"With Harmony Mobile, we have been able to provide additional security to our network."
"It monitors all the URLs that a user goes to on their phone and so we can see what they're looking at and we can limit that. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit those as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk."
"The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected."
"It is a stable solution."
"The ease of use, along with comprehensive protection for all devices, is a key advantage. It provides visibility into malicious applications installed on the phone."
"The usability is the most valuable feature. It's really easy to use. It's a durable solution. I don't have any breaches. It is a good solution from that angle."
"The environment is managed and administered centrally in Check Point Infinity which provides a lot of stability with its other features."
"Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage."
"The most valuable features of the solution are reliability and uptime."
"What I like the most about Pulse Connect Secure is that it's user-friendly. It's easy to use. You just need to connect, and that's it."
"Ivanti secures access to the corporate network from various devices and locations."
"It is customer-friendly. It is quite easy for our users to connect. There is also the flexibility of the features."
"The best feature of Pulse Connect Secure is the good security it provides. It gives a secure connection to your network."
"From an end-user perspective, the setup phase is easy."
"Pulse Connect Secure is a stable solution."
"The most valuable feature is being able to securely connect and use virtual desktops."
"The product needs to improve its user awareness."
"There are certain shortcomings in the integration capabilities that a product offers."
"One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity."
"They could make a more beautiful interface."
"Integration needs improvement. We use Check Point for email. We use Check Point Capsule Workspace and I wish that it tied into that better and was integrated with their email application so that when it's secure, then they're able to access their email and it could be deployed as one group instead of two separate applications. It's a little bit more work for us to deploy both of those so it'd be nice if they could be integrated."
"At times, when configuring policies, the tool takes some time to apply the policy."
"The remote configuration has room for improvement."
"We know that for many companies, the management and administration of device and data security have been complex."
"There is room for improvement. I'm concerned about the frequent vulnerabilities identified. As a security product, the number of vulnerabilities is concerning."
"The support team of the product needs improvement. Sometimes we have issues with multiple authentications, but there is no help from the support team."
"The product's price is an area where improvements are required."
"This solution normally works but at times, we have had trouble with connectivity."
"We need to know how many live active users there are and we can't. We even updated the server, however, we still can't see the proper level of live connections. Right now, it's showing as 300 users and my customer does not have that many users in his organization."
"The solution can be improved by addressing the failure to connect on public 2-step networks."
"The user experience has room for improvement."
"We want to switch to another solution because there are some challenges with the support from Pulse. The quality of documentation is also not good. It is sometimes very hard to find documentation that provides a solution and describes how all this works."
Check Point Harmony Mobile is ranked 1st in Mobile Threat Defense with 43 reviews while Ivanti Connect Secure is ranked 3rd in SSL VPN with 25 reviews. Check Point Harmony Mobile is rated 8.8, while Ivanti Connect Secure is rated 7.6. The top reviewer of Check Point Harmony Mobile writes "Easy to implement, simple to maintain policies, and does not disrupt end-user functionality". On the other hand, the top reviewer of Ivanti Connect Secure writes "Beneficial multi-factor authentications, useful SSL VPNs, and simple initial setup". Check Point Harmony Mobile is most compared with Check Point Remote Access VPN, Lookout, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient and VMware Workspace ONE, whereas Ivanti Connect Secure is most compared with Fortinet FortiClient, OpenVPN Access Server, Cisco AnyConnect Secure Mobility Client, Ivanti Tunnel and F5 BIG-IP Access Policy Manager (APM).
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.