Try our new research platform with insights from 80,000+ expert users
Daphne - PeerSpot reviewer
Project Manager at Junta de Andalucia
Real User
Great value for money, easy to deploy, and is great at detecting threats
Pros and Cons
  • "One of the strengths of Harmony is its power to detect threats and keep us safe."
  • "I still don't have a clear opinion of the possible improvements that the tool may need. There are still functionalities that I have not been able to try completely and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."

What is our primary use case?

In my organization, we have deployed the Harmony Endpoint Check Point tool with the idea of being able to secure the deployed part of our mobile corporate devices in order to start the security processes at the point as close to the user as possible. 

Using its ease of deployment capacity and its power in detecting malware or insecure elements, this tool provides us with the peace of mind we were looking for in an environment of several thousand terminals deployed on the network in many places and environments.

How has it helped my organization?

By using the Check Point Harmony Endpoint tool we have improved our network visibility, have extensive control of our network and our users, and, above all, have a level of security against cyber attacks that we did not have before. 

Now, we are able to detect and avoid security breaks. We can better understand the use that our users make of the devices, and, most importantly, we can apply security policies that keep our users safe as well as the organization's own systems and data. The personal information of our users is also secure.

What is most valuable?

Right away, we noticed when using Check Point's Harmony Endpoint tool, was the ease of deployment. In our case, it was deployed without too many difficulties, considering the deployment involved several tens of thousands of devices. 

Once deployed, the dashboard and all the inventory information that we had been able to obtain and that we did not know about before proved to be very interesting. 

One of the strengths of Harmony is its power to detect threats and keep us safe. Also the ability to apply policies specifically to users or groups is very useful.

What needs improvement?

I still don't have a clear opinion of the possible improvements that the tool may need. There are still functionalities that I have not been able to try completely and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point. 

Something that is very important to me is the remediation or recovery capabilities after an attack. From what I have seen so far, this tool maintains the quality line of Check Point products and is always ahead of the needs of the market.

Buyer's Guide
Check Point Harmony Endpoint
November 2024
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for seven months.

Which solution did I use previously and why did I switch?

This was the first endpoint tool we use in my organization. We didn't use anything previously.

What's my experience with pricing, setup cost, and licensing?

The only thing I don't like about the solution is the time to pay for the licenses. That said, I really believe that it is a fair price according to the quality of the product offered.

Which other solutions did I evaluate?

What other advice do I have?

After analyzing and comparing other solutions, we determine that Harmony has the best value for money.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Vikas Gawali - PeerSpot reviewer
Security Engineer at TD SYNNEX
Real User
Top 5Leaderboard
Offers ease of deploying and removing features to users
Pros and Cons
  • "The installation is really flawless. It is easy to install."
  • "The drawback associated with the product is related to macOS since some features in it don't work."

What is our primary use case?

I use the solution in my company as an antivirus tool for port protection, media encryption, and hard disk encryption. There are many features for threat prevention, anti-fraud, anti-malware, threat detection, sandboxing, threat emulation, and threat hunting. These are some features based on the product licenses.

What needs improvement?

The drawback associated with the product is related to macOS since some features in it don't work. Some features sometimes do not work at all, and at times, they lag. When you install Check Point Harmony Endpoint, the system lags in between because it is a heavy agent. When you try to deploy some of the features you can deploy, like anti-malware and anti-ransomware, during which your system may sometimes get stuck.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for two years. My company is a reseller of the solution. My organization is a distributor reselling Check Point, and we also provide guidance on how to implement, use, and explain the features with the help of the PoC implementation phase.

What do I think about the stability of the solution?

I have not seen any glitches or bugs in the product. The product is stable in general.

Overall, the tool is stable.

What do I think about the scalability of the solution?

You can increase or decrease some features with the help of the policies in the tool. It is very easy to deploy the feature, and you can remove and disable some features. It is very easy.

How are customer service and support?

The solution's technical support is smooth. I rate the technical support an eight and a half to nine out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have experience with Symantec and Trend Micro. Symantec has pros and cons, including that sometimes some features don't work. In Check Point Harmony Endpoint, all the features are working, and it is really easy to use. I haven't used much of Trend Micro, but I know it is removed and replaced by Check Point Harmony Endpoint nowadays.

How was the initial setup?

The installation is really flawless. It is easy to install.

Only one administrator is needed to install the system.

No maintenance is required. There is no need to invest in maintenance time or no downtime. You need to restart the system, download the agent, and install it on your particular system. You can deploy the policies also.

What was our ROI?

The tool helps with cost savings. Compared to other products, it offers cost-saving benefits and is easy to maintain. It is really feasible to work with, or it is really cost-effective for industrial purposes.

What's my experience with pricing, setup cost, and licensing?

There are three licenses. One is the basic license, which only gives you threat prevention. In the second one, you will get port protection. In the complete license, you will get all the licenses, like anti-malware, sandboxing, port protection, and all the licenses. It is very easy to deploy the tool.

What other advice do I have?

The integration capabilities are very easy to install. We just need to deploy them after the download process for our requirements. Deploying the systems takes only five minutes. We can deploy them via the ADE Server.

The tool has some AI and ML-based integration, and it offers features like ThreatCloud AI. ThreadCloud AI is installed, so you can just only deploy the soluton.

I found Check Point Harmony Endpoint's deployment to be easier than implementation procedures for other solutions.

I rate the tool a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
November 2024
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
Abdul Modi - PeerSpot reviewer
Information Technology Security Specialist at Al Muzaini Exchange Co.
Real User
Top 20
Offers in-built EDR capabilities to provide better visibility of threats
Pros and Cons
  • "Compared to its competitors, Check Point Harmony Endpoint has advantages in areas like EDR and behavioral detection."
  • "The response from the tool's support team, which starts with L1, is something my company doesn't find helpful, especially when compared to the other solutions that we use."

What is our primary use case?

I use the solution in my company, and it is usually deployed on all our endpoint solutions, which include workstations and servers.

What is most valuable?

I think the overall product is good. There is an in-built EDR in the tool, which is good because it gives users visibility into the threats coming into the environment.

What needs improvement?

The support from the vendor itself is the tool's weakness because we don't get good support from the vendor. The response from the tool's support team, which starts with L1, is something my company doesn't find helpful, especially when compared to the other solutions that we use. The support is one of the major issues with Check Point Harmony Endpoint.

Apart from the support area, everything else is good in the tool.

The tool's performance sometimes slows down the system, and I think the module itself is very heavy on the endpoints, making it an area that can be improved. In our company, we have seen Trend Micro and other solutions that have very light agents, so they do not affect the performance of the endpoints.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for three years. I use a standard version.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a seven or eight out of ten.

What do I think about the scalability of the solution?

The tool's scalability is good. Scalability-wise, I rate the solution a seven to eight out of ten.

My company has around 800 licenses for the product, and I think we have a couple of administrators who are or are less good and capable of managing the solution.

My company does not plan to increase the use of the solution in the future because we have reached its maximum capacity. Even if we try to increase the capacity of the product in our company, then I don't believe that it would go beyond five to ten percent.

How are customer service and support?

I rate the technical support not more than four or five out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have worked with Symantec, Trend Micro, and Sophos.

What was our ROI?

My company has reached a point where it has experienced a return on investment from the use of the product.

What's my experience with pricing, setup cost, and licensing?

The product is averagely priced. The product price is neither very high nor too low. The tool is not really expensive.

Which other solutions did I evaluate?

Compared to its competitors, Check Point Harmony Endpoint has advantages in areas like EDR and behavioral detection. Lately, all the solutions have improved. I think that now there are a number of solutions that come with SIEM capabilities, while in the past, around three years ago, Check Point was leading in the aforementioned area. More or less, all the products that can be compared with each other are the same if I consider the peer-to-peer node part.

What other advice do I have?

Two or three years ago, I would have recommended the product to others, but nowadays, there are other solutions with good capabilities that are better than Check Point. I wouldn't recommend the tool to anyone now because I have seen much better solutions lately, and the market is also changing and becoming very dynamic.

Check Point Harmony Endpoint should learn from its competitors how to improve its agent capabilities and have a lightweight agent to provide good support. Also, some real-time detection and behavioral security checks are still missing and need to be improved.

I rate the overall tool an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
reviewer1777338 - PeerSpot reviewer
Supervisor Tecnico at Grupo MCoutinho
User
Top 20
Good URL filtering and application control with useful dick encryption
Pros and Cons
  • "The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options."
  • "Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant."

What is our primary use case?

We're using this for our endpoint protection in terms of antivirus and malware protection, disk encryption, and URL and application filtering on our client computers.

We integrate the VPN feature with Check Point's firewall allowing our clients to access internal resources with security policies enforced and controlled.

The reports given by the software are also a benefit since it allows better management and control of access to all our client computers at any time from anywhere.

The web console is also nice.

How has it helped my organization?

We have all our information and policies on one platform for all the features, and we can assign our technicians' several permissions and roles on the product.

Our customers are also better protected, and we can guarantee that security policies are enforced and compliant in each one of them.

Security has been a significant focus for us, and Harmony Endpoint, together with the entire Check Point ecosystem, made it easy for our organization to enforce such policies.

We value the URL and app filtering of the platform.

What is most valuable?

The URL filtering and application control are very helpful since it's typically hard to block productivity loss apps/URLs on clients when abroad. Harmony made it easy to control the usage of the company resources and bandwidth.

Disk encryption is a nice feature if you don't have other systems. However, since we've already had BitLocker deployed, we saved a few dollars on this licensing type.

The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options.

What needs improvement?

Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant. URL filtering should allow for time-based rules, for example, don't allow media streaming during work hours yet allow it on weekends.

The same applies to application control. When in our headquarters, we can solve this on the Check Point Firewall. However, the Harmony client does not support this type of condition, and we had to find a "middle ground" between policies and usability for our clients.

For how long have I used the solution?

We've been using this solution for two years.

Which solution did I use previously and why did I switch?

We did use Microsoft Defender. It lacked features, and therefore we moved away from the solution.

What's my experience with pricing, setup cost, and licensing?

I'd advise users to try to implement BitLocker for disk encryption since it's free.

Which other solutions did I evaluate?

We did not evaluate other options. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
JurajMackovič - PeerSpot reviewer
Sales ManagerService Delivery at K_CORP
Real User
Great security and mobile device encryption and is easy to manage
Pros and Cons
  • "It's easy to scale as needed."
  • "We did have some early compatibility issues, which I hope Check Point has since resolved."

What is our primary use case?

From my point of view, the use cases involved strategy and business opportunities.

What is most valuable?

The solution is easy to use and easy to manage.

The security in regards to phishing, viruses, and so on, is very powerful. 

For mobile devices, encryption is excellent. 

From our point of view, Check Point is really easy to implement and really easy to manage. From the customer's point of view, the main reason was that the Check Point is the best brand, one of the best brands in our region. When they evaluate in comparison to competitors it comes out on top.

The solution is stable.

It's easy to scale as needed. 

Check Point Harmony covers everything.

What needs improvement?

We did have some early compatibility issues, which I hope Check Point has since resolved. 

As each project varies, anything that may be missing, in terms of features, would become obvious during a POC. Check Point has pretty much everything, however, it could be better in terms of working with Mac products. However, this is typical of other solutions and Apple. 

For how long have I used the solution?

I started working with the solution approximately one year ago. We implemented it primarily for the endpoints. 

A large company in our area opened the discussion about endpoint security. During the discussion, we looked at Check Point products as our company at this moment was a distributor for Check Point products.

What do I think about the stability of the solution?

The solution is very stable and reliable. There are no bugs or glitches and it doesn't crash or freeze. Its performance is good. 

What do I think about the scalability of the solution?

Users can scale the product very easily. If you need more parts from the products added to the running environment, you can buy some more licensing. For the administrators, it is very easy to implement as scalability is one of the strongest parts of Check Point.

How are customer service and support?

Technical support is very good from the vendor. We find that to be very important. 

How would you rate customer service and support?

Positive

How was the initial setup?

I can't speak to the details around deployment or implementation as I was in pre-sales. 

What about the implementation team?

We are able to implement the solution for our client. While we have four people involved in pre-sales activity, we have another team that handles the implementation.

What was our ROI?

Users can observe an ROI. We worked with the client for a very short time and therefore had no time to calculate the ROI, however, it is my understanding it is there and quite good. 

What's my experience with pricing, setup cost, and licensing?

We had special licensing for a rather sizable project. The project was prepared by Check Point directly and the client had a special negotiated rate. 

What other advice do I have?

My previous company was a partner of Check Point. I no longer work there.

I was involved in pre-sales activities with the client who uses the product. We're a distributor of Check Point. 

I'd rate the solution nine out of ten. We had some problems with implementations during proof of concept with a particular customer with a lot of Apple products, however, it is a small number of problems.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1850805 - PeerSpot reviewer
Sr. Data Scientist at a tech vendor with 10,001+ employees
MSP
Top 10
Great provisioning, helps secure endpoints, and good client-based access
Pros and Cons
  • "I found the fact of working across multiple attack vectors easy and more beneficial."
  • "I would like to see more automation."

What is our primary use case?

Harmony Endpoint is able to focus on the ZTNA for applications and in penetration testing for any type of ransomware or man-in-the-middle attacks. 

It helps to protect and secure endpoints, helps to focus on incidents, and prioritizes vulnerabilities. The solution also helps with endpoint protection and recovery from an autonomous response and in conforming to the organization's policy. It helps to do SSL traffic encryption and packet sniffing and has a good way for mobile threat management and defense as well. 

Security across the workspace has been the primary use case. 

How has it helped my organization?

Our organization was able to use the analytics and report information to figure out any risk exposure in a remote workspace of mobile and VPN access and email and endpoint security. 

Endpoint analytics helps to showcase any of the gaps that are there with the downloads, attacks on malware, and how to triage incidents. 

It helped to improve upon sensitivity of the data with the data loss prevention technique as well. And stopping any vicious attacks is the priority by making sure any advanced ways of detection come about.

What is most valuable?

I found the fact of working across multiple attack vectors easy and more beneficial. 

It has helped with USB to human errors to website issues to all types of threats and bot attacks. 

I also found the features of provisioning a VM for some security requirements and the fact of access across SSH and remote terminals also beneficial. 

Client-based access and the suite of products from SaaS API and Browser Protection are also very beneficial. It follows the ZTNA which tells that the VPN model of security would come to be obsolete in a few years with the Harmony benefit of Check Point.

What needs improvement?

More development in Linux may help, however, the fact that the product could also have some more documentation as suggestions on what to do may also help.

The product may take some time to navigate at first but apart from that the log ingesting and working on getting a client installed may take some time. 

I would like to see more automation. 

Also, encryption management is not made available in all versions but if it could be extended that would be great. Sometimes it may take some slight delay, however, it's nothing too bad. 

For how long have I used the solution?

I have been using this solution for three years.

Which solution did I use previously and why did I switch?

We did not use a different solution previously.

What's my experience with pricing, setup cost, and licensing?

I'd advise new users to work with a technical account manager and follow the steps in the documentation.

Which other solutions did I evaluate?

We evaluated ZScaler.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Sales Manager, Checkpoint at South Asian Technologies
Reseller
Top 5
A solution with a number of valuable blades that make it competitive
Pros and Cons
  • "With the prevention blade, Harmony scales higher than many other solutions."
  • "I have a few issues when attempting to install Harmony on some of the machines."

What is our primary use case?

I handle Check Point SMB along with Check Point Harmony Endpoint, and I have recently provided around 400 endpoints to a construction company in Sri Lanka.

What is most valuable?

The Rollback feature is valuable because ransomware attacks are very familiar nowadays, and anti-phishing and anti-ransomware blades are required by many of our customers. Other features, like prevention blades, are also okay, where you get threat extraction and evaluation. Likewise, the forensic report is also very important.

With the prevention blade, Harmony scales higher than many other solutions. Even CrowdStrike has technical problems when you're offline. But Harmony is not like that. Even if I don't have Internet connectivity, I have seen how remediation and rollback happen. All the encrypted files come to a state where it works with micro-backups.

Customers would like to have a very advanced endpoint to protect themselves from anti-phishing, especially ransomware.

What needs improvement?

I have clients who use very old Windows versions, so I have a few issues when attempting to install Harmony on some of the machines. At times, even with the latest Windows versions, the machines' performance gets slower. We still don't have a clear idea of what has been happening. If you take 100 PCs, two, three, or four are still troublesome when you attempt to install Harmony.

Also, the price could come down slightly, and I am not saying by a huge gap, but slightly. Even Sri Lanka's smaller customers have to buy a minimum quantity, and with Harmony Connect, they have to buy 50 licenses at once. If they could come down to 20, 30, or something like that, I should be able to sell much more. Some customers would like to have Harmony, but they have to buy a minimum quantity of 50. That's a bit troublesome for me as a salesperson.

For how long have I used the solution?

I have worked with Checkpoint Harmony Endpoint for almost one year now.

What do I think about the stability of the solution?

I rate the solution's stability a nine out of ten.

What do I think about the scalability of the solution?

I highly rate the solution's scalability.

How are customer service and support?

We have a set of engineers who specialize in Harmony Endpoint and Harmony Connect.

How would you rate customer service and support?

Positive

How was the initial setup?

The deployment takes one or two weeks. The deployer always creates a tenant, through which they install the solution. They also trained customers and end users to install Harmony, and they managed to install the entire license.

What's my experience with pricing, setup cost, and licensing?

I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high.

What other advice do I have?

Features like factory remediation, basically callback, are getting familiarized by Sri Lankan customers. Many have bought Harmony endpoints, so many customers have been considering Harmony Connect. This will lead to it having a good future.

When speaking to customers, I first communicate what ThreatCloud is all about. ThreatCloud is shared by other solutions like CloudGuard, Quantum, and Quantum Spark. It's very common to them. This means you will get the prevention blade, not the detection blade. Whenever you have phishing attacks, malware attacks, DDoS attacks, and even zero-day attacks, they are all always prevented by Check Point Harmony and Check Point products.

I always advise people to go for an advanced endpoint because IT managers have less of a hassle when using products like Check Point.

I have been facing lots of competition with CrowdStrike and Kaspersky. I don't think other products should compete with Check Point Harmony Endpoint because it is a different level endpoint altogether. I want to give them competition with the pricing.

I rate Check Point a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Amber Mishra - PeerSpot reviewer
Pre-Sales Manager at DCIPHERS IT SOLUTIONS
Reseller
Top 10
A consolidated security solution that is easy to implement and has a user-friendly dashboard
Pros and Cons
  • "Check Point Harmony Endpoint has one of the most user-friendly dashboards I've seen."
  • "Check Point Harmony Endpoint's agent is a bit heavy."

What is most valuable?

Check Point Harmony Endpoint has one of the most user-friendly dashboards I've seen.

What needs improvement?

Check Point Harmony Endpoint's agent is a bit heavy.

Check Point Harmony Endpoint should probably support more in Linux as well.

For how long have I used the solution?

I have been working with Check Point Harmony Endpoint for one and a half years.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint is a scalable solution.

What's my experience with pricing, setup cost, and licensing?

Check Point Harmony Endpoint's pricing is more competitive than any other vendor. Since it is growing, the solution gives better prices than any other in the market.

What other advice do I have?

It is easy to integrate Check Point Harmony Endpoint with other vendors.

Check Point Harmony Endpoint is easy to implement. I recommend Check Point Harmony Endpoint to other users.

Check Point Harmony Endpoint is a good product. Check Point Harmony Endpoint and SentinelOne are the only two products that can compete in the endpoint space.

Majorly, we push Check Point Harmony Endpoint to our customers. Other than Check Point, if something comes up, we go with SentinelOne. We only sell CrowdStrike when the customer asks for it. We position Check Point Harmony Endpoint and SentinelOne depending on the customer's requirement.

Sentinel One has a bit better breach prevention rate. If a customer needs a consolidated security solution and anti-ransomware protection with ransomware 2.0, then Check Point Harmony Endpoint is the best solution over SentinelOne.

Overall, I rate Check Point Harmony Endpoint ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.