Find out what your peers are saying about Check Point Software Technologies, Lookout, Zimperium and others in Mobile Threat Defense.
Our ROI with Harmony Mobile has been strong, we have prevented multiple phishing and malware incidents in mobile devices saving time, potential breaches, and compliance-related costs.
Their team is responsive, knowledgeable and proactive in resolving issues and providing guidance.
There were a few initial hiccups with certain applications, but Check Point Harmony Mobile support helped us resolve those quickly.
It is not poor support, but it is not perfect support we're getting right now; it is not an immediate solution, and it may take two or three days.
Harmony mobile scales easily with growing device fleets making it well suited for both small teams and large enterprises.
Harmony mobile has proven to be highly stable in our environment with consistent performance and no major downtime or crashes.
While it is worth the investment given the increased security and improved user experience, it is definitely a significant expense.
Check Point Harmony Mobile is strong but could improve in reducing alert fatigue, sometimes we get too many notifications which can overwhelm users and IT staff.
Another concern is that support is getting reduced by Workspace ONE; some customers are saying there are support issues on Workspace ONE right now.
It is a significant expense, but it is worth the investment given the increased security and improved user experience.
Harmony Mobile's pricing is per device and generally affordable especially when bundled with other harmony solutions.
Overall, we are very satisfied with Check Point Harmony Mobile. It has significantly improved our security posture and simplified our remote access management.
Network protection especially against unsafe wifi has been crucial for securing remote work.
In UEM, the most helpful part of Windows Management is the baseline policy and central script; using this, you can replace all the AD GPO policy.
Check Point Harmony Mobile is a unified security solution for user devices and access. It is a complete threat defense solution for mobile devices that prevents cyberattacks and enforces security for remote workers and users. It prevents threats on apps, networks, and OS while enhancing the user experience and preventing the disruption of device performance.
Check Point Harmony Mobile Benefits
Some benefits of Harmony Mobile include:
Harmony Mobile integrates with UEM systems to assess the device’s level of risk. The UEM quarantines and activates security policies, such as blocking access to corporate assets.
Check Point Harmony Mobile Key Features
Harmony Mobile's key features include:
Check Point Harmony Mobile Components
Check Point Harmony Mobile Capabilities
Reviews from Real Users
"The easy navigation of the admin portal is a welcome change to how some other admin portals are not very user-friendly," says G.S., a Manager of Infrastructure Services at an energy/utilities company.
Kadeem C., an IT Security Analyst at an energy/utilities company, says, "I really like the application scanning portion where it scans your current applications and any new applications that you add to the device to let you know if it is malicious."
Oleg P., Senior Network/Security Engineer at Skywind Group, says, "The most impressive thing is the SSL VPN Portal."
Hans V., an Engineer at Caldoo, adds that “We've found that the product is quite stable."
VMware Workspace ONE is an intelligence-driven digital workspace platform that delivers any app on any device. It integrates access control, multi-platform endpoint management, and application management. With the VMware Workspace ONE platform, IT teams can deliver a digital workspace that includes the devices and apps of the company’s choice, but with security and control.
VMware Workspace ONE is available:
VMware Workspace ONE Key Features
VMware Workspace ONE Benefits
Some of the benefits of using VMware Workspace ONE include:
Workspace ONE Components
Reviews from Real Users
Below is some feedback from our PeerSpot users who are currently using the solution:
PeerSpot user Patrick B., Cybersecurity Architect at a tech services company, says, "Its UI is extremely easy to use whether you're an advanced user or a novice user. When I first opened it up and had to learn the product, I was easily a novice. By the end of the third month, I was digging into the backend of the system and using it as a highly advanced user to accomplish what I needed to accomplish, and I was able to do it through the UI mostly."
Roshan T., Partner Manager North America at a tech company, mentions how satisfied he is with the product, saying, "You can put all your applications on a mobile device, be it a phone or tablet. It is secure and easy to use. Because it is centrally managed, you don't have to do any configuration on the phone. I just got the phone and connected to the central applications. I just downloaded one thing and everything got rolled out. Email, calendar, and other things were deployed centrally. If you don't have AirWatch, you have to configure your phone manually. For example, you need to deploy and configure your email manually and then synchronize everything. It is much simpler when a mobile device is centrally managed."
We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.