Top Rated Harmony Mobile Alternatives
44 Harmony Mobile Reviews
Overall Review Sentiment for Harmony Mobile
Log in to view review sentiment.
I like the product is protected mobile devices.
I can see scanning threats and malware on the devices by our console.
And easy to control the mobile devices. Review collected by and hosted on G2.com.
I think that the product license is expensive to maintain.
And the product cannot integrate the log consolidate with other products. Review collected by and hosted on G2.com.

Best Mobile Security. My iPhone and other smart devices used by our company are protected from cyber threats by this product. Harmony Mobile offers an additional layer of protection with active safeguards with its many next-generation capabilities. Review collected by and hosted on G2.com.
Its complete integration with Google Mobile device management is one problem we have (MDM). There is currently a limited capacity for this, and some functionalities need to be connected with Google MDM using third-party features. We are still waiting for the introduction of google MDM integration. Review collected by and hosted on G2.com.
hello everyone, during the pandemic, all of us were working from home. During that period mobile phones are the most vulnerable and unsecured edge for an organization. In that situation, MTD solution or technology does its job and secured mobile phones from phishing emails and websites. This was really helpful for an organization to manage its workflow from home. As a consultant, i was working on this Checkpoint Mobile MTD solution. I have tested the solution and it was really fantastic. The ease of control and accuracy in action over malicious content and phishing content was very good. Review collected by and hosted on G2.com.
See I cannot say this as a dislike, it is my expectation. The checkpoint should work on this solution to add capabilities of MDM solution along with MTD. Currently, the market trend is more focused on MDM hence, if MTD can provide the main features of MDM then it would be a great choice for complete mobile management and security package. Review collected by and hosted on G2.com.

The product allows quick deployment and great visibility.
Protecting against malicious applications , risky networks or network attacks and also phishing SMS. Review collected by and hosted on G2.com.
Potentially unwanted applications are sometimes classified as malicious Review collected by and hosted on G2.com.
Easy integration and administration
brilliant separate work domain other than the device domain
Root discovery
tools used with is CP Doc viewer mostly
MS Intune Review collected by and hosted on G2.com.
limited capability in some area which probably not much used when it comes to 3rd party intergation
more productive
Perfectly using it in demonstrations
confidence in continuing work on the way Review collected by and hosted on G2.com.
This product protects my iPhone and smart devices in our business from cyber threats. Finally, a system that monitors behavior and activities on my fleet of mobile devices and helps me manage threats from a central dashboard. Review collected by and hosted on G2.com.
Only that this has to be purchased through a distributor like Synnex. The system itself works great after some fine tuning to our specific environmental needs. Review collected by and hosted on G2.com.
It really helps you keep your mobile safe, just think about how exposed we are through them, better use this solution. Review collected by and hosted on G2.com.
best product on market in my advise, not very clear manual you have to study a bit to understand it all and use the product at the best Review collected by and hosted on G2.com.

This has allowed an increased Security Posture through multiple types of protections across our company issued mobile devices. During this pandemic we have seen a large increase in work from home and remote work. Harmony Mobile has established a defense and protection layer to mobile devices once not covered by existing controls. Also where regular protections are reactive or detective in nature Harmony Mobile provides an added layer through active protections with its numerous next generation features.
Harmony Mobile has multiple valuable features which make it beneficial to have in deployment.
URL Filtering - with threat actors increasingly using phishing technology and malicious websites this tool has allowed active protection by scanning url and providing repudiation of links which in turn increases security posture.
App Security - Harmony Mobile also allows us insight into applications being installed on mobile devices and the risk categorization of these applications. It provides this also through app comparison to the app store which allows better levels of detection
Reporting - The reporting is very simple allowing easy to understand reports which can be sent to the executive of the company. Review collected by and hosted on G2.com.
One issue that we have is its full integration with Google Mobile Device Management (MDM). Currently there is limited capability for this and some features require third party features to be integrated with Google MDM. This creates a headache due to the fact that this was not stated before and these third party features come at an additional cost which would not have been planned for at inception due to information provided.
Expanded Google MDM integration was supposed to be introduced but so far we are still waiting.
Though different tools can be integrated into the Infinity Console, it would be nice to have a single pain of glass which correlates all checkpoint solutions into a dashboard reporting feature that can drill down to individual tools while providing overall security posture information in a dashboard format. Review collected by and hosted on G2.com.