We use it for multiple purposes. It's for securing the endpoints. We have about 200 endpoints added to this solution and being maintained. Its server is cloud-based and here our in-house IT team takes care of the installation and configuration on endpoints. We are required to secure our endpoint from any external attacks. It's also well controlled so that only required access is to be given to end-users. Whether it's about blocking unwanted websites or port blocking, we use the solution to manage everything.
Assitant Manager - IT Support at a outsourcing company with 1,001-5,000 employees
Great for securing endpoints with good anti-malware and port protection
Pros and Cons
- "It's great for securing our endpoints from any external attacks."
- "Tech Support must be better."
What is our primary use case?
What is most valuable?
The anti-malware and port protection, etc., are good. We have about 200 endpoints on this solution being maintained. We like that its server is cloud-based and that our in-house IT team can handle the installation and configuration on endpoints. It's great for securing our endpoints from any external attacks. We can control access to end-users.
What needs improvement?
Tech Support must be better. Whenever we log a case for any issue it takes too much time to get it sorted. There should be escalation by default. If the case is not being sorted quickly, it must get internally escalated to the team who are experts and they should be empowered to jump in to get the issue fixed. Many times, we have to be on it for weeks to come to a proper resolution.
Website blocking and endpoint levels are still a challenge and there needs to be a more sophisticated solution. We are looking forward to having this product work more efficiently.
For how long have I used the solution?
We have been using Harmony Endpoint for over six Months.
Buyer's Guide
Check Point Harmony Endpoint
December 2024
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
How are customer service and support?
Tech Support needs improvement.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security Specialist at a tech services company with 11-50 employees
Has a great encapsulation system but could use better support ticketing
Pros and Cons
- "The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists."
- "In terms of improvement, the ticketing system could be better. It is a little tricky to try to open a case and give it to an engineer."
What is our primary use case?
Our company uses Harmony Endpoint for encryption and encapsulation. Our clients use it for data encryption.
What is most valuable?
The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists.
What needs improvement?
In terms of improvement, the ticketing system could be better.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for about three months.
What do I think about the stability of the solution?
In terms of stability, I would rate it an eight out of ten.
What do I think about the scalability of the solution?
I would rate the scalability of the solution a solid eight out of ten. It could be slightly improved. Approximately 1000 people use Harmony Endpoint at our company. The maintenance is done once a week by a team of three engineers.
How are customer service and support?
In the Harmony series, the products are linked to each other. It is a little tricky when you try to open a case and give it to an engineer because, in our custom environment, we have to access it from their devices. For example, in Harmony Mobile, their Android or iPhone devices have to be used. All of that takes time and it would be good if Check Point could find a better solution to this and create a feature to help us collect logs for the cases. I would rate the support a six out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I'm currently working with Cisco Secure Endpoint and Palo Alto Cortex XDR.
How was the initial setup?
We use both the cloud and on-premise solutions. The initial setup is simple and creating a profile with the agents is easy. We only create agents and direct them to versions of the agents while we integrate them with the process. It only takes about five minutes to deploy one mission.
What was our ROI?
We have seen good results with the solution. If it is used with Linux or Mac, it provides better performance.
What's my experience with pricing, setup cost, and licensing?
Check Point Harmony Endpoint is a subscription-based solution and the pricing is quite reasonable when compared to other solutions on the market. I would give it a nine out of ten in terms of affordability.
What other advice do I have?
My advice to people who are considering using Check Point Harmony Endpoint is to be careful of which version you choose while deploying the solution. You should get the recommended versions for the agents. Otherwise, there will be a lot of problems and soft ticketing. Overall, I would rate Harmony Endpoint a seven out of ten.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer:
Buyer's Guide
Check Point Harmony Endpoint
December 2024
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
Its a nice administrative portal, In Infinity centralize and easy
Pros and Cons
- "We love the reports and monitoring they provide."
- "Infinity Portal sometimes requires more performance."
What is our primary use case?
Check Point Harmony Mobile was provided through an installed agent which has very light protection against malware and ransomware, among others.
In our country, many ransomware threats have been generated at the country level, for which it was worrying that we had kidnapping or encryption of our data. At the management level, the request was given to provide additional security to protect us. The tool has been very good.
We tested this Check Point tool to assess the performance of our endpoints, and shield them safely while increasing the protection of our platforms.
How has it helped my organization?
Our company wanted to provide an additional layer of security for our endpoints. We already manage Check Point with different tools, We have done very well with them and we have validated how Check Point Harmony Endpoint works to protect our endpoint equipment. So far, it works quite well.
We have seen the reports of attempted attacks and we have been able to provide a solution to these vulnerabilities. There is less malware in our infrastructure.
Its characteristics are quite good.
What is most valuable?
The characteristic that most attracts our attention is the administration portal. It doesn't require a management server since its licensing and management are through the Check Point Infinity Portal. It is very intuitive and easy to implement.
The way in which the agent is installed on the computers is very easy, it does not consume almost any performance of the server or final computers, in this way there is no need to worry about increasing resources to be able to protect them with Check Point Harmony Endpoint.
We love the reports and monitoring they provide. It helps us quickly see what vulnerabilities we have on our endpoints.
What needs improvement?
We have few disadvantages or improvement points. However, the Infinity Portal sometimes requires more performance. It is a small detail. However, it could be improved.
On the other hand, it is also essential that the manufacturer improves the public documentation so that users can better understand how it can be implemented with best practices.
Finally, at the support level, we believe that Check Point can improve. Sometimes the answers are provided at dawn, which makes it more challenging to solve.
For how long have I used the solution?
The solution is a very good security tool. It was used this year at a test level and everything works very well.
Which solution did I use previously and why did I switch?
Previously we only had or used Microsoft's antivirus or endpoint, however, we had all non-centralized security. Through this tool, we can centralize everything in the Infinity Check Point Portal.
What's my experience with pricing, setup cost, and licensing?
Licensing is per endpoint, which is why we think is good. The cost is competitive, and its features are very good.
Which other solutions did I evaluate?
We validated several manufacturers, however, we did not want to have separate solutions. It seems to us a better option to have only Check Point.
What other advice do I have?
I recommend this security tool, it is always important to test the tool at the test level to decide if it is what you are looking for.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Head of Security and Operational Risk at Medianet
Great real-time click protection, web filtering, and compatability
Pros and Cons
- "We are able to manage all our endpoints from a single cloud console."
- "It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products."
What is our primary use case?
As a financial company, we use the solution to provide security to our CDE environment and compliance with all PCI requirements. This tool enables us to provide security to the endpoints and also, to comply with local and foreign regulations regarding platform security.
We use this solution to protect all our endpoints, including personal computers and mobile phones.
We have deployed the solution in Windows, Linux servers, workstations, and mobile phones.
We also use the web filter capabilities both on mobile phones and on corporate computers.
How has it helped my organization?
We now have so many capabilities we did not have before, as follows:
- We are able to manage all our endpoints from a single cloud console
- We don't need adicional on-premise servers to run this solution
- The time that the endpoint refresh and identify new policies is very short. It takes seconds and this is a great value for us to fight emerging threats
- We are now able to protect web browsing in all web browsers and also we don't need additional policies to block browsers in private browsing
- The integratión with our SIEM solution was very smooth and the solution provides valuable information for security analysis
What is most valuable?
The most valuable aspects include:
- Web Filtering. This feature is easy to manage, and it applies new policies in seconds.
- Real-time Click Protection. It protects the user from phishing attacks in real time.
- Compatibility with Windows, Linux, Android, and Mac. We don't need additional solution to protect all our endpoint.
- Cloud Management. This feature allows us to reduce our operating burden and also improve our TCO.
We now have the ability to block a compromised machine from the network.
We now have the ability to block in near real-time IOC.
What needs improvement?
It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products.
It would also be great to include FIM capabilities for the Endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products.
It would be great if we could have additional DLP capabilities to identify personal information or any kind of information to comply with regulations that require information protection.
For how long have I used the solution?
I have been using the solution for about three months.
What do I think about the stability of the solution?
We haven't had any problems or downtime since we acquired the solution. It is stable.
What do I think about the scalability of the solution?
The solution is scalable. It is quite simple to add new endpoints to the solution or add additional features, all with zero downtime.
How are customer service and support?
Customer support and channel support are also always willing to help.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have been using McAfee Endpoint protection for about ten years. We were missing so many features and needed additional tools and effort to protect our endpoint.
How was the initial setup?
It took a few minutes to deploy the whole solution.
What about the implementation team?
It was through a vendor. They were experts on the product.
What's my experience with pricing, setup cost, and licensing?
The costs depend on the company size. In my case, I was able to have all the features, including email protection, remote access, mobile protection, and endpoint protection, for a great price.
Which other solutions did I evaluate?
I evaluated Trend Micro and McAfee.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Security Officer at a tech services company with 1,001-5,000 employees
Easy to use with good application control and great endpoint protection
Pros and Cons
- "It is quite easy to use and deploy the agent on endpoints to protect them from bad actors."
- "Sometimes the portal loads slowly which should be improved."
What is our primary use case?
We primarily use the solution for protecting our endpoints from malware. We've provided features to group the endpoints and apply specific policies by including or excluding them in a certain policy group.
It's great for endpoint security and protection. We are using the VPN feature as well to connect to the corporate network of our organization, which is a good feature. It's used for scanning malware and other malicious files on endpoints which greatly enhances our security posture for endpoints, including Windows and Macs and other operating systems as well.
How has it helped my organization?
Check Point Harmony Endpoint benefits a lot to organizations by providing endpoint protection. There is centralized management through the Harmony portal, which is really nice.
It is quite easy to use and deploy the agent on endpoints to protect them from bad actors.
Daily signatures updates are really good and helpful in protecting against zero day vulnerabilities and exploits.
The firewall and application control greatly improves our security posture. End users are unable to install any suspicious or malicious apps in our environment.
What is most valuable?
The sandblast agent, policies implementation, and logs are quite valuable aspects of the solution.
Threat emulation and anti-exploits are great features to protect the endpoints.
The remote access VPN within the endpoint agent is quite easy to set up and use.
The Harmony portal allows us to do a single sign-on using our active directory which makes the life of admins easy.
Harmony Endpoint scans all website before opening and also scans fields on the website that protects from XSS and CSRF attacks which is really an advanced level feature.
The endpoint scanning tools are quite enhanced and detect most malicious files.
What needs improvement?
Sometimes the portal loads slowly which should be improved.
There should be an easy option for the administrator to turn off or disable malware protection on a specific asset or computer instead of adding a specific asset in a Disable group as that will make it easy for the admin to disable if and when required for some testing purpose. I would like this feature to be added.
Logs searching also needs to be more quick and enhanced and more metadata should be stored in the logs for Endpoint for a better view for admins.
For how long have I used the solution?
I've been using the solution for two years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Director at esupport Solutions Pvt ltd
Prevents malware from entering via the internet or USB drives
Pros and Cons
- "The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature."
- "The remote deployment with Check Point Endpoint Security requires improvement. We have to depend on some of their deployment tools. I would like a system endpoint protection management tool or a remote deployment tool."
What is our primary use case?
We are an international systems integrator company for Check Point Endpoint Security software solutions.
How has it helped my organization?
It's easy to deploy Check Point. If you try to download files or if you try to access any website, Endpoint will secure the activity. The malware will not be permitted to enter from the internet or USB drives.
What is most valuable?
The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature.
What needs improvement?
The remote deployment with Check Point Endpoint Security requires improvement. We have to depend on some of their deployment tools.
I would like a dependable system endpoint protection management tool or remote deployment tool. The deployment on the remote client needs some type of tool to implement it.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
The stability of Check Point Endpoint Security is quite good. One single install is enough. You can forget about it. Then it just takes care of scanning and updates.
The beauty of Check Point Endpoint Security is the forensics. The forensics are very complicated too and it is easy to understand if some malware has entered into your PC.
With Check Point forensics, they provide a pictorial diagram in the materials when malware is downloaded, when it is activated, when it is trying to contend with it, and when it is quarantined.
Across the entire Check Point Endpoint Security software package, the network reports are really good.
What do I think about the scalability of the solution?
For maintenance, one or two employees is more than enough. We have about 30 users total in our company.
How are customer service and technical support?
The technical support from Check Point is really awesome. They initiate a call once they find a result. From the charts, alerts, and reports, you can reach out to support.
If you share your phone number, they will call. Check Point provides us with really great support. Unless the issue is resolved, they will not disconnect the phone.
Which solution did I use previously and why did I switch?
We also used Symantec and some of their anti-malware products. Once we tested Check Point, we realized that it's a lot better.
How was the initial setup?
The initial setup of Check Point Endpoint Security was very easy. What we found was that they redesigned the entire UI, now called Infinity. Infinity is the new platform they evolved.
The Infinity platform gives us good results and is easy to manage. The entire process is straightforward. The deployment did not take much time, maybe close to three hours.
What's my experience with pricing, setup cost, and licensing?
With Check Point Endpoint Security, you can go with the Suite license or you can go with the individual Blade license. I recommend the Full Suite license.
Check Point Endpoint Security is not 100% compatible with Kaspersky and Symantec products. You can go only with Endpoint, i.e. you cannot mix with a competitor's solution.
It could be a good solution because they have multiple ways to handle the licensing model. If someone requires an encryption license, it is extra and not included in the base license. If you have any intellectual property, then the financial investment will be worth it.
If you compare Check Point Endpoint Security to Kaspersky, Kaspersky has two types of suites. One is the Select plan and one is the Advanced plan. If you go with their Advanced plan, then that will collect all of the web confidence reports, many of which vary.
Check Point Endpoint Security is easier for the administrator compared to Kaspersky, in terms of alerts and reporting. The admin receives regular reports and each report says how many total Windows versions are there, how many Office instances there are, etc.
Each product will have a unique set of advantages and different backgrounds, but when it comes to security, we are happy to go with Check Point Endpoint Security.
Which other solutions did I evaluate?
We also looked at Kaspersky.
What other advice do I have?
The anti-malware we found very good on Check Point Endpoint Security. Mainly we observe the overall deployment and then maintenance is easy. It is only one click and you can deploy everything.
Whoever wants their data secure, and they want to have peace of mind, make sure to go with the anti-malware capabilities on the SandBlast Agent.
We consider Check Point Endpoint Security to be one of the best systems for SAP.
The zero-day anti-exploit solutions should be there with Check Point Endpoint Security. Because of the budget, people keep the software, but my advice is that it is also a must-have software. You should have SandBlast Agent along with the anti-malware capabilities installed.
I would rate it a ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
Director at esupport Solutions Pvt ltd
The sandboxing feature is really good
Pros and Cons
- "Harmony's endpoint sandboxing is really good."
- "Check Point Harmony is definitely pricier compared to other endpoints."
What is our primary use case?
Kaspersky is suitable for small and medium-sized businesses (SMB), while Harmony is for enterprise segments. There are different requirements for enterprises versus SMBs. At an SMB, one administrator handles the firewall, network, and endpoints. You have more specialization in an enterprise. So at a larger scale, where you have a 5,000 or 10,000 users use case, Harmony helps pinpoint where security is lacking on a particular machine.
What is most valuable?
Harmony's endpoint sandboxing is really good.
What do I think about the scalability of the solution?
I haven't had any difficulty deploying Harmony for up to 5,000 users.
How are customer service and support?
Check Point support is really good.
How was the initial setup?
Harmony is very easy to deploy.
What's my experience with pricing, setup cost, and licensing?
Check Point Harmony is definitely pricier compared to other endpoints.
What other advice do I have?
I rate Check Point Harmony 10 out of 10. It's a unique product. It's the best in this class. I feel that Harmony is better than Crowd Strike or any other similar solution in that class. However, I would like to see more competitive pricing and better training for partners.
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
Associate Consult at Atos
Helps us to detect running malicious activity in our network
Pros and Cons
- "It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks."
- "We know that Check Point has a very good database about threats even Check Point tries to make this EDR stable still there are some issues we were facing after upgrading or taking TAC to help its got resolved but Check Point really needs to work on metadata."
What is our primary use case?
Previously, one of our clients was using Symantec and we provided POV to them with Check Point SandBlast agent after that customer found that it's very easy and stable to use after E83 version released.
There were many bugs or cosmetic issues that Check Point rectified and provided the stable version.
It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks.
How has it helped my organization?
Compliance check, anti-malware, Media Encryption Full disc encryption, Forensic behavioral ransomware protection are some type of feature that Check Point provides with a single dashboard console. It gives overall host information about when any malicious activity has found and what action by which security blade has taken. So starting from firewall bladed to forensic / ransomware blade it gives us finite detail information on the host. So most of the security load has been transferring to the endpoint which is perfectly doing their work.
What is most valuable?
Most of EDR solutions which detect malware based on AI or ML. Check Point provides the most sophisticated attack vector information by combining these two. The forensic analysis gives detail information about host compromised how exact payload was executed and bots were communicating and how it prevents them.
Anti-ransomware createS a copy of your entire disk in case any suspicious activity founded then it automatically restored all files to its last backup file date so even after the system gets compromised by ransomware still we get hope to get all data safely.
What needs improvement?
Stability.
We know that Check Point has a very good database about threats even Check Point tries to make this EDR stable still there are some issues we were facing after upgrading or taking TAC to help its got resolved but Check Point really needs to work on metadata.
Check Point agent to Server communication many times got interrupted or cloud-managed infinity portal dashboard gives many issues while creating policy or installing uninstalling agent or packages.
Heavy load on the system gives issue which can be in a different manner.
For how long have I used the solution?
2 years.
What do I think about the stability of the solution?
Needs to work better.
What do I think about the scalability of the solution?
can be scaled upto high value
How are customer service and technical support?
TAC team is helpful.
Which solution did I use previously and why did I switch?
Symantec to Check Point.
How was the initial setup?
Not too easy. Need to have basic understanding and require to take local Check Point engineers to help sometimes.
What about the implementation team?
We are a vendor.
Which other solutions did I evaluate?
Cisco AMP.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Cisco Secure Endpoint
SentinelOne Singularity Complete
Fortinet FortiClient
Cortex XDR by Palo Alto Networks
Symantec Endpoint Security
Intercept X Endpoint
Trend Vision One Endpoint Security
Trellix Endpoint Security
Kaspersky Endpoint Security for Business
ESET Endpoint Protection Platform
VMware Carbon Black Endpoint
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Are you aware of SIEM platforms that integrate both Active Directory auditing and security monitoring tools?
- Which ransomware is the biggest threat in 2020?