compliance-related costs.
Their team is responsive, knowledgeable and proactive in resolving issues and providing guidance.
The support for Check Point Harmony Mobile was excellent, both for technical support and other aspects.
Customer support for Check Point Harmony Mobile is very great.
Support responds immediately, but I see that some engineers are new or they don't have experience collecting logs, so they take two to three days to come back.
The support side has recently become weaker compared to what it used to be with VMware.
Check Point Harmony Mobile is scalable and can be integrated with our existing security infrastructure.
Harmony mobile scales easily with growing device fleets making it well suited for both small teams and large enterprises.
Check Point Harmony Mobile's scalability is good, and I have been able to add more users or devices easily as my organization has grown.
Harmony mobile has proven to be highly stable in our environment with consistent performance and no major downtime or crashes.
Check Point Harmony Mobile is absolutely stable with no downtime, and it is working excellently.
Check Point Harmony Mobile is very stable.
Granular admin roles would help, as adding more flexible role-based access control within the Infinity Portal would help large teams delegate responsibilities without overexposing sensitive settings and data.
While it is worth the investment given the increased security and improved user experience, it is definitely a significant expense.
Check Point Harmony Mobile is strong but could improve in reducing alert fatigue, sometimes we get too many notifications which can overwhelm users and IT staff.
Another concern is that support is getting reduced by Workspace ONE; some customers are saying there are support issues on Workspace ONE right now.
The documentation is not comprehensive compared to other VMware solutions or Microsoft documentation.
It is a significant expense, but it is worth the investment given the increased security and improved user experience.
Harmony Mobile's pricing is per device and generally affordable especially when bundled with other harmony solutions.
The pricing for Check Point Harmony Mobile was higher than expected, but the setup cost and other aspects were a good experience.
Check Point Harmony Mobile's advanced threat prevention capabilities have been very effective in blocking these threats.
Network protection especially against unsafe wifi has been crucial for securing remote work.
Check Point Harmony Mobile has positively impacted my organization by saving time and providing better security.
In UEM, the most helpful part of Windows Management is the baseline policy and central script; using this, you can replace all the AD GPO policy.
In terms of assessing the capability of Workspace ONE UEM in maintaining compliance across all endpoints, that's a very handy feature set.
| Product | Mindshare (%) |
|---|---|
| Check Point Harmony Mobile | 11.4% |
| Zimperium | 26.1% |
| Lookout | 18.5% |
| Other | 44.0% |
| Product | Mindshare (%) |
|---|---|
| Workspace ONE UEM | 10.5% |
| Microsoft Intune | 22.3% |
| ManageEngine Endpoint Central | 7.7% |
| Other | 59.5% |

| Company Size | Count |
|---|---|
| Small Business | 38 |
| Midsize Enterprise | 14 |
| Large Enterprise | 23 |
| Company Size | Count |
|---|---|
| Small Business | 40 |
| Midsize Enterprise | 22 |
| Large Enterprise | 58 |
Check Point Harmony Mobile offers comprehensive protection through real-time threat detection, device encryption, and intuitive use, safeguarding apps and networks by blocking phishing, malicious apps, and unsafe Wi-Fi.
Providing robust mobile security, Check Point Harmony Mobile seamlessly integrates with environments for enhanced protection without compromising performance. It addresses security gaps with features like URL filtering, anti-phishing, and comprehensive reporting. Valuable for BYOD scenarios, it oversees and secures mobile activities against phishing and malware threats, preserving corporate data on iOS and Android.
What are the key features of Check Point Harmony Mobile?Many industries, including those with high data sensitivity such as finance and healthcare, implement Check Point Harmony Mobile for mobile security. Its ability to integrate with mobile device management solutions ensures protection from threats like unauthorized access and malware. Organizations benefit from its real-time capabilities to maintain secure and efficient operations.
Workspace ONE UEM is a comprehensive platform for centralized device management offering advanced security and seamless integration. It's ideal for managing mobile and IoT devices, providing centralized administration capabilities for businesses.
Workspace ONE UEM stands out due to its user-friendly interface and extensive multi-platform support. It provides policy-driven device control, advanced application and content management, and secure remote access. Its excellent third-party integration and strong security measures make it particularly beneficial for managing devices across different platforms. The platform is tailored for businesses looking for scalable solutions that support BYOD policies, application deployment, and user authentication. While praised for stability and comprehensive features like email management, there are calls for improved integration with Active Directory and better pricing strategies.
What are the most important features?Organizations across industries implement Workspace ONE UEM for its sophisticated management strategies, critical in sectors like healthcare for secure patient data management, finance for compliance, and education for supporting diverse device policies. Its integration capabilities make it essential for sectors requiring stringent security and seamless operational workflows.
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.