Try our new research platform with insights from 80,000+ expert users
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Great encryption, MKA, and browser isolation capabilities
Pros and Cons
  • "It provides end-to-end encryption for the communication between the user's device and the remote browser, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks."
  • "The solution needs greater automation to reduce the need for manual configuration and management."

What is our primary use case?

Check Point Harmony Browse is a browser isolation solution that aims to protect organizations against web-borne threats. It uses a remote browser to securely render web pages and deliver them to the end user, isolating the user's device from any potential threats.

The use case of Check Point Harmony Browse is to protect organizations against web-borne threats such as malware, phishing, and other types of cyber attacks. 

It can be especially useful for organizations that have a high level of web-based activities such as online banking, and e-commerce, or those working with sensitive data.

How has it helped my organization?

One way it can improve an organization is by providing a secure way of accessing web-based resources, as it isolates the user's device from potential threats. This can help to reduce the risk of data breaches or other security incidents caused by web-borne threats.

Another way it can improve an organization is by providing a secure way of accessing web-based resources for employees, contractors, and partners who need to access web-based resources while working remotely. This can increase productivity and allow employees to be more flexible in their work arrangements. 

What is most valuable?

The most valuable aspects of the solution include: 

Browser isolation. This feature allows organizations to use a remote browser to securely render web pages and deliver them to the end user, isolating the user's device from any potential threats.

Multi-factor authentication. This feature allows organizations to use a combination of authentication methods such as certificates, tokens, biometric authentication, and user credentials to secure access to web-based resources.

Encryption. This feature provides end-to-end encryption for the communication between the user's device and the remote browser, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks. 

What needs improvement?

Areas for improvement include:

Greater automation to reduce the need for manual configuration and management.

Improved scalability by allowing the solution to handle larger numbers of users and devices without a significant impact on performance.

Advanced reporting and analytics capabilities in order to have more detailed visibility into security incidents and events and allow for better decision-making.

An enhanced user experience by allowing users to have a seamless browsing experience with minimal latency and interruption. 

Buyer's Guide
Check Point Harmony Browse
November 2024
Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Assistant Manager at ASCI
User
Secure with great next-gen zero-day phishing and zero-day malware features
Pros and Cons
  • "Its potential features of Threat Detection and Threat Emulation have helped businesses to browse securely hassle-free without any tension."
  • "More focus and emphasis is required on customization and real-time notification and alert system."

What is our primary use case?

Check Point Harmony Browse is the one-stop shop for ensuring end-to-end security while browsing online from anywhere, anytime. It helps in providing strict security to browsing access and content for the workforce sitting remotely and on the premises. Half of our workforce is working through Hybrid mode, and before the introduction of Check Point Browse, it became extremely difficult for us to monitor and ensure secure browsing and working in online mode across different platforms.

Due to Check Point Browse security solutions, we now feel more confident in working online, and there is no fear about malware attacks and phishing attempts on our IT system and mobile devices precisely. All our data security is intact with Check Point Browse.

How has it helped my organization?

Check Point Harmony Browse became everyone's favorite in no time. It helped my IT team to develop capabilities and ensure easy deployment and integration of Check Point Browse with other third-party vendors and client applications to ensure that there is no lapse in security checks and all the working data is secure from any malware attacks. 

It boosted our compliance and audit reporting, and now we receive fewer observations from the audit and compliance desk as they can see that there is an advanced IT security mechanism in place with equal capability to monitor 24/7 for the remote and on-premise workforce. Certainly, it leads to the attraction of more new clients on board and greater client satisfaction in the end.

What is most valuable?

It offers safe access to the internet anywhere, anytime due to advanced next-gen zero-day phishing and zero-day malware features, ensuring malware-free downloading of any kind of content from any internet website.

This has created a technological revolution in 100% web security due to advanced and proactive threat detection from anywhere on the internet and warns the user of its potential to harm IT systems.

Its potential features of Threat Detection and Threat Emulation have helped businesses to browse securely hassle-free without any tension, and also it helps the users to ensure no data breach happened in an insecure internet environment. Check Point Browse is an expert in diffusing internet threats within a fraction of a second.

Highly integrated and user-friendly secure browsing solution, accepted globally by all 

What needs improvement?

Check Point Browse is doing a fantastic job and doing great justice to the IT world. 

More focus and emphasis is required on customization and real-time notification and alert system. The system is there, however, it needs more strengthening and robustness to cater to the business requirements in the quickest and most accurate manner.

Also, a strong push is required on research and technological intervention to understand the emerging market demand and customize our present and future upcoming solutions so that there is no hassle in deployment and integration of the software/platform across any channel and can be done smoothly.

For how long have I used the solution?

I've used the solution for almost three to six months now.

What do I think about the stability of the solution?

The solution offers high intensity and stability.

What do I think about the scalability of the solution?

This is a fantastic scalable solution.

How are customer service and support?

The support is amazing and commendable.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Kaspersky Internet Security solutions earlier and switched to Check Point as it's now a well-known and recognized name in the market and offers great offerings end-to-end at a reasonable cost. There is no cost burden on small, medium, and marginalized organizations.

How was the initial setup?

The solution is easy and straightforward.

What about the implementation team?

We implemented the setup with the help of a vendor.

What was our ROI?

The ROI is amongst the best.

What's my experience with pricing, setup cost, and licensing?

I recommend all to start using Check Point Harmony Browse as it's the best available security software in the market currently. It will never disappoint you on anything. They are the leading market player now and will capture half of the market quickly due to their agility and high business ethical attitude. Their solutions are cost-effective and save our pockets from high burnout. 

Licensing is easy and trouble-free. 

Which other solutions did I evaluate?

We evaluated software like Quick Heal, AVG Antivirus, and other solutions to meet our requirements.

What other advice do I have?

Check Point Harmony Browse will secure your system 100% in no time, and there are 24/7/365 days of security on systems, servers, and devices in on-premise and remote mode. 

The monitoring process through the desktop would be an effortless activity, and all monitoring insights will be presented through a dashboard in real-time so that no lapse occurs at all.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Browse
November 2024
Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Top 5Leaderboard
Good for validation and control with helpful security aspects
Pros and Cons
  • "Its content filtering is great."
  • "I would like the solution to be implemented more easily for teams and directly on Android or iOS devices."

What is our primary use case?

Currently, with the mobility that we have within different teams, and the different internal organizations that have been deployed to work from home, we worry about opening ourselves up to security breaches when users work from home or in places outside the organization.

We have been adopting Harmony services for much of the team and departments that do telework.

How has it helped my organization?

When users are working off-site, we've found it is important to have reporting that is very important in order to validate, control, and determine if the users are working in a corresponding way. We want to be able to give them protection as long as it is established that they have the power or the capacity to work outside the institution. This solution has allowed us to give users secure access to pages, addresses, and resources that can now be accessed inside or outside our institution while always maintaining security guidelines.

What is most valuable?

Its content filtering is great. It protects the information of our institution and the personal data of the users, meaning that this solution always maintains the privacy of the data at all times. It's not invasive or created in such a way that it would bother the end users when using it. The data can be filtered or exposed in the Harmony browser and we can use it with total flexibility. The security and the filtering that they have It is really efficient.

What needs improvement?

I would like the solution to be implemented more easily for teams and directly on Android or iOS devices. That way, we could provide teams with devices like tablets.  

They have become a technological ally for people who have greater mobility. As long as they have easier portability, we'd be happier. We need a solution with applications directly installed on cell phones in a more native way that allows for allowing web browsing, thus helping, and always contributing to device security.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 5Leaderboard
Great protection, good notifications, and helpful analysis of threats
Pros and Cons
  • "It analyzes and verifies in detail how secure or insecure a file, document, or object is that is being downloaded."
  • "Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies."

What is our primary use case?

In my experience, since the beginning of the pandemic, we have been adopting better security measures mainly due to the fact that we have more users who are working outside the perimeter of our organization. They are working from home or some other country or place more often now.

For this reason and to protect these users, most of whom are people who are not computer technicians and whose knowledge and experience in malicious or unsafe places is less, we have implemented Check Point Harmony Browse to help keep users safe.

How has it helped my organization?

One of the great advantages is being able to ensure that each of our users is protected from the best browsing solution. Many times we applied the antivirus and protected the equipment, however, we leave aside that these threats arrive many times through browsers. Harmony Browse gives us the protection before accessing an address or trying to download X content from a site. And it always notifies us, which contributes to the learning of the less experienced.

What is most valuable?

Being able to have a tool that analyzes and emulates any activity that may occur from a downloaded document is of great value. It analyzes and verifies in detail how secure or insecure a file, document, or object is that is being downloaded. It provides value. 

Another important feature that many can ignore is its large number of notifications. For less experienced users, these are helpful as they help teach and properly guide users.

What needs improvement?

It is one of the best solutions, however, with respect to its support in IOS and Android, it can improve a little more.

Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies.

Its guides are identical to the existing ones. These guides need to be updated and improved in terms of their design. 

For how long have I used the solution?

We've used the solution for the last two years.

Which solution did I use previously and why did I switch?

We did not previously use a different solution. 

What's my experience with pricing, setup cost, and licensing?

Check Point is a very good brand. However, its cost is high> that said, it complies with what each of its products says it will do.

Which other solutions did I evaluate?

We did not previously evaluate other options. 

What other advice do I have?

I'd advise users to test the solution. It will really help you to have more security for each of your users inside and outside your organization. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Security Consultant at Synergy
Reseller
Top 5Leaderboard
A cloud solution for detecting download files and phishing websites with reasonable pricing
Pros and Cons
  • "The product is stable."
  • "The URL filtering database should be improved."

What is our primary use case?

The solution helps us to detect download files, phishing websites, and access to non-compliant websites.

What is most valuable?

The essential feature of Harmony Browse is SEO phishing. Also, it has improved security.

What needs improvement?

The URL filtering database and website restriction should be improved.

For how long have I used the solution?

I have been using Harmony Browse as a distributor.

What do I think about the stability of the solution?

The product is stable.

What do I think about the scalability of the solution?

We cater the solution to enterprise businesses.

How was the initial setup?

The initial setup and its configuration are easy.

The tool’s deployment on a computer takes ten minutes.

What's my experience with pricing, setup cost, and licensing?

The product has a reasonable pricing.

What other advice do I have?

Harmony Browse is a part of the Check Point Harmony Endpoint security suite. It protects the endpoints.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
PeerSpot user
reviewer1112463 - PeerSpot reviewer
Security Solutions Architect at a computer software company with 201-500 employees
Reseller
Top 20
Provides firewall protection and private dev browsing with accuracy

What is our primary use case?

We use the solution for firewall protection and private dev browsing.

How has it helped my organization?

The edge filtering and protection are at the border.

What is most valuable?

Accuracy is probably one of the top requirements or features. It lowers the incidence of malware or malicious software. It's easy to navigate and relatively intuitive.

What needs improvement?

Pricing could be better.

For how long have I used the solution?

I have been using Check Point Harmony Browse for five years.

How was the initial setup?

The initial setup does not take a long time.

I rate the initial setup as four out of five.

What's my experience with pricing, setup cost, and licensing?

It has moderate pricing.

What other advice do I have?

Maintenance is relatively easy.  I was able to resolve challenges with the online knowledge base.

It is a product worth of consideration and implementation.

Overall, I rate the solution an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Web administration is great, great secure tool.
Pros and Cons
  • "Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance."
  • "It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow."

What is our primary use case?

Teleworking and the mobility of users led us to understand that we needed to improve the security of the user and of the team. We also implemented this tool through a super light agent.   

How has it helped my organization?

The downloads were completely safe from the browsers. Its great virtue is its security from the start of the download itself in the browser.

We also established policies in a granular way. We create user profiles for different types of blocking or web access, to guarantee that we can protect users and managers.

What is most valuable?

Check Point Harmony Browse came to innovate security from the browser. I will comment on the best virtues of the tool:

1. Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance.

2. Its protection against modern threats such as credential theft is incredible. With this feature, you can browse with confidence knowing that your accounts are safe.

3. Its administration portal through Check Point Infinity is incredible, really intuitive, and easy to implement for users.

What needs improvement?

There are few improvements. No manufacturer is perfect. It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow. They can improve the performance, and it would be even more amazing.

The documentation of these tools is scarce. They could share more of the new tools at a public level.

The costs are competitive. However, they are only accessible through a partner. It would be better if they were public to make references against other products and make decisions.

For how long have I used the solution?

This Check Point tool, used in recent years, is modern and is great for identity security.

Which solution did I use previously and why did I switch?

We did not know a tool with these qualities.

What's my experience with pricing, setup cost, and licensing?

It is important to find a Check Point partner, validate costs, request documentation, and take a proof of concept. That would be my recommendation before purchasing the product.

Which other solutions did I evaluate?

Our partner told us about this tool. We immediately validated the market, verified costs, and made the decision. It really wasn't difficult due to everything that Check Point represents.

What other advice do I have?

It is a very good tool, however, not necessary for everyone, since some companies already have other tools that provide security at this point. However, I recommend trying it.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1931475 - PeerSpot reviewer
Associate Technical Manager at TrustArc
Vendor
Top 20
Great support, cutting-edge technology, and good security
Pros and Cons
  • "It gives our customers a sense of security they might not have found anywhere else."
  • "Having local support everywhere in the world would be helpful."

What is our primary use case?

We provide services to clients that have to do with their websites. For a company like ours, we needed a product that could safeguard our workstations.  

We need to provide our customers with a safe and secure environment to win their business, and choosing Check Point Harmony Browse was and still is the best decision we've made. 

It gives our customers a sense of security they might not have found anywhere else. 

Since our move to Check Point Harmony, our client relationship has improved dramatically.

How has it helped my organization?

Since our move to Check Point Harmony, our client relationship has improved by quite a bit. Our trust rating has gone up immensely, and we couldn't even fathom the level of change we experienced until one of our clients mentioned it. 

We were hesitant to make this change in the beginning. However, we all have finally agreed to finalize the switch, and we have not looked back. 

The support was also very different from what we were used to; they go above and beyond to make sure that our concerns are fixed in no time.

What is most valuable?

Their support is top-notch, and their technology is cutting-edge. We had a little problem when it came to deployment. However, their support has helped us throughout the entire process. They also educated us and answered all our questions, even though some of them may have sounded ignorant. We appreciate a great support team, which has been a great factor in deciding to stay with them and renew our product. They're easy to reach out to and will not stop until all our issues are resolved. 

What needs improvement?

They can maybe improve the deployment strategy.

Having local support everywhere in the world would be helpful. 

Our deployment has taken a while to complete as there were some issues with the OS we were using. This was handled by their support team with great success; however, it would have been best if it was completed in the time frame that was originally discussed. We're still very happy with the overall support that we are getting, and that's really all we can ask for.

For how long have I used the solution?

I've used the solution for over a year.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Browse Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Check Point Harmony Browse Report and get advice and tips from experienced pros sharing their opinions.