Try our new research platform with insights from 80,000+ expert users
Technical Architect and consultant at VirginAustralia
Reseller
Top 5Leaderboard
Protects devices from sophisticated attacks, including malware
Pros and Cons
  • "Harmony Mobile is a unified security solution for user devices and internet connections. It protects devices from sophisticated attacks, including malware, and implements Zero Trust Access for comprehensive security."
  • "The solution should improve passive scanning and provide regular updates. Also, during business hours, users should not experience any slowdown on their devices."

What is our primary use case?

We use the solution in the hospitality and aviation domains.

What is most valuable?

Harmony Mobile is a unified security solution for user devices and internet connections. It protects devices from sophisticated attacks, including malware, and implements Zero Trust Access for comprehensive security.

What needs improvement?

The solution should improve passive scanning and provide regular updates. Also, during business hours, users should not experience any slowdown on their devices. 

For how long have I used the solution?

I have been using Harmony Mobile for four years.

Buyer's Guide
Check Point Harmony Mobile
August 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,483 professionals have used our research since 2012.

What do I think about the stability of the solution?

I rate the solution’s stability an eight out of ten.

What do I think about the scalability of the solution?

The scalability is very good. We have to take the perpetual license, etc., to expand headcounts. It is suitable for medium to enterprise businesses.

I rate the solution’s scalability a nine out of ten.

How are customer service and support?

Support is good and available 24/7.

How would you rate customer service and support?

Positive

How was the initial setup?

The solution requires a one-time setup, which is on cloud. We must enable inbound configurations by setting up the server. This server should be associated with the Check Point management server, from which we can push policies. We have similar software solutions, such as CrowdStrike and CloudStack, that offer robust security features. In addition, we use products from McAfee and Symantec, among other security vendors. I am working with multiple vendors and organizations, including Microsoft's security solutions.

Once it is designed and discussed, the server will be implemented in about one week, depending on the situation and various factors, such as the number of Harmony users.

What was our ROI?

The tool provides powerful and good features, making it easy to do business.

What's my experience with pricing, setup cost, and licensing?

The product pricing is moderate.

What other advice do I have?

Harmony Mobile is highly effective for protecting mobile devices. Much information and data are shared over the cloud using mobile devices and laptops. Many mobile attacks target devices without robust security features, making them vulnerable to malicious files and bots. However, if a device is configured with Check Point Harmony Protection, these threats, including encrypted and malicious files, will be detected and neutralized based on the configuration settings. This protection ensures the safety of business data and other critical information. Additionally, Harmony Mobile is easy to install and requires minimal intervention on mobile devices, making it a very effective security solution.

Nowadays, everything is integrated with AI, which benefits various use cases and users. For example, if a malicious code is detected by the device, it should send an alert message to the user. Harmony Mobile can notify the user by saying, "Malicious code detected. Please take appropriate action." This kind of artificial intelligence support ensures that even if users do not see the message, they can be alerted through a voice message. 

We recommend the solution.

Overall, I rate the solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Reseller
Top 5Leaderboard
Offers ease of management and can be installed effortlessly
Pros and Cons
  • "The product's initial setup phase is very straightforward."
  • "At times, when configuring policies, the tool takes some time to apply the policy."

What is our primary use case?

I use the solution in my company so that whoever the mobile users are and those who use the corporate applications, we can secure communication from the corporate application to the outside network. My company uses Check Point Harmony Mobile through the browser to secure our applications, as well as to secure the communication between customers and other users.

What is most valuable?

The most effective features of the product stem from its ability to deal with areas like data security and application security while also being useful to users who use mobiles in roaming mode and those who use a personal mobile phone with corporate applications in it.

What needs improvement?

At times, when configuring policies, the tool takes some time to apply the policy. If I configure a new policy and apply it to the management console, it may take time. The product should work on policy enforcement so that users can quickly enforce the policies within a fraction of a second.

For how long have I used the solution?

I have been using Check Point Harmony Mobile for three years.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten. Some customers of the tool face some issues in their environment with respect to policy enforcement.

What do I think about the scalability of the solution?

It is a very easily scalable solution. 

My company deals with a very limited set of customers of the product. The tool's competitors have been very aggressive with the mobile browser part, especially the ones offering MDM solutions. Those who use firewall products from Check Point are very happy to acquire and use Check Point Harmony Mobile.

How are customer service and support?

As and when required, the solution's technical support helps users with troubleshooting. The solution's technical support is good, and it responds quickly.

How was the initial setup?

The product's initial setup phase is very straightforward.

For the product's deployment phase, you just need to install the agent to the end user and configure the policy on the cloud management console.

The solution's deployment phase is a one-day task.

What was our ROI?

In terms of ROI, the product helps secure your application, mobile, and data.

What's my experience with pricing, setup cost, and licensing?

There is a need to make yearly payments towards the licensing costs attached to the product. You can opt for a one-year, three-year, or five-year license. There is a separate team that handles the pricing part of the product, and depending on the customers or order quantity they handle, I believe that 60 or 70 percent discounts on the prices are offered. There are no additional costs attached to the product.

What other advice do I have?

The tool helped prevent potential security threats whenever some users communicate from their mobile with someone outside our company since, at such a time, the product secures the communication as well as the data. With the tool, no confidential data goes outside from the inside of our company. Our company can block data leakage from mobile phones to the outside environment of our organization.

The threat detection and response capabilities of the tool benefit the company in scenarios where a user wants to send out some confidential data outside the company through the browser, which would not be possible If the organization uses Check Point Harmony Mobile. The tool shows how our company can secure the user, as well as how we can prevent data leakage from the inside to the outside of the organization.

The product provides users with ease of management. It is a simple tool that allows users to configure some of the policies for a user or a user-based group and apply them to the solution.

According to Gartner's website, the tool's stability and support as a security provider places it in the leader category.

The tool helps respond to emerging corporate threats, especially those who use corporate applications on their personal devices. If you want to secure your corporate applications, you have to adopt Check Point Harmony Mobile.

If you use corporate applications on your personal mobile device and you want to secure your applications and data, then you have to use Check Point Harmony Mobile.

I rate the tool a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
Buyer's Guide
Check Point Harmony Mobile
August 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,483 professionals have used our research since 2012.
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS
Real User
Top 5Leaderboard
Detailed summaries, good mobile security, and nice reporting
Pros and Cons
  • "With Harmony Mobile, we have been able to provide additional security to our network."
  • "They could make a more beautiful interface."

What is our primary use case?

With this, the company has been able to give many users access to the infrastructure of the company from their mobile phones. Several types of applications are used that must connect to the company network which accesses sensitive information. This has helped a lot to improve efficiency in day-to-day operations and be able to reach more customers. In addition, it has provided us with better administration of all devices and has them organized by security policies depending on the area where each employee works.

How has it helped my organization?

This tool has helped us at various points in our organization. For example, we can have better control over each device that accesses the infrastructure network. We can also reach and process orders, and solutions faster, or be able to consult data in real-time from mobile phones. We can work from anywhere in the country. 

With Harmony Mobile, we have been able to provide additional security to our network. 

In addition, it provides a detailed summary of each of the operations from where they access what they access and this has helped us a lot in the audit that they do so we can provide accurate and concise information.

What is most valuable?

The tool is excellent, however, it has some features that stand out a lot, for example, it has a very intuitive interface. 

The search capacity allows you to find information quickly and concisely. 

It generates reports and precise analysis, quickly in real-time allowing the technology department to focus. 

We can automate many of the tasks. 

It has notifications and reminders that help us be aware of each event or vulnerability that may arise in our organization.

What needs improvement?

The tool is very effective and proactive, I don't have much to say about the improvements it should have. It already has a very intuitive interface. Yet they should improve the order of each of the options a little since it is difficult to get used to the location of each one. They should rearrange each of the options since time is wasted finding each one.

They could make a more beautiful interface.

When an update is going to be done, it should be less heavy and should streamline operations.

For how long have I used the solution?

In the last six years, I have been able to use, buy, and implement this tool for the mobile security of companies that are supporting BYD with their officials.

What do I think about the stability of the solution?

It has very good stability - if it weren't for the updates that sometimes loop.

What do I think about the scalability of the solution?

Scalability is one of the high points that the tool has.

How are customer service and support?

Support is sometimes very slow.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

The company did not have any tools previously.

How was the initial setup?

The first implementation was difficult since the tool has a fairly high learning curve.

What about the implementation team?

The seller helped us do the implementation and part of the configuration. They gave us the training to be able to make the tool Russian.

What was our ROI?

The ROI is slow to appear, however, they will provide security to all the company's information.

What's my experience with pricing, setup cost, and licensing?

The tools are a little expensive, however, it is worth making that investment for the installation and it has a medium learning curve.

Which other solutions did I evaluate?

Some tools were evaluated including:

What other advice do I have?

It is a very useful tool for mobile security, thus providing security to the entire company.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2751366 - PeerSpot reviewer
Security Support Engineer at a tech vendor with 51-200 employees
Real User
Top 5
Mobile security is enhanced, but log retrieval needs improvement
Pros and Cons
  • "Check Point Harmony Mobile has positively impacted my organization by improving compliance in the customer's environment and helps remind the customer that there is protection on the devices."
  • "Troubleshooting on Check Point Harmony Mobile is quite difficult because the logs are not located in the cloud, but they are on the local device."

What is our primary use case?

My main use case for Check Point Harmony Mobile is for securing mobile devices and remote workers.

A specific example of how I use Check Point Harmony Mobile is when the customer receives a company phone. To protect such phone because it might contain sensitive information, it is installed with Check Point Harmony Mobile, which keeps the phone safe for most of the time and allows security on the phone.

What is most valuable?

All features are very fundamental because they are a core protection that every single customer and device should have, especially sensitive devices such as phones that can be used for malicious intent if not protected correctly.

Check Point Harmony Mobile has positively impacted my organization by improving compliance in the customer's environment and helps remind the customer that there is protection on the devices. The weakest link is not the software itself, but the person using the device.

What needs improvement?

Troubleshooting on Check Point Harmony Mobile is quite difficult because the logs are not located in the cloud, but they are on the local device. If there is an issue, you need to retrieve the logs from the device itself, which requires user availability.

For how long have I used the solution?

I have been using Check Point Harmony Mobile for a few months.

What do I think about the stability of the solution?

Check Point Harmony Mobile is stable because I never received any request for troubleshooting other than the one I mentioned previously.

What do I think about the scalability of the solution?

The scalability of Check Point Harmony Mobile can handle a growing number of devices or users easily, depending on the licensing pool.

How are customer service and support?

I had to reach out to customer support for Check Point Harmony Mobile recently to understand better where the log location was, and they replied with the correct SK procedure.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I am not aware if I evaluated other options before choosing Check Point Harmony Mobile.

I am not aware if I previously used a different solution before Check Point Harmony Mobile.

What was our ROI?

I am not aware if I have seen a return on investment from using Check Point Harmony Mobile.

What other advice do I have?

Check Point Harmony Mobile is deployed in my organization in the public cloud.

I use the Check Point provider for the cloud.

I am not aware of the experience with pricing, setup cost, and licensing for Check Point Harmony Mobile.

I rate Check Point Harmony Mobile a seven out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Flag as inappropriate
PeerSpot user
Anuraj Nair - PeerSpot reviewer
Presales Engineer at SNSIN
Reseller
Top 5Leaderboard
Provides good threat detection and prevention, but it lacks MDM capabilities present in other MDM products
Pros and Cons
  • "The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS."
  • "Check Point Harmony Mobile lacks MDM capabilities, which are present in other MDM products, like IBM Security MaaS360, AirWatch, and Google Workspace."

What is most valuable?

The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS. Check Point Harmony Mobile is a good option for users who want only incoming and outgoing traffic security for their Android and iOS devices.

What needs improvement?

Check Point Harmony Mobile lacks MDM capabilities, which are present in other MDM products, like IBM Security MaaS360, AirWatch, and Google Workspace.

For how long have I used the solution?


What do I think about the stability of the solution?

Check Point Harmony Mobile is a stable solution.

I rate the solution a nine out of ten for stability.

What do I think about the scalability of the solution?

Around two to three customers are using Check Point Harmony Mobile.

I rate the solution’s scalability a six out of ten.

How are customer service and support?

The technical support team's response time should be faster. Also, the engineers should come up with a proper solution plan, which is currently missing.

Which solution did I use previously and why did I switch?

I have previously worked with Azure MDM, IBM Security MaaS360, and VMware AirWatch. The solution has better threat detection capabilities and catch rates than other mobile security vendors.

What about the implementation team?

The solution’s deployment takes around five minutes. To deploy the solution, you need to deploy the agent to the endpoint Android. It will then be listed in the Infinity portal, and you can start configuring.

You need to download the agent from the Infinity portal, put it on your mobile, install it, and activate it. It will be reflected in the Infinity portal, and you can then configure the policy.

What was our ROI?

Check Point Harmony Mobile can help you with regulation compliance. Customers will secure all infrastructure that belongs to them because they are managing that infrastructure. However, they don't have any control over mobile devices connected to their network. Any threats to those particular devices can also affect your infrastructure if they are connected without any protection.

Check Point Harmony Mobile will ensure the device is clean in such cases. Even if the device gets connected to your infrastructure, there won't be any infection or any impact happening to your infrastructure.

What's my experience with pricing, setup cost, and licensing?

Users have to pay a yearly licensing fee for each device, which is cheap.

What other advice do I have?

Check Point Harmony Mobile is not so attractive and provides security only for mobile devices. Customers can use Check Point Harmony Mobile to secure their mobile devices, such as Android or Mac smartphones. However, it has less capability than an MDM (Mobile device management).

Check Point Harmony Mobile has a good advantage in terms of security posture and security threat detection and prevention. Check Point Harmony Mobile will help prevent 99% of attacks on mobile devices. It is easy to manage Check Point Harmony Mobile.

People bring their own devices and connect them to all the other unwanted networks. This causes traffic to flow to these devices from any network source, such as Wi-Fi, LAN, or other public networks. Deploying Check Point Harmony Mobile can ensure the endpoint is sanitized and clean for use at home and the workplace.

Overall, I rate the solution a six out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
PeerSpot user
Dave Eversden - PeerSpot reviewer
Managing Director at Forever Group
MSP
Top 10
Enhances security and is easy to deploy and configure
Pros and Cons
  • "The solution was easy to deploy and provided a useful security enhancement for mobile devices."
  • "We had some issues with loopback VPN DNS filtering stopping working periodically, however, this is something that we could probably iron out with support."

What is our primary use case?

We used the solution to provide mobile threat defense for mobile devices (predominantly Apple iPhone/iPad). We evaluated numerous solutions from competitors including IBM, Better Mobile, Trend Micro, and others. Check Point is attractive since they are a market-leading firewall vendor and therefore we trust their filtering in terms of web and link protection beyond others who may rely on smaller or third-party feeds. We also found that the breadth of protections including app analysis and WiFi spoofing validation were helpful.

How has it helped my organization?

The solution was easy to deploy and provided a useful security enhancement for mobile devices. It allowed us to extend filtering technologies that we would generally expect to be available within an edge firewall to mobile devices - such as web content filtering and URL protection. With the prevalence of mobile phishing (including SMS phish which circumvents email filters), we felt that this was a useful security layer. Check Point is also a provider that we felt we could trust when adding products to our security stack.

What is most valuable?

The integration with Microsoft Intune scoped to the security group made deployment a breeze. Certainly, once the initial configuration was in place the process was smooth and devices began to appear in the Check Point Harmony portal automatically. Adding web and link protection was considered to be a valuable security enhancement and is a key benefit of using mobile threat defense. The fact that the product can also highlight changes in public IP addresses for known corporate WiFi SSIDs also helps to alert or prevent spoofing of internal WiFi networks.

What needs improvement?

We had some issues with loopback VPN DNS filtering stopping working periodically, however, this is something that we could probably iron out with support. In the end, we ended up disabling this feature and using Umbrella (which we also use). It is of course highly possible that we could have addressed this with their support team but in our scenario, it was easier to disable the functionality and run with a separate product that we already had available. Certainly, everything else worked fine and the alerts were very useful.

For how long have I used the solution?

I first used the solution several years ago.

What do I think about the stability of the solution?

We had no stability issues with the solution save for the periodic VPN loopback internet outages with iOS agents that I'm sure could be resolved with support.

What do I think about the scalability of the solution?

We don't foresee any obvious limits with the scalability of the solution for all but the largest of organizations.

How are customer service and support?

Support engineers were friendly and communicable.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We had previously trialed better mobile but the minimum onboarding/barrier of entry costs were too steep. We are also more familiar with the Check Point brand. We've also used Trend Micro before yet found the feature set for iOS devices to be slim.

How was the initial setup?

The solution has a straightforward setup - especially with Intune integration.

What about the implementation team?

We did an in-house implementation.

What was our ROI?

ROI is impossible to compute.

What's my experience with pricing, setup cost, and licensing?

Setup and recurring costs seemed reasonable and in line with other Check Point products.

Which other solutions did I evaluate?

We did evaluate IBM, Trend Micro, Better Mobile, and others.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Director Comercial at Alta Sistemas
Reseller
Top 20
Has super efficient VPN and good ransomware protection
Pros and Cons
  • "The product's VPN solution is super efficient, and our clients highly value ransomware protection on mobile. These two features are probably the most valuable aspects of this product. Check Point Harmony Mobile responds very fast to any cybersecurity attack. With that product, your mobile response is super fast."
  • "Some areas that could be improved with Check Point Harmony Mobile include embedding SD-WAN in mobile device products. Our clients are interested in this feature, so it could be a good idea if Check Point Harmony Mobile includes it in the mobile product."

What is our primary use case?

Many clients have the product on their Android and iOS cell phones.

What is most valuable?

The product's VPN solution is super efficient, and our clients highly value ransomware protection on mobile. These two features are probably the most valuable aspects of this product. Check Point Harmony Mobile responds very fast to any cybersecurity attack. With that product, your mobile response is super fast.

It's very intuitive and allows fast deployment on many devices. Recently, the platform has become easier to configure and implement. It's a very good platform and very easy to use.

What needs improvement?

Some areas that could be improved with Check Point Harmony Mobile include embedding SD-WAN in mobile device products. Our clients are interested in this feature, so it could be a good idea if Check Point Harmony Mobile includes it in the mobile product.

For how long have I used the solution?

I have been using the product for 15 years. 

What do I think about the stability of the solution?

The solution's stability is very good; I rate it a ten out of ten. 

What do I think about the scalability of the solution?

The product's scalability is good. We may have some problems with some MDMs, such as I don't remember the brand of the MDM. We have also had many problems with delivering or installing the product. But it's easy and fast to implement or set up for our clients.

How are customer service and support?

The solution's support is very good and fast. 

How would you rate customer service and support?

Positive

How was the initial setup?

I rate the tool's ease of deployment a nine out of ten. 

What's my experience with pricing, setup cost, and licensing?

Check Point Harmony Mobile's pricing is good. 

What other advice do I have?

I recommended the solution. It's the only mobile product that I sell to our clients, so we trust Check Point Harmony Mobile 100 percent. I rate the overall solution a ten out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Jessica Muñoz - PeerSpot reviewer
Account Manager at a tech vendor with 11-50 employees
Reseller
Top 5
User-friendly and offers complete protection to mobile devices
Pros and Cons
  • "It is very easy for my company to get information from the product's support team."
  • "There are certain shortcomings in the integration capabilities that a product offers."

What is most valuable?

I like the product's ability to offer IPS protections for mobile security.

What needs improvement?

There are certain shortcomings in the integration capabilities that a product offers. In the future, I would like to see the product offer more integration features.

For how long have I used the solution?

I have experience with Check Point Harmony Mobile. My company has a partnership with Check Point.

What do I think about the stability of the solution?

Considering that the product is easy to use, user-friendly, and offers complete protection, I rate the product's stability an eight out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a nine out of ten.

How are customer service and support?

It is very easy for my company to get information from the product's support team. I rate the technical support a nine out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The product's deployment is easy. You only deploy the tool on the mobile device for the client or customer who wants to use it.

What's my experience with pricing, setup cost, and licensing?

When I purchased the product for one of our company's clients, I realized that the price of the product was competitive.

What other advice do I have?

I need to check with the clients in the industry who use Check Point Harmony Mobile and integrate it with other mobile management solutions. I simply managed the product and used it to protect and ensure that scanning processes were in progress while also checking the branch office security, reviewing CVEs, checking the implementation and interventions with the tool. The product offers ease of blocking. The solution also offers integration with Samsung, Microsoft, BlackBerry, and other solutions. The solution can be used for mobile protection and to protect applications.

The product is user-friendly for its customers. The solution also offers complete protection and simple management. The tool provides its users with the capacity to prevent malicious activities and phishing threats while also checking the mobile for malware or any other attacks on the device.

The solution is easy to deploy and to check for attacks in mobile devices.

The product's ability to adapt and offer security against the evolving threat landscape is good because it is easy for a user since there is only one application that they need to use.

I rate the overall tool an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.
Updated: August 2025
Product Categories
Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.