Information Technology Security Specialist at Telecommunications Services of Trinidad & Tobago Limited (TSTT)
Real User
Top 20
Easy to use with an excellent variety of capabilities
Pros and Cons
  • "Harmony Mobile's most valuable feature is the variety of capabilities in the platform, including allowing you to track device status."
  • "Harmony Mobile could be improved with increased built-in DLP coverage."

What is our primary use case?

I use Harmony Mobile integrated with our MDM platform to manage mobile devices.

What is most valuable?

Harmony Mobile's most valuable feature is the variety of capabilities in the platform, including allowing you to track device status.

What needs improvement?

Harmony Mobile could be improved with increased built-in DLP coverage.

For how long have I used the solution?

I've been using Check Point Harmony Mobile for two and a half years.

Buyer's Guide
Check Point Harmony Mobile
April 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,857 professionals have used our research since 2012.

What do I think about the stability of the solution?

Harmony Mobile is stable.

What do I think about the scalability of the solution?

Harmony Mobile is scalable.

How was the initial setup?

The initial setup is easy, and deployment takes just a couple of minutes.

What about the implementation team?

We used an in-house team.

Which other solutions did I evaluate?

I also evaluated VMware AirWatch, but I find Harmony Mobile to be a better solution.

What other advice do I have?

Because of its ease of use and the coverage you get for the blurred boundary of mobile devices, Harmony Mobile gives you coverage whether you're using a BYOD, COPE, or COBO framework. I would give Harmony Mobile a rating of nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Centralized management with good monitoring and reporting features
Pros and Cons
  • "The solution has clients for both Android and Apple devices, so all of our employees' devices are protected."
  • "The feature set between the Android and Apple devices is not fully equal."

What is our primary use case?

Having the Check Point SandBlast Mobile application installed is mandatory for any smartphone or tablet PC provided to the employees by our company, and for any BYOD device if it is going to be connected to the corporate network. Currently, there are about 500 devices that are running on both Android and Apple devices. 

We decided not to self-host the management center, and onboarded the cloud management solution provided by the Check Point. This runs in their own datacenter, with the SLA provided.

How has it helped my organization?

Before implementing the Check Point SandBlast Mobile, we didn't have any mandatory security software being installed on the corporate mobile devices, and it was a huge security gap we needed to close ASAP because smartphones and tablets are connected to the office Wi-Fi networks on a daily basis, and to the corporate VPN resources occasionally (depending on the user's access level). 

The implementation of the Check Point SandBlast Mobile, as the centralized security solution for the mobile devices, improved the overall security of our network by providing the additional protecting layer on the user devices. 

The management overhead is minimal since there is a central management point, where all the policies are configured and then pushed to the smartphones and tablets when they are online.

What is most valuable?

  1. The solution has clients for both Android and Apple devices, so all of our employees' devices are protected.
  2. The client allows us to detect the rooting/jailbreaking of the OS and prevents the connection of such devices to the corporate network VPN.
  3. The client detects and prevents the various types of the phishing attacks, malicious sites in the browsers, and checks them with the help of the Check Point database (ThreatCloud).
  4. The centralized management portal is rich in configuration options, monitoring, reporting capabilities.

What needs improvement?

  1. Some of our employees reported slow performance of the application on the old Android devices (Android version 2.4 and less), but I think it is mostly connected with the poor hardware resources on the older devices.
  2. The feature set between the Android and Apple devices is not fully equal. For example, with Android, it is possible to configure in the policy the file system tampering and keylogging and credential theft detection options. This is unavailable for the Apple devices. I don't think it is the fault of Check Point, but rather restrictions based on the different operating system capabilities. Nonetheless, I would like the policies to be more alike.

For how long have I used the solution?

We have been using Check Point SandBlast Mobile for about two years.

What do I think about the stability of the solution?

The clients for both Android and Apple operating systems are stable and mature.

What do I think about the scalability of the solution?

The solution is scalable. Now we manage about 500 devices and see no downgrade in the performance of centralized management.

How are customer service and technical support?

We didn't have any support cases opened for Check Point SandBlast Mobile.

Which solution did I use previously and why did I switch?

We did not use another solution prior to this one.

What about the implementation team?

The solution was implemented by the in-house team of security engineers and system administrators.

Which other solutions did I evaluate?

We decided to purchase the Check Point SandBlast Mobile after the demo with the vendor.

What other advice do I have?

The solution is modern and easy to onboard.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Mobile
April 2024
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,857 professionals have used our research since 2012.
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees
Real User
Has good application scanning that it stable and has helpful technical support
Pros and Cons
  • "I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."
  • "In the next release, I would like to see a Wi-Fi scanner to be able to identify whether a wireless network is malicious before you join it."

What is our primary use case?

The primary use case of this solution is for mobile threat prevention. We integrate it with an MDM and push it to our managed devices to protect the company's phone.

How has it helped my organization?

It prevents you from visiting phishing sites. It will scan the URL and let you know whether or not it's a malicious location or not.

It helps to reduce the person from just clicking away.

Users always feel disconnected from the network when they are using their mobile phone and we felt the need to be protected, just as much as our laptops. Sometimes you can click on something without realizing it. Having that extra added layer of security and support helps to keep the person safe from malicious actors.

We were looking for a solution with application scanning, phishing detection, and has the ability to whitelist and blacklist websites or a URL.

What is most valuable?

I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious.

It does an active scan of all applications.

Time and time again, you read that applications have been removed from the Play Store because they are from a malicious vendor or they have been compromised. Having an extra layer of security where it scans to ensure that your device has a more secure and stable version of the application is very valuable.

What needs improvement?

In the next release, I would like to see a Wi-Fi scanner to be able to identify whether a wireless network is malicious before you join it. That would be very valuable.

For how long have I used the solution?

I have been using this product for more than two years.

What do I think about the stability of the solution?

It's a stable solution and I don't recall any outages or access issues. The uptime is high.

What do I think about the scalability of the solution?

Currently, we have not exhausted our license, and haven't had the need to scale it up or down.

We have approximately 800 users who range from customer service to the CEO. Once you have a mobile device, it will be managed.

I am a security analyst and my manager and I are the only two interacting with the solution. We reach out to Check Point for any maintenance that is needed.

How are customer service and technical support?

Technical support was very helpful and not difficult to connect with them. As soon as we sent them the email, there we always ready and available to arrange a meeting to get things done.

The process is the same before and after deployment. Just sent an email with the issues and they will contact to arrange a meeting to resolve the issue.

I would say that they are very helpful and always just an email away.

How was the initial setup?

The initial setup is straightforward. It's an easy setup with just a flip of a switch.

We were set up and ready to go very quickly. Because it's a cloud offering and hosted online, it's made to be much quicker.

The deployment was less than a week. We installed it manually on the devices then integrated with an MDM that automates the process for all manual devices.

What about the implementation team?

We had support from Check Point to assist us and they were very helpful.

What was our ROI?

The fact that we have not had any mobile breaches is a return on investment.

What's my experience with pricing, setup cost, and licensing?

Check Point pricing is better than Symantec.

Which other solutions did I evaluate?

We also evaluated Symantec Endpoint protection Mobile.

Symantec does not do everything that Check Point does and furthermore, Check Point pricing is better. Budgetary-wise, it was the right choice for us.

What other advice do I have?

This solution checks so many of our boxes already, anything new added would just be the icing on the cake.

My advice would be to do your homework. Ensure that this is the right product for you. Request a demo and test it out. 

Don't purchase more licenses than you need because it will become costly.

Before this, I didn't realize that there were so many malicious applications out there in the world. So, it was a bit eye-opening to see some of what your phone can access without you even realizing what you were clicking.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Systems Administrator at a retailer with 201-500 employees
Real User
Provides in-depth, good protection for all three threat vectors: application, network, and device
Pros and Cons
  • "It monitors all the URLs that a user goes to on their phone and so we can see what they're looking at and we can limit that. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit those as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk."
  • "Integration needs improvement. We use Check Point for email. We use Check Point Capsule Workspace and I wish that it tied into that better and was integrated with their email application so that when it's secure, then they're able to access their email and it could be deployed as one group instead of two separate applications. It's a little bit more work for us to deploy both of those so it'd be nice if they could be integrated."

What is our primary use case?

We use SandBlast Mobile to secure our BYOD devices for employees that want to have access to corporate information, as we require them to have SandBlast in order to do that. It is always monitoring their text messages for malicious stuff or their apps, to see if there's anything malicious, and then we receive the logging and alerts so we are able to react and take care of our users' security.

How has it helped my organization?

I don't know if it improved any functions for us besides just securing devices. Previously, we had nothing securing our mobile devices and we just trusted the users to be smart on their phones, and now we have that solution so it's able to help protect those phones and let us know if their software's really out of date and information like that.

It has stopped about five phishing attacks on mobiles in the last month.

What is most valuable?

I would say the most valuable aspect is just the offering itself. We don't have a lot of offerings out there in the mobile world right now to put on cell phones and they filled that gap. Having a really good security control on a mobile device is its greatest asset.

The protection provided by this solution for all three threat vectors, application, network, and device is really good. It's in-depth on all accounts.

It monitors all the URLs that a user goes to on their phone so we can see what they're looking at and we can limit it. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit apps as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk.

The device itself checks to see if the device is jailbroken yet and so that's a good security control they have. It also watches your SMS text messages for phishing so that's another way it's securing the device.

The detection and prevention mechanisms seem very accurate. I remember about a year and a half ago, there was an app that had been found to be malicious, it instantly switched its rating, and was reacting to that change in the vulnerability of that app rather swiftly so it seems to be very accurate and in-depth.

It's super comprehensive. The networking part watches all of its networking and it does a man in the middle attack to be able to see that, but it is extremely comprehensive in being able to see everything that the phone is doing network-wise.

It has a pretty good dashboard. You can maneuver around it quickly and be able to see what you want to see and get to the information you need.

The ease of use is good. It does allow you to send email alerts and I get email alerts when something's going on so I don't have to be watching it all the time and then I'm able to go and work with that user to resolve it. It seems to be a pretty well-built tool.

I haven't seen many false positives, they've all seemed to be pretty accurate.

What needs improvement?

Integration needs improvement. We use Check Point for email. We use Check Point Capsule Workspace and I wish that it tied into that better and was integrated with their email application so that when it's secure, then they're able to access their email and it could be deployed as one group instead of two separate applications. It's a little bit more work for us to deploy both of those so it'd be nice if they could be integrated.

With that, I think that having the functionality of being able to test the URL would be an improvement. For example, if you had an email with a URL address in it, you can copy and paste it in there and it can test it and tell you if it's a safe site or something like that. 

For how long have I used the solution?

I've been using Check Point SandBlast Mobile for three years. 

We are using the cloud for its management. It's hosted by Check Point.

What do I think about the stability of the solution?

It seems to be very stable, I haven't seen any outages in it.

What do I think about the scalability of the solution?

Being hosted by Check Point, scalability hasn't really been a big concern. It seems to be handling all the devices we've added. We have a very small company so I don't know as far as how it would fit a huge company, but for us, it's been great.

There are fifty users in my company. 

How are customer service and technical support?

I have not used their technical support for this solution.

How was the initial setup?

The initial setup was pretty straightforward. Setting up individual networking is a little bit more complex besides depending on how granular your organization uses it, but for us, it was pretty straightforward.

The installation of the solution on end-user mobile devices was not complex. It's straightforward. It's very simple. Our end-users are able to install it themselves, we don't have to really be involved in that process so they're able to do it without help from IT for the most part. That is super helpful to not have to handhold as an IT team all of our users, they can just do it and it works. 

There is no enforcement mechanism that depends on the user if they installed it or not. We don't enforce it in that way, but we do enforce it based upon if they want to have email access. We require them to have it so we validate that it's installed before we install email, but we don't enforce it.

There was definitely concern from end-users about their privacy. Especially with the networking part, the way that it's able to see everywhere they go is a big security and privacy issue. We addressed it by not requiring all our users to have it, but if they want to email, they have to have it and so that's how we ended up getting around it. We had people that ended up using a company phone and a personal phone separately because of it.

The deployment is still in process actually, but that's mostly on our end, not really Check Point's end. We don't have all the policies in place to have that process set forth of how we're doing it so we're still kind of working on that. 

In terms of our implementation strategy, as of right now, we have emails set up on people's devices using a different application. That application is no longer working and so as users want email, we implement it, but we aren't pushing users to have email on their phone. And I think in the future that's going to be the case, but right now it's not because we don't have company policies in place for that.

I'm responsible for the deployment and maintenance and I'm a system administrator.

What was our ROI?

Our ROI has been great. It really didn't come at a cost for us because we already had the Infinity in place so, at no cost, we had extra security benefits added and visibility into our users' devices that we didn't have before.

What's my experience with pricing, setup cost, and licensing?

As we didn't really compare it with competitors, we bought it as part of our Infinity and so it was included with our other network security. It was basically no cost to us because we were already planning on using the other features of it. It was just an added part of that contract, but I don't have much input beyond that. We didn't compare to anyone else or anything like that.

What other advice do I have?

Having Check Point, at least for us, they implemented two different hosted platforms so that we could have different policies for different users, and that was really helpful to us because we did have privacy concerns from a lot of users. We were able to lock down the network on some devices and other devices we didn't monitor the network.

I would rate it a nine out of ten. It's really in-depth for what it does.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Security officer at a construction company with 11-50 employees
Real User
Top 20
The market-leading Mobile Threat Defense solution that keeps your corporate data safe
Pros and Cons
  • "It is a scalable solution. Up to three hundred users are using the solution. I rate the scalability a ten out of ten."
  • "The project point needs improvement."

What is our primary use case?

We use it for protecting mobile devices and have a few cases for integrating HEM mobile as it is the gate to some payment applications.

What needs improvement?

The project point needs improvement. 

For how long have I used the solution?

I have been using Check Point Harmony Mobile for five years. 

What do I think about the stability of the solution?

The solution is stable. I rate the stability an eight out of ten. 

What do I think about the scalability of the solution?

It is a scalable solution. Up to three hundred users are using the solution.  I rate the scalability a ten out of ten. 

How are customer service and support?

The technical support team is good. 

How was the initial setup?

The initial setup is straightforward. 

What's my experience with pricing, setup cost, and licensing?

The price is not so high. I would rate the pricing a three or four out of ten. 

What other advice do I have?

I would rate the overall solution a ten out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
PeerSpot user
Technology consultant at a tech services company with 501-1,000 employees
Real User
Has good visibility, we can see every installed app and the severity and risk of each app
Pros and Cons
  • "First, the granular visibility of apps & traffic which we get through Check Point SandBlast Mobile are good. We can see each & every installed app & information for each app about severity & risk."
  • "Also, we found configuring device groups & mapping a policy is quite confusing. There should be a simpler interface."

What is our primary use case?

Our primary use case for using Check Point SandBlast Mobile solution was for securing (Bring your own device) BYOD mobile devices of users. With Check Point SandBlast Mobile we get full visibility of users' mobile activity, like installed apps. Users are only allowed to use permitted applications. We also have blacklisted some malicious URLs. Check Point SandBlast Mobile provides flexibility to BYOD users to access the restricted website as per the time specified by the company policy.

How has it helped my organization?

We have deployed for the first time a mobile protection solution in the environment & Check Point SandBlast Mobile worked well. All mobile devices that are connected to the network are monitored and restricted for web surfing as per company policy. With that, users also have the flexibility to use their favorite websites for some time. Device compliance, phishing protection, and all other next-gen features in action were previously not there with the environment. Also, adding a new user is very easy, there is no extra load on the team. 

What is most valuable?

First, the granular visibility of apps & traffic which we get through Check Point SandBlast Mobile is good. We can see each & every installed app & information for each app about severity & risk.

URL filtering has a wide variety of URL categories to choose from. We can also add whitelist & blacklist domains as per our requirements.

Another great thing about Check Point SandBlast Mobile is the ease of deployment. We can deploy a solution in an hour or two. 

Check Point SandBlast Mobile android application is very easy and simple. The interface & all processes are automated.

What needs improvement?

When adding users sometimes we were not able to send SMS to users also even after the application user was not visible in the dashboard. Upon troubleshooting, we found that the same user has previously integrated with our old Check Point SandBlast Mobile.

Also, we found configuring device groups & mapping policies is quite confusing. There should be a simpler interface.

Other than this, we did not have any problem as of now. In case of any problem, Check Point tech is always available to help.

For how long have I used the solution?

I have been using Check Point SandBlast Mobile for one year.

What do I think about the stability of the solution?

The product is pretty stable, we have not had any problems with stability.

How are customer service and technical support?

Our experience with Check Point tech is very good as of now. Every time we get a solution to our problem. They have been one of our best tech experiences.

How was the initial setup?

The initial setup is very simple & less time-consuming.

What about the implementation team?

The in-house team implemented the solution.

What's my experience with pricing, setup cost, and licensing?

I was one who implemented the solution & we were not involved with commercials.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Engineer at Caldoo
Real User
Good integration, great scalability, and helpful technical support
Pros and Cons
  • "We've found that the product is quite stable."
  • "From a user's perspective, of course, it is always better when it is cheaper in price."

What is our primary use case?

We primarily use the solution for mobile threat defense. We protect our mobile devices with it, due to the fact that SandBlast Mobile detects phishing, malware, et cetera, and all mobile devices.

What is most valuable?

What I like is that the user experience of your mobile device is not compromised by SandBlast Mobile. The end-user doesn't see anything like an extra app on your device. The app is working in the background, scanning for all kinds of cyberattacks, and seeking out phishing, malware, bots, et cetera. 

Once something is detected, the end-user gets an alert, and can immediately command an action. When they go to open, let's say, a phishing e-mail, they get an alert that says something to the effect of "Beware, this is a phishing mail. Don't open it." The user has the possibility then to open it, however, it would be quite foolish to do so when they are told not to do it. The app gives you very good warnings in terms of malicious attacks.

There is good integration with mobile device management systems.

There is a potential for reporting if you need it.

The solution scales very well.

We've found that the product is quite stable.

Technical support is helpful.

What needs improvement?

From my perspective, it's a very good product. I can't recall a moment where I thought a feature was missing.

It would be ideal if, one day, this product was bundled into a larger offering so that it's not just a standalone product.

For how long have I used the solution?

I've been using the solution for three years at this point. It's not so long.

What do I think about the stability of the solution?

The stability is okay. We haven't had any issues with bugs or glitches. It doesn't crash or freeze. It's reliable.

What do I think about the scalability of the solution?

In terms of scalability, you can use it very well within an organization. YOu can use it with five devices or a hundred thousand devices. Worldwide, it's used by millions of devices. The scalability potential, therefore, is huge. It's no problem at all if an organization needs to scale it.

How are customer service and technical support?

Technical support is very good. They are very quick as well. It's fairly easy to talk with them when needed, however, truthfully, you don't need regularly. It works very well as a product. You rarely need to deal with technical support.

What's my experience with pricing, setup cost, and licensing?

From a user's perspective, of course, it is always better when it is cheaper in price. That said, it is a fair price. it's not overly expensive. We find it very reasonable. After all, when you get hit with ransomware or some other malicious program, it can be extremely expensive and comes at a great cost to the company.

What other advice do I have?

We're both a reseller as well as an end-user of the solution. We're partners with Check Point.

The product is in the SaaS environment.

I'd recommend the solution. With cybersecurity on the rise due to COVID, and people working on devices from home, off secure networks, it's important to protect your devices, now more than ever. I'd advise that organizations look at this solution and consider implementing it.

I'd rate the solution nine out of ten.

However, if this solution is right for a company depends on the environment. The capability of the standalone product is very good. 

When there's a supplier who buys Check Point SandBlast Mobile and incorporates it into their larger solution, I will give it a ten out of ten. Then you have a solution that really fits not only your mobile devices but also the security part of your organization. While, right now, it's a great standalone product, there's a lot of possibilities for it when it integrates with a larger security offering.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Business Tranformation Project Manager at a financial services firm with 501-1,000 employees
Real User
It's easy to use and durable but the interface should be more user-friendly
Pros and Cons
  • "The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle."
  • "The interface could be more user-friendly. They should improve the look and feel."

What is our primary use case?

We use the private cloud deployment model. We use AWS as our cloud provider. Our primary use case is for my users who are mobile. If I want them to connect from wherever they are and build connections to the emails. It's for my management that are usually very mobile.

What is most valuable?

The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle. 

What needs improvement?

The interface could be more user-friendly. They should improve the look and feel.

I would like to see more meaningful logs in the next release. The way the system is now, it's pretty expensive. 

For how long have I used the solution?

I have been using this solution for three years.

What do I think about the stability of the solution?

I've not had an issue with this solution. There were issues when we did it first, there were a few problems with instability. People were not able to log in. But I think it's fine now because now, from a products point of view, it was the best solution.

What do I think about the scalability of the solution?

I'm okay with the scalability. It's flexible enough. I currently have around 400 users. The users are primarily branch managers and top management of the bank.

We don't have any plans to increase the usage as of now. 

How are customer service and technical support?

Their technical support is good. We don't have any issues with them. Anytime we have a problem, they help us. 

How was the initial setup?

The deployment took around three months. 

What about the implementation team?

We used an integrator for the deployment. We used our partners for the integration and customization. 

What other advice do I have?

We had initial problems because our requirements were not well defined. You should define your use case. You should also look into other options to see what else there is out there and what they offer. 

I would rate it a seven out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Product Categories
Mobile Threat Defense
Buyer's Guide
Download our free Check Point Harmony Mobile Report and get advice and tips from experienced pros sharing their opinions.