Try our new research platform with insights from 80,000+ expert users
reviewer1039464 - PeerSpot reviewer
Network Administrator at a healthcare company with 1,001-5,000 employees
Real User
Administratively, it's easy to control
Pros and Cons
  • "Administratively, it's easy to control."
  • "The security is its most valuable feature."
  • "Off the top of my head, I can't think of a way it has improved my organization."

What is our primary use case?

We have it on our endpoints.

How has it helped my organization?

Off the top of my head, I can't think of a way it has improved my organization.

What is most valuable?

The security is its most valuable feature.

Administratively, it's easy to control.

What do I think about the stability of the solution?

The stability of the solution is good.

Buyer's Guide
Check Point Harmony Endpoint
December 2024
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.

How was the initial setup?

The initial setup was pretty straightforward.

What about the implementation team?

We used a consultant, and he was awesome.

What was our ROI?

We have not yet seen ROI.

Which other solutions did I evaluate?

The company had this solution. I got put in charge of it, so it was already in place. I decided to keep it.

What other advice do I have?

From the administrative side, it is easy to manipulate and control, and that makes it great.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Owner at a tech services company with 1-10 employees
Real User
Offers the most secure and surefire way to tackle ransomware
Pros and Cons
  • "Its ability to rollback anti-ransomware once an attack has started is the most valuable feature."
  • "It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects."

What is our primary use case?

My primary use of this solution is to supplement my existing antivirus and enable/enhance my anti-ransomware capabilities.

What is most valuable?

Its ability to rollback anti-ransomware once an attack has started is the most valuable feature. 

What needs improvement?

It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects.

What do I think about the stability of the solution?

It's very stable. It is a production-grade solution.

What do I think about the scalability of the solution?

It scales well. However, it lacks deployment functionality because other vendors, like Symantec and McAfee, are building that into their tools. 

How are customer service and technical support?

On a scale from one to ten, I would rate their technical support as a nine. 

Which solution did I use previously and why did I switch?

We previously used Symantec Endpoint. Our reason for switching is because Check Point offers the most secure and surefire way to tackle ransomware.

I was part of the decision-making process.

How was the initial setup?

The initial setup was not straightforward. There is content available on the Check Point support site (on the Internet). This enabled us to deploy it out successfully.

What about the implementation team?

We implemented it internally. 

Which other solutions did I evaluate?

We did not consider any other vendors during the evaluation process.

What other advice do I have?

Don't think about getting the product. Just do it.

I would rate it a ten out of ten. No other product on the market is able to rollback a ransomware attack once it has started.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
December 2024
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
Muhammed Basheer - PeerSpot reviewer
Territory Manager at a tech services company with 501-1,000 employees
Real User
Reliable, easy initial setup, and excellent support
Pros and Cons
  • "The most valuable feature of Check Point Harmony Endpoint is it can be used for all kinds of endpoints, including mobile phones."
  • "Check Point Harmony Endpoint could improve mobile device management (MDM)."

What is our primary use case?

Check Point Harmony Endpoint is used for protection.

What is most valuable?

The most valuable feature of Check Point Harmony Endpoint is it can be used for all kinds of endpoints, including mobile phones.

What needs improvement?

Check Point Harmony Endpoint could improve mobile device management (MDM).

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for approximately one year.

What do I think about the stability of the solution?

The stability of Check Point Harmony Endpoint is good.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint is scalable.

How are customer service and support?

The support from Check Point Harmony Endpoint is excellent.

I rate the support from Check Point Harmony Endpoint a five out of five.

How was the initial setup?

The initial setup of Check Point Harmony Endpoint is easy.

What about the implementation team?

For 100 users of Check Point Harmony Endpoint, we only need one person for maintenance.

What's my experience with pricing, setup cost, and licensing?

The price of Check Point Harmony Endpoint is comparable to SonicWall. The price could be a bit lower.

I rate the price of Check Point Harmony Endpoint a four out of five.

What other advice do I have?

I rate Check Point Harmony Endpoint an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
reviewer1597644 - PeerSpot reviewer
Chief Technology Officer at a tech services company with 11-50 employees
Real User
Is easy to deploy, cost effective, stable, scalable, and more secure
Pros and Cons
  • "Check Point Harmony Endpoint can be easily deployed and is cost effective and more secure."
  • "Technical support needs to be improved, along with the response time."

What is our primary use case?

Check Point Harmony Endpoint is antimalware and antivirus software, and it also has features such as in firewall autoresponse and autonotification, autoprotection, definition updates, and policies that we can apply.

We have medium-sized companies who use this solution.

What is most valuable?

My customers choose Check Point Harmony Endpoint because deployment is easier and because it's cost effective and more secure.

It is also a stable and scalable solution.

What needs improvement?

Technical support needs to be improved, along with the response time. The technical team or any product team should liaise with us and help to deploy the solution to the first few customers so that we can roll out to the rest of the customers.

They need to improve the licensing process as well so that it is easier for the end user. At present, we have to wait one to two weeks to get a license, which is not productive. The process is not very smooth or convenient for the end user because Check Point Harmony Endpoint provides two login portals. One is for licensing, and the other is for management.

In the future, I would like to the management portal and the licensing portal be integrated or changed to a single sign-on because that will be good for both the panel and the user. If they can make it very convenient for deployment and monitoring, it would be good.

If we could get technical support in Singapore, then it will be helpful for our customers.

For how long have I used the solution?

I've been dealing with this solution for two months.

It's deployed both on cloud and on-premises.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

This solution is scalable. If you have a server or any software deployment tools, you can just push from the server so that the users don't even need to install it on their machines.

How are customer service and technical support?

Technical support needs to improve. Their response time needs to improve too. Also, the only way to contact technical support is through email or international phone calls (for us in Singapore).

How was the initial setup?

The initial setup is much easier compared to that of other solutions because it involves emailing and letting the agent download and then deploy the solution. It's lightweight, not using a lot of system resources compared to the rest of the products. It is the next generation of endpoint agents.

The deployment itself can take a day.

Maintenance is not required because it depends on the policy that you apply on the Check Point portal itself.

What's my experience with pricing, setup cost, and licensing?

Compared to the cost of other solutions, Check Point Harmony Endpoint is cost effective. The cost is not very cheap, but it's fair.

The licensing process is not smooth and can take one to two weeks.

What other advice do I have?

I would recommend this solution because the protection works well, and it is cost is effective.

They also have cloud-based management, so it is like a SaaS service, and we don't need to buy a server to host it and to implement any hardware just for running the management of Check Point Harmony Endpoint.

On a scale from one to ten, I would rate this solution at eight.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Owner at Giliam Network & System Solutions
Real User
VPN functionality helps keep our network secure
Pros and Cons
  • "The most valuable feature of this solution is the VPN."
  • "I would like to see support for a policy in the appliance that will refuse to create a connection if it does not detect an active virus scanner."

What is our primary use case?

The primary use case for this solution is security.

What is most valuable?

The most valuable feature of this solution is the VPN.

What needs improvement?

I would like to see support for a policy in the appliance that will refuse to create a connection if it does not detect an active virus scanner.

Two-factor authentication is missing from this solution.

For how long have I used the solution?

I have been using this solution for more than twelve years.

What do I think about the stability of the solution?

The stability is very good.

What do I think about the scalability of the solution?

This is a scalable solution.

What other advice do I have?

I would rate this solution a ten out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1477194 - PeerSpot reviewer
Engineer at a tech services company with 51-200 employees
Real User
Good sandbox and forensics capabilities, good visibility
Pros and Cons
  • "The most valuable feature is forensics."
  • "We cannot integrate this product with other solutions, which is something that should be improved."

What is our primary use case?

We primarily use this product for the SandBlast module. It is used for sandboxing, malware detection, antivirus, and forensics blade.

What is most valuable?

The most valuable feature is forensics.

What needs improvement?

We cannot integrate this product with other solutions, which is something that should be improved. I believe that it is in the roadmap.

Other vendors have some non-security-related features in their endpoint protection solutions that should be implemented in this one.

For how long have I used the solution?

I have been using Check Point Endpoint Security for approximately one year.

What do I think about the stability of the solution?

The stability is okay but if you have limited resources then it gets slow.

What do I think about the scalability of the solution?

I have not used this product in a large deployment. Certainly, it scales, but my deployment is for less than 500 endpoints. Our company is really small, with just 25 people. As a partner, we also deploy it for our customers.

How are customer service and technical support?

The people that work for the vendor are sometimes a little hard to get a hold of, but once you do get in contact with them, they get the problem fixed.

How was the initial setup?

It is rather easy to set up. As a cloud solution, you can have it up and running in a day or less. We have defined different policies, which makes it easy to get up and running. After you, you can customize the setup.

What other advice do I have?

My advice to anyone who is considering Check Point Endpoint Security is that it is a great solution that is very easy to deploy, and it really gives you visibility of what's happening on your endpoint. It helps you do deal with security issues pretty fast.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
PeerSpot user
Senior Security Consultant - Checkpoint Technologies at a tech services company with 11-50 employees
Consultant
Automatically Deletes Ransomware and Restores the Encrypted Files
Pros and Cons
  • "We had a ransomware attack and the SandBlast agent automatically picked up the ransomware."
  • "One area of this product that has room for improvement is the disc encryption."

What is our primary use case?

We have implemented Check Point for endpoint protection.

How has it helped my organization?

We had a ransomware attack and the SandBlast agent automatically picked up the ransomware. It automatically deleted the ransomware and restored the encrypted files.

What is most valuable?

The most valuable feature of Check Point Endpoint Security is the SandBlast Agent.

What needs improvement?

One area of this product that has room for improvement is the disc encryption.

I'd like to see a patch management solution like Kaspersky has. That's the only feature that's missing.

For how long have I used the solution?

We've been using Check Point Endpoint Security for about a year now.

What do I think about the stability of the solution?

Check Point Endpoint Security is very stable.

What do I think about the scalability of the solution?

Check Point Endpoint Security is very scalable. There are 11 of us. You need a central management station with one person. Everybody here is using it already.

How are customer service and technical support?

The technical support is good. If you log calls, they're very quick to respond.

Which solution did I use previously and why did I switch?

We used Kaspersky. The Check Point Endpoint was new. We wanted to roll it out to our clients. We wanted to first try it in-house.

How was the initial setup?

The initial setup is straightforward. It was very quick. It was probably, in total, about 40 minutes.

What about the implementation team?

We are Check Point partners. We did it ourselves, in-house.

What's my experience with pricing, setup cost, and licensing?

Our license is on a yearly basis. It just includes the licensing fee.

Which other solutions did I evaluate?

We did have a look at some other options like Symantec and McAfee. We found that the anti-ransomware component on the Check Point was better than the competitors.

What other advice do I have?

My advice to others that are looking to implement Check Point Endpoint Security is that it's very secure. The only issue is that the disc encryption is bound to the hardware in the machine that it's in. It takes a bit long to decrypt the hard drive. That's the only issue. 

I'd give Check Point Endpoint Security about a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
PeerSpot user
PeerSpot user
Tech Support Staff at a tech company with 51-200 employees
Real User
I would recommend endpoint security to anyone because it worked for me; no security issues with end devices for more than a year now.

Valuable Features:

Endpoint security protects networks from unauthorized programs, viruses and malware, and allows you to control the network by blocking devices that you do not want to have access to it, for example by file extensions or using the device’s ID.It also controls access and prevents theft of data by controlling access to storage devices that are portable. USB storage devices are also encrypted for security purposes.Centralized monitoring, logging and generation of reports and automatic protection of newly added computers to the network are other functions and capabilities of endpoint security.

Room for Improvement:

It took me time to learn how to configure endpoint security. Getting one for our Unix-based systems was not easy because most programs available in the market are windows-based. Implementing security on the latest endpoint devices was not easy due to compatibility issues.

Other Advice:

Endpoint security is implemented on client-server network model to ensure that end devices in the network are totally secure before having access to the network. Endpoint security can be implemented as a firewall or an anti-virus program that can be configured to include intrusion detection properties. It is also used in cloud computing and can be hosted or used on-site. It is a very flexible and efficient form of desktop security and I have used it for a very long time.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2024
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.