Share your experience using Zimperium

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 84,000+ reviews on PeerSpot:

Anuraj Nair - PeerSpot reviewer
Presales Engineer at SNSIN
Real User
Top 5Leaderboard
Provides good threat detection and prevention, but it lacks MDM capabilities present in other MDM products
Pros and Cons
  • "The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS."
  • "Check Point Harmony Mobile lacks MDM capabilities, which are present in other MDM products, like IBM Security MaaS360, AirWatch, and Google Workspace."

What is most valuable?

The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS. Check Point Harmony Mobile is a good option for users who want only incoming and outgoing traffic security for their Android and iOS devices.

What needs improvement?

Check Point Harmony Mobile lacks MDM capabilities, which are present in other MDM products, like IBM Security MaaS360, AirWatch, and Google Workspace.

For how long have I used the solution?


What do I think about the stability of the solution?

Check Point Harmony Mobile is a stable solution.

I rate the solution a nine out of ten for stability.

What do I think about the scalability of the solution?

Around two to three customers are using Check Point Harmony Mobile.

I rate the solution’s scalability a six out of ten.

How are customer service and support?

The technical support team's response time should be faster. Also, the engineers should come up with a proper solution plan, which is currently missing.

Which solution did I use previously and why did I switch?

I have previously worked with Azure MDM, IBM Security MaaS360, and VMware AirWatch. The solution has better threat detection capabilities and catch rates than other mobile security vendors.

What about the implementation team?

The solution’s deployment takes around five minutes. To deploy the solution, you need to deploy the agent to the endpoint Android. It will then be listed in the Infinity portal, and you can start configuring.

You need to download the agent from the Infinity portal, put it on your mobile, install it, and activate it. It will be reflected in the Infinity portal, and you can then configure the policy.

What was our ROI?

Check Point Harmony Mobile can help you with regulation compliance. Customers will secure all infrastructure that belongs to them because they are managing that infrastructure. However, they don't have any control over mobile devices connected to their network. Any threats to those particular devices can also affect your infrastructure if they are connected without any protection.

Check Point Harmony Mobile will ensure the device is clean in such cases. Even if the device gets connected to your infrastructure, there won't be any infection or any impact happening to your infrastructure.

What's my experience with pricing, setup cost, and licensing?

Users have to pay a yearly licensing fee for each device, which is cheap.

What other advice do I have?

Check Point Harmony Mobile is not so attractive and provides security only for mobile devices. Customers can use Check Point Harmony Mobile to secure their mobile devices, such as Android or Mac smartphones. However, it has less capability than an MDM (Mobile device management).

Check Point Harmony Mobile has a good advantage in terms of security posture and security threat detection and prevention. Check Point Harmony Mobile will help prevent 99% of attacks on mobile devices. It is easy to manage Check Point Harmony Mobile.

People bring their own devices and connect them to all the other unwanted networks. This causes traffic to flow to these devices from any network source, such as Wi-Fi, LAN, or other public networks. Deploying Check Point Harmony Mobile can ensure the endpoint is sanitized and clean for use at home and the workplace.

Overall, I rate the solution a six out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Flag as inappropriate
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Real User
Top 5Leaderboard
Offers ease of management and can be installed effortlessly
Pros and Cons
  • "The product's initial setup phase is very straightforward."
  • "At times, when configuring policies, the tool takes some time to apply the policy."

What is our primary use case?

I use the solution in my company so that whoever the mobile users are and those who use the corporate applications, we can secure communication from the corporate application to the outside network. My company uses Check Point Harmony Mobile through the browser to secure our applications, as well as to secure the communication between customers and other users.

What is most valuable?

The most effective features of the product stem from its ability to deal with areas like data security and application security while also being useful to users who use mobiles in roaming mode and those who use a personal mobile phone with corporate applications in it.

What needs improvement?

At times, when configuring policies, the tool takes some time to apply the policy. If I configure a new policy and apply it to the management console, it may take time. The product should work on policy enforcement so that users can quickly enforce the policies within a fraction of a second.

For how long have I used the solution?

I have been using Check Point Harmony Mobile for three years.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten. Some customers of the tool face some issues in their environment with respect to policy enforcement.

What do I think about the scalability of the solution?

It is a very easily scalable solution. 

My company deals with a very limited set of customers of the product. The tool's competitors have been very aggressive with the mobile browser part, especially the ones offering MDM solutions. Those who use firewall products from Check Point are very happy to acquire and use Check Point Harmony Mobile.

How are customer service and support?

As and when required, the solution's technical support helps users with troubleshooting. The solution's technical support is good, and it responds quickly.

How was the initial setup?

The product's initial setup phase is very straightforward.

For the product's deployment phase, you just need to install the agent to the end user and configure the policy on the cloud management console.

The solution's deployment phase is a one-day task.

What was our ROI?

In terms of ROI, the product helps secure your application, mobile, and data.

What's my experience with pricing, setup cost, and licensing?

There is a need to make yearly payments towards the licensing costs attached to the product. You can opt for a one-year, three-year, or five-year license. There is a separate team that handles the pricing part of the product, and depending on the customers or order quantity they handle, I believe that 60 or 70 percent discounts on the prices are offered. There are no additional costs attached to the product.

What other advice do I have?

The tool helped prevent potential security threats whenever some users communicate from their mobile with someone outside our company since, at such a time, the product secures the communication as well as the data. With the tool, no confidential data goes outside from the inside of our company. Our company can block data leakage from mobile phones to the outside environment of our organization.

The threat detection and response capabilities of the tool benefit the company in scenarios where a user wants to send out some confidential data outside the company through the browser, which would not be possible If the organization uses Check Point Harmony Mobile. The tool shows how our company can secure the user, as well as how we can prevent data leakage from the inside to the outside of the organization.

The product provides users with ease of management. It is a simple tool that allows users to configure some of the policies for a user or a user-based group and apply them to the solution.

According to Gartner's website, the tool's stability and support as a security provider places it in the leader category.

The tool helps respond to emerging corporate threats, especially those who use corporate applications on their personal devices. If you want to secure your corporate applications, you have to adopt Check Point Harmony Mobile.

If you use corporate applications on your personal mobile device and you want to secure your applications and data, then you have to use Check Point Harmony Mobile.

I rate the tool a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate