We changed our name from IT Central Station: Here's why
2019-09-24T05:43:00Z

What is your primary use case for Check Point Harmony Mobile?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
1616 Answers

author avatar
Top 20User

The goal is to implement Harmony Mobile in the entire fleet of devices of the Government of the Junta de Andalucia. We are talking about a total of about 60,000 terminals. A pilot of the solution has started and it will be implemented in all the terminals that are renewed in the corporate network. These devices correspond to different user profiles and include different browsing patterns and profiles and threat exposure from terminals for M2M communication to advanced user terminals with large traffic quotas.

2021-07-27T09:49:00Z
author avatar
User

The Checkpoint Harmony mobile application is used to protect and eliminate our corporate iPhone users from malicious attempts such as phishing, malware, malicious websites, anti-bots, and harmful applications. Many users receive malicious text messages and emails prompting them for credentials such as corporate active directory details, banking information, or credit card information. It is important to protect our corporate data on all mobile devices by using Check Point's Harmony Mobile Application.

2021-07-20T20:18:00Z
author avatar
Top 20User

We were lacking threat detection and device-level protection in our mobile device space. We are an Apple shop exclusively and although Apple does a good job at vetting apps and developers in the Apple App Store, we were lacking protection beyond that. The Harmony Mobile Protect suite really gave us the confidence of protection and real-time threat level safeguards. Users have the confidence to know that the data on their devices is safe. It's a great solution that has a proven track record in the mobile space.

2021-07-20T20:07:00Z
author avatar
Top 5LeaderboardReal User

The primary use case is to enable access to any corporate application hosted on-premises or in the cloud using a mobile device with single sign-on (SSO) capabilities. It provides IT admins capabilities for granting access to corporate applications or data on mobile devices and should be able to securely monitor and manage the mobile devices that access sensitive business data. It includes storing essential information about mobile devices, deciding which apps can be present on the devices, and locating devices. This product should be able to remove corporate applications and data on enrolled devices remotely, known as an enterprise wipe, in case a device is stolen, lost, or if the user leaves the organization. Corporate data should be securely stored on mobile devices and the user should not be able to share data from corporate apps/data to personal storage.

2021-03-29T14:34:00Z
author avatar
Top 5LeaderboardReal User

We have implemented Check Point Harmony Mobile due to the numerous phishing attacks that our users were suffering, both by email and by fake text messages, pretending to be the Post Office, Amazon, banks, etc... With this product, we have tried to avoid this type of attack and therefore have our business environment more secure. Currently, we have users in various territorial locations and we were looking for a solution that would allow us to secure their mobile devices with a minimum level of intrusiveness in the terminals. The solution should be for both Android and iOS.

2021-03-25T22:44:00Z
author avatar
Top 5LeaderboardReal User

We use SandBlast Mobile, integrated with our MDM for automatic deployment of solutions on our devices. This is for our corporate mobile devices, and also for BYOD (Bring your own device) cases. This works well for the users that want access to our corporate repositories for accessing information. SandBlast is always monitoring their activity including the applications that are installed or they are trying to install, not allowing apps that are not 100% trusted, receiving logging alerts, etc., to take care of our devices and avoid their comprise.

2021-03-02T18:41:00Z
author avatar
Top 5LeaderboardReal User

We primarily use the solution for mobile threat defense. We protect our mobile devices with it, due to the fact that SandBlast Mobile detects phishing, malware, et cetera, and all mobile devices.

2021-01-15T17:21:40Z
author avatar
Top 5LeaderboardReal User

We are a technology services company and our clients and employees are working from across the world. We have Check Point as a perimeter Firewall device in all our offices and all the devices are with R80.30 with the latest hotfix. During this Covid-19 pandemic, we have enabled Check Point Remote access for our employees, so that they can access the office resources from their mobile device, home desktop, or laptop. Now, they are able to access our resources from their own machine or remote devices and we can say that our employees are doing work from anywhere.

2020-12-14T04:33:00Z
author avatar
Top 5LeaderboardReseller

One reason we use it is that we didn't really have any control on the mobile side. We do have Google MDM, but we didn't have a solution like the one Check Point offers to protect mobile devices. Even with Google MDM, there is not much we can do without having something that can enforce security on the endpoint. So there was a gap and that security gap was our main use case.

2020-09-07T05:57:00Z
author avatar
Top 5LeaderboardReal User

Having the Check Point SandBlast Mobile application installed is mandatory for any smartphone or tablet PC provided to the employees by our company, and for any BYOD device if it is going to be connected to the corporate network. Currently, there are about 500 devices that are running on both Android and Apple devices. We decided not to self-host the management center, and onboarded the cloud management solution provided by the Check Point. This runs in their own datacenter, with the SLA provided.

2020-08-30T10:23:00Z
author avatar
Top 5LeaderboardReal User

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point Mobile Access software blade is one of the numerous blades activated on the NGFWs and serves for providing connectivity to the datacenter for the employees.

2020-08-22T14:38:00Z
author avatar
Top 5LeaderboardReal User

Our primary use case for using Check Point SandBlast Mobile solution was for securing (Bring your own device) BYOD mobile devices of users. With Check Point SandBlast Mobile we get full visibility of users' mobile activity, like installed apps. Users are only allowed to use permitted applications. We also have blacklisted some malicious URLs. Check Point SandBlast Mobile provides flexibility to BYOD users to access the restricted website as per the time specified by the company policy.

2020-08-14T10:31:00Z
author avatar
Top 20Real User

We use SandBlast Mobile to secure our BYOD devices for employees that want to have access to corporate information, as we require them to have SandBlast in order to do that. It is always monitoring their text messages for malicious stuff or their apps, to see if there's anything malicious, and then we receive the logging and alerts so we are able to react and take care of our users' security.

2020-08-05T06:59:00Z
author avatar
Top 5LeaderboardReal User

The primary use case of this solution is for mobile threat prevention. We integrate it with an MDM and push it to our managed devices to protect the company's phone.

2020-07-28T06:50:00Z
author avatar
Top 10Reseller

We primarily use the solution for mobile security, which is important in our part of the world. Using SandBlast Mobile, we're able to prove if a traditional antivirus has become embedded in some devices. It helps us to combat cybercrime. We're able to control things like SMS phishing and check for malicious links and malicious application downloads. For example, if my son downloads Angry Birds, and we don't know if the version he downloaded was malicious, we can trigger SandBlast to check it.

2020-02-18T07:41:15Z
author avatar
Real User

We use the private cloud deployment model. We use AWS as our cloud provider. Our primary use case is for my users who are mobile. If I want them to connect from wherever they are and build connections to the emails. It's for my management that are usually very mobile.

2019-09-24T05:43:00Z
Learn what your peers think about Check Point Harmony Mobile. Get advice and tips from experienced pros sharing their opinions. Updated: January 2022.
564,322 professionals have used our research since 2012.