You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.
By Check Point Software Technologies
How would you rate your experience with Check Point Harmony Mobile Protection?
Multi-Factor Authentication
Based on 17 Check Point Harmony Mobile Protection reviews.
Requires a second level of authentication, such as sms messaging or customized tokens, to access data.
Access Management
Based on 19 Check Point Harmony Mobile Protection reviews.
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Security and Compliance
Based on 20 Check Point Harmony Mobile Protection reviews.
Abilities to set standards for database security and risk management.
Mobile Device Mangement
21 reviewers of Check Point Harmony Mobile Protection have provided feedback on this feature.
Ability to set standards for types of mobile devices and networks capable of accessing data.
Data Encryption
19 reviewers of Check Point Harmony Mobile Protection have provided feedback on this feature.
Provide some level of encryption of data at rest, protecting sensitive data while it lives on a mobile device.
Data Transport
As reported in 19 Check Point Harmony Mobile Protection reviews.
Protects data with some form of encryption as it leaves your secure or local network.
Mobile VPN
Provides a virtual private network (VPN) to secure remote access to networks
Backup
This feature was mentioned in 17 Check Point Harmony Mobile Protection reviews.
Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.
Attacks
Defends against threats such as phishing attempts, jailbreaking, man-in-the-middle (MITM) attacks, and malicious third-party applications.