

Find out what your peers are saying about Check Point Software Technologies, Zimperium, Lookout and others in Mobile Threat Defense.
| Product | Market Share (%) |
|---|---|
| Check Point Harmony Mobile | 11.9% |
| Zimperium | 26.9% |
| Lookout | 19.8% |
| Other | 41.400000000000006% |
| Product | Market Share (%) |
|---|---|
| Ivanti Tunnel | 0.8% |
| OpenVPN Access Server | 13.4% |
| Fortinet FortiClient | 7.2% |
| Other | 78.6% |
| Company Size | Count |
|---|---|
| Small Business | 37 |
| Midsize Enterprise | 15 |
| Large Enterprise | 22 |
Check Point Harmony Mobile is a unified security solution for user devices and access. It is a complete threat defense solution for mobile devices that prevents cyberattacks and enforces security for remote workers and users. It prevents threats on apps, networks, and OS while enhancing the user experience and preventing the disruption of device performance.
Check Point Harmony Mobile Benefits
Some benefits of Harmony Mobile include:
Harmony Mobile integrates with UEM systems to assess the device’s level of risk. The UEM quarantines and activates security policies, such as blocking access to corporate assets.
Check Point Harmony Mobile Key Features
Harmony Mobile's key features include:
Check Point Harmony Mobile Components
Check Point Harmony Mobile Capabilities
Reviews from Real Users
"The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly," says G.S., a Manager of Infrastructure Services at an energy/utilities company.
Kadeem C., an IT Security Analyst at an energy/utilities company, says, "I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."
Oleg P., Senior Network/Security Engineer at Skywind Group, says, "The most impressive thing is the SSL VPN Portal."
Hans V., an Engineer at Caldoo, adds that “We've found that the product is quite stable."
Maintaining user privacy is critical to the success of any mobile enterprise. But user privacy isn’t just limited to personal apps and content on the device; it extends to the network as well. That means IT must be able to secure traffic from enterprise apps without capturing personal traffic, such as a user posting a family photo on Facebook. As a result, protecting employee privacy requires IT to move beyond device-wide VPNs to more secure, intelligent, and granular app VPNs.
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.