The solution is primarily used to protect us. It's a tool that we have installed on all the users from sales.
CISO at a financial services firm with 51-200 employees
Well priced, simple to set up and easy to layer in with other products
Pros and Cons
- "It's a scalable product as it is a cloud offering."
- "Specifically, there are gaps when it comes to security."
What is our primary use case?
What is most valuable?
Overall, it's a good tool. It's doing a good job for what it is designed for.
It is easy to set up.
The solution is stable.
It's a scalable product as it is a cloud offering.
You can layer in this solution with others. I like layering myself with various technologies, depending on the environment we're working in.
The product offers good pricing.
What needs improvement?
Everything can always be improved. Specifically, there are gaps when it comes to security.
For how long have I used the solution?
I've been using the solution for a couple of years now.
Buyer's Guide
Check Point Harmony Endpoint
December 2024
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
What do I think about the stability of the solution?
If you go by the recommended version, yes, it's stable.
What do I think about the scalability of the solution?
The cloud offering is scalable.
We have about two hundred or more users on the solution.
Which solution did I use previously and why did I switch?
We're also using Sophos.
How was the initial setup?
The solution is very straightforward to set up. It's not overly complex or difficult.
To set it up from the server-side, the deployment takes a couple of hours. To set it up from the user side, it's a couple of minutes.
What's my experience with pricing, setup cost, and licensing?
The product is reasonably priced. It's not overly expensive.
Which other solutions did I evaluate?
Currently, we're looking at CrowdStrike. We have not yet bought it. We're currently talking about options. I'm already set with a good partner on it and just discussing right now, discussing what is best suited as a product, rather than pricing.
What other advice do I have?
I am a customer and an end-user.
I'm not sure which version we are using currently, however, it is visible in the portal. The solution is a software as a service.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Manager at a renewables & environment company with 51-200 employees
Great cloud management and reporting with on easy pane of glass
Pros and Cons
- "The rollout and management of devices were very simple."
- "The web filter service could be improved."
What is our primary use case?
We wanted to consolidate a several-point solution to one endpoint. With so many new cyber threats and having a growing environment, what we had in place had too many gaps or grey areas between solutions and vendors.
Also, with a rapid transition to hybrid working, we needed to reconsider our end point protection. Having used Check Point NGFW for five years, it seemed like a good fit. Also, the experience and long term position of Check Point in the security market gave us good confidence. This mature position in the market also helped with finding several resellers and experience.
How has it helped my organization?
There is one pane of glass to all end points, events, and incidents which is providing our team with a clear picture of the environment. We have already experienced several items that previously just got lost in the greyness of a multi-solution environment.
The rollout and management of devices were very simple. It allowed for a rollout of 200+ devices - all remote - in just a couple of weeks. Having cloud-based management also really helped get started, as, within the day, we had a POC running and just started to grow from there.
What is most valuable?
Cloud management and reporting are great. The management interface is very simple and easy to navigate. Just getting a logon to start is very helpful. The Check Point support at this stage was great. While it was very simple and intuitive, having someone talk over the defaults provided recommendations that helped us jump forward very easily.
Again, the cloud management service has a several inbuilt default reports which are easy to customize and provide more visibility than we have had previously with several solutions.
What needs improvement?
The web filter service could be improved. It would be great to have a self-service user request for sites. An administrator would still need to approve, however.
The block screen could have a nicer screen or allow it to be customized.
The list of exceptions for URLs could be improved with a separate screen for a large list of exceptions. Having the same exception list for mobile and endpoints would be great.
We are hoping to transition to the SOC based service. Think this is still new; we're looking forward to get more information and test.
For how long have I used the solution?
We just transitioned to Check Point Harmony, and have been running it now for six weeks.
What do I think about the stability of the solution?
Stability seems very strong, however, it's early days.
What do I think about the scalability of the solution?
Scalability seems very strong, however, it is early days.
How are customer service and support?
We don't know yet.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
The move to hybrids has been working well during Covid.
How was the initial setup?
The initial setup was not complex.
What about the implementation team?
We did both - we implemented through a vendor and in-house.
What was our ROI?
The product offers a great lower cost than previous solutions.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to talk to your Check Point partners or find a good one.
Which other solutions did I evaluate?
We spent a long time reviewing the marketplace and comparison sites however, we did not test anything.
What other advice do I have?
I am very positive in terms of the solution and Check Point in general.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Harmony Endpoint
December 2024
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
ICT Officer at Kenyatta National Hospital
Guarantees the security and stability of your network
Pros and Cons
- "Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved."
- "They should provide bandwidth regulation, so we can monitor and regulate bandwidth."
What is our primary use case?
We primarily use this solution as the main firewall for the perimeter of the hospital. We use the firewall itself for URL filtering, application filtering, and identity awareness.
How has it helped my organization?
Before we used this solution, our mail used to have a lot of spam and most of the time our main email account was blacklisted. Now it works well; we are whitelisted by all organizations, including Google. Also, the security of our institution has really improved.
What needs improvement?
They should provide bandwidth regulation so we can monitor and regulate bandwidth.
For how long have I used the solution?
We've been using Check Point for five or six years.
What do I think about the stability of the solution?
It's 100% stable. It has never failed me in all the years I've used it.
What do I think about the scalability of the solution?
I do not think I have had any higher scale than now. Initially, we used the R77.3, but I have just upgraded to the Gaia R80 operating system. For the amount of user we need, it usually works well. We have 5,000 users on it and it is still running okay.
Actually, we have already ordered two more boxes. We are waiting for them to arrive in the hospital. They are both from the 15400 series.
How are customer service and technical support?
The technical support is fine. We've got a good relationship with the company. If there is any problem, they respond very well and fast.
For maintenance, we have a service agreement with the vendor who brought it to our institution.
Which solution did I use previously and why did I switch?
We had SonicWall, but it was not stable. With the number of users we needed, SonicWall became a bit overwhelmed.
How was the initial setup?
When we started it the initial setup was very complex. I have never been given any training on Check Point. I had to learn on the job.
What about the implementation team?
The deployment did not take long, the guys who came to the place from Check Point did it very fast, it was a fast thing, within a day or two.
What was our ROI?
Return on investment was the first thing we checked. We are okay in that regard. We are not complaining.
What's my experience with pricing, setup cost, and licensing?
We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it.
Which other solutions did I evaluate?
We looked at firewalls from Fortinet and Barracuda. We even brought guys here to test their solutions, but they were no match for Check Point. We are comfortable now with Check Point.
What other advice do I have?
My advice is to get Check Point, even without trying it first. Use it, and you will be very, very secure. Check Point guarantees the security and stability of your network.
I would rate this solution as nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security IT at a tech services company with 51-200 employees
Harmony Endpoint - modern app security in infinity portal
Pros and Cons
- "The most important characteristic of our requirements was the implementation of disk encryption."
- "We would like to make the documentation for more modern solutions like the Harmony family easier to find."
What is our primary use case?
Within the company, some departments, including the IT department, require their users to be connected from anywhere. In order to provide security to their teams, whether they were inside or outside the company, it was necessary to be able to implement a robust solution that would help us with access, equipment security, and reliability both for the protection of equipment information and to avoid vulnerabilities through applications to which users have access with credentials and administrator permissions.
How has it helped my organization?
This "Harmony Endpoint" tool is a modern solution from the Check Point Harmony family and has helped us improve the company's security with anti-malware protection, ransomware, among others, real-time protection, monitoring, and review of logs from the Check Point Infinity Portal.
Thanks to these characteristics, we have gained control over the equipment to avoid data loss. For example, with the encryption of the device units, we can avoid loss of the equipment, as well as access protection and application control policies, among other options that were enabled. It's leveraged to improve security.
What is most valuable?
The most important characteristic of our requirements was the implementation of disk encryption. It's necessary to avoid loss or theft of the equipment and, therefore, loss of data from the equipment. It can be applied to all the equipment from the portal or segments.
Another advantage is the control of applications and access policies that can be carried out in a granular manner for different company profiles. It works very well.
It offers secure administration from Check Point Infinity Portal. It is a security center where many of the Check Point solutions are located.
What needs improvement?
The improvements that can be mentioned are few. The solution and its architecture are very well done.
The Check Point Infinity Portal sometimes has some latency or performance issues that are slightly worse, affecting user management. It cannot be improved by the customer.
We would also like to make the documentation for more modern solutions like the Harmony family easier to find. That way, we can implement these solutions with the best practices recommended by the manufacturer.
For how long have I used the solution?
The solution has been used for more than two years for our portable devices with high mobility.
Which solution did I use previously and why did I switch?
Previously we used ESET at endpoints, however a site once had a ransomware attack and the solution was not able to solve the problem, so it was decided to change.
What's my experience with pricing, setup cost, and licensing?
The costs are per user. It is a good option for covering company equipment.
I recommend finding a partner that can help you with the costs for this and any other Check Point solution.
What other advice do I have?
This solution is very good and complete. I recommend it. You should try it and decide.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Security Assurance Specialist at Visa Inc.
Offers good protection and integrates well with other Check Point solutions
Pros and Cons
- "Check Point Endpoint Security really helped the business stop various malware attacks throughout the time we used it, including a ransomware attack, which was stopped in minutes."
- "I think some work needs to be done to improve the integration with other third-party products, namely SIEM solutions."
What is our primary use case?
We have used Check Point Sandblast Agent as an anti-malware solution. We were already working in a Check Point environment, which made the decision to purchase an endpoint security product from Check Point easy.
We first tested it in a Lab environment, where we sampled various malware, some less complicated than others. We were impressed with the results.
How has it helped my organization?
Check Point Endpoint Security really helped the business stop various malware attacks throughout the time we used it, including a ransomware attack, which was stopped in minutes.
What is most valuable?
The Sandblast Agent really made a difference for the organization. It integrated well with the existing Check Point environment we had in place. It was used both for threat protection and remote access VPN.
What needs improvement?
I think some work needs to be done to improve the integration with other third-party products, namely SIEM solutions. We found it quite challenging.
We found out the hard way that the configuration was lost when we version upgraded the management console.
For how long have I used the solution?
We have used Check Point Endpoint Security for the past two years.
Which solution did I use previously and why did I switch?
We did not use another similar solution prior to this one.
Which other solutions did I evaluate?
We did not evaluate other options.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Brand Manager at Corporation Sekiura S.A.C.E.I.
Excellent anti-ransomware, anti-bot and anti-exploit features
Pros and Cons
- "It has improved the detection of malware."
- "Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle."
What is our primary use case?
The first use case is to detect malware as well as advanced threat protection for known, unknown, and zero-day malware, sandbox emulation and extraction, and enhanced by automated endpoint forensics analysis.
Zero-day attacks are a risk for the company which seemed very important to us, plus the sandbox in the cloud. We have a cloud console that is easy to use and easy to monitor.
The details of our environment are Harmony Endpoint Advanced for 100 on-premise users with cloud managment console, and support for one year.
How has it helped my organization?
It has improved the detection of malware. We are very satisfied with the friendly and easy-to-monitor console. We chose the advanced version as it seemed very important to have advanced threat protection for known, unknown, and zero-day malware plus sandbox emulation and extraction, enhanced by automated endpoint forensics analysis.
At the moment we are very satisfied and confident with Check Point.
What is most valuable?
All of these features quoted below are valuable for us, as the set of solutions is what makes the solution really valuable.
- Endpoint Threat Prevention features
- Web Protection (malicious sites/URL Filtering)
- Anti-Ransomware
- Anti-Bot
- Anti-Exploit
- NGAV
- Anti-Virus
- Forensic collection and automated reports
- Threat Hunting
- Sandbox Emulation and Extraction (CDR)
- Endpoint Access Control Features
- Endpoint Firewall
- Application Control
- Port Protection
- Endpoint Compliance
- Remote Access VPN
If we had to choose one, we really like the EDR included.
What needs improvement?
The Check Point Harmony Endpoint is a very complete solution. Even in the most basic version, it already includes EDR, which today is very important and something that all endpoint solutions should consider having from the most basic versions. We would like to have one more step and that's to give and have full-disk encryption.
Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle. We could have it with Check Point Endpoint, mobile, cloud, or firewall. An all-in-one console would be great.
For how long have I used the solution?
I've been using the solution for six months.
What do I think about the stability of the solution?
The stability has been positive.
What do I think about the scalability of the solution?
The scalability has been positive.
How are customer service and support?
We did not have any problems. We got good solution training
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not previously use the solution.
What about the implementation team?
We had a positive experience with the implementation via a vendor.
What was our ROI?
Our ROI has been positive.
What's my experience with pricing, setup cost, and licensing?
If you need the on-premise management console, you have to pay an additional cost. It's not much, however, it's good to ask for a quote.
Which other solutions did I evaluate?
We also looked into Sophos.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: The company want to keep anonymity.
IT Administrator at a healthcare company with 1,001-5,000 employees
When we have reached out to support, they have been quick to respond
We use Checkpoint here, and are currently in the process of planning a major from the standalone client to the full console version.
They had some issues in the past with the OS X and Windows versions not being in sync, but with the latest release E80 release, the clients are identical.
There are still a few gaps, such as not supporting Fusion drives, but overall, things have been great.
Deployment has been simple: We create a composer package that pushes the installer and our installation profile onto the client, and then call a script to run through the pkg installer. It has worked flawlessly for us.
As far as management goes, the reason we are moving to the console version is to have better reporting. Currently, the encryption files are written to a File share, and that is all the logging we get. We use the JSS' EA to get a more up to date picture, but with the Console version, it allows for more "real-time" updates (1-2 minutes).
The stability has been great for us. We have found a few iMacs that shipped to us with bad blocks/sectors that were not picked up by any of our HD diagnostics.
When we have reached out to support, they have been quick to respond. Like I said above, I definitely suggest the web chat as the best option.
Reliability has been pretty good. We saw an uptick in "black screens" that leave the machines in an un-bootable state, but that is more due to the fact that these drives have been encrypted for 4-5 years, and are used 24/7.
As far as performance goes, we have noticed that with Checkpoint we are getting about a 1-2% performance hit over FileVault, but nothing that has cause major issues.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Technology Security Engineer at a tech services company with 11-50 employees
Efficient malware protection with an easy setup and helpful support
Pros and Cons
- "The traditional anti-malware engine is valuable."
- "There should be an indication when you assign an endpoint to be a local proxy for other endpoints. The current system doesn't clearly indicate whether the assignment was successful."
What is our primary use case?
Check Point Harmony Endpoint is used mostly for endpoint protection.
How has it helped my organization?
It protects endpoints for our customers.
What is most valuable?
The traditional anti-malware engine is valuable.
What needs improvement?
There should be an indication when you assign an endpoint to be a local proxy for other endpoints. The current system doesn't clearly indicate whether the assignment was successful. I even talked to Check Point support about considering this as a feature request.
For how long have I used the solution?
I have been familiar with Harmony Endpoint for about two years.
What do I think about the stability of the solution?
I did not encounter any stability issues with Harmony Endpoint.
What do I think about the scalability of the solution?
I would rate the scalability as 9.5 out of ten.
How are customer service and support?
I had no problems with Check Point support. They were very helpful and competitive, and we had various calls where they connected to our implementation and provided assistance.
Which solution did I use previously and why did I switch?
Before using Harmony Endpoint, we used other similar solutions, however, I do not have a stable opinion on which one is better as these products are very different.
We previously used McAfee.
How was the initial setup?
The setup is easy when using the web console. However, for on-premises deployment, it requires additional data and configuration.
What about the implementation team?
We have a certified engineer with the necessary certifications to install, support, and troubleshoot Harmony Endpoint and Check Point firewalls.
What's my experience with pricing, setup cost, and licensing?
Pricing is not within my purview as an engineer. However, if customers purchase it, I assume the price is reasonable.
What other advice do I have?
I would recommend Harmony Endpoint to others.
I'd rate the solution eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Last updated: Oct 30, 2024
Flag as inappropriateBuyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Cisco Secure Endpoint
SentinelOne Singularity Complete
Fortinet FortiClient
Cortex XDR by Palo Alto Networks
Symantec Endpoint Security
Intercept X Endpoint
Trend Vision One Endpoint Security
Trellix Endpoint Security
Kaspersky Endpoint Security for Business
ESET Endpoint Protection Platform
VMware Carbon Black Endpoint
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Are you aware of SIEM platforms that integrate both Active Directory auditing and security monitoring tools?
- Which ransomware is the biggest threat in 2020?