Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Mobile vs Zimperium comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Mobile
Ranking in Mobile Threat Defense
1st
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
60
Ranking in other categories
No ranking in other categories
Zimperium
Ranking in Mobile Threat Defense
2nd
Average Rating
9.0
Reviews Sentiment
8.1
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2026, in the Mobile Threat Defense category, the mindshare of Check Point Harmony Mobile is 11.9%, down from 14.3% compared to the previous year. The mindshare of Zimperium is 26.9%, down from 29.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Mobile Threat Defense Market Share Distribution
ProductMarket Share (%)
Check Point Harmony Mobile11.9%
Zimperium26.9%
Other61.2%
Mobile Threat Defense
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Unified across devices and mobile threats are automatically blocked before damage occurs
The best feature of Check Point Harmony Mobile is the Mobile Threat Defense because it detects and blocks phishing attempts, malicious apps, man-in-the-middle attacks, and device exploits, which is especially critical in BYOD and remote work environments. The Mobile Threat Defense feature in Check Point Harmony Mobile has been very effective, especially in catching threats that target employees outside of traditional email channels. For example, there was a smishing attempt where a user received a text message with links disguised as package delivery updates. Check Point Harmony Mobile analyzed the link in real-time, flagged it as malicious, and blocked access before anyone could enter credentials, which prevented what could have been a widespread credential harvesting attack. Device Management and Remote Work Support are two additional aspects of Check Point Harmony Mobile that are especially valued. Device Management continuously checks device posture, including things like OS version, patch level, and whether a device is jailbroken or rooted. Remote Work Support allows employees to securely access email, collaboration tools, and files from anywhere without worrying about phishing links, malicious apps, and unsafe Wi-Fi networks. Check Point Harmony Mobile has positively impacted the organization, especially with phishing protections, as SMS or messaging-based phishing attempts are now blocked before users can click, preventing credential theft. Measurable outcomes since deploying Check Point Harmony Mobile highlight its impact on both security and compliance. Mobile-related security incidents have dropped by approximately 40 to 50 percent compared to before deployment.
user5010 - PeerSpot reviewer
CEO at a tech services company with 11-50 employees
Straightforward initial setup, it took less than a week to get everybody up and running
We are using the latest version of this solution. My primary use case is for mobile device protection The middleman protection and the WiFi protection are the most valuable features.  General reporting can be improved. The logs only last a short period of time so reporting could be improved,…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most impressive thing is the SSL VPN Portal."
"The other most valuable service so far has been the assistance provided to us by the Check Point Harmony mobile engineers. They have been so awesome and helpful to us during the setup process."
"The best thing about the product is that it is transparent and does not impact the users."
"The ease of use, along with comprehensive protection for all devices, is a key advantage. It provides visibility into malicious applications installed on the phone."
"Check Point Harmony Mobile is the best solution to secure user mobile devices and company data."
"The best part of Check Point Harmony Mobile is its ability to deliver real-time on-device threat detection without compromising device performance."
"I would rate the stability a ten out of ten."
"The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected."
"Look at other options but ultimately, this solution offers possibly one of the best solutions out there."
 

Cons

"The feature set between the Android and Apple devices is not fully equal."
"It would be super helpful if there were more details around the risks that were found on our mobile devices."
"We don't have Google MDM being supported by the solution as of yet. It is a feature requirement... They are aware that it is something that I need. My objective is to be able to have the MDM integration and to have some level of control over the asset itself."
"The project point needs improvement."
"The reporting dashboard could be more flexible. Currently, it is somewhat limited in terms of customizing views or filtering data by user groups and device type."
"The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not."
"The one area where Check Point Harmony Mobile can be improved is cost-wise because compared to other vendors, the cost is a little bit higher."
"My experience with pricing, setup cost, and licensing is that it is very expensive."
"General reporting can be improved. The logs only last a short period of time, so reporting could be improved."
 

Pricing and Cost Advice

"I rate the tool's pricing a three out of ten."
"We didn't actually purchase the software. It was given to us by Check Point. We are using it as a test bed for possible future customers."
"At the moment, the price is good, but there is always scope for amelioration when it comes to pricing. When pricing is lower, it can make a customer buy the product. Customers ask us about the price of the product before allowing us to explain the functionality to them."
"Its cost depends upon the number of users."
"Users have to pay a yearly licensing fee for each device, which is cheap."
"The product pricing is reasonable for the security it provides."
"Pricing is a little high."
"The price is okay. Per user, it should be something like five or ten dollars. But, we usually get discounts that drive the cost down."
"There could be more clarity regarding the pricing."
report
Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
881,733 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Manufacturing Company
10%
Outsourcing Company
7%
Security Firm
7%
Financial Services Firm
15%
Manufacturing Company
12%
Computer Software Company
12%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business37
Midsize Enterprise15
Large Enterprise22
No data available
 

Questions from the Community

What do you like most about Check Point Harmony Mobile?
The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS.
What is your experience regarding pricing and costs for Check Point Harmony Mobile?
My experience with pricing, setup cost, and licensing for Check Point Harmony Mobile is that pricing can be a little bit lower, which would be good because other antivirus solutions are significant...
What needs improvement with Check Point Harmony Mobile?
While Check Point Harmony Mobile is a strong solution, there are a few areas where improvement could make it even more effective and user-friendly, such as more granular policy controls.
Ask a question
Earn 20 points
 

Also Known As

Check Point Mobile Access, Check Point SandBlast Mobile
No data available
 

Overview

 

Sample Customers

Samsung Research America, Mississippi Office of the Secretary of State
Large global telco, global leader in financial services
Find out what your peers are saying about Check Point Software Technologies, Zimperium, Lookout and others in Mobile Threat Defense. Updated: January 2026.
881,733 professionals have used our research since 2012.