Try our new research platform with insights from 80,000+ expert users
Ryan Evans - PeerSpot reviewer
Technical Support Engineer at Hildes Technologies
Real User
Top 10
Offers a single agent, handles heavy performance well and integrates with third-party servers
Pros and Cons
  • "Its stability during any heavy performance activity is excellent."
  • "The solution can be made lightweight in order to keep the systems more effective during the background operations of the scanning and security checks."

What is our primary use case?

There are many factors that make Check Point Harmony Endpoint as the main solution for our end-to-end system and data security of the organization. 

The primary use case of Check Point Harmony Endpoint, in our case, is to monitor every node against viruses and digital vulnerabilities, which keeps a 24/7 check over the happenings and keep us alerted against any unforeseen. 

The most important benefit of this solution has a single agent for security purposes and offers great stability during any heavy performance activity.

How has it helped my organization?

It has improved the overall security of our organizational digital well-being and made things and monitoring processes a lot easier and more straightforward. 

Integration with third-party servers and data endpoints and 24/7 background security checks are very useful for us and has been very instrumental phenomena in keeping things simple and secure for us. 

It has the ability to configure with any type of system and operating environment, which is great and makes it a more useful product for multiple business entities. 

What is most valuable?

The most important benefit of this solution is having a single agent for security purposes. 

Its stability during any heavy performance activity is excellent. 

It has improved the overall security of our organizational digital well-being and made things and monitoring processes a lot easier and more straightforward.

Integration with third-party servers and data endpoints and 24/7 background security checks are very useful for us and has been very instrumental phenomena in keeping things simple and secure for us. 

It has the ability to configure with any type of system and operating environment, which is great and makes it a more useful product for multiple purposes.

What needs improvement?

Overall, my experience with the product is great, and it's a perfect endpoint solution for multiple purposes. 

The solution can be made lightweight in order to keep the systems more effective during the background operations of the scanning and security checks. 

The user interface of reporting dashboard needs to improve for a better understanding of the end users and the administrators. 

The pricing of Check Point Harmony Endpoint can also be reduced. They are quite expensive at the moment. 

Buyer's Guide
Check Point Harmony Endpoint
November 2024
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

We found it to be 99% stable and smoothly runs in the background.

What do I think about the scalability of the solution?

It is a scalable solution and everything can be easily monitored, and data can be maintained.

How are customer service and support?

Customer service is great and always helping us with quick solutions.

How would you rate customer service and support?

Positive

How was the initial setup?

It was straightforward to set up and deployed over the cloud.

What about the implementation team?

We implemented the solution via in-house teams.

What was our ROI?

We've witnessed a positive ROI.

What's my experience with pricing, setup cost, and licensing?

It is a great cost with high-end Check Point features within reasonable cost brackets. You must try it.

What other advice do I have?

Overall this is a great solution with a lot of benefits and ease of use. 

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Team Lead Implementation Services/Systems Integration Engineer at Trinidad Systems Limited
Real User
Threat Emulation and Threat Extraction features scan email attachments before the user is able to access the file and then provide a safe copy of the attachment
Pros and Cons
  • "One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users machine. This is a very valuable feature of this solution."
  • "As I understand there will be a URL filtering feature included with the browser agent in the future. This will allow URL filtering without the need for a Gateway Device. This is something I am looking forward to and would be a great addition to list of features."

What is our primary use case?

Our primary use case for this solution is Antivirus capabilities. These include Antimalware, Antibot, Anti-Ransomware, and Threat Emulation and Anti Exploit. We have a mixed environment that includes Windows 2012 R2 Windows 7 Windows 10 and macOS 10.xx. We also use VMware. 

The client has been installed on all servers, PC,s, laptops and MAC machines. 

We need all this infrastructure monitored for malicious activity and reporting if something happens in realtime. This solution has worked very well.

How has it helped my organization?

In the past, we have experienced virus problems on our network. It has come in through email attachments, USB drives, internet websites, and so on. The current solution was not performing well. Since we implemented  Checkpoint Endpoint Security we have had no infection thus far. It is able to scan all email attachments, lock the ability to use external USB drives, and scan rouge internet traffic. We are very satisfied with this solution. Since its implementation, we have had no loss in data and no loss of revenue.

What is most valuable?

One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users' machine. This is a very valuable feature of this solution.

The Zero Phishing feature is also very valuable. This feature has the ability to scan the username and password fields on a website before you enter your credentials and verify if the site is legitimate. This brilliant feature prevents the stealing of account information.

What needs improvement?

As I understand there will be a URL filtering feature included with the browser agent in the future. This will allow URL filtering without the need for a Gateway Device. This is something I am looking forward to and would be a great addition to a list of features.

The best improvement to the product that can be made is to make it less resource-intensive so it may work effortlessly on slower systems.

The ability to push the Endpoint Client over the network without the use of 3rd party solutions would be an asset.

For how long have I used the solution?

I have been using and implementing this solution for about three years.

What do I think about the scalability of the solution?

My impression of the scalability of the this solution is positive. It can be don't with minimal affect on production. 

How are customer service and technical support?

They attend to your needs in a timely manner. They are well educated in the product.

Which solution did I use previously and why did I switch?

We did use a different solution in the past. It was not performing well and we were always getting infected by malicious software. they made us switch to Checkpoint Endpoint Security.

How was the initial setup?

The initial setup is straightforward and can be done by less technical staff.

What about the implementation team?

It was done by an in-house team.

What's my experience with pricing, setup cost, and licensing?

Setup costs can be kept to a minimum as Check Point offers Cloud Management which eliminates the need for on-premise hardware cost.

Which other solutions did I evaluate?

We did evaluate Avast. Which was not performing well. We also evaluated Kaspersky. Their client was a bit to resource-intensive.

What other advice do I have?

Check Point Endpoint Security just works. You will not be disappointed.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
November 2024
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
SANDRA SUAREZ - PeerSpot reviewer
CEO at SAFEID
Real User
Top 5
Provides encryption for operating systems and protection against malware
Pros and Cons
  • "It provides encryption for operating systems and protects browsers against malware."
  • "The endpoint might consume excessive resources from the machine, which can impact its performance."

What is most valuable?

It provides encryption for operating systems and protects browsers against malware, benefiting both new and old customers.

What needs improvement?

When using Check Point Harmony Endpoint, performance issues may occur, although not necessarily a ransomware attack. The endpoint might consume excessive resources from the machine, which can impact its performance.

For how long have I used the solution?

We have partnered with Check Point Harmony Endpoint.

What do I think about the scalability of the solution?

We have 25 endpoints using this solution.

How are customer service and support?

Email support works fine, but it needs to be on the phone.

How would you rate customer service and support?

Positive

How was the initial setup?

The deployment is not complex if you have to manage it. The installation can be done directly if the customer has a good knowledge of Microsoft systems. However, we have to install it manually, which can be difficult, especially when replacing all the old agents.

If the customer doesn't have an IP directory, we only put one person in it. We are deploying up to 1500 endpoints with only one person, maybe in two weeks. If the customer doesn't have an active directory and has 100-200 endpoints to install, we normally have to use three security engineers.

I rate the initial setup a nine out of ten, where one is difficult and ten is easy.

What was our ROI?

We have a particular case where today's endpoint provides complete security against ransomware. It runs effectively from work. It is about eighty to ninety percent effective.

What's my experience with pricing, setup cost, and licensing?

The pricing is high because we lost several customers to Trend Micro and Symantec. Latin America and Columbia particularly have high prices. It was probably fifty percent more.

What other advice do I have?

As a partner, Check Point provides us with the best protection. We can also arrange a demo or discussion to showcase the protection features and advantages to our customers.

Overall, I rate the solution an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
PeerSpot user
Ajenthan Aiyathurai - PeerSpot reviewer
Manager - IT at NVCL Group
Real User
Top 5Leaderboard
Good monitoring and visibility with compliance capabilities
Pros and Cons
  • "It is easy to install from the cloud."
  • "Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats."

What is our primary use case?

We use this solution for our desktops, laptops, servers, and selective mobile devices. It offers real-time protection against malware and other malicious threats is superb. 

Our previously used antivirus has not been able to identify certain threats. Check Point Harmony did it. That is a key highlight of this product. Check Point Harmony Endpoint includes a firewall component that allows us to enforce network security policies at the endpoint level, including application control, network segmentation, VPN enforcement, etc.

How has it helped my organization?

We can now see the performance of the computers. Previously, we used some other applications where we could see the CPU percentage go increasingly high. Compared to that, this solution is good. 

Check Point Harmony Endpoint helps us ensure endpoint compliance with security policies and regulatory requirements by enforcing configuration settings. 

Moreover, It provides visibility into endpoint activities and enables security teams to detect, investigate, and respond to security incidents in real-time. So business progress never gets disturbed. 

What is most valuable?

It monitors endpoint behavior in real-time to identify and block suspicious activities indicative of malware or malicious behavior. This proactive approach helps us a lot. 

It employs sandboxing technology to execute suspicious files in a controlled environment and analyze their behavior. This allows it to identify and block malware that may evade traditional detection methods by remaining dormant or obfuscated. 

More importantly, it is easy to install from the cloud. 

What needs improvement?

Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats. 

Enhancements in compliance management and reporting capabilities could help organizations meet regulatory requirements more effectively and streamline audit processes. 

Continuously updating and enriching threat intelligence feeds and research capabilities can improve threat detection and prevention accuracy and effectiveness.

For how long have I used the solution?

I've used the solution for over a year.

What do I think about the stability of the solution?

Check Point is a well established cybersecurity vendor with a long history of developing and maintaining security solutions. Harmony Endpoint benefits from this experience and is built on a solid foundation of technology and best practices. That i believe. 

What do I think about the scalability of the solution?

The centralized management console enables efficient management of endpoint security across the entire organization, irrespective of its size. Administrators can easily configure policies, deploy updates, and monitor endpoint activities from a single interface, streamlining management at scale.

How are customer service and support?

Customer service should be improved. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Check Point Harmony has fould a suspicious file that the previous application did not discover (that file was in the system for a period as alogic bomps).

How was the initial setup?

The initial setup was straightforward and easy.

What about the implementation team?

We handled the setup in-house.

What was our ROI?

We've noted ROI in Risk Reduction and have noted:

  • Productivity gains
  • Compliance cost reduction
  • Operational efficiency
  • Security consolidation
  • Incident response cost reduction

What's my experience with pricing, setup cost, and licensing?

Compared to other service providers, the price is a bit high. That said, it is worth the price. 

Which other solutions did I evaluate?

We did evaluate McAfee and Norton. 

What other advice do I have?

The solution is good, hence I'm more concerned about the pricing. It would be good if that can be been reduced. 

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Cyber Security Consultant at Wirespeed
Reseller
Top 5
An endpoint security solution with ransomware protection and EDR
Pros and Cons
    • "If you're using an endpoint that does not have sufficient resources, it would be very tough to use."

    What is our primary use case?

    We use the solution for endpoint security.

    What is most valuable?

    The solution provides endpoint security, ransomware protection, endpoint detection, and response. Also, cloud-based management is a good feature with an excellent catch rate.

    What needs improvement?

    If you're using an endpoint that does not have sufficient resources, it would be very tough to use. Most of them will shut down, but it works well with the detection so far. The solution can reduce the impact of the endpoints.

    The performance impact should be improved. Also, the tool should have the ability to search for files. It could make on-premise deployment easier. They might have blocked ports and the control makes it more difficult. They can make implementation much easier even with what they have.

    For how long have I used the solution?

    I have been using Check Point Harmony Endpoint as a reseller for three to four years.

    What do I think about the stability of the solution?

    The solution is stable.

    What do I think about the scalability of the solution?

    It is a very scalable solution. It is well-suited for medium business. I rate the solution’s scalability a nine out of ten.

    How are customer service and support?

    Technical support is responsive.

    How was the initial setup?

    The tool is easy to set up but the on premise management is difficult. The deployment takes three hours to complete.

    I rate the initial setup a seven out of ten, where one is difficult, and ten is easy.

    What's my experience with pricing, setup cost, and licensing?

    The solution is reasonable, but there are cheaper solutions out there.

    What other advice do I have?

    Smaller customers go with the cloud, whereas the bigger ones opt for on-premise management.

    I recommend the solution.

    Overall, I rate the solution an eight out of ten.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: My company has a business relationship with this vendor other than being a customer:
    Flag as inappropriate
    PeerSpot user
    Mantu Shaw - PeerSpot reviewer
    Project Manager at Incedo Inc.
    MSP
    Top 20
    Easy-to-integrate product with a valuable feature for building API
    Pros and Cons
    • "The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client."
    • "From an improvement perspective, the major challenge we've faced with Harmony is the support."

    What is most valuable?

    The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client. Both features offer significant advantages from different perspectives.

    What needs improvement?

    From an improvement perspective, the major challenge we've faced with Harmony is the support. While the technical features and xRail-based aspects are good, support still needs to be improved. However, this concern could be addressed effectively if they focus on improving support.

    For how long have I used the solution?

    We have been using Check Point Harmony Endpoint for the last three or four years.

    What do I think about the scalability of the solution?

    The product is scalable.

    How are customer service and support?

    Overall, technical support for all Check Point products has been a concern, but improvements have occurred recently. They are making significant changes, and the support is now more stable.

    Which solution did I use previously and why did I switch?

    Before implementing Check Point Harmony Endpoint, we used a similar solution called Trend Micro SMAX.

    What other advice do I have?

    Check Point Harmony Endpoint is easy to integrate with any Avaya platform. The interface is very user-friendly. In terms of promotions, the product is visible in the market.

    I rate it a nine out of ten.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    reviewer1625493 - PeerSpot reviewer
    Chief Information Security Officer at a consultancy with 1-10 employees
    Real User
    Top 10
    A scalable tool that offers great EDR functionalities
    Pros and Cons
    • "Scalability-wise, I rate the solution a ten out of ten."
    • "It's not easy to investigate an incident that you find in the company. Users often face trouble when downloading files, so it is very slow in terms of how it works."

    What is our primary use case?

    I work as a consultant for a company where the solution is needed as an EDR solution. After my company made comparisons between a few companies, we felt Check Point Harmony Endpoint won, considering the pricing model that it offered in the market. The company that uses the product wants to set up a big business for some local authorities with the help of the EDR functionalities provided by Check Point Harmony Endpoint, which is why Check Point is also trying to push its product into the market.

    What is most valuable?

    The most valuable features of the solution stem from the EDR functionalities it provides to users, as it does its work properly.

    What needs improvement?

    The tool is not too intuitive if you want to monitor and see the results to investigate in a layer. It's not easy to investigate an incident that you find in the company. Users often face trouble when downloading files, so it is very slow in terms of how it works. The tool is not very supportive of all the versions when it comes to the part of loading hash codes, so it may support SHA-1 but not SHA-256, meaning it doesn't support all the formats. Calling the support team for the solution doesn't help.

    The support team of the solution lacks etiquette. The technical team of the product told our company that we need to get Check Point products through an official vendor only. Technical support for the solution is an area with issues where improvements are needed.

    For how long have I used the solution?

    I have been using Check Point Harmony Endpoint for two years. I work as a consultant for a company where the solution is used.

    What do I think about the stability of the solution?

    It is not a stable solution because if users find a problem with it, they have to disable the product.

    Stability-wise, I rate the solution a six out of ten.

    What do I think about the scalability of the solution?

    It is easy to use the scalability feature of the product since users just need to acquire more licenses.

    Scalability-wise, I rate the solution a ten out of ten.

    The product is used mostly by small-sized businesses.

    How are customer service and support?

    I rate the technical support a four out of ten.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    CrowdStrike, SentinelOne, Cynet, and Fortinet FortiGate are a few of the solutions that I have worked with in the past. Among all the solutions that I have used to date, CrowdStrike is the best.

    How was the initial setup?

    I rate the product's initial setup phase a seven out of ten on a scale of one to ten. Compared to Check Point Harmony Endpoint, the deployment process of CrowdStrike was much easier.

    Compared to Check Point Harmony Endpoint, the deployment process of CrowdStrike was much easier as it could be deployed in hundreds of locations in two hours. Check Point Harmony Endpoint's deployment process takes a week to be completed. Check Point Harmony Endpoint's deployment process takes time since there are many troubles, as my company has to meet with the client to conduct certain checks, owing to which it cannot be deployed through a central management process.

    The number of people required to take care of Check Point Harmony Endpoint's deployment process depends on the organization's size. One good engineer is enough to take care of the product's deployment process. Having ten engineers without knowing the product or issue cannot help a user deal with the tool's deployment area, and it is usually the same for each product deployed in any company.


    What's my experience with pricing, setup cost, and licensing?

    I rate the product price a four on a scale of one to ten, where one is low, and ten is high.

    The problem with the product is that Check Point tries to push it to the market. FortiGate, a firewall solution I purchased for the first time around twelve years ago, was very cheap because Fortinet had to push the product into the market. Users can get it for good prices only during the beginning phase of the tool.

    Our company has to make yearly payments towards the licensing charges attached to the solution. There are no additional charges attached to the product apart from the licensing costs attached to the solution.

    What other advice do I have?

    The maintenance of the product is difficult since it is something to be done online.

    To those who plan to use the solution of the future, I would say that they get the support involved in the contract before purchasing the product.

    I rate the overall tool an eight out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    Edwin Solano Salmeron - PeerSpot reviewer
    Soporte técnico superior at Acobo
    Real User
    Top 5Leaderboard
    Minimally invasive, good for securing devices of remote users, and does not slow performance
    Pros and Cons
    • "It is minimally invasive. From a single installer, the equipment is protected and secured."
    • "This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market."

    What is our primary use case?

    We were having several difficulties when we were presented with the design that we had to implement for the teams and personnel that had to work outside of the organization due to the pandemic. 

    As a result of all this and all these uncertainties, the need to secure the equipment was the reason we adopted the Harmony endpoint solution. It came to protect us inside and outside the institution. The equipment itself does not need to be connected and secured by the perimeter area of ​​our organization.

    How has it helped my organization?

    We have adopted this solution in a quick, simple way. It integrated well based on these three characteristics: 

    1. It is minimally invasive. From a single installer, the equipment is protected and secured. 

    2. The solution is really not burdened with the need for computing power for the local management of the device, which will prevent the teams from slowing down. 

    3. It is integrated with a cloud administration which makes it easy, fast, and simple to manage each of your policies for the security of the equipment. 

    What is most valuable?

    Its most outstanding feature is the power to manage everything from a dashboard, a window that is in the cloud, which allows us to manage it from anywhere in the world through any browser, from anywhere. This is a feature that came to give administrators the possibility to work from home. Today many of us are remote workers who are not at the company, on-site. We are not in a single site, and yet we manage well and have the capacity and the assurance of managing everything easily, quickly, and simply.

    What needs improvement?

    This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market.  

    I would very much like to have the opportunity to see applications access at the web level and have applications from different brands and devices give simplicity to the management that we are going to need in the future.

    For how long have I used the solution?

    I've used the solution for about two years.

    What do I think about the stability of the solution?

    The solution is really stable. I have had the opportunity to try it on Mac and to try it on Windows. Its functionality, filtering, and execution have been really stable.

    What do I think about the scalability of the solution?

    It is a fairly scalable solution that is simple to use and quick to install on the devices of each user, that is, on their computers.

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
    Updated: November 2024
    Buyer's Guide
    Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.