HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
This content is provided by FinTechBenchmarker.com who are responsible for the content. Please contact them if you have any questions.
A mobile threat defense solution that protects wealth management professionals from malware, network attacks, and data leakage. Features include on-device network protection, app security, OS protection, phishing prevention, and integration with MDM solutions for comprehensive security policy enforcement.
More about Check Point Software
Tablets and smartphones with enhanced security features allowing advisors to access client information and financial planning tools while meeting with clients outside the office.
More Secure Mobile Devices
More Wealth Management ...
Multi-Factor Authentication (MFA) Requires users to provide multiple forms of identification before granting access. |
Industry standard security; MFA is referenced as supported within many Check Point deployments and is a commonly required feature for financial industry apps. | |
Biometric Authentication Supports authentication via fingerprint, facial recognition, or iris scanning. |
Biometric authentication is typically supported via device-level security, which Harmony Mobile enforces as part of OS protection. | |
Single Sign-On (SSO) Allows users to use one set of login credentials across multiple related systems. |
No information available | |
Role-Based Access Control (RBAC) Grants access based on user roles, limiting exposure to sensitive features and data. |
Supports integration with MDMs which generally enforce RBAC; Check Point documentation references role-based management. | |
Time-based Access Restrictions Restricts platform access to set periods for added security and oversight. |
No information available | |
Geofencing Limits platform access to predefined geographic locations. |
No information available | |
Session Timeout Automatically logs out users after a period of inactivity. |
No information available | |
Device Registration Allows only registered and approved devices to access sensitive information. |
Device registration and approval for app activation are supported as part of integration with MDM/UEM solutions. | |
Jailbreak/Root Detection Detects devices with compromised operating systems and restricts access. |
Explicitly advertised as a feature ('Jailbreak/Root detection and mitigation'). | |
Remote Lock/Wipe Ability to lock or erase device data remotely if lost or stolen. |
No information available | |
Customizable Password Policies Enforces complexity and frequency rules for password creation and updates. |
No information available | |
User Activity Logging Tracks user actions on the platform for accountability and investigation. |
User activity is logged for compliance and threat monitoring (referenced in admin/control documentation). | |
Access Approval Workflow Requires admin approval before granting user or device access. |
No information available |
End-to-End Encryption Encrypts data at rest and in transit between devices and servers. |
Encrypts sensitive data at rest and transit (Check Point documentation). | |
On-Device Data Encryption Secures stored data locally on the mobile device using encryption. |
On-device encryption is standard and enforced by the MTD features. | |
Secure Backup Backs up data securely in compliance with privacy standards. |
No information available | |
Encrypted Communications Ensures all messaging, calls, and file transfers are encrypted. |
Network protection and encrypted comms are explicitly claimed as part of phishing prevention and on-device network protection. | |
Secure Key Management Safeguards encryption keys with restricted access and best practices. |
No information available | |
Data Masking Masks sensitive financial data displayed on screens to prevent exposure. |
No information available | |
Granular Encryption Levels Allows different levels of encryption for different data types. |
No information available | |
Privacy Policy Transparency Displays clear information about data collection, use, and sharing. |
No information available | |
Compliance with GDPR/CCPA Adheres to data privacy regulations such as GDPR or CCPA. |
Check Point provides support for GDPR and CCPA compliance as stated on their regulatory compliance pages. | |
Audit Logging Maintains logs of all access and changes to client data for auditing. |
Audit logging is a standard feature for threat and compliance purposes. | |
Secure Cache Management Automatically clears or encrypts application cache to prevent data leaks. |
No information available |
MDM Integration Offers compatibility with leading MDM solutions for device oversight. |
MDM integration is widely referenced in marketing and deployment documentation. | |
Device Inventory Tracking Tracks all approved devices accessing financial systems. |
No information available | |
App Whitelisting/Blacklisting Prevents installation or use of non-approved applications. |
No information available | |
Mobile Threat Detection Continuously monitors for malware, phishing, or other threats. |
Continuous monitoring for malware, phishing, and other threats is the core function of this product. | |
Patch & Update Management Ensures devices and apps are running the latest secure versions. |
Patch/Update management is a feature typically available through MDM integration, and is referenced among supported security policies. | |
VPN Enforcement Requires VPN connections for external or remote access. |
VPN enforcement is an explicit feature in conjunction with network threat detection. | |
Compliance Reporting Generates reports on device compliance with security policies. |
Compliance reporting on device state and security posture is a requirement for financial MTD solutions and is referenced in product documentation. | |
Remote Configuration Centrally manages security settings and configurations across devices. |
No information available | |
Lost Device Tracking Allows real-time location and status tracking of lost devices. |
Lost device tracking is achievable through MDM/UEM integration, and such functionality is referenced in the integration notes. | |
Security Incident Alerts Automatically notifies administrators of security breaches or risks. |
Harmony Mobile sends real-time alerts and notifications to admins on security incidents. | |
Usage Analytics Provides analytics on device engagement and usage by advisors. |
No information available |
Intuitive Navigation Easy-to-use interface for advisors and clients. |
No information available | |
Customizable Dashboard Allows users to personalize information and shortcuts. |
No information available | |
Multi-Language Support Available in a variety of languages to serve diverse client bases. |
No information available | |
Accessibility Features Supports screen readers, high contrast mode, and large text. |
No information available | |
Offline Mode Limited functionality without network connection for emergencies. |
No information available | |
In-App Notifications Provides timely alerts and updates to users inside the app. |
Push and in-app notifications are core part of incident and threat alerting in Harmony Mobile. | |
Seamless Document Upload/Download Secure and easy handling of financial documents. |
No information available | |
Dedicated Client/Advisor Portal Separate portal areas for advisors and clients with tailored functions. |
No information available | |
Voice Assistant Integration Integrates with voice assistants for hands-free operation. |
No information available | |
Search Functionality Advanced search tools for transactions, documents, and contacts. |
No information available | |
Responsive Design Adapts interface for phones, tablets, and different screen sizes. |
Harmony Mobile interface is mobile responsive (required for mobile security apps). |
Transaction Approvals Requires one or more approvals before large or sensitive transactions proceed. |
No information available | |
Real-Time Transaction Monitoring Monitors and flags potentially suspicious activity as it happens. |
Real-time transaction/activity monitoring (focused on malicious/suspicious app transactions) is core to the platform. | |
Limits on Transaction Amounts Configurable maximums for transactions approved via mobile. |
No information available | |
Automated Fraud Detection AI-based detection and prevention of fraudulent transactions. |
Automated fraud detection (malware, phishing and network threats) is a principal use-case for Harmony Mobile. | |
Transaction Notifications Instant alerts for every transaction initiated or completed. |
Notifications for security-related transactions (e.g. risky app, network attack) are pushed instantly to the administrator. | |
Dual Authorization Two users must independently authorize critical transactions. |
No information available | |
Audit Trail of Transactions Comprehensive log of all transaction details and authorizations. |
Audit trail for all detected threats, user/administrator actions, and compliance events is retained in the system. | |
Regulatory Compliance Checks Automated screening of transactions for regulatory compliance. |
No information available | |
Transaction Reversal Tools Ability to reverse incorrect or fraudulent transactions swiftly. |
No information available | |
User Permissions for Transaction Types Administrator control to restrict types of transactions by user. |
No information available |
API Access Robust, secure API for integrating with other platforms and services. |
No information available | |
Data Import/Export Allows seamless transfer of financial information to and from other systems. |
No information available | |
CRM Integration Integrates with Client Relationship Management software. |
No information available | |
Portfolio Management Integration Works with third-party portfolio management and analytics tools. |
No information available | |
Bank Connection Aggregation Aggregates holdings and balances from multiple banks and custodians. |
No information available | |
Document Management Integration Connects with document storage and e-signature platforms. |
No information available | |
Secure Open Banking Support Supports open banking APIs with OAuth2 and PSD2 compliance. |
No information available | |
Alerting System Integrations Can send alerts to external monitoring and support systems. |
No information available | |
App Marketplace Compatibility Supports plug-ins and third-party apps from curated marketplaces. |
No information available | |
Single Data Format Standardization Uses open standards for financial data for easier interoperability. |
No information available |
Regulatory Audit Trail Captures full audit logs for all data and actions, meeting compliance obligations. |
Regulatory audit logs are generated for device and user activity, key for compliance in financial sector. | |
Real-Time Compliance Alerts Instantly flags actions or transactions that may breach compliance rules. |
Instant compliance alerts for policy violations and security breaches. | |
Scheduled Compliance Reporting Automatically generates and distributes compliance reports. |
No information available | |
Role-Based Compliance Controls Compliance checks vary based on user roles and access. |
No information available | |
e-Discovery Support Facilitates discovery of electronic records for legal/audit review. |
No information available | |
Customizable Policy Engine Policy rules can be tailored to organizational and regulatory needs. |
No information available | |
Conflict of Interest Monitoring Detects and reports potential advisor conflicts. |
No information available | |
Transaction Reporting Standards Supports formats (e.g., SWIFT, FIX) required for external reporting. |
No information available | |
Automated Record Retention Automatically applies record retention/destruction based on policy. |
No information available | |
Data Residency Awareness Ensures data is stored in approved jurisdictions. |
The product provides data residency awareness for compliance with storage requirements in the financial industry. |
Secure In-App Messaging Enables end-to-end encrypted communication between users. |
No information available | |
Document Sharing and Signatures Securely share, collaborate and sign important documents. |
No information available | |
Client Scheduling Tools Integrates calendars and scheduling for advisor-client meetings. |
No information available | |
Group Chat Capability Supports group discussions among teams or family members. |
No information available | |
Push Notification Channel Provides immediate client/advisor updates and reminders. |
Push notification channel supported for incident and compliance messages. | |
Voice and Video Communication Enables secure audio and video calls through the app. |
No information available | |
Audit Logging of Communications Maintains logs for all advisor-client communications for compliance. |
Audit logs for all communications relevant to security events are retained. | |
Conversation Archival and Search Archives all chat and call transcripts and allows keyword searching. |
No information available | |
Automated Meeting Summaries Records and summarizes client meetings for audit and convenience. |
No information available | |
Integration with Email/Other Channels Can synchronize communications with email, SMS, or third-party chat. |
No information available |
99.99% Uptime SLA Guaranteed uptime or availability level for the application. |
No information available | |
Real-Time Performance Monitoring Tracks system performance metrics for rapid issue detection. |
The platform monitors mobile health and network status in real time, as noted in documentation. | |
Scalability Supports growing users or device numbers without service degradation. |
Designed for enterprise scalability - supports growing users and device counts. | |
Load Balancing Balances traffic across servers for optimal responsiveness. |
No information available | |
Disaster Recovery Plan Comprehensive plan and backup for service continuity after outage. |
No information available | |
Auto Failover Seamlessly switches users to backup systems in case of primary failure. |
No information available | |
Response Time Average time for screen or transaction to load/process. |
No information available | |
Regular Maintenance Scheduling Planned maintenance that does not interrupt critical user activity. |
No information available | |
Bug Reporting & Resolution SLA Defined timelines for responding to and fixing reported bugs. |
No information available | |
User Feedback Loop Allows real users to report issues and suggest improvements. |
Users and admins can report issues directly through the dashboard and management portal. |
Guided Onboarding Step-by-step instructions for initial setup for users and administrators. |
Guided onboarding is included in enterprise deployments, including admin and user setup. | |
In-App Tutorials & Help Embedded resources to assist new or returning users. |
No information available | |
24/7 Help Desk Support Continuous support by phone, chat, or web. |
24/7 technical support is a standard enterprise support offer for Check Point Harmony Mobile. | |
Knowledge Base Online repository of FAQs, guides and troubleshooting tips. |
No information available | |
Dedicated Account Manager Assigned specialist for organizational needs and issue escalation. |
Dedicated account manager provided for enterprise clients as part of customer success/support offering. | |
Flexible Deployment Options Supports cloud, on-premises, or hybrid deployment models. |
Product can be deployed via cloud or integrated with on-prem MDM, offering flexible deployment. | |
User Role Training Programs Custom training by user function (advisor, admin, client). |
No information available | |
API Documentation Complete documentation for developers integrating the platform. |
No information available | |
Test/Sandbox Environment Safe environment for testing new features/configurations. |
Sandbox/test environment supported for enterprise trials and integrations (reference: product setup guides). | |
Feedback & Feature Request System Enables users to submit suggestions and requests for enhancements. |
Feature suggestion/feedback channels exist through customer support and portal. |
This data was generated by an AI system. Please check
with the supplier. While you are talking to them, remind them that they need
to update their entry.