No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Harmony Mobile vs Lookout comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 3, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Mobile
Ranking in Mobile Threat Defense
1st
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
61
Ranking in other categories
No ranking in other categories
Lookout
Ranking in Mobile Threat Defense
3rd
Average Rating
7.6
Reviews Sentiment
7.1
Number of Reviews
3
Ranking in other categories
Threat Intelligence Platforms (TIP) (28th), Endpoint Detection and Response (EDR) (52nd)
 

Mindshare comparison

As of May 2026, in the Mobile Threat Defense category, the mindshare of Check Point Harmony Mobile is 11.4%, down from 13.9% compared to the previous year. The mindshare of Lookout is 18.5%, down from 26.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Mobile Threat Defense Mindshare Distribution
ProductMindshare (%)
Check Point Harmony Mobile11.4%
Lookout18.5%
Other70.1%
Mobile Threat Defense
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Unified across devices and mobile threats are automatically blocked before damage occurs
The best feature of Check Point Harmony Mobile is the Mobile Threat Defense because it detects and blocks phishing attempts, malicious apps, man-in-the-middle attacks, and device exploits, which is especially critical in BYOD and remote work environments. The Mobile Threat Defense feature in Check Point Harmony Mobile has been very effective, especially in catching threats that target employees outside of traditional email channels. For example, there was a smishing attempt where a user received a text message with links disguised as package delivery updates. Check Point Harmony Mobile analyzed the link in real-time, flagged it as malicious, and blocked access before anyone could enter credentials, which prevented what could have been a widespread credential harvesting attack. Device Management and Remote Work Support are two additional aspects of Check Point Harmony Mobile that are especially valued. Device Management continuously checks device posture, including things like OS version, patch level, and whether a device is jailbroken or rooted. Remote Work Support allows employees to securely access email, collaboration tools, and files from anywhere without worrying about phishing links, malicious apps, and unsafe Wi-Fi networks. Check Point Harmony Mobile has positively impacted the organization, especially with phishing protections, as SMS or messaging-based phishing attempts are now blocked before users can click, preventing credential theft. Measurable outcomes since deploying Check Point Harmony Mobile highlight its impact on both security and compliance. Mobile-related security incidents have dropped by approximately 40 to 50 percent compared to before deployment.
DB
IT Manager at NHS Trust
Enhanced mobile security with visibility into app and website usage, but installation challenges remain
We use Lookout for mobile devices, such as phones It has reduced our risk around mobile devices. I like the security features and being able to see what apps and websites people are using. There is nothing we have come across that we've desired. We have been using Lookout for one year. The…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It monitors all the URLs that a user goes to on their phone and so we can see what they're looking at and we can limit that. Certain topics are not allowed to be accessed. They're monitoring their apps and they rate them based upon how big of a security risk that individual app is based on their ratings. And so we're able to limit those as well and allow people to have some that may be a low risk, but still a risk, but we may allow that for our users whereas we block medium and high risk."
"All of our clients' and employees' feedback is very positive and they are very satisfied with this solution."
"The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected."
"After deploying Check Point Harmony Mobile, I saw a noticeable drop in mobile-related security alerts, around 30 to 40%, fewer phishing and risky application incidents, and better user awareness."
"Because of its ease of use and the coverage you get for the blurred boundary of mobile devices, Harmony Mobile gives you coverage whether you're using a BYOD, COPE, or COBO framework."
"It has been very easy to implement and deploy."
"The best feature of Check Point Harmony Mobile is the Mobile Threat Defense because it detects and blocks phishing attempts, malicious apps, man-in-the-middle attacks, and device exploits, which is especially critical in BYOD and remote work environments."
"As a security solution for devices, it can benefit us in many ways, including providing us with data security, access control, network security, and more."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"We have not had any issues with bugs or breakdowns."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
 

Cons

"We can say that this is a very good solution but Check Point has to reduce the cost."
"The one area where Check Point Harmony Mobile can be improved is cost-wise because compared to other vendors, the cost is a little bit higher."
"We had some issues with loopback VPN DNS filtering stopping working periodically, however, this is something that we could probably iron out with support."
"The interface could be more user-friendly. They should improve the look and feel."
"The area that I find could use the most improvement would be in the forensics section of the administrator console."
"The cost is a bit high. While it is worth the investment given the increased security and improved user experience, it is definitely a significant expense."
"The feature set between the Android and Apple devices is not fully equal."
"The deployment in the Android system is very simple but in the case of iOS, it is more complicated so the users require attention from our CAU."
"The initial setup requires a little bit of experience with configuration."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
 

Pricing and Cost Advice

"Pricing is a little high."
"The product pricing is reasonable for the security it provides."
"Users have to pay a yearly licensing fee for each device, which is cheap."
"The price is not so high. I would rate the pricing a three or four out of ten."
"Check Point pricing is better than Symantec."
"The price is okay. Per user, it should be something like five or ten dollars. But, we usually get discounts that drive the cost down."
"Check Point Harmony Mobile's pricing is good."
"I rate the tool's pricing a three out of ten."
"The pricing is fair; it's comparable to our previous solution, and we carried out multiple POCs and POVs (proof of value). The product is worth the money we pay for it."
"Lookout is definitely on the lower end when it comes to price point and that seems to be the only differentiator. The technology is in place in this space and it's really about who is coming in at the better price point now."
report
Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
893,438 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Manufacturing Company
10%
Outsourcing Company
7%
Financial Services Firm
7%
Computer Software Company
12%
Manufacturing Company
11%
Financial Services Firm
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business39
Midsize Enterprise14
Large Enterprise23
By reviewers
Company SizeCount
Small Business2
Large Enterprise5
 

Questions from the Community

What do you like most about Check Point Harmony Mobile?
The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS.
What needs improvement with Check Point Harmony Mobile?
I have faced some issues with Check Point Harmony Mobile. We are trying to get some features developed into the app and it is taking long for it to be developed. The support sometimes is not as eff...
What is your experience regarding pricing and costs for Lookout?
The pricing is a little expensive. We are currently looking at comparisons with other solutions, including Umbrella.
What needs improvement with Lookout?
There is nothing we have come across that we've desired.
What is your primary use case for Lookout?
We use Lookout for mobile devices, such as phones.
 

Also Known As

Check Point Mobile Access, Check Point SandBlast Mobile
CipherCloud
 

Overview

 

Sample Customers

Samsung Research America, Mississippi Office of the Secretary of State
Information Not Available
Find out what your peers are saying about Check Point Harmony Mobile vs. Lookout and other solutions. Updated: April 2026.
893,438 professionals have used our research since 2012.