Reduce your software costs by 18% overnight
Check Point Mobile Access

Check Point Mobile Access Alternatives & Competitors

(8)3.8 out of 5

Looking for alternatives to Check Point Mobile Access? Tons of people want Mobile Data Security Software. What's difficult is finding out whether or not the software you choose is right for you. ESET PROTECT Advanced, Palo Alto Networks GlobalProtect, Symantec Endpoint Protection Mobile, and Salesforce Shield are the most popular alternatives and competitors to Check Point Mobile Access.

Top Alternatives to Check Point Mobile Access

  • ESET PROTECT Advanced
  • Palo Alto Networks GlobalProtect
  • Symantec Endpoint Protection Mobile
  • Salesforce Shield
  • Trend Micro Mobile Security

Top 20 Alternatives & Competitors to Check Point Mobile Access

    #1
    #1
  1. ESET PROTECT Advanced

    (403)4.6 out of 5
    Optimized for quick response

    Equipped with proactive malware defense and engineered to be light on your systems, endpoint security gives you the protection you need with fewer interruptions and false positives.

    Categories in common with Check Point Mobile Access:
  2. Equipped with proactive malware defense and engineered to be light on your systems, endpoint security gives you the protection you need with fewer interruptions and false positives.

    Categories in common with Check Point Mobile Access:

    Victoria E.
    VE
    This cloud-based security software provides endpoint security against malware for businesses and enterprises of all kinds. Its functions are not just limited to endpoint security, but it also...Read more

    Reviewers say compared to Check Point Mobile Access, ESET PROTECT Advanced is:

    Better at meeting requirements
    More usable
    Better at support
    #2
    #2
  3. Palo Alto Networks GlobalProtect

    (24)4.5 out of 5

    GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, command-and-control traffic, and known and unknown threats.

    Categories in common with Check Point Mobile Access:
  4. GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, command-and-control traffic, and known and unknown threats.

    Categories in common with Check Point Mobile Access:

    AR
    Ease of use and configuration. Management does not require regular changes or tweaking. Once the software is installed, the configuration doesn't need input every time and just connects in 2 clicks.

    Reviewers say compared to Check Point Mobile Access, Palo Alto Networks GlobalProtect is:

    Better at meeting requirements
    More usable
    Better at support
    18%   of software applications aren't well liked by teams using them.
    Find out how your team feels about your stack with G2 Pulse Surveys.
    Learn More
    #3
    #3
  5. Symantec Endpoint Protection Mobile

    (42)4.1 out of 5

    Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.

    Categories in common with Check Point Mobile Access:
  6. Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.

    Categories in common with Check Point Mobile Access:

    GK
    I use this app for a short time but it is enough, to be sure that, it works well. Protection is good, and it takes not much of free space from my memory. Also, I have trust with this app because it...Read more

    Reviewers say compared to Check Point Mobile Access, Symantec Endpoint Protection Mobile is:

    Better at meeting requirements
    More usable
    #4
    #4
  7. Salesforce Shield

    (21)4.2 out of 5

    Salesforce Shield offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.

    Categories in common with Check Point Mobile Access:
  8. Salesforce Shield offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.

    Categories in common with Check Point Mobile Access:

    UM
    Shield helps you keep data integrity and confidentiality while mobile, and helps you monitor events and create cool reports. I like not having that we don't have to use external encryption tools. ...Read more

    Reviewers say compared to Check Point Mobile Access, Salesforce Shield is:

    Better at meeting requirements
    #5
    #5
  9. Trend Micro Mobile Security

    (21)3.9 out of 5

    Trend Micro™ Mobile Security is an essential component of Trend Micro complete user protection solution that gives you full visibility and control of mobile devices, apps, and data through a single built-in console. It strikes the right balance between user productivity and IT risks.

    Categories in common with Check Point Mobile Access:
  10. Trend Micro™ Mobile Security is an essential component of Trend Micro complete user protection solution that gives you full visibility and control of mobile devices, apps, and data through a single built-in console. It strikes the right balance between user productivity and IT risks.

    Categories in common with Check Point Mobile Access:

    Dani H.
    DH
    Strong protection and ultra light for using this

    Reviewers say compared to Check Point Mobile Access, Trend Micro Mobile Security is:

    More usable
    Better at meeting requirements
    #6
    #6
  11. BlackBerry Blend

    (13)2.8 out of 5

    Boundless connectivity

    Categories in common with Check Point Mobile Access:
  12. Boundless connectivity

    Categories in common with Check Point Mobile Access:

    Alejandro M.
    AM
    Being able to access almost every important data you keep in your smartphone from a computer or table is just awesome. It gives you an enhanced user experience with the security we all know...Read more
    #7
    #7
  13. zANTI

    (7)3.9 out of 5

    zANTI™ is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.

    Categories in common with Check Point Mobile Access:
  14. zANTI™ is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.

    Categories in common with Check Point Mobile Access:

    Haoda W.
    HW
    Very well built, penetration testing is solid

    Reviewers say compared to Check Point Mobile Access, zANTI is:

    More usable
    Better at meeting requirements
    #8
    #8
  15. DashO – App Protection for Android & Java

    (13)4.5 out of 5

    DashO is a Java and Android Obfuscator plus much more. It provides enterprise-grade app hardening and shielding, greatly reducing the risk of intellectual property theft, data theft, piracy, and tampering. Our layered obfuscation, encryption, watermarking, auto-expiry, anti-debug, anti-tampering, anti-rooted device solution provides protection for applications all around the world.

    Categories in common with Check Point Mobile Access:
  16. DashO is a Java and Android Obfuscator plus much more. It provides enterprise-grade app hardening and shielding, greatly reducing the risk of intellectual property theft, data theft, piracy, and tampering. Our layered obfuscation, encryption, watermarking, auto-expiry, anti-debug, anti-tampering, anti-rooted device solution provides protection for applications all around the world.

    Categories in common with Check Point Mobile Access:

    Samir S.
    SS
    DashO is an excellent tool to protect the apps in various modules like IP theft, Data theft, and more. It helps in making my application solid proof to make it nearly impossible for reverse...Read more

    Reviewers say compared to Check Point Mobile Access, DashO – App Protection for Android & Java is:

    Better at meeting requirements
    More usable
    Better at support
    #9
    #9
  17. Dotfuscator – App Protection for .NET & Xamarin

    (12)4.6 out of 5

    Dotfuscator is a .NET Obfuscator & much more. It provides enterprise-grade app protection, greatly reducing the risk of piracy, intellectual property theft and tampering. Our layered obfuscation, encryption, watermarking, auto-expiry, anti-debug, anti-tampering and alerting and defense technology provides protection for hundreds of thousands of applications around the world.

    Categories in common with Check Point Mobile Access:
  18. Dotfuscator is a .NET Obfuscator & much more. It provides enterprise-grade app protection, greatly reducing the risk of piracy, intellectual property theft and tampering. Our layered obfuscation, encryption, watermarking, auto-expiry, anti-debug, anti-tampering and alerting and defense technology provides protection for hundreds of thousands of applications around the world.

    Categories in common with Check Point Mobile Access:

    Mark G.
    MG
    Love the string encryption and removal features. It is great to know that my apps are protected

    Reviewers say compared to Check Point Mobile Access, Dotfuscator – App Protection for .NET & Xamarin is:

    Better at meeting requirements
    Better at support
    More usable
    #10
    #10
  19. Amazon WorkLink

    (7)3.7 out of 5

    Categories in common with Check Point Mobile Access:
  20. Categories in common with Check Point Mobile Access:

    MC
    Amazon WorkLink is not a simple point-to-point VPN, it allows you to easily create multiple connections between multiple peers and multiple locations or headquarters around the world through the...Read more
    #11
    #11
  21. AirCheck Wi-Fi Tester for Android

    (5)3.9 out of 5

    Smart Wi-Fi Troubleshooting and Deployment App

    Categories in common with Check Point Mobile Access:
  22. Smart Wi-Fi Troubleshooting and Deployment App

    Categories in common with Check Point Mobile Access:

    Jon H.
    JH
    Aircheck wifi is a useful tool in helping find wifi when in new areas away from your home
    #12
    #12
  23. Dell Credant

    (4)3.6 out of 5

    CREDANT is the trusted expert in data protection, enabling organizations to control, manage and protect data wherever it resides.

    Categories in common with Check Point Mobile Access:
  24. CREDANT is the trusted expert in data protection, enabling organizations to control, manage and protect data wherever it resides.

    Categories in common with Check Point Mobile Access:

    UH
    Encryption is a relative breeze. The external media encryption portion is very slick. I like being able to force USB mass storage devices to be encrypted before they are used on our systems. ...Read more
    #13
    #13
  25. Certo iPhone

    (4)2.2 out of 5

    Certo iPhone is the only bug and spyware detection tool available for iOS devices. Our clients use Certo iPhone to ensure their employee's devices are secure.

    Categories in common with Check Point Mobile Access:
  26. Certo iPhone is the only bug and spyware detection tool available for iOS devices. Our clients use Certo iPhone to ensure their employee's devices are secure.

    Categories in common with Check Point Mobile Access:

    Kartik M.
    KM
    It is convenient and easy to use. Also for people who are not so tech savy, the periodic reminders and analytics it offers are a great insight for your apple devices.
    #14
    #14
  27. Symantec Trusted Mobile Device Security Service

    (3)4.0 out of 5

    Symantec Mobile Device Security service brings enterprise-grade threat protection and policy controls to mobile devices, including iOS and Android devices, no matter where your employees are using them. With network-based application controls, real-time threat analytics, encrypted communication, and the industry’s only Negative Day Defense, the service allows you to deliver the access users want and the security your business needs. Now you can enable your employees to use the best mobile devices and apps the world has to offer, and enjoy higher levels of productivity and satisfaction.

    Categories in common with Check Point Mobile Access:
  28. Symantec Mobile Device Security service brings enterprise-grade threat protection and policy controls to mobile devices, including iOS and Android devices, no matter where your employees are using them. With network-based application controls, real-time threat analytics, encrypted communication, and the industry’s only Negative Day Defense, the service allows you to deliver the access users want and the security your business needs. Now you can enable your employees to use the best mobile devices and apps the world has to offer, and enjoy higher levels of productivity and satisfaction.

    Categories in common with Check Point Mobile Access:

    Aishwarya R.
    AR
    Good experience with respect to protection & performance. It has a without MDM capabilities, other competitors do not have that kind of capabilities without third-party MDM. The deployment is also...Read more
    #15
    #15
  29. WinMagic

    (3)4.5 out of 5

    WinMagic provides the world's most secure, manageable and easy-to-use data encryption solutions.

    Categories in common with Check Point Mobile Access:
  30. WinMagic provides the world's most secure, manageable and easy-to-use data encryption solutions.

    Categories in common with Check Point Mobile Access:

    Greg G.
    GG
    I like the ease of management and deployment. I also like that I don't have to license and use enterprise editions of windows. It also works across multiple platforms.
    #16
    #16
  31. MYMobile

    (3)3.8 out of 5

    MYMobileSecurity is amongst the most trusted on the market today. The technology has already won several "Best in Test" awards and certificates.

    Categories in common with Check Point Mobile Access:
  32. MYMobileSecurity is amongst the most trusted on the market today. The technology has already won several "Best in Test" awards and certificates.

    Categories in common with Check Point Mobile Access:

    CC
    Being able to trouble shoot issues with our mobile devices for RFID scanning
    #17
    #17
  33. Ribbon

    (3)0.0 out of 5

    Ribbon's real-time communications solutions offer enterprises and government organizations an innovative, secure, and cost-effective alternative to proprietary PBX and UC products.

    Categories in common with Check Point Mobile Access:
  34. Ribbon's real-time communications solutions offer enterprises and government organizations an innovative, secure, and cost-effective alternative to proprietary PBX and UC products.

    Categories in common with Check Point Mobile Access:

    AT
    Ribbon GENCom is a feature-rich communications application for Windows devices. Users can turn any workspace into a virtual office. A Ribbon GENCom client delivers a robust set of collaboration...Read more
    #18
    #18
  35. HiddenApp

    (2)5.0 out of 5

    HiddenApp's technology has been specifically built for monitoring, managing and tracking Apple device fleets.

    Categories in common with Check Point Mobile Access:
  36. HiddenApp's technology has been specifically built for monitoring, managing and tracking Apple device fleets.

    Categories in common with Check Point Mobile Access:

    MR
    This software is easy to install locally and computer in the field already.
    #19
    #19
  37. passQi

    (1)4.0 out of 5

    passQi provides both an intelligent password management mobile app and a complementary server-side solution called mFactor to implement a proprietary Multi Factor Authentication login for WordPress and other web sites. The app can be used as a stand alone product, or in concert with the mFactor solution. The passQi 2 app provides the highest level of security by storing information exclusively in the user’s smartphone vault, a single tool that goes everywhere. One-time keys securely encrypt relayed information via the cloud, and are never passed through the network or shared with another device. passQi 2 is designed to work seamlessly with nearly any site on the Internet and offers an optional automated TOTP support alternative to Google authenticator.

    Categories in common with Check Point Mobile Access:
  38. passQi provides both an intelligent password management mobile app and a complementary server-side solution called mFactor to implement a proprietary Multi Factor Authentication login for WordPress and other web sites. The app can be used as a stand alone product, or in concert with the mFactor solution. The passQi 2 app provides the highest level of security by storing information exclusively in the user’s smartphone vault, a single tool that goes everywhere. One-time keys securely encrypt relayed information via the cloud, and are never passed through the network or shared with another device. passQi 2 is designed to work seamlessly with nearly any site on the Internet and offers an optional automated TOTP support alternative to Google authenticator.

    Categories in common with Check Point Mobile Access:

    Jaeson S.
    JS
    The product is easy to launch. Very user friendly and intuitive.
    #20
    #20
  39. Corrata

    (1)4.5 out of 5

    Corrata is a cloud-based SaaS mobile data management software that uses advanced analytics to ensure you're always getting the best value from your mobile service provider and offers the enterprise visibility of their employees mobile data use and helps the employee manage their own data use inline with company policy

    Categories in common with Check Point Mobile Access:
  40. Corrata is a cloud-based SaaS mobile data management software that uses advanced analytics to ensure you're always getting the best value from your mobile service provider and offers the enterprise visibility of their employees mobile data use and helps the employee manage their own data use inline with company policy

    Categories in common with Check Point Mobile Access:

    AP
    Lo que más me gusta es que Corrata realiza la inspección del tráfico de red de forma local, en el propio dispositivo, utilizando las capacidades de red nativas de los sistemas operativos móviles...Read more