What is our primary use case?
We started using the product months before the start of the pandemic. It is a robust solution for the protection of endpoints. It contains the classic antivirus, however, it has anti-bot and disk encryption functions (FDE) as well as the integration of a sandboxing for the consultation and download of files in a safe way (whether they are downloaded from a page or from an email).
It is a very complete tool for users who need to be able to connect from home or some other public access point since it has a VPN service, in addition to different layered-in security solutions.
How has it helped my organization?
The addition of Check Point's Harmony Endpoint as the main security tool for the company's collaborators has represented a reliable source of security since updates can be executed automatically or manually, as may be required.
There's the possibility of being able to do the administration from the Check Point portal, maintaining control and visibility of the different security events at all times.
Admin users are able to access an adjustable dashboard that shows the most relevant information about the status of the endoints and the statistics of threats found.
What is most valuable?
Without a doubt, the best security feature is Full Disk Encryption (FDE). In cases where the endpoint is stolen or lost, you are sure that the information will not be accessible without the access password being the correct, maintaining the confidentiality of files at all times.
In addition, if someone tries to extract the physical disk and places it as a removable disk in a PC, they will not have access to the information either, since the files are still encrypted, ensuring that this method of extracting the information does not work without the decryption key.
What needs improvement?
They could be focused on the analysis of USB devices. It has the ability to block the use of USB storage memories until it is completely scanned for any virus or threat. We need to ensure that the USB device will not be available until the scan has been completed, however, this may represent a malfunction when using other tools such as Rufus, as, by blocking access to USB drives, Harmony Endpoint will block access to these drives, thus Rufus will not be properly detecting USB drives and therefore it cannot operate properly.
For how long have I used the solution?
I've used the solution for one year and eight months.
What do I think about the stability of the solution?
I have had almost no problems with the execution of the software agent and it is very useful when I need to do research on the internet.
What do I think about the scalability of the solution?
It is fully scalable by scheduling updates from the console. When the agent is updated it will be necessary to update the PC, however.
How are customer service and support?
As a user, I have not had contact with the manufacturer's technical support.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We did not use a different solution.
How was the initial setup?
Although it is an intuitive configuration, due to the variety of blades available, it may take some time to complete the configuration. Everything will depend on the number of blades a company needs to configure.
What about the implementation team?
We handled the implementation in-house.
What's my experience with pricing, setup cost, and licensing?
Licensing is based on sizing and based on the number of users and the desired security blades. All versions include access to the Check Point web portal for administration.
Which other solutions did I evaluate?
We did not evaluate other options.
What other advice do I have?
By acquiring this tool, companies will have a robust and reliable solution for endpoint protection.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.