Check Point Harmony Mobile vs. ESET PROTECT

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point Harmony Mobile
Score 7.0 out of 10
N/A
Check Point’s Harmony Mobile (formerly SandBlast Mobile) is an enterprise mobile security and mobile threat defense (MTD) solution, designed to make protecting businesses from advanced, fifth-generation cyber attacks easier. Harmony Mobile offers: Anti-Phishing with Zero-Phishing Safe Browsing Conditional Access Anti-Bot URL Filtering Protected DNS Wi-Fi Network SecurityN/A
ESET PROTECT
Score 8.9 out of 10
N/A
ESET provides Endpoint Protection Platform (EPP) capabilities via the ESET PROTECT Platform, covering Windows, Mac, Linux, and both Android and iOS operating systems, providing Mobile Device Management functionality. It comes with multi-tenant management, ensuring real-time visibility for both on-premises and off-premises endpoints as well as full reporting for ESET enterprise-grade solutions. ESET PROTECT management platform can be deployed on-premise or in-cloud. For organizations looking to…N/A
Pricing
Check Point Harmony MobileESET PROTECT
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Check Point Harmony MobileESET PROTECT
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeOptional
Additional DetailsESET offers are tailored to each customer’s needs. ESET takes pride in working with customers and partners to find the perfect solution for their security challenges at the right price. Contacting an ESET partner or sales representative ensures each solution is made-to-measure and precisely fits the size, complexity of IT environment and level of protection to match the customer’s business requirements.
More Pricing Information
Community Pulse
Check Point Harmony MobileESET PROTECT
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
Check Point Harmony MobileESET PROTECT
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Check Point Harmony Mobile
-
Ratings
ESET PROTECT
9.1
16 Ratings
7% above category average
Anti-Exploit Technology00 Ratings9.016 Ratings
Endpoint Detection and Response (EDR)00 Ratings9.215 Ratings
Centralized Management00 Ratings9.115 Ratings
Hybrid Deployment Support00 Ratings8.412 Ratings
Infection Remediation00 Ratings9.116 Ratings
Vulnerability Management00 Ratings9.515 Ratings
Malware Detection00 Ratings9.716 Ratings
Best Alternatives
Check Point Harmony MobileESET PROTECT
Small Businesses

No answers on this topic

SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10
Medium-sized Companies
Sophos Mobile
Sophos Mobile
Score 8.3 out of 10
SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10
Enterprises

No answers on this topic

BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 8.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point Harmony MobileESET PROTECT
Likelihood to Recommend
8.0
(1 ratings)
9.5
(48 ratings)
Likelihood to Renew
-
(0 ratings)
10.0
(4 ratings)
Usability
-
(0 ratings)
8.0
(2 ratings)
Support Rating
-
(0 ratings)
9.5
(5 ratings)
Implementation Rating
-
(0 ratings)
10.0
(1 ratings)
User Testimonials
Check Point Harmony MobileESET PROTECT
Likelihood to Recommend
Check Point Software Technologies
It immediately tells you when an app is malicious, its always scanning the device. The policies you can enforce on the device allows you to know that the device can remain secure. I have a hard time describing scenarios where is it less appropriate because Harmony Mobile was made to secure mobile devices.
Read full review
ESET
Comprehensive threat prevention against a variety of threats, such as viruses, ransomware, and spyware is effectively provided by ESET PROTECT. The cross platform compatibility of this software is advantageous for business with diverse IT environments such as those combination of Windows, macOS, and Linux systems. Some industries, such highly regulated sectors with specific compliance needs, may find it more cost-effective, however it is less suitable for small enterprises with limited IT resources and for organizations with severe budgetary limits.
Read full review
Pros
Check Point Software Technologies
  • Blocks Smishing Attacks
  • Blocks specific categories of content e.g. Pornography
  • Ability to Scan Applications to determine their integrity
Read full review
ESET
  • ESET provides comprehensive, transparent protection for my MacOS devices without interfering with the efficiency of my operating system.
  • It's easy to install, configure (default settings are great for just about everyone), and update.
  • ESET's customer communications, including a very detailed knowledge base online, make it clear I've chosen the right antivirus solution!
Read full review
Cons
Check Point Software Technologies
  • I think the ability to scan a Wi-Fi network prior to joining can be an excellent addition
  • On demand application scanning
  • Alert users when an application becomes malicious
Read full review
ESET
  • If the system administrator has functions such as pop-up notification and alert mail transmission, I believe that countermeasures can be taken faster
  • It often gets in the way of the network system.
  • Communication between PCs under the same network may be hindered, which may be an obstacle to verification.
Read full review
Likelihood to Renew
Check Point Software Technologies
No answers on this topic
ESET
I'm giving it a 10, because I would totally have no reservations about staying on with eSet for another 3 years once our contract comes up for renewal. We are looking to transfer to a different product in January, however. This is due to a special pricing contract with the state of Ohio that made a normally much more expensive product very affordable and was cheaper than our coming eSet renewal cost. This is a very special case only available to government and educational organizations, but had that not been offered, we would have gladly stayed with eSet.
Read full review
Usability
Check Point Software Technologies
No answers on this topic
ESET
We had issues initially getting all of the policies implemented and working since it can be hard to figure out what setting is coming from what policy. Once you get your stack of policies setup and working, the product works great. The installers just work and knowing that they can remove other AV software when you install it can save you a lot of time and headaches.
Read full review
Support Rating
Check Point Software Technologies
No answers on this topic
ESET
Excellent support from ESET and when we had questions regarding the initial deployment they were there. The questions we put forth were answered immediately with great detail. Any of the items we put forth, scenarios, were given a good solution from ESET to fit our needs. This company stands by their product and are happy to step up when needed.
Read full review
Implementation Rating
Check Point Software Technologies
No answers on this topic
ESET
Do the full scan at the beginning and be prepared to wait until it is done. It will find things you did not know were there. You can leave on the Apple firewall as well as the ESET firewall. There have been no conflicts. Remember to remove emails from being backed up, so you do not have spam on your backup! This was the mistake I made.
Read full review
Alternatives Considered
Check Point Software Technologies
Harmony Mobile is really a cut above the rest because it really is the first application of its kind, the first Mobile Threat Defense tool that is designed for just that. Detecting and preventing threats. It should be the baseline used to develop other MTD applications because of its already high standards and quality.
Read full review
ESET
We really like the lightness of ESET, this really is a differential in your favor, the way it operates quietly in the background even running a scan was something that interested us, nothing worse than an antivirus locking everything like a scan and still end up issuing scandalous false detections, in the end the choice was made by ESET much because of this differential.
Read full review
Return on Investment
Check Point Software Technologies
  • Secure phones means less possibility for breaches
  • Only safe apps can be installed
  • Savings from the reduction in the possibility of breaches
Read full review
ESET
  • Stopped several malware outbreaks that would have had considerable downtime on endpoints.
  • Stopped several ransomware attacks that would have potentially costs large sums of money and downtime.
  • Allowed us to utilize Eset itself in lieu of a patchwork of platforms to accomplish the same tasks. Saving us several thousand per year.
Read full review
ScreenShots

ESET PROTECT Screenshots

Screenshot of ESET PROTECT Dashboard.
Unified cybersecurity platform interface providing network visibility and control. Available as cloud or on-prem deployment.

Ensures real-time visibility for all endpoints as well as full reporting and security management for all OSes.Screenshot of ESET Endpoint Security.

Advanced multilayered protection for computers and smartphones powered by ESET LiveSense technology.Screenshot of ESET Server Security.
Provides real-time protection for the company’s data passing through all general servers, network file storage including OneDrive, and multi-purpose servers to ensure business continuity.Screenshot of ESET PROTECT - Reports. 
Meets reporting requirements and saves time with scheduled reporting and dozens of customizable templates.Screenshot of ESET Full Disk Encryption. 
An encryption managed natively by ESET remote management console. It increases the  organization's data security that meets compliance regulations.Screenshot of ESET LiveGuard Advanced. 
A cloud-based technology that uses scanning, machine learning, cloud sandboxing, and in-depth behavioral analysis to prevent targeted attacks as well as new or unknown threats, especially ransomware.