We performed a comparison between Check Point Harmony Mobile and SAP Mobile Secure based on real PeerSpot user reviews.
Find out what your peers are saying about Check Point Software Technologies, Lookout, Zimperium and others in Mobile Threat Defense."The easy deployment is the key for us. I can simply send a link through email to a user, then they install the software and are protected."
"It doesn't allow you to activate some of the applications until your mobile is malware free. That way we come to know that the device secure and only then do we deploy the business application."
"One of the features that have given us additional value is being able to encrypt and block how data is shared within cell phones or mobile devices."
"The most valuable features of this solution are the filtering, interface configuration, and threat management."
"Network protection, OS protection, application protection, and file protection are valuable. It is also easy to implement and manage."
"The environment is managed and administered centrally in Check Point Infinity which provides a lot of stability with its other features."
"The other most valuable service so far has been the assistance provided to us by the Check Point Harmony mobile engineers. They have been so awesome and helpful to us during the setup process."
"Harmony Mobile's most valuable feature is the variety of capabilities in the platform, including allowing you to track device status."
"Everything is available to you from your handset."
"Harmony has more support for Android OS as opposed to iOS. You need a third-party MDM solution to integrate with iOS. If you don't have an MDM, your app can't scan on an iOS device. The solution can scan everything on Android. It sees all your apps."
"One thing that should be improved in the future of the ability to ensure that mobile devices are protected from connections in environments with unlimited connectivity."
"If possible, it would be better if they can include vulnerability management for applications. When a user installs many applications, if there is a way to manage a pack of applications, it would be helpful."
"While it's great, there's always room for improvement. Adding capabilities for automatic deployment in an enterprise environment would be useful."
"One of the improvements that can be made is that they become compatible with Google MDM."
"I would like to see more visibility into the actual devices that it's protecting. In some cases, you don't want to see a lot. However, for our purposes, I would like to see more information about the applications which are installed, then have more control over what can and what cannot be installed."
"We know that for many companies, the management and administration of device and data security have been complex."
"We had some issues with loopback VPN DNS filtering stopping working periodically, however, this is something that we could probably iron out with support."
"We would like it if SAP could integrate the transactional mode as well so that users can perform transactional jobs by mobile-only."
Earn 20 points
Check Point Harmony Mobile is ranked 1st in Mobile Threat Defense with 44 reviews while SAP Mobile Secure is ranked 26th in Enterprise Mobility Management (EMM). Check Point Harmony Mobile is rated 8.6, while SAP Mobile Secure is rated 9.0. The top reviewer of Check Point Harmony Mobile writes "Easy to implement, simple to maintain policies, and does not disrupt end-user functionality". On the other hand, the top reviewer of SAP Mobile Secure writes "Easy to use and set up with easy mobile access to reports". Check Point Harmony Mobile is most compared with Check Point Remote Access VPN, Lookout, Cisco AnyConnect Secure Mobility Client, Fortinet FortiClient and VMware Workspace ONE, whereas SAP Mobile Secure is most compared with .
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.