Try our new research platform with insights from 80,000+ expert users
Head of Special Projects Unit-RCJA (SANDETEL) at Junta de Andalucia
User
Easy to implement, simple to maintain policies, and does not disrupt end-user functionality
Pros and Cons
  • "It has been very easy to implement and deploy."
  • "It could expand the functionalities to, in addition to security functionality, incorporate Mobile Device Management (MDM) functionalities such as remote device management, administration of installed applications, etc."

What is our primary use case?

The goal is to implement Harmony Mobile in the entire fleet of devices of the Government of the Junta de Andalucia. We are talking about a total of about 60,000 terminals. A pilot of the solution has started and it will be implemented in all the terminals that are renewed in the corporate network. These devices correspond to different user profiles and include different browsing patterns and profiles and threat exposure from terminals for M2M communication to advanced user terminals with large traffic quotas.

How has it helped my organization?

In the first place, the Harmony Mobile solution (or also known as Sandblast Mobile) has allowed us to minimize and speed up the software deployment tasks, which is the plan for 60,000 potential terminals and it is already a very important first advantage. The main advantage of the solution is the implementation of complete security policies for the terminals that address how more apps are installed on corporate devices. It is essential to be absolutely certain that these apps and the navigation of these terminals do not cause any risk to the corporate network. Harmony Mobile guarantees this protection.

What is most valuable?

It has been very easy to implement and deploy. It's possible to scale the installation based on the policies defined for each profile. It's my understanding that maintaining these policies and updating them will be a fairly easy task through the options provided by the platform. I am convinced that it is an advantage that the network administrators and security officers of the companies will gladly accept. On the other hand, it is also very important to note that the end-user has not perceived any inconvenience in the application of this solution to their terminals: it is completely transparent and has not caused any rejection among users who already have it implemented.

What needs improvement?

It could expand the functionalities to, in addition to security functionality, incorporate Mobile Device Management (MDM) functionalities such as remote device management, administration of installed applications, etc. In a wide network like ours, it would be a very desirable feature, since, in the same product, we would have all the device management and security capabilities we need. Another capacity that I would add to the product would be greater performance optimization options for older terminals. Our fleet is very varied and some devices are up to 5 years old.

Buyer's Guide
Check Point Harmony Mobile
June 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.

For how long have I used the solution?

Our solution has been in place for 3 years.

What do I think about the stability of the solution?

The current version we are working with (Version 3.7) is very stable. It's a stable solution because it keeps corporate data safe by protecting mobile devices across all attack vectors— apps, network, and operating system —without impacting user experience or privacy.

What do I think about the scalability of the solution?

The solution is easily scalable because integration with the MDM is allowed.

How are customer service and support?

Access to technical support for users is always done through the vendor. However, we perceive that the technical and human team behind Check Point is exceptional.

Which solution did I use previously and why did I switch?

No, previously we have not had any solution that implements security in the mobile terminals of the corporate network.

How was the initial setup?

The initial start-up was fairly straightforward thanks to the specialist support of the vendor. No major incidents were detected.

What about the implementation team?

The implementation was through a vendor. The team in charge had a high level of experience and their tasks were carried out with a high degree of professionalism.

What was our ROI?

Our business model does not focus on measuring these types of parameters. The adoption of this type of solution is motivated by other factors, especially in the reduction of security incidents and related incidents in mobile services and corporate networks.

What's my experience with pricing, setup cost, and licensing?

In our case, the cost is indirect and is directly passed on by the mobile services operator to the mobile voice services/terminals of the corporate network. We do not have data on the detailed cost of the service.

Which other solutions did I evaluate?

No, previously we have not had any solution that implements security in the mobile terminals of the corporate network.

What other advice do I have?

As it is deployed in a greater number of devices and the maintenance and management tasks associated with the solution escalate, we will be able to make a future updated review.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hendrik-Du Plooy - PeerSpot reviewer
Regional Manager at Saber1
Real User
Top 5
Offers comprehensive solution for all devices but improvement is needed in user awareness
Pros and Cons
  • "The ease of use, along with comprehensive protection for all devices, is a key advantage. It provides visibility into malicious applications installed on the phone."
  • "The product needs to improve its user awareness."

What is most valuable?

The ease of use, along with comprehensive protection for all devices, is a key advantage. It provides visibility into malicious applications installed on the phone.

What needs improvement?

The product needs to improve its user awareness. 

For how long have I used the solution?

I have been working with the product for 18 months. 

What do I think about the scalability of the solution?

I rate Check Point Harmony Mobile a nine out of ten. 

How was the initial setup?

I rate Check Point Harmony Mobile's deployment an eight out of ten. 

What's my experience with pricing, setup cost, and licensing?

I rate the tool's pricing a three out of ten. 

What other advice do I have?

I rate the overall solution an eight out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Check Point Harmony Mobile
June 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Raj Ashish - PeerSpot reviewer
Founder - Director (Technology Business) at a tech services company with 1-10 employees
Real User
Top 10
Affordable, easy to set up, with some level of DIY capabilities and is stable
Pros and Cons
  • "The solution provides us with all the information in the log."
  • "The remote configuration has room for improvement."

What is our primary use case?

We mainly use this solution to detect unwanted traffic or any applications which is installed from a reliable/unreliable source. However, when we install the solution, it begins to behave differently. This software is intelligent enough to understand the user interface and interact with it, determining whether it is doing good or asking for sensitive personal information. This capability must be present in any mobile security app.

How has it helped my organization?

It gives enough confidence when we review the logs after appropriately tuning the 'tunable' parameters and then put the device on raw internet traffic and revisit its behavior/events on log files generated. It helps us in graduating our best practices to a 'Leading Practice'. It helped us in conducting critical tests in conducting our job works on Cybersecurity.

What is most valuable?

If we revisit all possible IT compliance whether it is PCI-DSS, HIPAA, GDPR, and more, they all talk about protecting the 'data' and/or leading to privacy. And mobile devices are some of the most vulnerable devices which can be misused in many ways, so protecting the device from malicious traffic is the key when it would be supported with manual configurable controls then it would be the best fit!

What needs improvement?

Documentation may need a revisit, and on additional features: The problem comes when something goes haywire and customers have changed some elements of the mobile which affects the Android software environment. For the same, we looked for remote connectivity for revisiting the consumer's device safely and securely for which we tried a couple of openly available apps (in a controlled environment) which does not look very safe for consumers. Hence, would be interested to see an add-on or an extension software to be a part of 'Check Point Harmony' and can be used for remote monitoring and controlling (keeping all possible security and compliance aspects in mind!)

For how long have I used the solution?

I have been using the solution for several months.

What do I think about the stability of the solution?

We experienced deploying this software on multiple Android devices (having varied firmware versions), however, when it comes to a few old hardware we faced challenges. Rest the product is very stable. (recommend reviewing the release notes, FAQs and recommendations, and more...)

What do I think about the scalability of the solution?

As stated discussed, this is stable software. Given the required storage, recommended memory, and live internet, it would suffice most of the business needs.

How are customer service and support?

When interacting with technical support, we have to be very clear about the issue we (including customers as well) are encountering then the support will provide assistance quickly.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We had a better experience using Zone Alarm (Antivirus and Firewall - desktop release) for a long time, and when we started getting requests on cybersecurity-related issues on mobile devices, we quickly checked Check Point 'Harmony' app. and found a perfect fit as of now.

How was the initial setup?

The initial setup is straightforward (though version to version - device to device it may vary) and the deployment takes no more than ten minutes, but when it comes to 'fine-tuning or customizations' (some specific need/business requirements) it takes time and a series of testing for its fitment.

What about the implementation team?

We did the implementation ourselves and are happy that we are able to protect our own devices (used in business) and for customers. The good part is there are lots of techno-functional documents available on their site which gives enough pragmatic exposers for technologies to understand its near-to-perfect deployment plus your past experience should kick in.

What was our ROI?

Our Revenue is organic and growing. Though unfortunately when we requested for registering our organization, we received our certificate a few days before the COVID lockdown and things have changed fundamentally, then we quickly transformed our operational machinery for remote work and successfully worked for a couple of clients in and around UAE/Saudi reign, which helped us survive and now we have enough requests coming-up for India/locally.

What's my experience with pricing, setup cost, and licensing?

We pay between 300 and 600 Rupees (around seven dollars per month) per year per license, which depends on where you are procuring it, plus a small quantum of our service charges. 

What other advice do I have?

I give the solution an eight out of ten.

The reason we use this solution is primarily due to its availability in the Indian market. This plays a very important role. We then started reviewing many products based on Gartner's magic quadrants, IDC, and other big analytical companies that provide the reports and enough rationale and justification for our decision-making. We prefer to have a look at Moody's ratings for companies' performance.

We must first look at the different mobile applications consumer use. We check the type of issue/problem explained is covered by comprehensive writeups/reports/bug reports/FAQs/or on some relabel blogs or reviews matching our problem area, then we take sustainable solutions.

I recommend the product, but it has to be fine-tuned and tested by each organization.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Provides great data security, access control, and network security
Pros and Cons
  • "As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more."
  • "One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity."

What is our primary use case?

This solution is required for one of the internal needs of our organization. We need the product based on our need for the control of access to corporate resources. We were looking for a solution that allows us to generate the management of mobile network devices and something that could secure all systems in the best way possible, thus giving us a solution that allows for general device management. With this product, our organization will be able to monitor and control the devices used by each of our employees in the organization, which gives us an level of adequate security configuration and allows us to comply with internal policies.

How has it helped my organization?

As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more. The kinds of features on offer provide us with confidential access to information, ensuring each of the different devices is protected while improving the productivity of employees. In summary, this solution can help us protect business resources in the best way possible, which can be translated into efficient and profitable security.

What is most valuable?

A very important feature that is outstanding and helps our organization is the ability to protect the business data stored on each device. This is especially important since these devices are used to create information, catalogs, products, customer information, and inventory. Every time they are outside the company, the solution provides us with a secure connection from the devices to the database, thereby keeping data safe. In addition, we can improve the productivity of each of the employees remotely. This benefits to the company in terms of sales or productivity even from different locations. 

What needs improvement?

One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity. 

In some cases, devices may be found in areas with little or no signal, which can make it difficult to connect to the network. That makes it difficult to use the solution. We ned to ensue we have something that allows users to work effectively even without a strong network connection. This would allow us to have a solution that adapts to the challenged presented by limited connection environments.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Great for protecting data, securing non-corporate devices, and removing old user permissions
Pros and Cons
  • "One of the features that have given us additional value is being able to encrypt and block how data is shared within cell phones or mobile devices."
  • "I would like to see management and remote administration functions in the same portal."

What is our primary use case?

We were busy protecting many of the devices used today by managers, sales teams, and those departments that have to be moving very frequently due to all these uncertainties. 

We were busy protecting the content, data, and information that was downloaded and all those objects or information that is shared with different departments to be secured in a simple way on the mobile devices to which access was given. 

For this reason, we have searched for solutions that could allow us to secure the departments' devices that have permissions outside the institution (based on the role or position they have).

How has it helped my organization?

One of the features that have given us additional value is being able to encrypt and block how data is shared within cell phones or mobile devices. This means that the data that belongs to the corporation will be encrypted and protected in a portion of the phone, with access to interactions against the data further protected within the device. It's a safe way to encapsulate, within a device, security to protect an organization's information.

What is most valuable?

The most valuable feature is being able to encrypt corporate data on devices that are not company devices (like personal cell phones), and being able to manage it remotely. This way, fired users can be removed and eliminated corporate data without affecting the personal data of its other users, thus being an efficient way to safely manage and administer the information that belongs to the corporation. 

We can easily secure the information of the company and the user's device so that if we find a vulnerability or some insecurity breach in these cell phones, the solution will indicate that the device is compromised and it will remove the corporate data to ensure the integrity of the data.

What needs improvement?

I would like to see management and remote administration functions in the same portal. I would like us to see it from the same centralized portal and be able to share its rules, its characteristics, and the advantages of cloud computing power. That way, we would have a more central way to manage the computers that belong to or are managed by us. Check Point Harmony Mobile is one of the features that we can see that is easy to install. We would like to have that same flexibility when it comes to managing it on the same platform where we share it with other features of Harmony Endpoint, Harmony Browser, or the NGFWs.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Adam Coulibaly - PeerSpot reviewer
Suporta engineer at Novasys
Real User
Provides complete protection and is easy to deploy and manage
Pros and Cons
  • "Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage."
  • "If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful."

What is our primary use case?

We are mainly using it to manage mobile connections. It is a cloud solution, and it is deployed on the Check Point cloud.

How has it helped my organization?

We can manage different mobiles in the Harmony portal. For example, we can fix the version of the OS system that can connect to our network. Some applications are not authorized to be installed by the user. So, we can block those applications or versions.

What is most valuable?

Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage.

What needs improvement?

If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful.

For how long have I used the solution?

I have been using this solution for two years.

What do I think about the stability of the solution?

There is no problem with stability. We have had no issues since we started using this product.

What do I think about the scalability of the solution?

It is very easy to scale. We have 10 users, and it is for our internal use. We are also a Check Point partner, and we use it on our mobile phones to show it to our customers during seminars or presentations.

How are customer service and support?

I'm a support engineer, and I have contacted their technical support. I was with a customer who needed some information about the mobile UEM integration of Harmony Endpoint, and I had to contact their technical support to find out how we can do this easily. 

Their support is very easy to contact. We are a partner, and when we contact their support, they always respond on time. Their support is very good.

Which solution did I use previously and why did I switch?

We were providing Kaspersky and Bitdefender to our customers before becoming a partner of Check Point. I don't know if Bitdefender has protection for mobile, but I know that Kaspersky has recently started developing for mobile. Check Point Harmony Mobile is better and more secure for mobile protection because of its stability and all the functionality. It is easy to deploy and manage.

How was the initial setup?

Its initial setup is very simple. If any additional configuration needs to be done, I just receive an email. When a user is added to the portal, you receive an email with information about the server and the password. You can just click and start the application. It is very easy.

It is pretty fast. It just takes one minute for the installation and the first scan.

What about the implementation team?

I do it myself from the office. I don't need an assistant from Check Point or anyone else. I just need to read the documentation. I can download the documentation from their website, which contains the information for installation and troubleshooting.

The maintenance can be done from the tenants in the cloud. You can do the updates and patching of the product in the portal.

What's my experience with pricing, setup cost, and licensing?

At the moment, the price is good, but there is always scope for amelioration when it comes to pricing. When pricing is lower, it can make a customer buy the product. Customers ask us about the price of the product before allowing us to explain the functionality to them.

What other advice do I have?

I would recommend this solution to others. It is easy to implement, and it is easy to manage. It covers OS protection, network protection, file protection, and application protection. It provides the best protection.

I would rate it a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Founder at Softnetx
Real User
Top 5
Scalable solution with efficient scanning features
Pros and Cons
  • "It is a stable solution."
  • "There could be more automation features for the solution."

What is our primary use case?

We use the solution for security purposes. It helps us scan mobile apps for malware prevention.

What is most valuable?

The solution's most valuable features are scanning for malware prevention and threat identification. 

What needs improvement?

There could be more automation features for the solution.

For how long have I used the solution?

I have been using the solution for more than a year.

What do I think about the stability of the solution?

I rate the solution's stability a nine out of ten.

What do I think about the scalability of the solution?

It is a scalable solution. We have 5000 users in our organization.

How was the initial setup?

I rate the solution's initial setup process a nine out of ten. We take help from its documentation and execute the implementation manually. Although, the documentation needs to include a few crucial steps for onboarding users.

What's my experience with pricing, setup cost, and licensing?

The solution's cost depends upon the number of users. Its price reduces in case of a larger number of users.

What other advice do I have?

I advise others to deploy the solution for advanced automation features. I rate it a nine out of ten.

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
HM is a excellent security tool, modern and infinity portal is great.
Pros and Cons
  • "We have had a lot fewer attacks thanks to this solution."
  • "The only language that is available is English."

What is our primary use case?

They can access the information from anywhere, which had to be covered with security to safeguard the company data, for which we obtained the use of Check Point Harmony Mobile to be able to provide this layer of security in a simple way.

How has it helped my organization?

The security provided has helped us to shield the information accessible to mobiles from anywhere, this was a risk to vulnerabilities, which is why the implementation of the Harmony Mobile Check Point solution has been quite important to improve security.

With it, we have been able to establish policies for use, access and anti-malware protection, and modern protection so that the equipment is covered.

We have had a lot fewer attacks thanks to this solution, achieving the main objective.

Users are quite happy with the solution.

What is most valuable?

The costs are adjusted to the organization for each user that is implemented and is really competitive for the features that are implemented.

It is essential to rely on a good vendor so that the provisioning and implementation of security are the best.

What needs improvement?

I feel that the implementation of users in a massive way should improve so that we can easily load some Excel, which can provide all the users that are required to be implemented.

Also, the solution or support service must improve, its newer applications are a little more difficult for the support teams since they take longer to solve.

The only language that is available is English. The hours of attention are somewhat uncomfortable as they are generally on the other side of the world, which is why they are not compatible with Latin America.

For how long have I used the solution?

It has helped us a lot with the issue of controlling the security of both internal and using mobile devices since, through the agent, we can carry out this security governance.

Which solution did I use previously and why did I switch?

It is our first implementation since previously we used an antivirus solution, but they did not meet the requirements of the company or modern threats.

What's my experience with pricing, setup cost, and licensing?

It is important to always implement demo environments to test first before doing it in production so that we can have more experience when migrating it to the most important environment.

The cost is accessible.

Which other solutions did I evaluate?

We really do not doubt the capacity of Check Point. We validate reviews in addition to validating their characteristics, for which we are convinced of their potential. Check Point Harmony Mobile is one of the best.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Product Categories
Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.