Coming October 25: PeerSpot Awards will be announced! Learn more

Check Point Harmony Mobile OverviewUNIXBusinessApplication

Check Point Harmony Mobile is #1 ranked solution in top Mobile Threat Defense tools. PeerSpot users give Check Point Harmony Mobile an average rating of 9.2 out of 10. Check Point Harmony Mobile is most commonly compared to Check Point Remote Access VPN: Check Point Harmony Mobile vs Check Point Remote Access VPN. Check Point Harmony Mobile is popular among the large enterprise segment, accounting for 51% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 22% of all views.
Check Point Harmony Mobile Buyer's Guide

Download the Check Point Harmony Mobile Buyer's Guide including reviews and more. Updated: September 2022

What is Check Point Harmony Mobile?

Check Point Harmony Mobile is a unified security solution for user devices and access. It is a complete threat defense solution for mobile devices that prevents cyberattacks and enforces security for remote workers and users. It prevents threats on apps, networks, and OS while enhancing the user experience and preventing the disruption of device performance. 

Check Point Harmony Mobile Benefits

Some benefits of Harmony Mobile include: 

  • Advanced app analysis that detects known and unknown threats
  • Mitigates threats regardless of the mobile management platform or what the user is doing
  • Prevents infected devices to send data to botnets
  • Blocks phishing attacks on social media, email, and messaging

Harmony Mobile integrates with UEM systems to assess the device’s level of risk. The UEM quarantines and activates security policies, such as blocking access to corporate assets. 

Check Point Harmony Mobile Key Features

Harmony Mobile's key features include: 

  • App protection: The platform detects and blocks the download of malicious applications in real-time. It runs the application in a cloud-based environment and tests it by leveraging techniques such as sandboxing, advanced static analysis, anomaly detection, and other techniques. By doing so, it prevents malware from infiltrating employees’ mobile devices. 
  • Network protection: The platform’s unique infrastructure extends Check Point security capabilities to mobile devices. It includes features such as anti-phishing, safe browsing, conditional access, anti bot, and URL filtering. 
  • Simple and easy to use management: Check Point Harmony Mobile integrates with almost all mobile management solutions (MDM/UEM), and supports BYOD programs and remote work settings. It delivers scalability and efficiency with zero-touch deployment. The system works for all Android deployment models. The management console is cloud-based, delivering visibility over the risk posture and enabling admins to roll granular policies. 
  • User friendly: The platform is easy to adopt, with no disruption of the user experience or the device's usability. The system delivers detailed threat notifications in real time as well as weekly reports. The platform doesn’t impact battery life or data consumption. Additionally, it keeps the user and corporate data private without collecting or analyzing personal information. Finally, the platform anonymizes the context metadata from apps and networks it uses for analysis.  

Check Point Harmony Mobile Components 

  • Behavioral risk engine: The engine uses data received from the app about the network, configuration, and OS data integrity, detects and analyzes suspicious activity, and produces a risk score.
     
  • Mobile gateway: A multi-tenant architecture and mobile devices are registered. The gateway manages the solution communications with connected mobile devices and with the dashboard.
     
  • Management dashboard: The dashboard enables administration, provisioning, and monitoring of devices and policies. It integrates with Unified Endpoint Management.

  • Mobile Protect app: This lightweight app for iOS and Android collects data and analyzes threats to devices. It monitors the operating systems, applications, and network behavior and collects data to detect malicious behavior.

  • ThreatCloud: A database with real-time threat intelligence on indicators of compromise from hundreds of thousands of Check Point gateways and millions of endpoints worldwide.  

Check Point Harmony Mobile Capabilities

  • Prevents malicious app downloads
  • Prevents phishing on applications
  • Prevents man-in-the-middle attacks
  • Stops infected devices from accessing corporate applications
  • Detects OS exploits

Reviews from Real Users

"The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly," says G.S., a Manager of Infrastructure Services at an energy/utilities company.

Kadeem C., an IT Security Analyst at an energy/utilities company, says, "I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."

Oleg P., Senior Network/Security Engineer at Skywind Group, says, "The most impressive thing is the SSL VPN Portal."

Hans V., an Engineer at Caldoo, adds that “We've found that the product is quite stable."

Check Point Harmony Mobile was previously known as Check Point Mobile Access, Check Point SandBlast Mobile.

Check Point Harmony Mobile Customers

Samsung Research America, Mississippi Office of the Secretary of State

Check Point Harmony Mobile Video

Check Point Harmony Mobile Pricing Advice

What users are saying about Check Point Harmony Mobile pricing:
  • "Check Point provides a separate license in cases where organizations want to use this only on mobile devices, or laptops/desktops."
  • "Regarding the cost of licenses, each device consumes one, even if it has both professional and personal profiles."
  • "At the moment, the price is good, but there is always scope for amelioration when it comes to pricing. When pricing is lower, it can make a customer buy the product. Customers ask us about the price of the product before allowing us to explain the functionality to them."
  • "The quality, price, and support ratio are very good."
  • Check Point Harmony Mobile Reviews

    Filter by:
    Filter Reviews
    Industry
    Loading...
    Filter Unavailable
    Company Size
    Loading...
    Filter Unavailable
    Job Level
    Loading...
    Filter Unavailable
    Rating
    Loading...
    Filter Unavailable
    Considered
    Loading...
    Filter Unavailable
    Order by:
    Loading...
    • Date
    • Highest Rating
    • Lowest Rating
    • Review Length
    Search:
    Showingreviews based on the current filters. Reset all filters
    Basil Dange - PeerSpot reviewer
    Senior Manager at a financial services firm with 10,001+ employees
    Real User
    Top 5Leaderboard
    Secures and segments corporate and personal data, offers remote secure-wipe capabilities, but the reporting is complicated
    Pros and Cons
    • "Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet."
    • "The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not."

    What is our primary use case?

    The primary use case is to enable access to any corporate application hosted on-premises or in the cloud using a mobile device with single sign-on (SSO) capabilities.

    It provides IT admins capabilities for granting access to corporate applications or data on mobile devices and should be able to securely monitor and manage the mobile devices that access sensitive business data. It includes storing essential information about mobile devices, deciding which apps can be present on the devices, and locating devices.

    This product should be able to remove corporate applications and data on enrolled devices remotely, known as an enterprise wipe, in case a device is stolen, lost, or if the user leaves the organization.

    Corporate data should be securely stored on mobile devices and the user should not be able to share data from corporate apps/data to personal storage.

    How has it helped my organization?

    Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet.

    A separate workspace is created on the enrolled mobile, which partitions corporate data from personal data. Policies can restrict users from copying any app/data from corporate to personal storage and vise versa. 

    Users are able to login to corporate applications using single sign-on.

    DLP policy prevents data leakage issues, which cannot be prevented if applications are published directly without any MDM solution.

    Enterprise wipe gives us the capability to remove applications and data from enrolled devices remotely in cases where one is lost, stolen, or for any other reason. 

    Organizations can prevent device enrollment in cases where a device is rooted/jailbroken.

    What is most valuable?

    Enrollment is based on the user name and the admin needs to create an enrollment policy. The enrollment email goes to users who are entitled to enrollment via Capsule. Each user needs to manually click and add the Token, which is sent via email and used for providing and restricting access.

    Licenses are taken from Check Point for the number of users who need to be enrolled via Capsule. 

    No additional hardware or setup is required for Capsule configuration, as it can be enabled on the same security gateway. This reduces any additional hardware cost, as well as for setup and connectivity.

    Configuration is straightforward and can be controlled on the same NGFW as Capsule. This is used for providing access to users.

    What needs improvement?

    Reporting is quite complicated once more users are enrolled and they need disparate access. It needs to be maintained separately, which adds work for the admin and can lead to errors.

    Enrollment emails are sent for each device, which means that when a user needs to change devices or enroll more than one, admins need to generate and send additional tokens.

    The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not.

    For example:

    • HR sharing certain learning videos or documents to a group of users. The solution does not provide reports as to whether these have been accessed by the user or not.
    • It does not provide a solution in the case where a device is being shared by multiple users
    • A site where one iPad is being shared between five users is a problem. Each user has their own access to the device but this solution does not have the capabilities of providing each user with specific access to data or applications.
    Buyer's Guide
    Check Point Harmony Mobile
    September 2022
    Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
    633,184 professionals have used our research since 2012.

    For how long have I used the solution?

    We are not using Check Point Harmony Mobile for now.

    What do I think about the stability of the solution?

    This product is stable, just like any other Check Point solution.

    What do I think about the scalability of the solution?

    It can be scaled by adding more security gateways and enabling the license. It is done in the same manner as a Check Point firewall.

    How are customer service and support?

    The technical support is excellent.

    Which solution did I use previously and why did I switch?

    We used this solution and then moved to a different one.

    How was the initial setup?

    The initial setup is straightforward.

    The process involves getting a license from Check Point and enabling a module/blade on the security gateway. After this, start on the configuration (Published data, which needs to be made available on the endpoint to access).

    What about the implementation team?

    Our in-house team completed the deployment with OEM support.

    What was our ROI?

    Using this firewall improves productivity and availability for enrolled endpoints. Published data can be accessed anytime on a mobile device.

    What's my experience with pricing, setup cost, and licensing?

    Check Point provides a separate license in cases where organizations want to use this only on mobile devices, or laptops/desktops. Check Point Total includes both mobile devices and endpoints. 

    Setup can be done on the existing security gateway or it can be done on a dedicated security gateway where there are a large number of users.

    Checkpoint provides five user licenses by default.

    What other advice do I have?

    The organization should be clear on the requirements. If it is only for publishing a few web apps, URLs, email, or for a few shared drives, then the solution works absolutely fine. However, it is not a full-fledged MDM solution like VMware AirWatch/Citrix/Blackberry and more.

    These solutions all provide more MDM capabilities than Capsule.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Manager, Infrastructure Services at a energy/utilities company with 1,001-5,000 employees
    User
    Top 20
    Straightforward to setup with great technical support and an excellent admin portal
    Pros and Cons
    • "The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly."
    • "The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing."

    What is our primary use case?

    We were lacking threat detection and device-level protection in our mobile device space.  We are an Apple shop exclusively and although Apple does a good job at vetting apps and developers in the Apple App Store, we were lacking protection beyond that. The Harmony Mobile Protect suite really gave us the confidence of protection and real-time threat level safeguards. Users have the confidence to know that the data on their devices is safe. It's a great solution that has a proven track record in the mobile space.   

    How has it helped my organization?

    Harmony Mobile Protect has improved the confidence of the users in knowing their mobile device and data is protected. It is shocking to see how many sites, apps, and links to content were vulnerable to threats and security gaps. Users found themselves going to what they thought were innocent sites and in-app purchases that led them to a vulnerability.  To be fair, some legitimate apps, links, and content were flagged and all we needed to do is make adjustments to the white lists and users were able to access that data with no issue.   

    What is most valuable?

    The app just runs in the background and keeps the device safe. The real-time scan is awesome and really delivers that value-add component to threat defense and a holistic approach to mobile device protection. The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly. Tracking users, seeing devices and their current state at a glance is very helpful. Reporting is also a great value add to this product. Seeing the areas of concern and making adjustments to tighten the gaps is very helpful and a value add.

    What needs improvement?

    The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing. A simple refresh of that device corrects the issue and displays real-time data. Overall, it works well and the improvements so far for this product have been great. Allowing the user to control the real-time scan is important. In recent updates of the app version, this can be achieved easily, but the user doesn't always see that. Perhaps making a separate button or leveraging the menu ribbon for this feature may work better.   

    For how long have I used the solution?

    I've worked with the solution for 3 months now.

    What do I think about the stability of the solution?

    After the initial setup, of course there was some tweaking, but the platform It' very solid. We have had no issues thus far with the stability.  There have been a few updates that were low to no impact.  More enhancement based updates.  

    What do I think about the scalability of the solution?

    So far, we have found it to be very scalable. That was the main selling point for us on this product.

    How are customer service and technical support?

    We did have some issues come up and required technical support. The support team was awesome and really knew how to address the issues we were having. The problems were fixed and we were back on the road in no time.

    Which solution did I use previously and why did I switch?

    We did not. This is our first product for mobile device threat protection and real-time scanning. 

    How was the initial setup?

    It was pretty straightforward. We had a solutions engineer walk us through things and helped us tie into our MDM, which went well.  

    What about the implementation team?

    We implemented through Check Point directly for the POC and then continued with licenses. The setup with Check Point went great and we were very happy to have that level of expertise on hand. Their solutions engineers are top-notch and we were very pleased. 

    What was our ROI?

    We are new to using this product, so we have not been able to capture the ROI as of yet.

    What's my experience with pricing, setup cost, and licensing?

    We had a very positive experience with this. The cost is the amount of devices times the number of licensing and the setup fees. We were up and running quickly. I do highly recommend leveraging a demo of this product. It really shows the depth of the product and the value-add to the customer.  

    Which other solutions did I evaluate?

    No, we have a vested interest with Check Point Mobile and we looked at their product line first, and was sold.  

    What other advice do I have?

    Harmony Protect is a great solution and really stands up to threat protection and device defense.  

    Which deployment model are you using for this solution?

    Private Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Check Point Harmony Mobile
    September 2022
    Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
    633,184 professionals have used our research since 2012.
    Javier Garcia Martinez - PeerSpot reviewer
    Head of Special Projects Unit-RCJA (SANDETEL) at Junta de Andalucia
    User
    Top 20
    Easy to implement, simple to maintain policies, and does not disrupt end-user functionality
    Pros and Cons
    • "It has been very easy to implement and deploy."
    • "It could expand the functionalities to, in addition to security functionality, incorporate Mobile Device Management (MDM) functionalities such as remote device management, administration of installed applications, etc."

    What is our primary use case?

    The goal is to implement Harmony Mobile in the entire fleet of devices of the Government of the Junta de Andalucia. We are talking about a total of about 60,000 terminals. A pilot of the solution has started and it will be implemented in all the terminals that are renewed in the corporate network. These devices correspond to different user profiles and include different browsing patterns and profiles and threat exposure from terminals for M2M communication to advanced user terminals with large traffic quotas.

    How has it helped my organization?

    In the first place, the Harmony Mobile solution (or also known as Sandblast Mobile) has allowed us to minimize and speed up the software deployment tasks, which is the plan for 60,000 potential terminals and it is already a very important first advantage. The main advantage of the solution is the implementation of complete security policies for the terminals that address how more apps are installed on corporate devices. It is essential to be absolutely certain that these apps and the navigation of these terminals do not cause any risk to the corporate network. Harmony Mobile guarantees this protection.

    What is most valuable?

    It has been very easy to implement and deploy. It's possible to scale the installation based on the policies defined for each profile. It's my understanding that maintaining these policies and updating them will be a fairly easy task through the options provided by the platform. I am convinced that it is an advantage that the network administrators and security officers of the companies will gladly accept. On the other hand, it is also very important to note that the end-user has not perceived any inconvenience in the application of this solution to their terminals: it is completely transparent and has not caused any rejection among users who already have it implemented.

    What needs improvement?

    It could expand the functionalities to, in addition to security functionality, incorporate Mobile Device Management (MDM) functionalities such as remote device management, administration of installed applications, etc. In a wide network like ours, it would be a very desirable feature, since, in the same product, we would have all the device management and security capabilities we need. Another capacity that I would add to the product would be greater performance optimization options for older terminals. Our fleet is very varied and some devices are up to 5 years old.

    For how long have I used the solution?

    Our solution has been in place for 3 years.

    What do I think about the stability of the solution?

    The current version we are working with (Version 3.7) is very stable. It's a stable solution because it keeps corporate data safe by protecting mobile devices across all attack vectors— apps, network, and operating system —without impacting user experience or privacy.

    What do I think about the scalability of the solution?

    The solution is easily scalable because integration with the MDM is allowed.

    How are customer service and technical support?

    Access to technical support for users is always done through the vendor. However, we perceive that the technical and human team behind Check Point is exceptional.

    Which solution did I use previously and why did I switch?

    No, previously we have not had any solution that implements security in the mobile terminals of the corporate network.

    How was the initial setup?

    The initial start-up was fairly straightforward thanks to the specialist support of the vendor. No major incidents were detected.

    What about the implementation team?

    The implementation was through a vendor. The team in charge had a high level of experience and their tasks were carried out with a high degree of professionalism.

    What was our ROI?

    Our business model does not focus on measuring these types of parameters. The adoption of this type of solution is motivated by other factors, especially in the reduction of security incidents and related incidents in mobile services and corporate networks.

    What's my experience with pricing, setup cost, and licensing?

    In our case, the cost is indirect and is directly passed on by the mobile services operator to the mobile voice services/terminals of the corporate network. We do not have data on the detailed cost of the service.

    Which other solutions did I evaluate?

    No, previously we have not had any solution that implements security in the mobile terminals of the corporate network.

    What other advice do I have?

    As it is deployed in a greater number of devices and the maintenance and management tasks associated with the solution escalate, we will be able to make a future updated review.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Adriamcam - PeerSpot reviewer
    Consultant at ITQS
    Reseller
    Top 5Leaderboard
    Easy to use with great URL filtering and protects from unauthorized downloads
    Pros and Cons
    • "Harmony Mobile presents many innovative features."
    • "One of the improvements that can be made is that they become compatible with Google MDM."

    What is our primary use case?

    One of the main reasons why the implementation of Check Point Harmony Mobile was chosen was due to the fact that we needed a tool that had control and monitoring over mobile devices. Harmony Mobile provided us with that functionality. In this way, we were able to close a security gap that was affecting our organization. 

    With this solution, users could connect to the organization and access the corporate data and thus comply with a more secure standard. 

    Each mobile has applied policies through the Harmony Mobile panel and control the access

    How has it helped my organization?

    One of the great improvements that Harmony Mobile gave us is that it was possible to protect the mobile devices of each one of the users and thus not depend on the users to implement adequate security themselves. With a simple mistake or moment of carelessness, a user can accidentally cause great damage to sensitive company information.

    With Harmony Mobile, users do not worry. It transmits all the security to this tool. Currently, with what has been happening in the world with Covid, many workers are working from home and with this solution, we can limit third-party access to devices.

    It's important for it to have the main functions of Mobile Device Management (MDM), such as task automation, automatic application updates, they should also improve compatibility with other mobile device management (MDM) products on the market, ensuring correct operation between SandBlast Mobile and MDM. It's important for Point Harmony Mobile to be included in a broader offering so that it is not just a standalone product.

    What is most valuable?

    Harmony Mobile presents many innovative features. One of them is URL filtering which is very valuable in this tool. It offers to filter applications, protect privacy, and deny malicious or unauthorized downloads. It allows us to give ourselves an idea of how the application protects through certain levels of security that are threats, network applications, and devices. Its administration and configuration are very simple. It is easy to use with its friendly interface

    What needs improvement?

    Harmony Mobile is one of the first tools that we implemented in the organization when we entered into the protection of mobile devices. For many years all our staff did not have any restrictions on mobile devices. 

    An improvement would be the compatibility of linking local and cloud solutions to create a hybrid scenario. They should allow adding a SIEM for additional functions. That said, in relation to the characteristics that it currently presents, it satisfactorily complies with the security of mobile devices.

    One of the improvements that can be made is that they become compatible with Google MDM. 

    When it comes to scanning the network, sometimes my SSI ID does not appear; it would also be a great plus if they could make a unified console where you can manage several Check Point products and thus not be opening different consoles to manage different products.

    For how long have I used the solution?

    I have been using about two years.

    What do I think about the stability of the solution?

    The stability of the product is very good and it generates an excellent amount of monitoring reports.

    What do I think about the scalability of the solution?

    It is a very scalable tool.

    How are customer service and support?

    With the support, we have had good and bad experiences. Sometimes they take time to respond. Sometimes they give an accurate solution to the error presented.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    A mobile device solution had not previously been implemented.

    How was the initial setup?

    One of the parts that worried us was its configuration and administration, however, it was extremely simple.

    What about the implementation team?

    The installation was done with a seller who demonstrated his ability and handling of the tool.

    What was our ROI?

    The investment made with this tool is very good. The information will be guaranteed, therefore, every penny invested is a good investment.

    What's my experience with pricing, setup cost, and licensing?

    The cost is affordable. It competes with other technologies and the installation is easy to implement.

    Which other solutions did I evaluate?

    We have not opted for other technologies since we have implemented the Check Point line into our company.

    What other advice do I have?

    It is a good tool that can be implemented in the organization and be sure that it will protect your mobile devices.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Hans Van Oorschot - PeerSpot reviewer
    Engineer at Caldoo
    Real User
    Top 5
    Good integration, great scalability, and helpful technical support
    Pros and Cons
    • "We've found that the product is quite stable."
    • "From a user's perspective, of course, it is always better when it is cheaper in price."

    What is our primary use case?

    We primarily use the solution for mobile threat defense. We protect our mobile devices with it, due to the fact that SandBlast Mobile detects phishing, malware, et cetera, and all mobile devices.

    What is most valuable?

    What I like is that the user experience of your mobile device is not compromised by SandBlast Mobile. The end-user doesn't see anything like an extra app on your device. The app is working in the background, scanning for all kinds of cyberattacks, and seeking out phishing, malware, bots, et cetera. 

    Once something is detected, the end-user gets an alert, and can immediately command an action. When they go to open, let's say, a phishing e-mail, they get an alert that says something to the effect of "Beware, this is a phishing mail. Don't open it." The user has the possibility then to open it, however, it would be quite foolish to do so when they are told not to do it. The app gives you very good warnings in terms of malicious attacks.

    There is good integration with mobile device management systems.

    There is a potential for reporting if you need it.

    The solution scales very well.

    We've found that the product is quite stable.

    Technical support is helpful.

    What needs improvement?

    From my perspective, it's a very good product. I can't recall a moment where I thought a feature was missing.

    It would be ideal if, one day, this product was bundled into a larger offering so that it's not just a standalone product.

    For how long have I used the solution?

    I've been using the solution for three years at this point. It's not so long.

    What do I think about the stability of the solution?

    The stability is okay. We haven't had any issues with bugs or glitches. It doesn't crash or freeze. It's reliable.

    What do I think about the scalability of the solution?

    In terms of scalability, you can use it very well within an organization. YOu can use it with five devices or a hundred thousand devices. Worldwide, it's used by millions of devices. The scalability potential, therefore, is huge. It's no problem at all if an organization needs to scale it.

    How are customer service and technical support?

    Technical support is very good. They are very quick as well. It's fairly easy to talk with them when needed, however, truthfully, you don't need regularly. It works very well as a product. You rarely need to deal with technical support.

    What's my experience with pricing, setup cost, and licensing?

    From a user's perspective, of course, it is always better when it is cheaper in price. That said, it is a fair price. it's not overly expensive. We find it very reasonable. After all, when you get hit with ransomware or some other malicious program, it can be extremely expensive and comes at a great cost to the company.

    What other advice do I have?

    We're both a reseller as well as an end-user of the solution. We're partners with Check Point.

    The product is in the SaaS environment.

    I'd recommend the solution. With cybersecurity on the rise due to COVID, and people working on devices from home, off secure networks, it's important to protect your devices, now more than ever. I'd advise that organizations look at this solution and consider implementing it.

    I'd rate the solution nine out of ten.

    However, if this solution is right for a company depends on the environment. The capability of the standalone product is very good. 

    When there's a supplier who buys Check Point SandBlast Mobile and incorporates it into their larger solution, I will give it a ten out of ten. Then you have a solution that really fits not only your mobile devices but also the security part of your organization. While, right now, it's a great standalone product, there's a lot of possibilities for it when it integrates with a larger security offering.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    José Javier Dominguez Reina - PeerSpot reviewer
    Project Manager at Junta de Andalucia
    Real User
    Top 5Leaderboard
    Easy to set up, good support, and allows for both personal and professional device profiles
    Pros and Cons
    • "The Check Point SandBlast Mobile solution supports Android and iOS operating systems and allows for integration with Mobile Device Management (MDM)."
    • "Compatibility with other Mobile Device Management (MDM) products on the market should be improved, ensuring correct operation between SandBlast Mobile and MDM."

    What is our primary use case?

    We have implemented Check Point Harmony Mobile due to the numerous phishing attacks that our users were suffering, both by email and by fake text messages, pretending to be the Post Office, Amazon, banks, etc...

    With this product, we have tried to avoid this type of attack and therefore have our business environment more secure.

    Currently, we have users in various territorial locations and we were looking for a solution that would allow us to secure their mobile devices with a minimum level of intrusiveness in the terminals. The solution should be for both Android and iOS.

    How has it helped my organization?

    With the Check Point Harmony Mobile solution, we have been able to protect users' mobile terminals, both Android and iOS, from the various attacks they suffered. This has achieved a higher level of security on these devices and prevents access to user data or sensitive information accessible from mobile phones.

    With this Check Point product, we can apply similar security policies that the company's desktops or laptops have to mobile phones. Both iOS and Android to be able to use them safely.

    Check Point Harmony Mobile helps employees' mobile devices avoid running malicious applications and attacks on their network or operating system.

    What is most valuable?

    The Check Point SandBlast Mobile solution supports Android and iOS operating systems and allows for integration with Mobile Device Management (MDM).

    It has APIs to carry out operations in applications that connect to mobile terminals and performs the tasks that are specified. For example, avoid activating Wi-Fi or installing applications.

    When mobile devices are configured, two profiles are created for each of them. There is the personal profile and the professional profile, which means that different security policies can be applied to each profile.

    What needs improvement?

    Check Point SandBlast Mobile solution is not a Mobile Device Management (MDM), it only takes care of device security. It should have the main functions of Mobile Device Management (MDM), such as automating tasks, automatic updates of applications, etc...

    Compatibility with other Mobile Device Management (MDM) products on the market should be improved, ensuring correct operation between SandBlast Mobile and MDM.

    Another aspect to take into account is the increased load on old terminals, causing them to work slowly.

    What do I think about the stability of the solution?

    It is a fairly stable solution, although you have to take into account the increased load that it causes in older mobiles.

    What do I think about the scalability of the solution?

    It is an easily scalable solution because it allows for integration with any mobile management solution (MDM / UEM).

    How are customer service and technical support?

    Our experience with customer service / technical support has been very good. They respond quickly and offer us their help in everything we need.

    Which solution did I use previously and why did I switch?

    We did not have any solutions for mobile devices and after reviewing some, we chose Check Point Harmony Mobile.

    How was the initial setup?

    The initial setup was relatively easy, with no issues to review.

    What about the implementation team?

    The implementation was done with a vendor team and their level of knowledge is very high.

    What was our ROI?

    We currently do not have any ROI forecast. We will see this as the incidents on mobile devices decrease.

    What's my experience with pricing, setup cost, and licensing?

    Regarding the cost of licenses, each device consumes one, even if it has both professional and personal profiles.

    Which other solutions did I evaluate?

    We have been evaluating other solutions, such as Palo Alto Networks and Broadcom (Symantec).

    What other advice do I have?

    My advice is that before installing, a complete analysis of the requirements should be carried out. This should be done in order to correctly define user groups and the respective policies from the beginning. This will help to avoid individual policies.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Adam Coulibaly - PeerSpot reviewer
    Suporta engineer at Novasys
    Real User
    Top 20
    Provides complete protection and is easy to deploy and manage
    Pros and Cons
    • "Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage."
    • "If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful."

    What is our primary use case?

    We are mainly using it to manage mobile connections. It is a cloud solution, and it is deployed on the Check Point cloud.

    How has it helped my organization?

    We can manage different mobiles in the Harmony portal. For example, we can fix the version of the OS system that can connect to our network. Some applications are not authorized to be installed by the user. So, we can block those applications or versions.

    What is most valuable?

    Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage.

    What needs improvement?

    If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful.

    For how long have I used the solution?

    I have been using this solution for two years.

    What do I think about the stability of the solution?

    There is no problem with stability. We have had no issues since we started using this product.

    What do I think about the scalability of the solution?

    It is very easy to scale. We have 10 users, and it is for our internal use. We are also a Check Point partner, and we use it on our mobile phones to show it to our customers during seminars or presentations.

    How are customer service and support?

    I'm a support engineer, and I have contacted their technical support. I was with a customer who needed some information about the mobile UEM integration of Harmony Endpoint, and I had to contact their technical support to find out how we can do this easily. 

    Their support is very easy to contact. We are a partner, and when we contact their support, they always respond on time. Their support is very good.

    Which solution did I use previously and why did I switch?

    We were providing Kaspersky and Bitdefender to our customers before becoming a partner of Check Point. I don't know if Bitdefender has protection for mobile, but I know that Kaspersky has recently started developing for mobile. Check Point Harmony Mobile is better and more secure for mobile protection because of its stability and all the functionality. It is easy to deploy and manage.

    How was the initial setup?

    Its initial setup is very simple. If any additional configuration needs to be done, I just receive an email. When a user is added to the portal, you receive an email with information about the server and the password. You can just click and start the application. It is very easy.

    It is pretty fast. It just takes one minute for the installation and the first scan.

    What about the implementation team?

    I do it myself from the office. I don't need an assistant from Check Point or anyone else. I just need to read the documentation. I can download the documentation from their website, which contains the information for installation and troubleshooting.

    The maintenance can be done from the tenants in the cloud. You can do the updates and patching of the product in the portal.

    What's my experience with pricing, setup cost, and licensing?

    At the moment, the price is good, but there is always scope for amelioration when it comes to pricing. When pricing is lower, it can make a customer buy the product. Customers ask us about the price of the product before allowing us to explain the functionality to them.

    What other advice do I have?

    I would recommend this solution to others. It is easy to implement, and it is easy to manage. It covers OS protection, network protection, file protection, and application protection. It provides the best protection.

    I would rate it a nine out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    Flag as inappropriate
    PeerSpot user
    Rodrigo Nalda - PeerSpot reviewer
    Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees
    Real User
    Top 10
    Quick and efficient support, transparent to the end-user, and priced well
    Pros and Cons
    • "The best thing about the product is that it is transparent and does not impact the users."
    • "The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU."

    What is our primary use case?

    We are deploying the solution on all corporate mobiles. We began the deployment with the most critical users for the business and we are expanding according to our needs. We have an organization differentiated by countries and we monitor the incidents reported from our SIEM.

    The main objective is to have a security mechanism in these devices that prevents users from falling into attempts to steal credentials, infection by malware, etc.

    With this tool, we consider that the systems are protected and so far, we have already been able to stop a good number of attacks.

    How has it helped my organization?

    Before having this tool, our users were exposed to any type of infection on corporate mobile devices and tablets. With the incorporation of Check Point Harmony Mobile technology, we have minimized these risks and both users and administrators feel calmer.

    We also know that any incident that occurs is sent to our SIEM, which is monitored 24x7x365 by a security services company, which, if necessary, will act immediately to solve the incident detected.

    All of this adds great value to the company in terms of security.

    What is most valuable?

    The best thing about the product is that it is transparent and does not impact the users. After analyzing the battery consumption and resource load, we found that it is practically negligible.

    On some occasions, we have had to contact the user to solve a problem with the system. It is quite simple, which facilitates the resolution of problems.

    What needs improvement?

    Based on the fact that we do not have an MDM system, the deployment of the solution has been a bit difficult. The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU.

    For how long have I used the solution?

    We have been using Check Point Harmony Mobile for more than a year.

    What do I think about the stability of the solution?

    The solution is very stable and in the time we have been using it, we have not had significant problems.

    What do I think about the scalability of the solution?

    There is no problem in terms of the scalability of the solution, as it is only necessary to acquire a greater number of licenses.

    How are customer service and technical support?

    The support has attended to us quickly and efficiently in the few cases that we have needed it. It seems that this is the usual case for Check Point support.

    How was the initial setup?

    Not having an MDM is somewhat more complex as it cannot automate, and in the iOS environment, it is more complex than in Android.

    What about the implementation team?

    We carry out the deployment of the solution with our own internal teams supported by the CAU.

    What's my experience with pricing, setup cost, and licensing?

    The quality, price, and support ratio are very good.

    What other advice do I have?

    At the moment, we have not detected a specific need for new features within our environment. With the last update, the possibility of analyzing applications developed by us or even requesting an analysis of an application already published in stores was incorporated, which is a great improvement. It is good, for example, to anticipate possible problems with third-party applications, as well as for checking the security status of our applications.

    In any case, we trust that in the next versions that Check Point publishes, useful functionalities will appear.

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user