Try our new research platform with insights from 80,000+ expert users
reviewer1721463 - PeerSpot reviewer
Manager, IT Infrastructure and Security at Control Southern Inc.
User
Great anti-ransomware blade, provides HTML reports, and protects endpoints well
Pros and Cons
  • "One of the coolest features is that it provides an HTML report on the laptop and the endpoint console for the administrator."
  • "The product updates are a manual process for my administrator and can take several hours out of his day."

What is our primary use case?

This solution handles AV, malware, VPN, ransomware and so much more. It's a solution for all of our endpoints. We have 250 users spread out over the southeast US and they all connect back to corporate for onsite ERP

Most of our workforce is remote in offices or homes in Georgia, Alabama, Florida, and Tennessee. We also have technicians that work in plants with limited or no internet connectivity so when they get to a hotel or other public internet hotspots. The auto-connect to VPN is critical to them having a secure connection to our corporate network.

How has it helped my organization?

The solution has provided enhanced security on all endpoints for URL filtering, VPN, media encryption, and scanning. One of the most common responses from our clients is that they love the auto-connect of the VPN, yet hate that we scan all USB devices they plugin. 

When our technicians are working at a plant with no internet and they go to a public hot spot, the VPN auto-connecting to corporate secures their data back to corporate without them having to do anything. 

The scanning of ransomware has stopped dozens of attempts from malicious websites.

What is most valuable?

The anti-ransomware blade is great. It stops device encryption automatically and has caught hundreds of cases on client laptops. 

One of the coolest features is that it provides an HTML report on the laptop and the endpoint console for the administrator. It will show you the forensic report of where it came from and if it spread to other systems that have the endpoint client installed. 

The best thing is it never gets past the first client as it looks for bad behavior. If needed, you can open the console and allow it.

What needs improvement?

The product updates are a manual process for my administrator and can take several hours out of his day. I understand this is partially due to the Windows version limitations. When you do need to update the client version it is pretty easy. Usually, it's a case of the end-user not being online to accept the push of the software. That is where it can take up a few hours of my administrator's time. The administrator has to wait and email for our technicians to go to an internet available area. It is usually not a big deal, however, it can take time.

Buyer's Guide
Check Point Harmony Endpoint
February 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

For how long have I used the solution?

I've been using the solution for five years.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1126782 - PeerSpot reviewer
Information Technology Security Engineer at a tech services company with 11-50 employees
Reseller
Top 5Leaderboard
Efficient malware protection with an easy setup and helpful support
Pros and Cons
  • "The traditional anti-malware engine is valuable."
  • "There should be an indication when you assign an endpoint to be a local proxy for other endpoints. The current system doesn't clearly indicate whether the assignment was successful."

What is our primary use case?

Check Point Harmony Endpoint is used mostly for endpoint protection.

How has it helped my organization?

It protects endpoints for our customers.

What is most valuable?

The traditional anti-malware engine is valuable.

What needs improvement?

There should be an indication when you assign an endpoint to be a local proxy for other endpoints. The current system doesn't clearly indicate whether the assignment was successful. I even talked to Check Point support about considering this as a feature request.

For how long have I used the solution?

I have been familiar with Harmony Endpoint for about two years.

What do I think about the stability of the solution?

I did not encounter any stability issues with Harmony Endpoint.

What do I think about the scalability of the solution?

I would rate the scalability as 9.5 out of ten.

How are customer service and support?

I had no problems with Check Point support. They were very helpful and competitive, and we had various calls where they connected to our implementation and provided assistance.

Which solution did I use previously and why did I switch?

Before using Harmony Endpoint, we used other similar solutions, however, I do not have a stable opinion on which one is better as these products are very different.

We previously used McAfee.

How was the initial setup?

The setup is easy when using the web console. However, for on-premises deployment, it requires additional data and configuration.

What about the implementation team?

We have a certified engineer with the necessary certifications to install, support, and troubleshoot Harmony Endpoint and Check Point firewalls.

What's my experience with pricing, setup cost, and licensing?

Pricing is not within my purview as an engineer. However, if customers purchase it, I assume the price is reasonable.

What other advice do I have?

I would recommend Harmony Endpoint to others.

I'd rate the solution eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
February 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Harmony Endpoint - modern app security in infinity portal
Pros and Cons
  • "The most important characteristic of our requirements was the implementation of disk encryption."
  • "We would like to make the documentation for more modern solutions like the Harmony family easier to find."

What is our primary use case?

Within the company, some departments, including the IT department, require their users to be connected from anywhere. In order to provide security to their teams, whether they were inside or outside the company, it was necessary to be able to implement a robust solution that would help us with access, equipment security, and reliability both for the protection of equipment information and to avoid vulnerabilities through applications to which users have access with credentials and administrator permissions.

How has it helped my organization?

This "Harmony Endpoint" tool is a modern solution from the Check Point Harmony family and has helped us improve the company's security with anti-malware protection, ransomware, among others, real-time protection, monitoring, and review of logs from the Check Point Infinity Portal. 

Thanks to these characteristics, we have gained control over the equipment to avoid data loss. For example, with the encryption of the device units, we can avoid loss of the equipment, as well as access protection and application control policies, among other options that were enabled. It's leveraged to improve security.

What is most valuable?

The most important characteristic of our requirements was the implementation of disk encryption. It's necessary to avoid loss or theft of the equipment and, therefore, loss of data from the equipment. It can be applied to all the equipment from the portal or segments.

Another advantage is the control of applications and access policies that can be carried out in a granular manner for different company profiles. It works very well.

It offers secure administration from Check Point Infinity Portal. It is a security center where many of the Check Point solutions are located.

What needs improvement?

The improvements that can be mentioned are few. The solution and its architecture are very well done.    

The Check Point Infinity Portal sometimes has some latency or performance issues that are slightly worse, affecting user management. It cannot be improved by the customer.

We would also like to make the documentation for more modern solutions like the Harmony family easier to find. That way, we can implement these solutions with the best practices recommended by the manufacturer.

For how long have I used the solution?

The solution has been used for more than two years for our portable devices with high mobility.

Which solution did I use previously and why did I switch?

Previously we used ESET at endpoints, however a site once had a ransomware attack and the solution was not able to solve the problem, so it was decided to change.

What's my experience with pricing, setup cost, and licensing?

The costs are per user. It is a good option for covering company equipment.

I recommend finding a partner that can help you with the costs for this and any other Check Point solution.

What other advice do I have?

This solution is very good and complete. I recommend it. You should try it and decide.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1489602 - PeerSpot reviewer
Network Security Assurance Specialist at Visa Inc.
Real User
Offers good protection and integrates well with other Check Point solutions
Pros and Cons
  • "Check Point Endpoint Security really helped the business stop various malware attacks throughout the time we used it, including a ransomware attack, which was stopped in minutes."
  • "I think some work needs to be done to improve the integration with other third-party products, namely SIEM solutions."

What is our primary use case?

We have used Check Point Sandblast Agent as an anti-malware solution. We were already working in a Check Point environment, which made the decision to purchase an endpoint security product from Check Point easy.

We first tested it in a Lab environment, where we sampled various malware, some less complicated than others. We were impressed with the results.

How has it helped my organization?

Check Point Endpoint Security really helped the business stop various malware attacks throughout the time we used it, including a ransomware attack, which was stopped in minutes.

What is most valuable?

The Sandblast Agent really made a difference for the organization. It integrated well with the existing Check Point environment we had in place. It was used both for threat protection and remote access VPN.

What needs improvement?

I think some work needs to be done to improve the integration with other third-party products, namely SIEM solutions. We found it quite challenging.

We found out the hard way that the configuration was lost when we version upgraded the management console.

For how long have I used the solution?

We have used Check Point Endpoint Security for the past two years.

Which solution did I use previously and why did I switch?

We did not use another similar solution prior to this one.

Which other solutions did I evaluate?

We did not evaluate other options.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1776063 - PeerSpot reviewer
IT Manager at a renewables & environment company with 51-200 employees
User
Great cloud management and reporting with on easy pane of glass
Pros and Cons
  • "The rollout and management of devices were very simple."
  • "The web filter service could be improved."

What is our primary use case?

We wanted to consolidate a several-point solution to one endpoint. With so many new cyber threats and having a growing environment, what we had in place had too many gaps or grey areas between solutions and vendors. 

Also, with a rapid transition to hybrid working, we needed to reconsider our end point protection. Having used Check Point NGFW for five years, it seemed like a good fit. Also, the experience and long term position of Check Point in the security market gave us good confidence. This mature position in the market also helped with finding several resellers and experience.

How has it helped my organization?

There is one pane of glass to all end points, events, and incidents which is providing our team with a clear picture of the environment. We have already experienced several items that previously just got lost in the greyness of a multi-solution environment.

The rollout and management of devices were very simple. It allowed for a rollout of 200+ devices - all remote - in just a couple of weeks. Having cloud-based management also really helped get started, as, within the day, we had a POC running and just started to grow from there.

What is most valuable?

Cloud management and reporting are great. The management interface is very simple and easy to navigate. Just getting a logon to start is very helpful. The Check Point support at this stage was great. While it was very simple and intuitive, having someone talk over the defaults provided recommendations that helped us jump forward very easily.

Again, the cloud management service has a several inbuilt default reports which are easy to customize and provide more visibility than we have had previously with several solutions. 

What needs improvement?

The web filter service could be improved. It would be great to have a self-service user request for sites. An administrator would still need to approve, however. 

The block screen could have a nicer screen or allow it to be customized.

The list of exceptions for URLs could be improved with a separate screen for a large list of exceptions. Having the same exception list for mobile and endpoints would be great. 

We are hoping to transition to the SOC based service. Think this is still new; we're looking forward to get more information and test.

For how long have I used the solution?

We just transitioned to Check Point Harmony, and have been running it now for six weeks.

What do I think about the stability of the solution?

Stability seems very strong, however, it's early days.

What do I think about the scalability of the solution?

Scalability seems very strong, however, it is early days.

How are customer service and support?

We don't know yet.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

The move to hybrids has been working well during Covid.

How was the initial setup?

The initial setup was not complex. 

What about the implementation team?

We did both - we implemented through a vendor and in-house.

What was our ROI?

The product offers a great lower cost than previous solutions.

What's my experience with pricing, setup cost, and licensing?

I'd advise users to talk to your Check Point partners or find a good one.

Which other solutions did I evaluate?

We spent a long time reviewing the marketplace and comparison sites however, we did not test anything.

What other advice do I have?

I am very positive in terms of the solution and Check Point in general.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Operations Director at a tech services company with 1-10 employees
Reseller
End-user management facilities are good, and there are innovations in every version
Pros and Cons
  • "The end-user facilities for managing the tool are good."
  • "Areas that have room for improvement are the scope of the product and, while I think the support is good, they can improve support as well."

What is our primary use case?

We use it to help clients solve their security problems.

How has it helped my organization?

It helps clients have a better view of the risks. It also helps increase staff productivity by more than 50 percent, in my estimate.

What is most valuable?

The most valuable features are the innovations that they release in every version. The end-user facilities for managing the tool are also good.

What needs improvement?

I'm not sure what they are thinking about in terms of additional features at the moment, but I hope that they'll maintain focus on the tool to enhance the solution. 

Areas that have room for improvement are the scope of the product and, while I think the support is good, they can improve support as well.

What do I think about the scalability of the solution?

It has a good level of scalability. They expand the solution with new and helpful features.

How are customer service and technical support?

Technical support provides good solutions. They are available and respond quickly. They are knowledgeable.

Which solution did I use previously and why did I switch?

Each scenario is different depending on the client's requirements or the regulations they need to follow or what they need to cover around risks.

How was the initial setup?

The initial setup is easy, but because we are resellers we are trained in setting it up.

What's my experience with pricing, setup cost, and licensing?

In addition to the standard licensing fees, there is a cost for support.

Which other solutions did I evaluate?

We have more than 70 products related to security solutions and we are resellers of many of them.

What other advice do I have?

Consider the solution as one of your options because it's one of the top tools.

I rate this solution at nine out of ten because it covers what it needs to cover. As always, there is room to improve, but I think it's a good product.

Disclosure: My company has a business relationship with this vendor other than being a customer: Resller.
PeerSpot user
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Great security, reliability, and offers a centralized administration of unified services
Pros and Cons
  • "Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard."
  • "I would like to see is this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses."

What is our primary use case?

We had to protect our equipment inside and outside the perimeter network, regardless of where we were. Due to this need, we came to use Check Point Harmony Endpoint, which was extremely easy to deploy from the moment we logged in to the website. 

This solution is very user-friendly. After the Check Point tenant is created, it allows us to download the application for iOS or Windows, and it is only a matter of installing it so that the teams can start reporting to the Harmony Endpoint cloud. 

How has it helped my organization?

It came to provide us with security, reliability, and a centralized administration of unified services. It works regardless of whether you work on Mac or Windows systems, which are among the equipment we have in our organization. Today, our equipment is very diverse. However, we have managed to protect everyone with this solution. Check Point Harmony Endpoint provides support within the new organizational disruption trend of teleworking. With it, we manage to protect and manage all teams from a centralized policy. 

What is most valuable?

Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard. We are achieving uniform work that is easy to manage if any changes are necessary. Being able to give us an inventory of the equipment and the health status of everything from a single place has been great. This solution has become a great ally for the prevention of threats and security problems caused by viruses such as ransomware, and we are protected against threats, which is of great value. 

What needs improvement?

I would like to see this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses. We'd like to be able to integrate several products and services into one to be more efficient and user-friendly within the infrastructure. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1866651 - PeerSpot reviewer
Brand Manager at Corporation Sekiura S.A.C.E.I.
User
Excellent anti-ransomware, anti-bot and anti-exploit features
Pros and Cons
  • "It has improved the detection of malware."
  • "Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle."

What is our primary use case?

The first use case is to detect malware as well as advanced threat protection for known, unknown, and zero-day malware, sandbox emulation and extraction, and enhanced by automated endpoint forensics analysis. 

Zero-day attacks are a risk for the company which seemed very important to us, plus the sandbox in the cloud. We have a cloud console that is easy to use and easy to monitor.

The details of our environment are Harmony Endpoint Advanced for 100 on-premise users with cloud managment console, and support for one year.

How has it helped my organization?

It has improved the detection of malware. We are very satisfied with the friendly and easy-to-monitor console. We chose the advanced version as it seemed very important to have advanced threat protection for known, unknown, and zero-day malware plus sandbox emulation and extraction, enhanced by automated endpoint forensics analysis.

At the moment we are very satisfied and confident with Check Point.

What is most valuable?

All of these features quoted below are valuable for us, as the set of solutions is what makes the solution really valuable. 

  • Endpoint Threat Prevention features
  • Web Protection (malicious sites/URL Filtering)
  • Anti-Ransomware
  • Anti-Bot
  • Anti-Exploit
  • NGAV
  • Anti-Virus
  • Forensic collection and automated reports
  • Threat Hunting
  • Sandbox Emulation and Extraction (CDR)
  • Endpoint Access Control Features
  • Endpoint Firewall
  • Application Control
  • Port Protection
  • Endpoint Compliance
  • Remote Access VPN

If we had to choose one, we really like the EDR included.

What needs improvement?

The Check Point Harmony Endpoint is a very complete solution. Even in the most basic version, it already includes EDR, which today is very important and something that all endpoint solutions should consider having from the most basic versions. We would like to have one more step and that's to give and have full-disk encryption.

Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle. We could have it with Check Point Endpoint, mobile, cloud, or firewall. An all-in-one console would be great.

For how long have I used the solution?

I've been using the solution for six months.

What do I think about the stability of the solution?

The stability has been positive.

What do I think about the scalability of the solution?

The scalability has been positive.

How are customer service and support?

We did not have any problems. We got good solution training

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not previously use the solution.

What about the implementation team?

We had a positive experience with the implementation via a vendor. 

What was our ROI?

Our ROI has been positive.

What's my experience with pricing, setup cost, and licensing?

If you need the on-premise management console, you have to pay an additional cost. It's not much, however, it's good to ask for a quote.

Which other solutions did I evaluate?

We also looked into Sophos.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: The company want to keep anonymity.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.