Try our new research platform with insights from 80,000+ expert users
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Great encryption, MKA, and browser isolation capabilities
Pros and Cons
  • "It provides end-to-end encryption for the communication between the user's device and the remote browser, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks."
  • "The solution needs greater automation to reduce the need for manual configuration and management."

What is our primary use case?

Check Point Harmony Browse is a browser isolation solution that aims to protect organizations against web-borne threats. It uses a remote browser to securely render web pages and deliver them to the end user, isolating the user's device from any potential threats.

The use case of Check Point Harmony Browse is to protect organizations against web-borne threats such as malware, phishing, and other types of cyber attacks. 

It can be especially useful for organizations that have a high level of web-based activities such as online banking, and e-commerce, or those working with sensitive data.

How has it helped my organization?

One way it can improve an organization is by providing a secure way of accessing web-based resources, as it isolates the user's device from potential threats. This can help to reduce the risk of data breaches or other security incidents caused by web-borne threats.

Another way it can improve an organization is by providing a secure way of accessing web-based resources for employees, contractors, and partners who need to access web-based resources while working remotely. This can increase productivity and allow employees to be more flexible in their work arrangements. 

What is most valuable?

The most valuable aspects of the solution include: 

Browser isolation. This feature allows organizations to use a remote browser to securely render web pages and deliver them to the end user, isolating the user's device from any potential threats.

Multi-factor authentication. This feature allows organizations to use a combination of authentication methods such as certificates, tokens, biometric authentication, and user credentials to secure access to web-based resources.

Encryption. This feature provides end-to-end encryption for the communication between the user's device and the remote browser, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks. 

What needs improvement?

Areas for improvement include:

Greater automation to reduce the need for manual configuration and management.

Improved scalability by allowing the solution to handle larger numbers of users and devices without a significant impact on performance.

Advanced reporting and analytics capabilities in order to have more detailed visibility into security incidents and events and allow for better decision-making.

An enhanced user experience by allowing users to have a seamless browsing experience with minimal latency and interruption. 

Buyer's Guide
Check Point Harmony Browse
January 2025
Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IdoSarusi - PeerSpot reviewer
Developer at Shavit-security
Reseller
Top 5
Has a feature that allows users to check the extensions installed in their browser
Pros and Cons
  • "Check Point Harmony Browse has a feature that allows users to check the extensions installed in their browser. This feature is valuable because hackers may install malicious extensions on a target computer without the user's knowledge. When browsing, users are often less aware of the extensions installed in their browsers, making it easier for malicious extensions to go unnoticed. By providing visibility into installed extensions, Check Point Harmony Browse enhances security by allowing users to identify and remove potentially harmful extensions."

    What is our primary use case?

    I have installed Check Point to secure my personal computer.

    What is most valuable?

    Check Point Harmony Browse has a feature that allows users to check the extensions installed in their browser. This feature is valuable because hackers may install malicious extensions on a target computer without the user's knowledge. When browsing, users are often less aware of the extensions installed in their browsers, making it easier for malicious extensions to go unnoticed. By providing visibility into installed extensions, Check Point Harmony Browse enhances security by allowing users to identify and remove potentially harmful extensions.

    The UI will be great. A good UI that displays threats and recent findings and allows for reporting events, even if the threat is blocked, will enhance understanding for network administrators. They can pinpoint the originating computer and track the event to its end. Additionally, if it's a Check Point link, it can be detected.

    What needs improvement?

    One of the challenges addressed by Check Point Harmony Browse is the threat posed by employees, partners, or other individuals who inadvertently click on or are targeted by malicious links or malware. Check Point Harmony Browse efficiently detects such links, blocks them, and alerts administrators or users who clicked on them, providing timely protection against potential threats

    For how long have I used the solution?

    I have been using Check Point Harmony Browse for five years.

    What do I think about the stability of the solution?

    I rate the solution’s stability a ten out of ten.

    What do I think about the scalability of the solution?

    The solution is scalable. 15 users are using this solution.

    How was the initial setup?

    The initial setup is easy and takes a few minutes to complete. It's just an extension. I rate the initial setup a ten out of ten, where one is difficult and ten is easy.

    What's my experience with pricing, setup cost, and licensing?

    The solution has a reasonable pricing.

    What other advice do I have?

    Check Point Harmony Browse's threat prevention is quite effective. Many times, I test it myself by setting up a free website and sending it to my computer to see if it detects threats when I click on it. It consistently detects threats efficiently, meeting expectations.

    Harmony Browse integrates seamlessly with your existing security infrastructure. It leverages Check Point's extensive experience and products in cybersecurity. Notably, it operates without requiring additional software on the user's device for malware and phishing detection, functioning like an antivirus solution. Our experience with Harmony Browse has met and even exceeded our expectations.

    I recommend that even if the product is good, opting for the Business-only option is essential. The CEO wants to install it on the company's computers and deploy it. Engaging with employees who will experience the installation on their computers is crucial. They need to understand the importance of cybersecurity and avoid phishing attacks by not clicking on suspicious links. This is vital because attackers often target individuals rather than the computer itself.

    Overall, I rate the solution a ten out of ten.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Check Point Harmony Browse
    January 2025
    Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
    831,265 professionals have used our research since 2012.
    Jonathan Ramos G. - PeerSpot reviewer
    Cloud Engineer at ITQS
    Real User
    Great protection, good notifications, and helpful analysis of threats
    Pros and Cons
    • "It analyzes and verifies in detail how secure or insecure a file, document, or object is that is being downloaded."
    • "Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies."

    What is our primary use case?

    In my experience, since the beginning of the pandemic, we have been adopting better security measures mainly due to the fact that we have more users who are working outside the perimeter of our organization. They are working from home or some other country or place more often now.

    For this reason and to protect these users, most of whom are people who are not computer technicians and whose knowledge and experience in malicious or unsafe places is less, we have implemented Check Point Harmony Browse to help keep users safe.

    How has it helped my organization?

    One of the great advantages is being able to ensure that each of our users is protected from the best browsing solution. Many times we applied the antivirus and protected the equipment, however, we leave aside that these threats arrive many times through browsers. Harmony Browse gives us the protection before accessing an address or trying to download X content from a site. And it always notifies us, which contributes to the learning of the less experienced.

    What is most valuable?

    Being able to have a tool that analyzes and emulates any activity that may occur from a downloaded document is of great value. It analyzes and verifies in detail how secure or insecure a file, document, or object is that is being downloaded. It provides value. 

    Another important feature that many can ignore is its large number of notifications. For less experienced users, these are helpful as they help teach and properly guide users.

    What needs improvement?

    It is one of the best solutions, however, with respect to its support in IOS and Android, it can improve a little more.

    Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies.

    Its guides are identical to the existing ones. These guides need to be updated and improved in terms of their design. 

    For how long have I used the solution?

    We've used the solution for the last two years.

    Which solution did I use previously and why did I switch?

    We did not previously use a different solution. 

    What's my experience with pricing, setup cost, and licensing?

    Check Point is a very good brand. However, its cost is high> that said, it complies with what each of its products says it will do.

    Which other solutions did I evaluate?

    We did not previously evaluate other options. 

    What other advice do I have?

    I'd advise users to test the solution. It will really help you to have more security for each of your users inside and outside your organization. 

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Cloud Support at a tech company with 1-10 employees
    User
    Top 5Leaderboard
    Web administration is great, great secure tool.
    Pros and Cons
    • "Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance."
    • "It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow."

    What is our primary use case?

    Teleworking and the mobility of users led us to understand that we needed to improve the security of the user and of the team. We also implemented this tool through a super light agent.   

    How has it helped my organization?

    The downloads were completely safe from the browsers. Its great virtue is its security from the start of the download itself in the browser.

    We also established policies in a granular way. We create user profiles for different types of blocking or web access, to guarantee that we can protect users and managers.

    What is most valuable?

    Check Point Harmony Browse came to innovate security from the browser. I will comment on the best virtues of the tool:

    1. Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance.

    2. Its protection against modern threats such as credential theft is incredible. With this feature, you can browse with confidence knowing that your accounts are safe.

    3. Its administration portal through Check Point Infinity is incredible, really intuitive, and easy to implement for users.

    What needs improvement?

    There are few improvements. No manufacturer is perfect. It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow. They can improve the performance, and it would be even more amazing.

    The documentation of these tools is scarce. They could share more of the new tools at a public level.

    The costs are competitive. However, they are only accessible through a partner. It would be better if they were public to make references against other products and make decisions.

    For how long have I used the solution?

    This Check Point tool, used in recent years, is modern and is great for identity security.

    Which solution did I use previously and why did I switch?

    We did not know a tool with these qualities.

    What's my experience with pricing, setup cost, and licensing?

    It is important to find a Check Point partner, validate costs, request documentation, and take a proof of concept. That would be my recommendation before purchasing the product.

    Which other solutions did I evaluate?

    Our partner told us about this tool. We immediately validated the market, verified costs, and made the decision. It really wasn't difficult due to everything that Check Point represents.

    What other advice do I have?

    It is a very good tool, however, not necessary for everyone, since some companies already have other tools that provide security at this point. However, I recommend trying it.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Edwin Solano Salmeron - PeerSpot reviewer
    Soporte técnico superior at Acobo
    Real User
    Top 5Leaderboard
    Good for validation and control with helpful security aspects
    Pros and Cons
    • "Its content filtering is great."
    • "I would like the solution to be implemented more easily for teams and directly on Android or iOS devices."

    What is our primary use case?

    Currently, with the mobility that we have within different teams, and the different internal organizations that have been deployed to work from home, we worry about opening ourselves up to security breaches when users work from home or in places outside the organization.

    We have been adopting Harmony services for much of the team and departments that do telework.

    How has it helped my organization?

    When users are working off-site, we've found it is important to have reporting that is very important in order to validate, control, and determine if the users are working in a corresponding way. We want to be able to give them protection as long as it is established that they have the power or the capacity to work outside the institution. This solution has allowed us to give users secure access to pages, addresses, and resources that can now be accessed inside or outside our institution while always maintaining security guidelines.

    What is most valuable?

    Its content filtering is great. It protects the information of our institution and the personal data of the users, meaning that this solution always maintains the privacy of the data at all times. It's not invasive or created in such a way that it would bother the end users when using it. The data can be filtered or exposed in the Harmony browser and we can use it with total flexibility. The security and the filtering that they have It is really efficient.

    What needs improvement?

    I would like the solution to be implemented more easily for teams and directly on Android or iOS devices. That way, we could provide teams with devices like tablets.  

    They have become a technological ally for people who have greater mobility. As long as they have easier portability, we'd be happier. We need a solution with applications directly installed on cell phones in a more native way that allows for allowing web browsing, thus helping, and always contributing to device security.

    For how long have I used the solution?

    I've used the solution for one year.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    PeerSpot user
    IT Security at Akros Tech
    Real User
    Reduces vulnerabilities, easy to implement and has an excellent nano agent
    Pros and Cons
    • "This tool installs a very small agent in browsers. It does not cause performance problems on the host computer, which makes it less annoying for users."
    • "Support must be faster in solving problems."

    What is our primary use case?

    Check Point Harmony Browse has been used by our company to provide security in the browsers of user computers that work remotely. They connect from many places, some with a lot of security, others with too many vulnerabilities. We needed to provide advanced security to these teams with a reliable tool, which could help protect against phishing, malware, and especially ransomware - since it is one of the most damaging threats today. This tool fulfills what we were looking for in an incredible way.

    How has it helped my organization?

    Previously, we had many vulnerabilities with the files downloaded by users through their browsers. Sometimes they were malware and sometimes ransomware. Since they were not in the perimeter, they were easy targets for these modern threats. However, thanks to this powerful tool, we have achieved the business security that we required.

    This tool installs a very small agent in browsers. It does not cause performance problems on the host computer, which makes it less annoying for users.

    With this, we have improved and secured the company's computers from anywhere against these threats.

    What is most valuable?

    We value the entire Check Point Harmony Browse tool. One of its greatest benefits is the ease of implementation. Its nano agent is incredible; it securely protects all devices.

    The administration from the centralized Infinity Portal provides an additional plus for the IT department since, in addition to being centralized, it is very intuitive. This benefits the administration and the time spent by the engineers during an event or in the case of daily management.

    As for the costs, it seems pretty comfortable.

    What needs improvement?

    Check Point has always been a constant tool, with its new tools, it has taken a lot of advantage over its competition. However, there are always features that need improvement, for example:

    1. Support must be faster in solving problems. Sometimes it takes many days to have a solution.

    2. Check Point could put more facilities in its manuals and documentation, including more graphics to make it simple for the client.

    3. The prices are only visible through a partner. It would also be good to be able to see them publicly.

    For how long have I used the solution?

    This is a great simple security tool for browsers that is easy to install an has been used throughout this year (2022).

    Which solution did I use previously and why did I switch?

    It is such a punctual tool. It is easy to use and so powerful in a way that we have not seen in other manufacturers. That's why we love Check Point.

    What's my experience with pricing, setup cost, and licensing?

    It is important to assess the costs and scope of the solution in order to meet the needs of the clients.

    Which other solutions did I evaluate?

    We evaluated tools, that were not the same, from other manufacturers such as Cisco and Fortinet. However, we chose Check Point Harmony browse for all its features and security power.

    What other advice do I have?

    I'd advise people to try the tool. Personally, I was amazed.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    reviewer1112463 - PeerSpot reviewer
    Security Solutions Architect at a computer software company with 201-500 employees
    Reseller
    Top 20
    Provides firewall protection and private dev browsing with accuracy

    What is our primary use case?

    We use the solution for firewall protection and private dev browsing.

    How has it helped my organization?

    The edge filtering and protection are at the border.

    What is most valuable?

    Accuracy is probably one of the top requirements or features. It lowers the incidence of malware or malicious software. It's easy to navigate and relatively intuitive.

    What needs improvement?

    Pricing could be better.

    For how long have I used the solution?

    I have been using Check Point Harmony Browse for five years.

    How was the initial setup?

    The initial setup does not take a long time.

    I rate the initial setup as four out of five.

    What's my experience with pricing, setup cost, and licensing?

    It has moderate pricing.

    What other advice do I have?

    Maintenance is relatively easy.  I was able to resolve challenges with the online knowledge base.

    It is a product worth of consideration and implementation.

    Overall, I rate the solution an eight out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
    Flag as inappropriate
    PeerSpot user
    Coordinador at oesia
    User
    Good protection, great threat extraction capabilities, and good at detection
    Pros and Cons
    • "This solution has multiple protections that are generally very simple to configure and work quickly with little intrusiveness for the user."
    • "The ease of handling should be improved, as it is currently intrusive and some users don't like it."

    What is our primary use case?

    This solution is essential to protect browsing against zero-day malware and zero-day phishing in a simple and easy-to-manage way. 

    With this solution, users can browse without worries, focusing on their work and not on security. In addition, this solution is available for all common systems (Windows, Mac, and Chrome OS), so you can avoid big scares with it.

    This solution is easily managed from a console in the cloud and only requires deploying an extension in browsers, which facilitates its administration.

    How has it helped my organization?

    With this solution, users' browsing is automatically protected against zero-day phishing and zero-day malware, all with almost no configuration required. In addition, you can monitor that corporate passwords are not reused, which further reduces the chances of falling into phishing.

    All these protections are maintained wherever the user is, which makes it perfect for teleworking.

    In my particular case, unfortunately, only a few of us in the organization have this solution installed. The rest of the users continue with these threats.

    What is most valuable?

    This solution has multiple protections, with Zero-phishing being the most different from the rest of the solutions on the market since it is capable of detecting and blocking all new phishing attacks quickly and easily.

    The second most differentiating factor that offers effective protection is Threat Extraction. It allows us to safely download any document in a few seconds, eliminating their active content and thus avoiding the risk of malware. If the original document is necessary, it can be downloaded after the file is analyzed by its advanced sandbox system.

    What needs improvement?

    This solution has multiple protections that are generally very simple to configure and work quickly with little intrusiveness for the user. In the case of document download zero-day threat protection, Threat Extraction, this is not exactly the case. 

    It works very well, however, it is very annoying for users, since it does not always work in the same way and sometimes it makes it show you the same window twice for each file to indicate where you want to save it. The ease of handling should be improved, as it is currently intrusive and some users don't like it.

    For how long have I used the solution?

    I've used the solution for about seven years.

    What do I think about the stability of the solution?

    It is very stable and only has a few times a year where the console cannot be accessed, although the solution still works due to updates.

    What do I think about the scalability of the solution?

    It is a very scalable solution since the client is very light and the management is done from a console in the cloud.

    How are customer service and support?

    The customer service is very good, however, the support is somewhat slow and heavy.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have tried several solutions and this seems to me the most complete and safest.

    How was the initial setup?

    The initial configuration is done in about ten minutes and then all you have to do is load the extension in the browsers.

    What about the implementation team?

    We implemented the solution internally.

    What was our ROI?

    By being able to avoid a first virus or phishing, ROI is achieved.

    What's my experience with pricing, setup cost, and licensing?

    It is an economic solution and very focused on the protection of navigation. It is also easy to configure, deploy, and manage.

    Which other solutions did I evaluate?

    We also looked at Crowdstrike, Symantec, Bitdefender, Netscope, and AVG.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company has a business relationship with this vendor other than being a customer: I work with this and other providers, always looking for the best solutions for our clients.
    PeerSpot user