{"id":31206,"date":"2023-11-08T09:50:23","date_gmt":"2023-11-08T08:50:23","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/managed-it-ot-security-solutions\/harmony-mobile\/"},"modified":"2024-12-02T11:41:32","modified_gmt":"2024-12-02T10:41:32","slug":"harmony-mobile","status":"publish","type":"page","link":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/harmony-mobile\/","title":{"rendered":"Harmony Mobile"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-junymveb-8019529af125454bc30a0ca228723c65 entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyesco-c4e682ac59bc82acac8cecf41202092b\">\n.flex_cell.av-junyesco-c4e682ac59bc82acac8cecf41202092b{\nvertical-align:middle;\nheight:400px;\nmin-height:400px;\nbackground:url(https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/10\/mobile-harmony.jpg) 0% 0% no-repeat scroll #ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junyesco-c4e682ac59bc82acac8cecf41202092b{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyesco-c4e682ac59bc82acac8cecf41202092b av-gridrow-cell av_one_half no_margin  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a\">\n.flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\nvertical-align:top;\nheight:400px;\nmin-height:400px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l3a9zy8e-31bde6cb57cf9a5beba894b3c821d632\">\n#top .av-special-heading.av-l3a9zy8e-31bde6cb57cf9a5beba894b3c821d632{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-l3a9zy8e-31bde6cb57cf9a5beba894b3c821d632 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-l3a9zy8e-31bde6cb57cf9a5beba894b3c821d632 .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-l3a9zy8e-31bde6cb57cf9a5beba894b3c821d632 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-l3a9zy8e-31bde6cb57cf9a5beba894b3c821d632 .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-l3a9zy8e-31bde6cb57cf9a5beba894b3c821d632 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-l3a9zy8e-31bde6cb57cf9a5beba894b3c821d632 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-l3a9zy8e-31bde6cb57cf9a5beba894b3c821d632 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  el_before_av_textblock  avia-builder-el-first  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Mobile security for your corporate devices and remote users<\/h1><div class='av_custom_color av-subheading av-subheading_below'><p>Harmony Mobile by Check Point<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jyzx0kqa-8b0988d736add2861771c640b9d40cd3\">\n#top .av_textblock_section.av-jyzx0kqa-8b0988d736add2861771c640b9d40cd3 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-jyzx0kqa-8b0988d736add2861771c640b9d40cd3 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><div class=\"avia-testimonial-meta-mini\">\n<p>Smartphones and tablets have become an indispensable part of everyday working life. Mobile devices are not only used in the home office to support or supplement daily work but are standard equipment in many professions and industries.<\/p>\n<p>This makes it even more important to secure these devices to prevent gateways into the corporate network and unwanted access to corporate data or applications.\u00a0 Malware, hacker attacks and vulnerabilities on smartphones and tablets need to be detected and blocked immediately.<\/p>\n<\/div>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-junyy33y-ebc4019e7b6877f5936d4d5958e59ead entry-content-wrapper main_color av-flex-cells  avia-builder-el-5  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyw8vu-4853268eebab2336dfbb5674b206345b\">\n.flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyw8vu-4853268eebab2336dfbb5674b206345b av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-6  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6\">\n.flex_cell.av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6 av-gridrow-cell av_one_half no_margin  avia-builder-el-7  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div><\/div><div id='av-layout-grid-3'  class='av-layout-grid-container av-3eke99z-f86894f94f960f650ec3dd65bda4d0d7 entry-content-wrapper main_color av-flex-cells  avia-builder-el-8  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-36772c7-170947e849077a7c91579099e071cfb7\">\n.flex_cell.av-36772c7-170947e849077a7c91579099e071cfb7{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-36772c7-170947e849077a7c91579099e071cfb7{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-36772c7-170947e849077a7c91579099e071cfb7 av-gridrow-cell av_one_half no_margin  avia-builder-el-9  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-8m37rr-b4a4bbfc914359191c0a8160cf93377b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Harmony Mobile for easy protection of all smartphones and tablets<\/h2>\n<p>Harmony Mobile by Check Point protects Android and iOS devices across all attack vectors &#8211; apps and files, network, and operating system. In addition to maximum security through real-time detection and blocking of threats, companies benefit from optimal integration into MDM systems such as <a href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/\">IKARUS mobile.management<\/a>. This means that the rollout and management of the app can be implemented centrally and without user interaction.<\/p>\n<h3>Security for devices and files<\/h3>\n<p>Harmony Mobile detects malicious apps through behavioural analysis in a virtual cloud environment. It also detects infected downloads, phishing attacks, malicious websites and man-in-the-middle attacks. Machine learning and AI, sandboxing, code analysis and anomaly detection are among the tools used. Harmony Mobile scans apps and downloads even in offline mode, warns of detected dangers and blocks suspicious processes immediately.<\/p>\n<h3>Protection against vulnerabilities in the operating system<\/h3>\n<p>With real-time analytics, Harmony Mobile detects attacks, vulnerabilities (CVE), configuration changes, weak security settings and advanced jailbreaking and rooting techniques.<\/p>\n<p>You can centrally monitor the risk assessment and security settings of your devices at any time via the Harmony Mobile Dashboard. You can also upload apps and have them threat assessed before deployment.<\/p>\n<h3>Seamlessly integrate Harmony Mobile with IKARUS mobile.management<\/h3>\n<p>Seamless integration with the <a href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/\">IKARUS mobile.management<\/a> MDM system enables zero-touch provisioning and central control of the app without user interaction. The risk levels of the devices can be imported into the MDM and threats can thus not only be detected, but also responded to immediately \u2013 manually or through individually definable rules.<\/p>\n<p>The IKARUS team of experts will be happy to support you in implementing and setting up the app and the MDM according to your requirements!<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-lui6emgb-0de187cec269663ffb4e0e41536ea489-wrap avia-button-left  avia-builder-el-11  el_after_av_textblock  el_before_av_button '><a href='\/wp-content\/downloads\/Harmony_Mobile-Ikarus_Solution_Brief-EN.pdf'  class='avia-button av-lui6emgb-0de187cec269663ffb4e0e41536ea489 av-link-btn avia-icon_select-no avia-size-small avia-position-left avia-color-dark'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Datasheet Harmony Mobile with IKARUS mobile.management   \"><span class='avia_iconbox_title' >Datasheet Harmony Mobile with IKARUS mobile.management   <\/span><\/a><\/div><br \/>\n<div  class='avia-button-wrap av-1le58jb-41f4a8c8f9918f8bf5516a232b2ddabe-wrap avia-button-left  avia-builder-el-12  el_after_av_button  avia-builder-el-last '><a href='mailto:sales@ikarus.at?subject=Harmony%20Mobile%20request%20from%20www.ikarussecurity.com'  class='avia-button av-1le58jb-41f4a8c8f9918f8bf5516a232b2ddabe av-link-btn avia-icon_select-no avia-size-medium avia-position-left avia-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Inquire now\"><span class='avia_iconbox_title' >Inquire now<\/span><\/a><\/div><\/p>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1binb87-8e2dafbdefdc0547ab5f2d3b2da6ce0b\">\n.flex_cell.av-1binb87-8e2dafbdefdc0547ab5f2d3b2da6ce0b{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-1binb87-8e2dafbdefdc0547ab5f2d3b2da6ce0b{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-1binb87-8e2dafbdefdc0547ab5f2d3b2da6ce0b av-gridrow-cell av_one_half no_margin  avia-builder-el-13  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ilmvzr-7dba455e5d79ab65361faf305ffd7fb4\">\n.avia-image-container.av-ilmvzr-7dba455e5d79ab65361faf305ffd7fb4 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-ilmvzr-7dba455e5d79ab65361faf305ffd7fb4 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-ilmvzr-7dba455e5d79ab65361faf305ffd7fb4 av-styling- avia-align-center  avia-builder-el-14  avia-builder-el-no-sibling '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img fetchpriority=\"high\" class='wp-image-31076 avia-img-lazy-loading-not-31076 avia_image ' src='https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/10\/harmony-mobile.png' alt='Harmony Mobile by Check Point' title='harmony-mobile'  height=\"854\" width=\"1200\"  itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/p>\n<div id='av-layout-grid-4'  class='av-layout-grid-container av-1a7jx9z-895ccda9eb688abba4f43696d106514a entry-content-wrapper main_color av-flex-cells  avia-builder-el-15  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lo8bfq07-1da94d4a9454b8d59300b4fc2051e6db\">\n.flex_cell.av-lo8bfq07-1da94d4a9454b8d59300b4fc2051e6db{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-lo8bfq07-1da94d4a9454b8d59300b4fc2051e6db{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-lo8bfq07-1da94d4a9454b8d59300b4fc2051e6db av-gridrow-cell av_one_third no_margin  avia-builder-el-16  el_before_av_cell_one_third  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lo8bgiwa-733e74b3ae6531a1d9ec567e23dab69b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Features:<\/h3>\n<ul>\n<li>Blocks malware downloads<\/li>\n<li>Stopps phishing and zero-day-phishing<\/li>\n<li>Prevents man-in-the-middle-attacks<\/li>\n<li>Recognizes advanced jailbreaking and rooting techniques<\/li>\n<li>Detects OS vulnerabilities (CVE) and misinformation<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lo8bg51z-10c549772e344595ed9f0a515c61c15f\">\n.flex_cell.av-lo8bg51z-10c549772e344595ed9f0a515c61c15f{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-lo8bg51z-10c549772e344595ed9f0a515c61c15f{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-lo8bg51z-10c549772e344595ed9f0a515c61c15f av-gridrow-cell av_one_third no_margin  avia-builder-el-18  el_after_av_cell_one_third  el_before_av_cell_one_third  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lo8bgtyj-7aa478290f2e9381f4049e9af2901201 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Advantages with Harmony Mobile:<\/h3>\n<ul>\n<li>Seamless cyber defence<\/li>\n<li>Unrestricted control<\/li>\n<li>Defence against mobile threats<\/li>\n<li>Automatic isolation of infected devices<\/li>\n<li>User-friendly operation<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kc146v-d8256f92b9e03bda5d38f46ee4cef815\">\n.flex_cell.av-kc146v-d8256f92b9e03bda5d38f46ee4cef815{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-kc146v-d8256f92b9e03bda5d38f46ee4cef815{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-kc146v-d8256f92b9e03bda5d38f46ee4cef815 av-gridrow-cell av_one_third no_margin  avia-builder-el-20  el_after_av_cell_one_third  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lo8bi8ma-336c22071447bb328f54de1e9952bfac '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Advantages with integration with IKARUS mobile.management:<\/h3>\n<ul>\n<li>Immediate response to vulnerabilities or security incidents<\/li>\n<li>Enables enforcement of updates and patches<\/li>\n<li>Supports &#8220;conditional access&#8221; &#8211; access rules for infected\/vulnerable devices<\/li>\n<li>Network scanning for added security<\/li>\n<li>Zero touch integration<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-5'  class='av-layout-grid-container av-rr8gnv-10-55949f49c9d93d1390f92d01030c67a4 entry-content-wrapper main_color av-flex-cells  avia-builder-el-22  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-44368r-e19fc3b78b0c777c06f393e19db316e8\">\n.flex_cell.av-44368r-e19fc3b78b0c777c06f393e19db316e8{\nvertical-align:middle;\n}\n.responsive #top #wrap_all .flex_cell.av-44368r-e19fc3b78b0c777c06f393e19db316e8{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-44368r-e19fc3b78b0c777c06f393e19db316e8 av-gridrow-cell av_one_full no_margin  avia-builder-el-23  avia-builder-el-no-sibling  content-align-middle'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-8-006b28938aadbd11f024893cf9430d16 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Contact us for a personal consultation!<\/h3>\n<p>Phone: +43 1 58995-500 | email : <a href=\"mailto:sales@ikarus.at\">sales@ikarus.at<\/a><\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":4310,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[],"class_list":["post-31206","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Harmony Mobile - IKARUS Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/harmony-mobile\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Harmony Mobile - IKARUS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/harmony-mobile\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-02T10:41:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/harmony-mobile\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/harmony-mobile\\\/\",\"name\":\"Harmony Mobile - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\"},\"datePublished\":\"2023-11-08T08:50:23+00:00\",\"dateModified\":\"2024-12-02T10:41:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/harmony-mobile\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/harmony-mobile\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/harmony-mobile\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security Solutions\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Harmony Mobile\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ikarusantivirussoftware\",\"https:\\\/\\\/x.com\\\/ikarusantivirus\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ikarus-security-software-gmbh\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/ikarussecuritysoftwaregmbh\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Harmony Mobile - IKARUS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/harmony-mobile\/","og_locale":"en_US","og_type":"article","og_title":"Harmony Mobile - IKARUS Security","og_url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/harmony-mobile\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_modified_time":"2024-12-02T10:41:32+00:00","twitter_card":"summary_large_image","twitter_site":"@ikarusantivirus","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/harmony-mobile\/","url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/harmony-mobile\/","name":"Harmony Mobile - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"datePublished":"2023-11-08T08:50:23+00:00","dateModified":"2024-12-02T10:41:32+00:00","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/harmony-mobile\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/harmony-mobile\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/harmony-mobile\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"IT Security Solutions","item":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/"},{"@type":"ListItem","position":3,"name":"Harmony Mobile"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/31206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=31206"}],"version-history":[{"count":19,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/31206\/revisions"}],"predecessor-version":[{"id":37275,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/31206\/revisions\/37275"}],"up":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/4310"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=31206"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=31206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}