Try our new research platform with insights from 80,000+ expert users
reviewer1961277 - PeerSpot reviewer
Senior Ts Systems Integration Specialist at NTT Security
Real User
Top 5
Good real-time endpoint analysis, great blocking mechanisms, detects malware effectively
Pros and Cons
  • "The dashboard is user-friendly and easy to understand."
  • "We have observed some policies are not working as expected."

What is our primary use case?

We use the solution for multiple purposes such as endpoint protection, organizational malware attack tracking and maintaining, blocking of IP addresses, domain and URL blocking, and prevention and detection, according to the purposes we follow. 

Check Point is the best in the marketplace for next-generation firewalls. In combination with Endpoint Security, it proves to be stable, error-free, and up-to-date with the latest fixes and solutions available. 

How has it helped my organization?

Earlier in our organization there was normally an antivirus which was used to check endpoint protection and policies according to what was applied. However, the detection of endpoints was not up to date with real-time analysis. 

There is a lot of gap in analysis. The malware reports and signatures were not updated in real-time. There was no blocking of Suspicious URLs or domains in real-time. As we using Check Point in DMZ. We purchased the license and implemented it in the UAT zone for the best outcome as per the organization's requirements.

What is most valuable?

The most valuable aspects of the solution are the real-time endpoint analysis and blocking mechanism, the detection of malware and threats is the best use of this technology. 

As we have the stability of this product and best practices solution is applied to the infrastructure as endpoints have a clear view of the statistics and performance. 

Also, we have monitored the server level where it's been protected from the outside world. The CPU, memory, and hard disk consumption and compromisation are good. 

The dashboard has also been user-friendly and easy to understand.  

What needs improvement?

Check Point is the best in the marketplace. As the EDR [Endpoint Harmony] there is a lot of enhancement in fixing the solution. We have observed some policies are not working as expected. We have observed a few cosmetic issues as well, however, it's fine. 

Minor release should improve the stability and overall performance of the endpoint solution. Consumption of the endpoint solution should have clear visibility on day-to-day operation tasks that are being carried out also we should monitor the malicious IP address and URL for blocking the same.

Buyer's Guide
Check Point Harmony Endpoint
February 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for four or more years.

What do I think about the stability of the solution?

The stability is the best in the marketplace.

What do I think about the scalability of the solution?

The scalability is the best in the marketplace.

How are customer service and support?

Their technical support is the best in the marketplace.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not previously use a different solution.

How was the initial setup?

The initial setup is straightforward.

What about the implementation team?

We handled the setup with an in-house team. I'd rate the experience foud out of five.

What was our ROI?

The ROI witnessed is the best in the marketplace.

What's my experience with pricing, setup cost, and licensing?

Check Point is the best in the marketplace. It's a good EDR and the cost is minimal.

Which other solutions did I evaluate?

We did not evaluate other options.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
Its a nice administrative portal, In Infinity centralize and easy
Pros and Cons
  • "We love the reports and monitoring they provide."
  • "Infinity Portal sometimes requires more performance."

What is our primary use case?

Check Point Harmony Mobile was provided through an installed agent which has very light protection against malware and ransomware, among others. 

In our country, many ransomware threats have been generated at the country level, for which it was worrying that we had kidnapping or encryption of our data. At the management level, the request was given to provide additional security to protect us. The tool has been very good.

We tested this Check Point tool to assess the performance of our endpoints, and shield them safely while increasing the protection of our platforms.

How has it helped my organization?

Our company wanted to provide an additional layer of security for our endpoints. We already manage Check Point with different tools, We have done very well with them and we have validated how Check Point Harmony Endpoint works to protect our endpoint equipment. So far, it works quite well.

We have seen the reports of attempted attacks and we have been able to provide a solution to these vulnerabilities. There is less malware in our infrastructure.

Its characteristics are quite good.

What is most valuable?

The characteristic that most attracts our attention is the administration portal. It doesn't require a management server since its licensing and management are through the Check Point Infinity Portal. It is very intuitive and easy to implement.

The way in which the agent is installed on the computers is very easy, it does not consume almost any performance of the server or final computers, in this way there is no need to worry about increasing resources to be able to protect them with Check Point Harmony Endpoint.

We love the reports and monitoring they provide. It helps us quickly see what vulnerabilities we have on our endpoints.

What needs improvement?

We have few disadvantages or improvement points. However, the Infinity Portal sometimes requires more performance. It is a small detail. However, it could be improved.

On the other hand, it is also essential that the manufacturer improves the public documentation so that users can better understand how it can be implemented with best practices.

Finally, at the support level, we believe that Check Point can improve. Sometimes the answers are provided at dawn, which makes it more challenging to solve.

For how long have I used the solution?

The solution is a very good security tool. It was used this year at a test level and everything works very well.

Which solution did I use previously and why did I switch?

Previously we only had or used Microsoft's antivirus or endpoint, however, we had all non-centralized security. Through this tool, we can centralize everything in the Infinity Check Point Portal.

What's my experience with pricing, setup cost, and licensing?

Licensing is per endpoint, which is why we think is good. The cost is competitive, and its features are very good.

Which other solutions did I evaluate?

We validated several manufacturers, however, we did not want to have separate solutions. It seems to us a better option to have only Check Point.

What other advice do I have?

I recommend this security tool, it is always important to test the tool at the test level to decide if it is what you are looking for.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
February 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
reviewer1853499 - PeerSpot reviewer
IT Security Manager at a manufacturing company with 1,001-5,000 employees
User
Great threat emulation and threat extraction features with helpful forensics
Pros and Cons
  • "The forensics allows us to search retrospectively for an URL or file opened by users, for example, when you need to quickly check who else has clicked on a phishing link."
  • "Unfortunately, the web (cloud) management system and log search performance are quite bad."

What is our primary use case?

We use Harmony on every PC to add additional protection primarily to file downloads. We use it alongside our classic AV solution (non-Check Point). Every file is scanned via Threat Emulation (virtual sandboxing) and Threat Extraction (sanitizing files by removal of active content).

The anti-phishing module scans every new web form, that the user is trying to enter data in. Based on visual similarities to known sign-in websites (like Microsoft Azure's) it blocks the phishing ones that are similar.

The forensics module allows us to retrospectively search for a wide number of events on all PCs (for example for now-known malicious URLs or files)

How has it helped my organization?

Harmony mainly filled the gap in e-mail security, allowing us to check what the user has clicked (and blocks it when needed).

It also has a nice phishing form detection blocking users from entering their credentials on many real-life phishing websites.

The forensic log search (as described above) allows us to quickly do a retrospective search for a file or URL that we found malicious.

The features come in handy during Covid-related extended remote work times, when we were able to provide better security to our employees working off-premises.

What is most valuable?

The most valuable features are threat emulation and threat extraction. Despite some false positives, it gives quite good security for file downloading.

Phishing form detection based on on-site similarity (not only on URL) has at least 50% efficiency in real-life examples that passed our antispam systems (and most of the false negatives are pretty general forms, which are not so convincing to the user).

The forensics allows us to search retrospectively for an URL or file opened by users, for example, when you need to quickly check who else has clicked on a phishing link.

What needs improvement?

Unfortunately, the web (cloud) management system and log search performance are quite bad. Sometimes it takes longer to perform simple tasks and scrolling the results of the log is annoying due to frequent refreshes.

The exception management was always the Achilles' heel of Check Point products. It was a bit improved in Harmony, still, you can't for example exclude a site from anti-phishing form checks (which could take a few secs) while not excluding it from attachment scanning.

The forensics module still doesn't allow for HTTPS URLs entered by users. You are limited to DNS search or IP lookup. This doesn't make sense from a technical standpoint as the URLs are passing Harmony checks so they are known to the solution.

Anti-phishing cannot scan a form located inside an HTML e-mail attachment (which is a common practice in real-life attacks).

For how long have I used the solution?

I've used the solution for one year.

What do I think about the scalability of the solution?

Cloud management performance is sometimes quite bad for day-to-day tasks, although it is not related to the number of endpoints.

How was the initial setup?

If you limit browser extension via GPO, there might be conflicts with Harmony's that generally overwrites your config in some modes (per user vs per device enforcement).

What's my experience with pricing, setup cost, and licensing?

Pricing isn't cheap, especially if you want to extend forensic log retention period from default one week.

What other advice do I have?

It's still being actively developed and still needs some improvement.

In general, it's quite good now regarding security and might get even better.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Presales Engineer at Data Warden
User
Robust and reliable with a useful Full Disk Encryption feature
Pros and Cons
  • "There's the possibility of being able to do the administration from the Check Point portal, maintaining control and visibility of the different security events at all times."
  • "They could be focused on the analysis of USB devices."

What is our primary use case?

We started using the product months before the start of the pandemic. It is a robust solution for the protection of endpoints. It contains the classic antivirus, however, it has anti-bot and disk encryption functions (FDE) as well as the integration of a sandboxing for the consultation and download of files in a safe way (whether they are downloaded from a page or from an email).

It is a very complete tool for users who need to be able to connect from home or some other public access point since it has a VPN service, in addition to different layered-in security solutions.

How has it helped my organization?

The addition of Check Point's Harmony Endpoint as the main security tool for the company's collaborators has represented a reliable source of security since updates can be executed automatically or manually, as may be required. 

There's the possibility of being able to do the administration from the Check Point portal, maintaining control and visibility of the different security events at all times. 

Admin users are able to access an adjustable dashboard that shows the most relevant information about the status of the endoints and the statistics of threats found.

What is most valuable?

Without a doubt, the best security feature is Full Disk Encryption (FDE). In cases where the endpoint is stolen or lost, you are sure that the information will not be accessible without the access password being the correct, maintaining the confidentiality of files at all times.

In addition, if someone tries to extract the physical disk and places it as a removable disk in a PC, they will not have access to the information either, since the files are still encrypted, ensuring that this method of extracting the information does not work without the decryption key. 

What needs improvement?

They could be focused on the analysis of USB devices. It has the ability to block the use of USB storage memories until it is completely scanned for any virus or threat. We need to ensure that the USB device will not be available until the scan has been completed, however, this may represent a malfunction when using other tools such as Rufus, as, by blocking access to USB drives, Harmony Endpoint will block access to these drives, thus Rufus will not be properly detecting USB drives and therefore it cannot operate properly.

For how long have I used the solution?

I've used the solution for one year and eight months.

What do I think about the stability of the solution?

I have had almost no problems with the execution of the software agent and it is very useful when I need to do research on the internet.

What do I think about the scalability of the solution?

It is fully scalable by scheduling updates from the console. When the agent is updated it will be necessary to update the PC, however.

How are customer service and support?

As a user, I have not had contact with the manufacturer's technical support.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We did not use a different solution.

How was the initial setup?

Although it is an intuitive configuration, due to the variety of blades available, it may take some time to complete the configuration. Everything will depend on the number of blades a company needs to configure.

What about the implementation team?

We handled the implementation in-house.

What's my experience with pricing, setup cost, and licensing?

Licensing is based on sizing and based on the number of users and the desired security blades. All versions include access to the Check Point web portal for administration.

Which other solutions did I evaluate?

We did not evaluate other options.

What other advice do I have?

By acquiring this tool, companies will have a robust and reliable solution for endpoint protection.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Director at esupport Solutions Pvt ltd
Real User
The sandboxing feature is really good
Pros and Cons
  • "Harmony's endpoint sandboxing is really good."
  • "Check Point Harmony is definitely pricier compared to other endpoints."

What is our primary use case?

Kaspersky is suitable for small and medium-sized businesses (SMB), while Harmony is for enterprise segments. There are different requirements for enterprises versus SMBs. At an SMB, one administrator handles the firewall, network, and endpoints. You have more specialization in an enterprise. So at a larger scale, where you have a 5,000 or 10,000 users use case, Harmony helps pinpoint where security is lacking on a particular machine. 

What is most valuable?

Harmony's endpoint sandboxing is really good.

What do I think about the scalability of the solution?

I haven't had any difficulty deploying Harmony for up to 5,000 users.

How are customer service and support?

Check Point support is really good.

How was the initial setup?

Harmony is very easy to deploy.

What's my experience with pricing, setup cost, and licensing?

Check Point Harmony is definitely pricier compared to other endpoints.

What other advice do I have?

I rate Check Point Harmony 10 out of 10. It's a unique product. It's the best in this class. I feel that Harmony is better than Crowd Strike or any other similar solution in that class. However, I would like to see more competitive pricing and better training for partners. 

Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
PeerSpot user
Associate Consult at Atos
Vendor
Helps us to detect running malicious activity in our network
Pros and Cons
  • "It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks."
  • "We know that Check Point has a very good database about threats even Check Point tries to make this EDR stable still there are some issues we were facing after upgrading or taking TAC to help its got resolved but Check Point really needs to work on metadata."

What is our primary use case?

Previously, one of our clients was using Symantec and we provided POV to them with Check Point SandBlast agent after that customer found that it's very easy and stable to use after E83 version released.

There were many bugs or cosmetic issues that Check Point rectified and provided the stable version.

It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks.

How has it helped my organization?

Compliance check, anti-malware, Media Encryption Full disc encryption, Forensic behavioral ransomware protection are some type of feature that Check Point provides with a single dashboard console. It gives overall host information about when any malicious activity has found and what action by which security blade has taken. So starting from firewall bladed to forensic / ransomware blade it gives us finite detail information on the host. So most of the security load has been transferring to the endpoint which is perfectly doing their work.

What is most valuable?

Most of EDR solutions which detect malware based on AI or ML. Check Point provides the most sophisticated attack vector information by combining these two. The forensic analysis gives detail information about host compromised how exact payload was executed and bots were communicating and how it prevents them.

Anti-ransomware createS a copy of your entire disk in case any suspicious activity founded then it automatically restored all files to its last backup file date so even after the system gets compromised by ransomware still we get hope to get all data safely.

What needs improvement?

Stability.

We know that Check Point has a very good database about threats even Check Point tries to make this EDR stable still there are some issues we were facing after upgrading or taking TAC to help its got resolved but Check Point really needs to work on metadata.

Check Point agent to Server communication many times got interrupted or cloud-managed infinity portal dashboard gives many issues while creating policy or installing uninstalling agent or packages.

Heavy load on the system gives issue which can be in a different manner.

For how long have I used the solution?

2 years.

What do I think about the stability of the solution?

Needs to work better.

What do I think about the scalability of the solution?

can be scaled upto high value

How are customer service and technical support?

TAC team is helpful.

Which solution did I use previously and why did I switch?

Symantec to Check Point.

How was the initial setup?

Not too easy. Need to have basic understanding and require to take local Check Point engineers to help sometimes.

What about the implementation team?

We are a vendor.

Which other solutions did I evaluate?

Cisco  AMP.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1835919 - PeerSpot reviewer
CISO at a financial services firm with 51-200 employees
Real User
Well priced, simple to set up and easy to layer in with other products
Pros and Cons
  • "It's a scalable product as it is a cloud offering."
  • "Specifically, there are gaps when it comes to security."

What is our primary use case?

The solution is primarily used to protect us. It's a tool that we have installed on all the users from sales.

What is most valuable?

Overall, it's a good tool. It's doing a good job for what it is designed for.

It is easy to set up.

The solution is stable.

It's a scalable product as it is a cloud offering.

You can layer in this solution with others. I like layering myself with various technologies, depending on the environment we're working in.

The product offers good pricing.

What needs improvement?

Everything can always be improved. Specifically, there are gaps when it comes to security.

For how long have I used the solution?

I've been using the solution for a couple of years now.

What do I think about the stability of the solution?

If you go by the recommended version, yes, it's stable.

What do I think about the scalability of the solution?

The cloud offering is scalable. 

We have about two hundred or more users on the solution. 

Which solution did I use previously and why did I switch?

We're also using Sophos.

How was the initial setup?

The solution is very straightforward to set up. It's not overly complex or difficult. 

To set it up from the server-side, the deployment takes a couple of hours. To set it up from the user side, it's a couple of minutes.

What's my experience with pricing, setup cost, and licensing?

The product is reasonably priced. It's not overly expensive. 

Which other solutions did I evaluate?

Currently, we're looking at CrowdStrike. We have not yet bought it. We're currently talking about options. I'm already set with a good partner on it and just discussing right now, discussing what is best suited as a product, rather than pricing.

What other advice do I have?

I am a customer and an end-user.

I'm not sure which version we are using currently, however, it is visible in the portal. The solution is a software as a service. 

I'd rate the solution nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IT Specalist at vTech Solution
User
Constantly updated with good zero-day prevention and excellent prevention capabilities
Pros and Cons
  • "Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today's complex threat landscape."
  • "They could improve memory consumption."

What is our primary use case?

Check Point Endpoint Security is to protect our employee endpoints as we're currently working from home. The user is totally unaware of the cyber threats, so the basic functionality of endpoint security provides a lot more security. With it, any threat attack can be rebuffed. Any user downloading any suspicious data from the web will first have Check Point scan it deeply. If there's malware then it quarantines it. Otherwise, the user can access it. We're using it on a primary basis. We don't have any other solutions in place apart from the Check Point.

How has it helped my organization?

Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today's complex threat landscape. 

It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response. That's how our organization improved its security. Before that, we didn't have the security to prevent such threats as ransomware, phishing, etc. Due to that, our IT environment is more secure and business has also increased.

What is most valuable?

The product offers advanced anti-malware and antivirus protection to protect, detect, and correct malware across multiple endpoint devices and operating systems. Proactive web security is available to ensure safe browsing on the web. Data classification and data loss prevention are there to prevent data loss and exfiltration.

SandBlast Agent defends endpoints and web browsers with a complete set of real-time advanced browser and endpoint protection technologies, including Threat
Emulation, Threat Extraction, Anti-Bot, and Zero Phishing. 

The zero-day prevention is very valuable.

What needs improvement?

Personally, I'm looking forward to separating server management policies. They could improve memory consumption. Once we installed a CP agent in our system, we found that it was consuming more memory. Even a normal configuration system can be hung.

Malware detection is an add-on plan that can't be added on. It's the most important part of endpoint security. There's a forensic addon which is very important after threat hunting against attacks.

For how long have I used the solution?

I've been using this solution for two years.

What do I think about the stability of the solution?

 I haven't seen any corruption on the agent side. It's stable.

What do I think about the scalability of the solution?

It's scalable. It always updates its malware database for security concerns on a daily basis

How are customer service and support?

Technical support is good. You can raise a ticket with the CP support portal and a technician will contact you based on the severity.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I didn't have that much experience with anything else. When I was joined, our company was using the same solution.

How was the initial setup?

The solution's initial setup is straightforward. Even new users can handle the process with help of online guidelines.

What about the implementation team?

We used a vendor team and they were experts in what they were doing.

What was our ROI?

As a security solution, of course, it gives back lots of return on investment.

What's my experience with pricing, setup cost, and licensing?

The setup cost is nothing. The licensing is costly due to the fact that, in return, it's giving the best security.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.