We are mainly using it to manage mobile connections. It is a cloud solution, and it is deployed on the Check Point cloud.
Suporta engineer at a insurance company with 201-500 employees
Provides complete protection and is easy to deploy and manage
Pros and Cons
- "Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage."
- "If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful."
What is our primary use case?
How has it helped my organization?
We can manage different mobiles in the Harmony portal. For example, we can fix the version of the OS system that can connect to our network. Some applications are not authorized to be installed by the user. So, we can block those applications or versions.
What is most valuable?
Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage.
What needs improvement?
If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful.
Buyer's Guide
Check Point Harmony Mobile
December 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,422 professionals have used our research since 2012.
For how long have I used the solution?
I have been using this solution for two years.
What do I think about the stability of the solution?
There is no problem with stability. We have had no issues since we started using this product.
What do I think about the scalability of the solution?
It is very easy to scale. We have 10 users, and it is for our internal use. We are also a Check Point partner, and we use it on our mobile phones to show it to our customers during seminars or presentations.
How are customer service and support?
I'm a support engineer, and I have contacted their technical support. I was with a customer who needed some information about the mobile UEM integration of Harmony Endpoint, and I had to contact their technical support to find out how we can do this easily.
Their support is very easy to contact. We are a partner, and when we contact their support, they always respond on time. Their support is very good.
Which solution did I use previously and why did I switch?
We were providing Kaspersky and Bitdefender to our customers before becoming a partner of Check Point. I don't know if Bitdefender has protection for mobile, but I know that Kaspersky has recently started developing for mobile. Check Point Harmony Mobile is better and more secure for mobile protection because of its stability and all the functionality. It is easy to deploy and manage.
How was the initial setup?
Its initial setup is very simple. If any additional configuration needs to be done, I just receive an email. When a user is added to the portal, you receive an email with information about the server and the password. You can just click and start the application. It is very easy.
It is pretty fast. It just takes one minute for the installation and the first scan.
What about the implementation team?
I do it myself from the office. I don't need an assistant from Check Point or anyone else. I just need to read the documentation. I can download the documentation from their website, which contains the information for installation and troubleshooting.
The maintenance can be done from the tenants in the cloud. You can do the updates and patching of the product in the portal.
What's my experience with pricing, setup cost, and licensing?
At the moment, the price is good, but there is always scope for amelioration when it comes to pricing. When pricing is lower, it can make a customer buy the product. Customers ask us about the price of the product before allowing us to explain the functionality to them.
What other advice do I have?
I would recommend this solution to others. It is easy to implement, and it is easy to manage. It covers OS protection, network protection, file protection, and application protection. It provides the best protection.
I would rate it a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
IT Security Manager at a comms service provider with 1,001-5,000 employees
We like the ability to encrypt transactions on all devices
Pros and Cons
- "We like Harmony's ability to encrypt transactions between mobile devices. All the user's transactions are encrypted. That's an excellent feature. We can detect, quarantine, and address any issues in the handset itself."
- "Harmony has more support for Android OS as opposed to iOS. You need a third-party MDM solution to integrate with iOS. If you don't have an MDM, your app can't scan on an iOS device. The solution can scan everything on Android. It sees all your apps."
What is our primary use case?
We use Harmony Mobile to protect our workers' mobile devices. There are about 300 users, including everybody from executives to regular engineers. We plan to increase usage, but we are waiting on an executive decision. They'll decide whether to cut costs or increase use.
What is most valuable?
We like Harmony's ability to encrypt transactions between mobile devices. All the user's transactions are encrypted. That's an excellent feature. We can detect, quarantine, and address any issues in the handset itself.
What needs improvement?
Harmony has more support for Android OS as opposed to iOS. You need a third-party MDM solution to integrate with iOS. If you don't have an MDM, your app can't scan on an iOS device. The solution can scan everything on Android. It sees all your apps.
For how long have I used the solution?
We have had Harmony Mobile for about three years. We're both a customer and a partner. The partner is the enterprise division of our organization, and we are a customer, but we cannot purchase it ourselves. We have to go to a third party. Acquisition is more from the customer base, but my company also is a partner.
What do I think about the stability of the solution?
We haven't had any issues with Harmony crashing our system.
How was the initial setup?
Deploying Harmony was straightforward. You can deploy it using an MDM solution, but we didn't have one at the time. We deployed by email or SMS, and was relatively simple.
We explored the MDM part with Google but ran into some issues because the feature required for this integration requires an enterprise license. We have three staff members responsible for implementing and managing the solution.
What's my experience with pricing, setup cost, and licensing?
The license was pretty reasonable. I don't have a figure right now, but I think it was somewhere between $10 and $30 per user.
Which other solutions did I evaluate?
We evaluated VMware Workspace ONE, and VMware also had an MDM that we looked at at the time. Even the McAfee MVISION right now also comes with mobile device management as well.
What other advice do I have?
I rate Check Point Harmony eight out of 10.
My advice for enterprises thinking about Harmony is to consider your device type. If your users are predominantly on Android, it's a good solution. If it's primarily iOS users, you might need to deploy an MDM before buying it. An MDM that covers both operating systems is a significant factor to consider. It will determine how easy it is to deploy it and how much control you have over the profiles.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Mobile
December 2025
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,422 professionals have used our research since 2012.
Head of Special Projects Unit-RCJA (SANDETEL) at a government with 10,001+ employees
Easy to implement, simple to maintain policies, and does not disrupt end-user functionality
Pros and Cons
- "It has been very easy to implement and deploy."
- "It could expand the functionalities to, in addition to security functionality, incorporate Mobile Device Management (MDM) functionalities such as remote device management, administration of installed applications, etc."
What is our primary use case?
The goal is to implement Harmony Mobile in the entire fleet of devices of the Government of the Junta de Andalucia. We are talking about a total of about 60,000 terminals. A pilot of the solution has started and it will be implemented in all the terminals that are renewed in the corporate network. These devices correspond to different user profiles and include different browsing patterns and profiles and threat exposure from terminals for M2M communication to advanced user terminals with large traffic quotas.
How has it helped my organization?
In the first place, the Harmony Mobile solution (or also known as Sandblast Mobile) has allowed us to minimize and speed up the software deployment tasks, which is the plan for 60,000 potential terminals and it is already a very important first advantage. The main advantage of the solution is the implementation of complete security policies for the terminals that address how more apps are installed on corporate devices. It is essential to be absolutely certain that these apps and the navigation of these terminals do not cause any risk to the corporate network. Harmony Mobile guarantees this protection.
What is most valuable?
It has been very easy to implement and deploy. It's possible to scale the installation based on the policies defined for each profile. It's my understanding that maintaining these policies and updating them will be a fairly easy task through the options provided by the platform. I am convinced that it is an advantage that the network administrators and security officers of the companies will gladly accept. On the other hand, it is also very important to note that the end-user has not perceived any inconvenience in the application of this solution to their terminals: it is completely transparent and has not caused any rejection among users who already have it implemented.
What needs improvement?
It could expand the functionalities to, in addition to security functionality, incorporate Mobile Device Management (MDM) functionalities such as remote device management, administration of installed applications, etc. In a wide network like ours, it would be a very desirable feature, since, in the same product, we would have all the device management and security capabilities we need. Another capacity that I would add to the product would be greater performance optimization options for older terminals. Our fleet is very varied and some devices are up to 5 years old.
For how long have I used the solution?
Our solution has been in place for 3 years.
What do I think about the stability of the solution?
The current version we are working with (Version 3.7) is very stable. It's a stable solution because it keeps corporate data safe by protecting mobile devices across all attack vectors— apps, network, and operating system —without impacting user experience or privacy.
What do I think about the scalability of the solution?
The solution is easily scalable because integration with the MDM is allowed.
How are customer service and technical support?
Access to technical support for users is always done through the vendor. However, we perceive that the technical and human team behind Check Point is exceptional.
Which solution did I use previously and why did I switch?
No, previously we have not had any solution that implements security in the mobile terminals of the corporate network.
How was the initial setup?
The initial start-up was fairly straightforward thanks to the specialist support of the vendor. No major incidents were detected.
What about the implementation team?
The implementation was through a vendor. The team in charge had a high level of experience and their tasks were carried out with a high degree of professionalism.
What was our ROI?
Our business model does not focus on measuring these types of parameters. The adoption of this type of solution is motivated by other factors, especially in the reduction of security incidents and related incidents in mobile services and corporate networks.
What's my experience with pricing, setup cost, and licensing?
In our case, the cost is indirect and is directly passed on by the mobile services operator to the mobile voice services/terminals of the corporate network. We do not have data on the detailed cost of the service.
Which other solutions did I evaluate?
No, previously we have not had any solution that implements security in the mobile terminals of the corporate network.
What other advice do I have?
As it is deployed in a greater number of devices and the maintenance and management tasks associated with the solution escalate, we will be able to make a future updated review.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Founder at a computer software company with 11-50 employees
Scalable solution with efficient scanning features
Pros and Cons
- "It is a stable solution."
- "There could be more automation features for the solution."
What is our primary use case?
We use the solution for security purposes. It helps us scan mobile apps for malware prevention.
What is most valuable?
The solution's most valuable features are scanning for malware prevention and threat identification.
What needs improvement?
There could be more automation features for the solution.
For how long have I used the solution?
I have been using the solution for more than a year.
What do I think about the stability of the solution?
I rate the solution's stability a nine out of ten.
What do I think about the scalability of the solution?
It is a scalable solution. We have 5000 users in our organization.
How was the initial setup?
I rate the solution's initial setup process a nine out of ten. We take help from its documentation and execute the implementation manually. Although, the documentation needs to include a few crucial steps for onboarding users.
What's my experience with pricing, setup cost, and licensing?
The solution's cost depends upon the number of users. Its price reduces in case of a larger number of users.
What other advice do I have?
I advise others to deploy the solution for advanced automation features. I rate it a nine out of ten.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
HM is a excellent security tool, modern and infinity portal is great.
Pros and Cons
- "We have had a lot fewer attacks thanks to this solution."
- "The only language that is available is English."
What is our primary use case?
They can access the information from anywhere, which had to be covered with security to safeguard the company data, for which we obtained the use of Check Point Harmony Mobile to be able to provide this layer of security in a simple way.
How has it helped my organization?
The security provided has helped us to shield the information accessible to mobiles from anywhere, this was a risk to vulnerabilities, which is why the implementation of the Harmony Mobile Check Point solution has been quite important to improve security.
With it, we have been able to establish policies for use, access and anti-malware protection, and modern protection so that the equipment is covered.
We have had a lot fewer attacks thanks to this solution, achieving the main objective.
Users are quite happy with the solution.
What is most valuable?
The costs are adjusted to the organization for each user that is implemented and is really competitive for the features that are implemented.
It is essential to rely on a good vendor so that the provisioning and implementation of security are the best.
What needs improvement?
I feel that the implementation of users in a massive way should improve so that we can easily load some Excel, which can provide all the users that are required to be implemented.
Also, the solution or support service must improve, its newer applications are a little more difficult for the support teams since they take longer to solve.
The only language that is available is English. The hours of attention are somewhat uncomfortable as they are generally on the other side of the world, which is why they are not compatible with Latin America.
For how long have I used the solution?
It has helped us a lot with the issue of controlling the security of both internal and using mobile devices since, through the agent, we can carry out this security governance.
Which solution did I use previously and why did I switch?
It is our first implementation since previously we used an antivirus solution, but they did not meet the requirements of the company or modern threats.
What's my experience with pricing, setup cost, and licensing?
It is important to always implement demo environments to test first before doing it in production so that we can have more experience when migrating it to the most important environment.
The cost is accessible.
Which other solutions did I evaluate?
We really do not doubt the capacity of Check Point. We validate reviews in addition to validating their characteristics, for which we are convinced of their potential. Check Point Harmony Mobile is one of the best.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Information Technologist at a energy/utilities company with 1,001-5,000 employees
Easy to use with zero-touch deployment and excellent assistance
Pros and Cons
- "The other most valuable service so far has been the assistance provided to us by the Check Point Harmony mobile engineers. They have been so awesome and helpful to us during the setup process."
- "It would be super helpful if there were more details around the risks that were found on our mobile devices."
What is our primary use case?
The Checkpoint Harmony mobile application is used to protect and eliminate our corporate iPhone users from malicious attempts such as phishing, malware, malicious websites, anti-bots, and harmful applications. Many users receive malicious text messages and emails prompting them for credentials such as corporate active directory details, banking information, or credit card information. It is important to protect our corporate data on all mobile devices by using Check Point's Harmony Mobile Application.
How has it helped my organization?
It has provided us with an easy-to-use solution that protects our corporate data on all our iPhone mobile devices. The easy-to-manage cloud-based management console provides us with details on the scanning status of our devices and reports all risks that are identified on the mobile devices. It is wonderful to be able to customize the many policies in order for the application to work at it's best for our corporate environment. The scalability has provided us with much protection and flexibility - and that is what we definitely need.
What is most valuable?
The zero-touch deployment system process has been the most valuable feature thus far. The ability to deploy and configure the application with the help of Microsoft's Endpoint Management (our mobile device management solution) has been seamless and has given us the ability to deploy with zero user interaction.
The other most valuable service so far has been the assistance provided to us by the Check Point Harmony mobile engineers. They have been so awesome and helpful to us during the setup process.
What needs improvement?
The area that I find could use the most improvement would be in the forensics section of the administrator console. It would be super helpful if there were more details around the risks that were found on our mobile devices. A simple click to find out more information would be excellent. Also, a reporting option would be beneficial as well. Maybe the option to send an email to the administrators when a high-risk vulnerability is found and also the option to run a monthly report to send to administrators would be great.
For how long have I used the solution?
I've used the solution for about 4 months.
What do I think about the stability of the solution?
The solution is very stable; we have not had any connection issues with the devices reporting into the admin console.
What do I think about the scalability of the solution?
The options to customize the policies are very beneficial.
How are customer service and technical support?
Technical support is great. All have excellent customer service skills and stellar technical abilities.
Which solution did I use previously and why did I switch?
We previously did not have a solution in place.
How was the initial setup?
The initial setup was straightforward and the documentation was excellent.
What about the implementation team?
We did an in-house implementation with support from engineers.
What was our ROI?
In terms of ROI, we do not know this yet.
What's my experience with pricing, setup cost, and licensing?
I'd advise new users to be sure to get all information about the cost and licensing first.
Which other solutions did I evaluate?
No, we did not evaluate other options first.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Manager, Infrastructure Services at a energy/utilities company with 1,001-5,000 employees
Straightforward to setup with great technical support and an excellent admin portal
Pros and Cons
- "The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly."
- "The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing."
What is our primary use case?
We were lacking threat detection and device-level protection in our mobile device space. We are an Apple shop exclusively and although Apple does a good job at vetting apps and developers in the Apple App Store, we were lacking protection beyond that. The Harmony Mobile Protect suite really gave us the confidence of protection and real-time threat level safeguards. Users have the confidence to know that the data on their devices is safe. It's a great solution that has a proven track record in the mobile space.
How has it helped my organization?
Harmony Mobile Protect has improved the confidence of the users in knowing their mobile device and data is protected. It is shocking to see how many sites, apps, and links to content were vulnerable to threats and security gaps. Users found themselves going to what they thought were innocent sites and in-app purchases that led them to a vulnerability. To be fair, some legitimate apps, links, and content were flagged and all we needed to do is make adjustments to the white lists and users were able to access that data with no issue.
What is most valuable?
The app just runs in the background and keeps the device safe. The real-time scan is awesome and really delivers that value-add component to threat defense and a holistic approach to mobile device protection. The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly. Tracking users, seeing devices and their current state at a glance is very helpful. Reporting is also a great value add to this product. Seeing the areas of concern and making adjustments to tighten the gaps is very helpful and a value add.
What needs improvement?
The admin portal is slightly clunky and sometimes shows a different status than what the device is actually doing. A simple refresh of that device corrects the issue and displays real-time data. Overall, it works well and the improvements so far for this product have been great. Allowing the user to control the real-time scan is important. In recent updates of the app version, this can be achieved easily, but the user doesn't always see that. Perhaps making a separate button or leveraging the menu ribbon for this feature may work better.
For how long have I used the solution?
I've worked with the solution for 3 months now.
What do I think about the stability of the solution?
After the initial setup, of course there was some tweaking, but the platform It' very solid. We have had no issues thus far with the stability. There have been a few updates that were low to no impact. More enhancement based updates.
What do I think about the scalability of the solution?
So far, we have found it to be very scalable. That was the main selling point for us on this product.
How are customer service and technical support?
We did have some issues come up and required technical support. The support team was awesome and really knew how to address the issues we were having. The problems were fixed and we were back on the road in no time.
Which solution did I use previously and why did I switch?
We did not. This is our first product for mobile device threat protection and real-time scanning.
How was the initial setup?
It was pretty straightforward. We had a solutions engineer walk us through things and helped us tie into our MDM, which went well.
What about the implementation team?
We implemented through Check Point directly for the POC and then continued with licenses. The setup with Check Point went great and we were very happy to have that level of expertise on hand. Their solutions engineers are top-notch and we were very pleased.
What was our ROI?
We are new to using this product, so we have not been able to capture the ROI as of yet.
What's my experience with pricing, setup cost, and licensing?
We had a very positive experience with this. The cost is the amount of devices times the number of licensing and the setup fees. We were up and running quickly. I do highly recommend leveraging a demo of this product. It really shows the depth of the product and the value-add to the customer.
Which other solutions did I evaluate?
No, we have a vested interest with Check Point Mobile and we looked at their product line first, and was sold.
What other advice do I have?
Harmony Protect is a great solution and really stands up to threat protection and device defense.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Chief Information Security Officer at a financial services firm with 10,001+ employees
Secures and segments corporate and personal data, offers remote secure-wipe capabilities, but the reporting is complicated
Pros and Cons
- "Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet."
- "The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not."
What is our primary use case?
The primary use case is to enable access to any corporate application hosted on-premises or in the cloud using a mobile device with single sign-on (SSO) capabilities.
It provides IT admins capabilities for granting access to corporate applications or data on mobile devices and should be able to securely monitor and manage the mobile devices that access sensitive business data. It includes storing essential information about mobile devices, deciding which apps can be present on the devices, and locating devices.
This product should be able to remove corporate applications and data on enrolled devices remotely, known as an enterprise wipe, in case a device is stolen, lost, or if the user leaves the organization.
Corporate data should be securely stored on mobile devices and the user should not be able to share data from corporate apps/data to personal storage.
How has it helped my organization?
Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet.
A separate workspace is created on the enrolled mobile, which partitions corporate data from personal data. Policies can restrict users from copying any app/data from corporate to personal storage and vise versa.
Users are able to login to corporate applications using single sign-on.
DLP policy prevents data leakage issues, which cannot be prevented if applications are published directly without any MDM solution.
Enterprise wipe gives us the capability to remove applications and data from enrolled devices remotely in cases where one is lost, stolen, or for any other reason.
Organizations can prevent device enrollment in cases where a device is rooted/jailbroken.
What is most valuable?
Enrollment is based on the user name and the admin needs to create an enrollment policy. The enrollment email goes to users who are entitled to enrollment via Capsule. Each user needs to manually click and add the Token, which is sent via email and used for providing and restricting access.
Licenses are taken from Check Point for the number of users who need to be enrolled via Capsule.
No additional hardware or setup is required for Capsule configuration, as it can be enabled on the same security gateway. This reduces any additional hardware cost, as well as for setup and connectivity.
Configuration is straightforward and can be controlled on the same NGFW as Capsule. This is used for providing access to users.
What needs improvement?
Reporting is quite complicated once more users are enrolled and they need disparate access. It needs to be maintained separately, which adds work for the admin and can lead to errors.
Enrollment emails are sent for each device, which means that when a user needs to change devices or enroll more than one, admins need to generate and send additional tokens.
The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not.
For example:
- HR sharing certain learning videos or documents to a group of users. The solution does not provide reports as to whether these have been accessed by the user or not.
- It does not provide a solution in the case where a device is being shared by multiple users
- A site where one iPad is being shared between five users is a problem. Each user has their own access to the device but this solution does not have the capabilities of providing each user with specific access to data or applications.
For how long have I used the solution?
We are not using Check Point Harmony Mobile for now.
What do I think about the stability of the solution?
This product is stable, just like any other Check Point solution.
What do I think about the scalability of the solution?
It can be scaled by adding more security gateways and enabling the license. It is done in the same manner as a Check Point firewall.
How are customer service and technical support?
The technical support is excellent.
Which solution did I use previously and why did I switch?
We used this solution and then moved to a different one.
How was the initial setup?
The initial setup is straightforward.
The process involves getting a license from Check Point and enabling a module/blade on the security gateway. After this, start on the configuration (Published data, which needs to be made available on the endpoint to access).
What about the implementation team?
Our in-house team completed the deployment with OEM support.
What was our ROI?
Using this firewall improves productivity and availability for enrolled endpoints. Published data can be accessed anytime on a mobile device.
What's my experience with pricing, setup cost, and licensing?
Check Point provides a separate license in cases where organizations want to use this only on mobile devices, or laptops/desktops. Check Point Total includes both mobile devices and endpoints.
Setup can be done on the existing security gateway or it can be done on a dedicated security gateway where there are a large number of users.
Checkpoint provides five user licenses by default.
What other advice do I have?
The organization should be clear on the requirements. If it is only for publishing a few web apps, URLs, email, or for a few shared drives, then the solution works absolutely fine. However, it is not a full-fledged MDM solution like VMware AirWatch/Citrix/Blackberry and more.
These solutions all provide more MDM capabilities than Capsule.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2025
Product Categories
Mobile Threat DefensePopular Comparisons
Symantec Endpoint Protection Mobile
McAfee MVISION Mobile
Pradeo Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros
sharing their opinions.







