No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Harmony Mobile vs McAfee MVISION Mobile comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Mobile
Ranking in Mobile Threat Defense
1st
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
61
Ranking in other categories
No ranking in other categories
McAfee MVISION Mobile
Ranking in Mobile Threat Defense
9th
Average Rating
9.0
Reviews Sentiment
8.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Mobile Threat Defense category, the mindshare of Check Point Harmony Mobile is 11.4%, down from 13.9% compared to the previous year. The mindshare of McAfee MVISION Mobile is 4.5%, up from 4.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Mobile Threat Defense Mindshare Distribution
ProductMindshare (%)
Check Point Harmony Mobile11.4%
McAfee MVISION Mobile4.5%
Other84.1%
Mobile Threat Defense
 

Featured Reviews

RL
TI at a security firm with 51-200 employees
Unified across devices and mobile threats are automatically blocked before damage occurs
The best feature of Check Point Harmony Mobile is the Mobile Threat Defense because it detects and blocks phishing attempts, malicious apps, man-in-the-middle attacks, and device exploits, which is especially critical in BYOD and remote work environments. The Mobile Threat Defense feature in Check Point Harmony Mobile has been very effective, especially in catching threats that target employees outside of traditional email channels. For example, there was a smishing attempt where a user received a text message with links disguised as package delivery updates. Check Point Harmony Mobile analyzed the link in real-time, flagged it as malicious, and blocked access before anyone could enter credentials, which prevented what could have been a widespread credential harvesting attack. Device Management and Remote Work Support are two additional aspects of Check Point Harmony Mobile that are especially valued. Device Management continuously checks device posture, including things like OS version, patch level, and whether a device is jailbroken or rooted. Remote Work Support allows employees to securely access email, collaboration tools, and files from anywhere without worrying about phishing links, malicious apps, and unsafe Wi-Fi networks. Check Point Harmony Mobile has positively impacted the organization, especially with phishing protections, as SMS or messaging-based phishing attempts are now blocked before users can click, preventing credential theft. Measurable outcomes since deploying Check Point Harmony Mobile highlight its impact on both security and compliance. Mobile-related security incidents have dropped by approximately 40 to 50 percent compared to before deployment.
reviewer1066482 - PeerSpot reviewer
Managing Director at a consultancy with 1-10 employees
A market leader that integrates nicely with other McAfee security products and is quite stable
We are just customers and end-users. We are using the most up-to-date version available at this time. I'd advise potential new users that the key thing is to clearly understand what your requirements are and what your use cases are, and both your business requirements, your technical requirements, and your regulatory requirements. It's important to understand all of those. A company needs to clearly understand all the use cases it needs to manage and make sure they do the appropriate due diligence to find a product that can achieve all those requirements and handle all those use cases. It was an extensive process for us. We did about four to six months of paper-based due diligence - not even a field trial - to make that we were picking the right product. We leveraged a lot of outside vendor-neutral sources like Gartner. So far, I'd rate the solution at a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Overall, it helped us account for all assets and protect them properly."
"We like Harmony's ability to encrypt transactions between mobile devices. All the user's transactions are encrypted. That's an excellent feature. We can detect, quarantine, and address any issues in the handset itself."
"After deploying Check Point Harmony Mobile, I saw a noticeable drop in mobile-related security alerts, around 30 to 40%, fewer phishing and risky application incidents, and better user awareness."
"The use and management of our portal is easy."
"The best feature of Check Point Harmony Mobile is the Mobile Threat Defense because it detects and blocks phishing attempts, malicious apps, man-in-the-middle attacks, and device exploits, which is especially critical in BYOD and remote work environments."
"Having a unified solution developed by one of the most reliable brands in the market gives our organization the peace of mind that data is safe anytime, anywhere."
"I really like the application scanning feature that scans all of the installed applications, and not only what appears in the add or remove apps, and then reports the results in the console."
"We've found that the product is quite stable."
"Due to the fact that we bought a number of McAfee security products, one of the significant benefits for our company was the integration across multiple security controls, giving us a single pane of glass to monitor, administer, and manage multiple security controls."
"The product is one of the market leaders, according to Gartner, on mobile protection."
 

Cons

"The feature set between the Android and Apple devices is not fully equal."
"Also, we found configuring device groups & mapping a policy is quite confusing. There should be a simpler interface."
"We don't have Google MDM being supported by the solution as of yet. It is a feature requirement... They are aware that it is something that I need. My objective is to be able to have the MDM integration and to have some level of control over the asset itself."
"I would like to see management and remote administration functions in the same portal."
"If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful."
"From a user's perspective, of course, it is always better when it is cheaper in price."
"The interface could be more user-friendly."
"In terms of what needs improvement, the web interface should be simplified. It should be more user-friendly. It's too technical."
"The one thing that I know that they're working on, that's not quite there in the product, is the artificial intelligence aspect."
"The one thing that I know that they're working on, that's not quite there in the product, is the artificial intelligence aspect."
 

Pricing and Cost Advice

"We didn't actually purchase the software. It was given to us by Check Point. We are using it as a test bed for possible future customers."
"This is a very expensive product."
"I rate the tool's pricing a three out of ten."
"There is a need to make yearly payments towards the licensing costs attached to the product. You can opt for a one-year, three-year, or five-year license."
"The quality, price, and support ratio are very good."
"Check Point pricing is better than Symantec."
"Check Point provides a separate license in cases where organizations want to use this only on mobile devices, or laptops/desktops."
"Check Point Harmony Mobile's pricing is good."
Information not available
report
Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
892,646 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Manufacturing Company
10%
Outsourcing Company
8%
Financial Services Firm
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise14
Large Enterprise23
No data available
 

Questions from the Community

What do you like most about Check Point Harmony Mobile?
The most valuable features of the solution are threat emulation, threat extraction, URL detection, antimalware, antivirus, and IPS.
What needs improvement with Check Point Harmony Mobile?
I have faced some issues with Check Point Harmony Mobile. We are trying to get some features developed into the app and it is taking long for it to be developed. The support sometimes is not as eff...
Ask a question
Earn 20 points
 

Also Known As

Check Point Mobile Access, Check Point SandBlast Mobile
McAfee MDP, MVISION Mobile
 

Overview

 

Sample Customers

Samsung Research America, Mississippi Office of the Secretary of State
LeadQual
Find out what your peers are saying about Check Point Software Technologies, Zimperium, Lookout and others in Mobile Threat Defense. Updated: April 2026.
892,646 professionals have used our research since 2012.