Try our new research platform with insights from 80,000+ expert users
Sitti Ridzma Salahuddin - PeerSpot reviewer
System Engineer at Trends and Technologies, Inc
Reseller
Top 5
Useful for prevention and detection, and supports Windows 7
Pros and Cons
  • "The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read."
  • "Check Point Harmony Endpoint's GUI is old. It needs to have a modern dashboard for logging activities. Compared to other products, the solution is slow in terms of deep scanning."

What is our primary use case?

We use the solution in hospitals. 

What is most valuable?

The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read. 

What needs improvement?

Check Point Harmony Endpoint's GUI is old. It needs to have a modern dashboard for logging activities. Compared to other products, the solution is slow in terms of deep scanning. 

For how long have I used the solution?

I have been working with the product for three months. 

Buyer's Guide
Check Point Harmony Endpoint
January 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.

What do I think about the stability of the solution?

I rate the solution's stability an eight-point five out of ten.

What do I think about the scalability of the solution?

The tool has many modules and is scalable. I rate it an eight-point five out of ten. 

How was the initial setup?

I rate the tool's deployment ease an eight out of ten. The process takes less than a day. In our case, however, it required at least three hours because we were doing a demo for Windows 7. We also needed to update the endpoint, which involved some installation requirements.

What's my experience with pricing, setup cost, and licensing?

I rate the solution's pricing a five out of ten. It costs around ₱2,200 per endpoint. 

What other advice do I have?

Our customers are mostly medium enterprises. You need to be patient with the scanning. The solution will help you with prevention and detection. I rate the overall product a nine out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate
PeerSpot user
Rakesh Jadhav - PeerSpot reviewer
Sr. Technical Consultant - Presales at Ivalue Infosolution
User
Easy to set up with helpful support and great flexibility
Pros and Cons
  • "It has extended OS support to ensure your legacy endpoints also have zero-day protection."
  • "They need to focus on more scalability (as much as possible) so that the solution can run across all supported OS."

What is our primary use case?

This solution can provide you with robust endpoint security and has the ability to give deep-level forensics because of EDR capability. 

The solution can offer you value-added features with the EPP-EDR platform to ensure complaint and posture management, category-based web access, disk encryption, password protection, and DLP over endpoint channels.

The primary key use cases for Check Point are:

1. Single console across multiple Check Point solutions using the Infinity Portal

2. Flexible deployment architecture

3. OS support

4. Rich threat intel to mitigate known/unknown attacks

5. Flexibility to bundle multiple value-added additional modules/features with the EPP platform

How has it helped my organization?

By using Harmony, you can provide 100 % security to the endpoints along with compliance and management features. This has a flexible deployment method. 

It has extended OS support to ensure your legacy endpoints also have zero-day protection. 

Using add-ons such as posture management, organizations can manage OS-level vulnerability and get rid of unwanted beaches. 

Check Point Harmony also protects you from web-based attacks along with category-based restrictions to ensure the end user gets the required access. 

What is most valuable?

Integration of the Check Point Threat intel cloud with the EPP-EDR platform, which is enhancing and providing efficient DB for threat hunting and preventing zero-day using an anti-exploit platform. 

Apart from the EPP and EDR capability, Check Point Harmony can integrate using API with 3rd party vendors; Azure AD integration makes the whole deployment and management easy for the administrator.

Multiple endpoint protection packages are available for organizations. Also, it is an MSSP-compatible platform.

What needs improvement?

With Check Point, you will get your all required value-added features as per your requirements. That said, they need to focus on more scalability (as much as possible) so that the solution can run across all supported OS. 

There are legacy OS concerns. It would be really helpful for them if legacy OS support could be extended up to Windows XP. 

Aside from that, Check Point Harmony will be a suitable option for any type of organization.

For how long have I used the solution?

I have been closely working on this solution in my organization over the last year. 

What do I think about the stability of the solution?

Using rich threat intel and robust endpoint security, the solution ensures protection against known and unknown attacks.

What do I think about the scalability of the solution?

The solution offers a flexible deployment and easy management through a consolidated console. 

How are customer service and support?

Support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously I worked with Cylance AV. Considering all value-added features along with the robust endpoint solution and threat intel, Check Point Harmony is the better choice. 

How was the initial setup?

The initial setup is very simple.

What about the implementation team?

We handled the implementation in-house.

What was our ROI?


What's my experience with pricing, setup cost, and licensing?

The pricing is really competitive when you consider other known vendors in the market.

Which other solutions did I evaluate?

We explored some traditional solutions as well.

What other advice do I have?

Check Point Harmony is feature-rich and robust, with great endpoint detection and response capabilities to ensure deep forensic understanding across incidents. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
January 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
Christal Tan - PeerSpot reviewer
Network and Cybersecurity Engineer at Respiro
Reseller
A tool that offers great functionalities in areas like web protection and threat prevention
Pros and Cons
  • "The most valuable features of the solution are web protection and threat prevention."
  • "A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings."

What is our primary use case?

When it comes to Check Point Harmony Endpoint, I have not dealt with any of our company's clients yet since I am still in the discovery phase.

What is most valuable?

The most valuable features of the solution are web protection and threat prevention.

What needs improvement?

A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings. Sometimes the product's page doesn't load at all, and sometimes it does. The position of the tabs and the other stuff on the product page needs to change a little bit.

I think the product's deployment process is much quicker in Mac devices, and it takes a bit more steps for Windows and the area, which needs a bit of improvement so that some balance is created when it comes to the steps in the deployment phase.

Considering last year, the pace at which the technical support team is progressing is a bit slow, making it an area where improvements are required.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for a year. My company has a partnership with Check Point Harmony Endpoint.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a nine out of ten.

My company mostly caters to the needs of small companies where the solution is used.

How are customer service and support?

I rate the technical support an eight out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

I rate the product's initial setup phase a ten on a scale of one to ten, where one is a difficult setup phase, and ten is an easy setup process.

The solution is deployed on the cloud.

The solution can be deployed in around ten minutes.

What's my experience with pricing, setup cost, and licensing?

I recently started to look for the prices of other products in the market and found out that Check Point Harmony Endpoint is cheaper than most of the other available solutions in my country. Price-wise, the product is affordable. There are no additional costs apart from the licensing charges that are attached to the product.

What other advice do I have?

Check Point Harmony Endpoint is a really good endpoint security solution because it comes as a full package. With the solution, there are not many additional costs for add-on features, especially when compared to the costs of the add-ons offered by other solutions in the market.

I rate the solution a ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Rahul Kamble. - PeerSpot reviewer
Business Director at One Networks
Reseller
Top 5
A comprehensive endpoint protection tool that is highly stable
Pros and Cons
  • "Stability-wise, I rate the solution a ten out of ten."
  • "Check Point offers solutions with only a few features for our company's customers' sites."

What is our primary use case?

My company tried Check Point Harmony Endpoint with multiple clients, but unfortunately, we could not get many clients to use the product. Currently, my company has limited clients, like ten to fifteen customers who use Check Point Harmony Endpoint.

What is most valuable?

The valuable features of Check Point Harmony Endpoint stem from the fact that it serves as a comprehensive endpoint protection product that provides users with a fast solution and complete endpoint protection while serving as a tool that offers the fastest recovery for endpoints. The tool efficiently detects, protects, and corrects vulnerabilities and patches.

What needs improvement?

Check Point offers solutions with only a few features for our company's customers' sites. My company hasn't found any bugs or didn't find the solution to be complex. Features like zero phishing, sandboxing, threat emulation and extractions, malware detection, and EDR solution capabilities need to be included in the product. My company expects more granular EDR functionalities in Check Point Harmony Endpoint.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for six months. My company has a partnership with Check Point Harmony Endpoint.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a nine out of ten.

Check Point Harmony Endpoint is a solution used by the company's clients who operate small and medium-sized businesses.

How are customer service and support?

I rate the technical support an eight and a half out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

I rate the product's initial setup phase a nine out of ten.

The solution is deployed on an on-premises model.

The solution can be deployed within two hours.

During the deployment process of Check Point Harmony Endpoint, my company needs to install the initial client and select an agent from the settings on Windows Server, after which we need to push the solution to the client. Installing the initial client isn't something that is very easy. With all the features like signature-based detection, threat emulations, and sandboxing, users may need to be involved in the creation of a signature group.

What's my experience with pricing, setup cost, and licensing?

Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years.

What other advice do I have?

Check Point Harmony Endpoint is a well-known solution among cybersecurity companies. With Check Point Harmony Endpoint, if my company gets good profit margins along with good opportunities, then we can penetrate into the market to sell it. My company expects support from Check Point, though we don't deal in many of its solutions.

I rate the overall tool a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Sales Manager, Checkpoint at South Asian Technologies
Reseller
Top 10
A solution with a number of valuable blades that make it competitive
Pros and Cons
  • "With the prevention blade, Harmony scales higher than many other solutions."
  • "I have a few issues when attempting to install Harmony on some of the machines."

What is our primary use case?

I handle Check Point SMB along with Check Point Harmony Endpoint, and I have recently provided around 400 endpoints to a construction company in Sri Lanka.

What is most valuable?

The Rollback feature is valuable because ransomware attacks are very familiar nowadays, and anti-phishing and anti-ransomware blades are required by many of our customers. Other features, like prevention blades, are also okay, where you get threat extraction and evaluation. Likewise, the forensic report is also very important.

With the prevention blade, Harmony scales higher than many other solutions. Even CrowdStrike has technical problems when you're offline. But Harmony is not like that. Even if I don't have Internet connectivity, I have seen how remediation and rollback happen. All the encrypted files come to a state where it works with micro-backups.

Customers would like to have a very advanced endpoint to protect themselves from anti-phishing, especially ransomware.

What needs improvement?

I have clients who use very old Windows versions, so I have a few issues when attempting to install Harmony on some of the machines. At times, even with the latest Windows versions, the machines' performance gets slower. We still don't have a clear idea of what has been happening. If you take 100 PCs, two, three, or four are still troublesome when you attempt to install Harmony.

Also, the price could come down slightly, and I am not saying by a huge gap, but slightly. Even Sri Lanka's smaller customers have to buy a minimum quantity, and with Harmony Connect, they have to buy 50 licenses at once. If they could come down to 20, 30, or something like that, I should be able to sell much more. Some customers would like to have Harmony, but they have to buy a minimum quantity of 50. That's a bit troublesome for me as a salesperson.

For how long have I used the solution?

I have worked with Checkpoint Harmony Endpoint for almost one year now.

What do I think about the stability of the solution?

I rate the solution's stability a nine out of ten.

What do I think about the scalability of the solution?

I highly rate the solution's scalability.

How are customer service and support?

We have a set of engineers who specialize in Harmony Endpoint and Harmony Connect.

How would you rate customer service and support?

Positive

How was the initial setup?

The deployment takes one or two weeks. The deployer always creates a tenant, through which they install the solution. They also trained customers and end users to install Harmony, and they managed to install the entire license.

What's my experience with pricing, setup cost, and licensing?

I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high.

What other advice do I have?

Features like factory remediation, basically callback, are getting familiarized by Sri Lankan customers. Many have bought Harmony endpoints, so many customers have been considering Harmony Connect. This will lead to it having a good future.

When speaking to customers, I first communicate what ThreatCloud is all about. ThreatCloud is shared by other solutions like CloudGuard, Quantum, and Quantum Spark. It's very common to them. This means you will get the prevention blade, not the detection blade. Whenever you have phishing attacks, malware attacks, DDoS attacks, and even zero-day attacks, they are all always prevented by Check Point Harmony and Check Point products.

I always advise people to go for an advanced endpoint because IT managers have less of a hassle when using products like Check Point.

I have been facing lots of competition with CrowdStrike and Kaspersky. I don't think other products should compete with Check Point Harmony Endpoint because it is a different level endpoint altogether. I want to give them competition with the pricing.

I rate Check Point a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Abdul Modi - PeerSpot reviewer
Information Technology Security Specialist at Al Muzaini Exchange Co.
Real User
Top 20
Offers in-built EDR capabilities to provide better visibility of threats
Pros and Cons
  • "Compared to its competitors, Check Point Harmony Endpoint has advantages in areas like EDR and behavioral detection."
  • "The response from the tool's support team, which starts with L1, is something my company doesn't find helpful, especially when compared to the other solutions that we use."

What is our primary use case?

I use the solution in my company, and it is usually deployed on all our endpoint solutions, which include workstations and servers.

What is most valuable?

I think the overall product is good. There is an in-built EDR in the tool, which is good because it gives users visibility into the threats coming into the environment.

What needs improvement?

The support from the vendor itself is the tool's weakness because we don't get good support from the vendor. The response from the tool's support team, which starts with L1, is something my company doesn't find helpful, especially when compared to the other solutions that we use. The support is one of the major issues with Check Point Harmony Endpoint.

Apart from the support area, everything else is good in the tool.

The tool's performance sometimes slows down the system, and I think the module itself is very heavy on the endpoints, making it an area that can be improved. In our company, we have seen Trend Micro and other solutions that have very light agents, so they do not affect the performance of the endpoints.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for three years. I use a standard version.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a seven or eight out of ten.

What do I think about the scalability of the solution?

The tool's scalability is good. Scalability-wise, I rate the solution a seven to eight out of ten.

My company has around 800 licenses for the product, and I think we have a couple of administrators who are or are less good and capable of managing the solution.

My company does not plan to increase the use of the solution in the future because we have reached its maximum capacity. Even if we try to increase the capacity of the product in our company, then I don't believe that it would go beyond five to ten percent.

How are customer service and support?

I rate the technical support not more than four or five out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have worked with Symantec, Trend Micro, and Sophos.

What was our ROI?

My company has reached a point where it has experienced a return on investment from the use of the product.

What's my experience with pricing, setup cost, and licensing?

The product is averagely priced. The product price is neither very high nor too low. The tool is not really expensive.

Which other solutions did I evaluate?

Compared to its competitors, Check Point Harmony Endpoint has advantages in areas like EDR and behavioral detection. Lately, all the solutions have improved. I think that now there are a number of solutions that come with SIEM capabilities, while in the past, around three years ago, Check Point was leading in the aforementioned area. More or less, all the products that can be compared with each other are the same if I consider the peer-to-peer node part.

What other advice do I have?

Two or three years ago, I would have recommended the product to others, but nowadays, there are other solutions with good capabilities that are better than Check Point. I wouldn't recommend the tool to anyone now because I have seen much better solutions lately, and the market is also changing and becoming very dynamic.

Check Point Harmony Endpoint should learn from its competitors how to improve its agent capabilities and have a lightweight agent to provide good support. Also, some real-time detection and behavioral security checks are still missing and need to be improved.

I rate the overall tool an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Anil Redekar - PeerSpot reviewer
Network and Security Engineer at a consultancy with 10,001+ employees
MSP
Top 5
Great anti-malware, anti-phishing and anti-ransomware capabilities
Pros and Cons
  • "The main advantage of the solution is the ability to implement complete security policies for the terminals in order to address how apps are installed on corporate devices."
  • "The solution needs more alerts to warn of attacks."

What is our primary use case?

In our organization, we are creating Trusted, Untrusted, and DMZ zones. 

We use URL filtering, antivirus and threat prevention, as well as detect and monitoring of all the outside traffic that enters the organization. 

It downloads the latest signature from the Check Point database for anti-malware and it keeps my laptop clear from malware files and attacks. 

We are now able to regularly scan after implementing this product and now we feel happy. In many ways, it made us feel safe. 

We have installed this tool for every user.

How has it helped my organization?

The Harmony vendor is excellent at providing various features and updates regularly. 

The main advantage of the solution is the ability to implement complete security policies for the terminals in order to address how apps are installed on corporate devices. 

It secures our organization from attacks from ransomware, malware, et cetera. 

The most important feature is the file scan capability. It saves us from attacks by modified files. In this way, we secure our internal traffic from outside attackers.

What is most valuable?

The below features are most valuable:

1) Anti-malware

2) Threat protection with signature

3) Anti-ransomware

4) Anti-phishing (support for all leading browsers)

1) Anti-malware (to detect and prevent malicious activity)

2)  Threat protection with signatures to prevent the threat on the basis of a signature. Signatures are stored in the database. 

What needs improvement?

I would suggest that the Check Point team always allocates an SME to all the vendors before implementation. This will help when the endpoint agent cannot integrate with another product or third party. It could expand the functionalities too. In addition to security functionality, they could incorporate Mobile Device Management (MDM) functionalities such as remote device management, administration of installed applications, et cetera. 

The solution needs more alerts to warn of attacks. 

For how long have I used the solution?

I have used this product for the last two years.

Which solution did I use previously and why did I switch?

We did not use a different solution previously.

How was the initial setup?

The setup is somewhat complex the first time, however, it is not too complicated or difficult.

What about the implementation team?

We implemented this product as per the organization's requirements. We did it ourselves.

What was our ROI?

Our ROI has definitely improved after installing this product.

What's my experience with pricing, setup cost, and licensing?

It is a fair price and according to the quality of the product offered.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Vikas Gawali - PeerSpot reviewer
Security Engineer at TD SYNNEX
Real User
Top 5Leaderboard
Offers ease of deploying and removing features to users
Pros and Cons
  • "The installation is really flawless. It is easy to install."
  • "The drawback associated with the product is related to macOS since some features in it don't work."

What is our primary use case?

I use the solution in my company as an antivirus tool for port protection, media encryption, and hard disk encryption. There are many features for threat prevention, anti-fraud, anti-malware, threat detection, sandboxing, threat emulation, and threat hunting. These are some features based on the product licenses.

What needs improvement?

The drawback associated with the product is related to macOS since some features in it don't work. Some features sometimes do not work at all, and at times, they lag. When you install Check Point Harmony Endpoint, the system lags in between because it is a heavy agent. When you try to deploy some of the features you can deploy, like anti-malware and anti-ransomware, during which your system may sometimes get stuck.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for two years. My company is a reseller of the solution. My organization is a distributor reselling Check Point, and we also provide guidance on how to implement, use, and explain the features with the help of the PoC implementation phase.

What do I think about the stability of the solution?

I have not seen any glitches or bugs in the product. The product is stable in general.

Overall, the tool is stable.

What do I think about the scalability of the solution?

You can increase or decrease some features with the help of the policies in the tool. It is very easy to deploy the feature, and you can remove and disable some features. It is very easy.

How are customer service and support?

The solution's technical support is smooth. I rate the technical support an eight and a half to nine out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have experience with Symantec and Trend Micro. Symantec has pros and cons, including that sometimes some features don't work. In Check Point Harmony Endpoint, all the features are working, and it is really easy to use. I haven't used much of Trend Micro, but I know it is removed and replaced by Check Point Harmony Endpoint nowadays.

How was the initial setup?

The installation is really flawless. It is easy to install.

Only one administrator is needed to install the system.

No maintenance is required. There is no need to invest in maintenance time or no downtime. You need to restart the system, download the agent, and install it on your particular system. You can deploy the policies also.

What was our ROI?

The tool helps with cost savings. Compared to other products, it offers cost-saving benefits and is easy to maintain. It is really feasible to work with, or it is really cost-effective for industrial purposes.

What's my experience with pricing, setup cost, and licensing?

There are three licenses. One is the basic license, which only gives you threat prevention. In the second one, you will get port protection. In the complete license, you will get all the licenses, like anti-malware, sandboxing, port protection, and all the licenses. It is very easy to deploy the tool.

What other advice do I have?

The integration capabilities are very easy to install. We just need to deploy them after the download process for our requirements. Deploying the systems takes only five minutes. We can deploy them via the ADE Server.

The tool has some AI and ML-based integration, and it offers features like ThreatCloud AI. ThreadCloud AI is installed, so you can just only deploy the soluton.

I found Check Point Harmony Endpoint's deployment to be easier than implementation procedures for other solutions.

I rate the tool a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.