Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Mobile vs Jamf Connect comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Mobile
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
53
Ranking in other categories
Mobile Threat Defense (1st)
Jamf Connect
Average Rating
9.0
Reviews Sentiment
5.9
Number of Reviews
13
Ranking in other categories
ZTNA as a Service (11th)
 

Mindshare comparison

Check Point Harmony Mobile and Jamf Connect aren’t in the same category and serve different purposes. Check Point Harmony Mobile is designed for Mobile Threat Defense and holds a mindshare of 12.8%, down 16.9% compared to last year.
Jamf Connect, on the other hand, focuses on ZTNA as a Service, holds 1.6% mindshare, down 1.9% since last year.
Mobile Threat Defense Market Share Distribution
ProductMarket Share (%)
Check Point Harmony Mobile12.8%
Zimperium30.5%
Lookout24.9%
Other31.80000000000001%
Mobile Threat Defense
ZTNA as a Service Market Share Distribution
ProductMarket Share (%)
Jamf Connect1.6%
Zscaler Zero Trust Exchange Platform17.4%
Prisma Access by Palo Alto Networks14.0%
Other67.0%
ZTNA as a Service
 

Featured Reviews

Nasseer Qureshi - PeerSpot reviewer
Ensuring remote work security with effective protection for Mobile device access
Check point harmony mobile is strong but could improve in reducing alert fatigue, sometimes we get too many notification which can overwhelm users and IT staff. Making alerts smarter or more customizable would help focus attention on the most critical threats. Also enhanced reporting with more detailed insights and easier integration with other security tools would be great. In the future versions adding AI-driven threat prediction and automated remediation could take the solution to the next level.
Joost Van 'T Wout - PeerSpot reviewer
Customizable and good password management but needs better user-level profile deployment
The main use case for Jamf Connect was to synchronize local accounts with the identity provider, like Entra. However, due to some limitations with the enrollment sequence and user limitations, we decided to discontinue using it We previously used Jamf Connect to synchronize local accounts with…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The best part of Check Point Harmony Mobile is its ability to deliver real-time on-device threat detection without compromising device performance."
"One of the features that have given us additional value is being able to encrypt and block how data is shared within cell phones or mobile devices."
"Management can see all devices on one panel and easily highlight any devices under threat."
"The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected."
"The most impressive thing is the SSL VPN Portal."
"Internal applications, data, and folders are published on enrolled mobile devices in a secure way without publishing any of the resources over the internet."
"Check Point Harmony Mobile has positively impacted my organization by achieving a decrease in 50% in the cyber attacks."
"The product's initial setup phase is very straightforward."
"The solution is scalable."
"Jamf Connect allows for easy and seamless joining of Mac devices to Azure AD, eliminating the need for third-party involvement or support engineer assistance."
"I would rate the product's scalability an eight out of ten."
"It is easy to integrate into any existing IT workflow."
"The most valuable feature is ease of access. It's convenient to do things like resetting passwords. Previously, users were bound to their domain. We had to bind the user to the domain and log them in through the AD. Now, using Jamf Connect, we don't face any of these challenges. Resetting passwords is hassle-free so we can regularly rotate passwords according to best practices."
"The most valuable feature is the synchronization of passwords with a local password, which works well."
"Jamf Connect is an identity provider, and once you log in, you will have all the device's access."
"The most valuable feature of Jamf Connect is the dual login screen, which has simplified the login process and eliminated the need for users to enter their password multiple times."
 

Cons

"There could be more automation features for the solution."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"Also, we found configuring device groups & mapping a policy is quite confusing. There should be a simpler interface."
"In terms of what needs improvement, the web interface should be simplified. It should be more user-friendly. It's too technical."
"The remote configuration has room for improvement."
"We know that for many companies, the management and administration of device and data security have been complex."
"In the next release, I would like to see a Wi-Fi scanner to be able to identify whether a wireless network is malicious before you join it."
"The product does not provide deep capabilities for sharing specific data to users or groups separately, nor does it provide visibility as to whether a user has access to the data or not."
"We have faced issues with the product's configuration. If we use the tool with other business manager solutions, then there is the issue of naming conventions. The tool needs to be careful with newer updates so that it doesn't break any of the existing configurations."
"The solution’s technical support is bad and should be improved."
"Overall, there is a lack of consistent experience sometimes with some of their features."
"When a Mac is joined to Azure, the generic Pro console in the MDM should accurately display the Mac as joined to Azure in the inventory section. Currently, it shows "no domain account found," which can be misleading."
"There is room for improvement with Jamf Connect in reducing its cost and overcoming limitations during pre-stage enrollment, which prevent it from creating MDM-capable users."
"The configuration could be faster."
"Jamf's support could be improved."
"What can be improved is the login banner resizing. Currently, it is not fully compatible and could benefit from being a full-screen size banner on the Mac device."
 

Pricing and Cost Advice

"Its cost depends upon the number of users."
"The price is okay. Per user, it should be something like five or ten dollars. But, we usually get discounts that drive the cost down."
"At the moment, the price is good, but there is always scope for amelioration when it comes to pricing. When pricing is lower, it can make a customer buy the product. Customers ask us about the price of the product before allowing us to explain the functionality to them."
"The price is not so high. I would rate the pricing a three or four out of ten."
"The quality, price, and support ratio are very good."
"The product pricing is reasonable for the security it provides."
"Regarding the cost of licenses, each device consumes one, even if it has both professional and personal profiles."
"There is a need to make yearly payments towards the licensing costs attached to the product. You can opt for a one-year, three-year, or five-year license."
"The solution's price is reasonable."
"I rate the cost as three out of ten, with ten being the highest."
"The pricing is definitely on the higher side."
"It's relatively inexpensive."
"The pricing is good."
"The pricing model could be improved, especially considering the availability of alternative MDM solutions like Kandji, which offers similar features for free or at a lower cost."
"Jamf Connect has a yearly licensing cost, which is expensive."
"We pay 2 dollars per device monthly. For the plus version, you have to pay 4 dollars per month. I think the product will give discounts based on the number of users and devices."
report
Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
867,370 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
24%
Manufacturing Company
10%
Government
5%
Comms Service Provider
5%
Computer Software Company
21%
Financial Services Firm
14%
Insurance Company
6%
Healthcare Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business34
Midsize Enterprise13
Large Enterprise21
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise2
Large Enterprise8
 

Questions from the Community

What do you like most about Check Point Harmony Mobile?
The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS.
What is your experience regarding pricing and costs for Check Point Harmony Mobile?
My experience with pricing, setup cost, and licensing is that it is very expensive.
What needs improvement with Check Point Harmony Mobile?
Troubleshooting on Check Point Harmony Mobile is quite difficult because the logs are not located in the cloud, but they are on the local device. If there is an issue, you need to retrieve the logs...
What do you like most about Jamf Connect?
Jamf Connect is an identity provider, and once you log in, you will have all the device's access.
What is your experience regarding pricing and costs for Jamf Connect?
Jamf Connect requires a per-device license fee, which becomes quite expensive given our large company size. Each device that gets enrolled with Jamf Connect requires a monthly license payment.
What needs improvement with Jamf Connect?
There is room for improvement with Jamf Connect in reducing its cost and overcoming limitations during pre-stage enrollment, which prevent it from creating MDM-capable users. This limitation affect...
 

Also Known As

Check Point Mobile Access, Check Point SandBlast Mobile
Wandera, Wandera Private Access
 

Overview

 

Sample Customers

Samsung Research America, Mississippi Office of the Secretary of State
Mastercard, Deloitte, PayPal, Toshiba, BNP Paribas, EY, Otis, Rollins, Eurostar, Frontier, Sealy, Rolex, VITAS Healthcare
Find out what your peers are saying about Check Point Software Technologies, Lookout, Zimperium and others in Mobile Threat Defense. Updated: August 2025.
867,370 professionals have used our research since 2012.