The integration capabilities are very easy to install. We just need to deploy them after the download process for our requirements. Deploying the systems takes only five minutes. We can deploy them via the ADE Server. The tool has some AI and ML-based integration, and it offers features like ThreatCloud AI. ThreadCloud AI is installed, so you can just only deploy the soluton. I found Check Point Harmony Endpoint's deployment to be easier than implementation procedures for other solutions. I rate the tool a nine out of ten.
We tried integrating Check Point Harmony Endpoint with other third-party solutions, such as Microsoft services, Adobe, and Google Workspace. Since Check Point Harmony Endpoint is focused more on endpoint devices, it is a very good option for users who want to secure their endpoints. If they have fewer devices or endpoints, they can look for other solutions in the market, such as Symantec Endpoint, Veritas, and Palo Alto. From my perspective, Check Point Harmony Endpoint is sufficient. Overall, I rate the solution a nine out of ten.
Check Point Harmony Endpoint is easy to integrate with any Avaya platform. The interface is very user-friendly. In terms of promotions, the product is visible in the market. I rate it a nine out of ten.
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
We haven’t deployed the antivirus yet. We’re trying to implement AV on Windows. Currently, AV is deployed on a Linux machine. When I implemented it, I didn't have any idea about the product. I just went through some documents. People who want to use the solution must go through the documents and understand the concepts. Overall, I rate the product a nine out of ten.
Check Point is a good solution if an organization needs a secure end-to-end security and malware protection solution. I recommend the tool to others. It is a big competitor for Palo Alto and Cisco. It is fully optimized in terms of cost and features for any organization. Overall, I rate the product a nine out of ten.
Chief Information Security Officer at a consultancy with 1-10 employees
Real User
Top 10
2024-01-05T09:50:45Z
Jan 5, 2024
The maintenance of the product is difficult since it is something to be done online. To those who plan to use the solution of the future, I would say that they get the support involved in the contract before purchasing the product. I rate the overall tool an eight out of ten.
Check Point Harmony Endpoint is a well-known solution among cybersecurity companies. With Check Point Harmony Endpoint, if my company gets good profit margins along with good opportunities, then we can penetrate into the market to sell it. My company expects support from Check Point, though we don't deal in many of its solutions. I rate the overall tool a ten out of ten.
I'd recommend users to be careful with low-resource devices as the solution has several security modules that can affect the performance of these devices. In our case, we had some old machines where we grouped them and created a more optimized policy for these legacy devices.
Currently, this software stands out as one of the top choices in the field. It's undoubtedly a strong contender for enhancing computer security, and while there are various other products available, this one ranks among the best. I recommend the solution, but I would rate it a six out of ten, mainly because the software requires considerable resources and can strain less powerful computers. It tends to impact system efficiency, especially on computers with weaker hardware, causing frequent restarts and putting a significant load on the CPU and memory.
It is easy to integrate Check Point Harmony Endpoint with other vendors. Check Point Harmony Endpoint is easy to implement. I recommend Check Point Harmony Endpoint to other users. Check Point Harmony Endpoint is a good product. Check Point Harmony Endpoint and SentinelOne are the only two products that can compete in the endpoint space. Majorly, we push Check Point Harmony Endpoint to our customers. Other than Check Point, if something comes up, we go with SentinelOne. We only sell CrowdStrike when the customer asks for it. We position Check Point Harmony Endpoint and SentinelOne depending on the customer's requirement. Sentinel One has a bit better breach prevention rate. If a customer needs a consolidated security solution and anti-ransomware protection with ransomware 2.0, then Check Point Harmony Endpoint is the best solution over SentinelOne. Overall, I rate Check Point Harmony Endpoint ten out of ten.
Cloud Engineer at IT Quest Solutions|interglobalmsp
User
Top 5
2023-02-28T17:21:00Z
Feb 28, 2023
New users need to identify the needs of the organization, evaluate any security solution, and clearly define the security needs and priorities of the organization prior to use.
It is a great product. Check Point could work on their Technical Assistance Center (TAC) to assist customers, however, they usually get the job done in the end.
My previous company was a partner of Check Point. I no longer work there. I was involved in pre-sales activities with the client who uses the product. We're a distributor of Check Point. I'd rate the solution nine out of ten. We had some problems with implementations during proof of concept with a particular customer with a lot of Apple products, however, it is a small number of problems.
Cybersecurity Architect at a computer software company with 201-500 employees
MSP
2022-01-05T07:20:55Z
Jan 5, 2022
My advice to others is they need to have Check Point expertise internally, if they don't have any in-house Check Point expertise, I wouldn't recommend this product. I rate Check Point Harmony Endpoint a six out of ten.
We are a reseller. My advice to new users would be to reconsider installing administration servers on-premise. The cloud solution can do it. It's going to lower the maintenance costs. Also, if you are on-premises, you often need some sort of expert on-side, whether it's a vendor or someone else - especially if you are upgrading. That requires knowledge. In contrast, on the cloud, everything is done for you. They have a high availability network so that when you upgrade the servers can keep up. You can upgrade without downtime if you choose the cloud. I would rate the solution at a ten out of ten.
I rate Check Point Harmony 10 out of 10. It's a unique product. It's the best in this class. I feel that Harmony is better than Crowd Strike or any other similar solution in that class. However, I would like to see more competitive pricing and better training for partners.
Technical Engineer at a tech services company with 11-50 employees
Reseller
2021-07-28T07:30:45Z
Jul 28, 2021
I am still in the initial stages of using the product, but I feel it to be very good. It satisfies all my needs and this includes the EDR, which I consider good. The solution gives good visibility when it comes to attacks. As the solution satisfies all my needs, I rate Check Point Harmony Endpoint as a ten out of ten.
It's a very good product. Over the past year, the team has been improving it day by day and we're now more focused on endpoint security with the latest features on offer.
Chief Technology Officer at a tech services company with 11-50 employees
Real User
2021-06-11T14:03:38Z
Jun 11, 2021
I would recommend this solution because the protection works well, and it is cost is effective. They also have cloud-based management, so it is like a SaaS service, and we don't need to buy a server to host it and to implement any hardware just for running the management of Check Point Harmony Endpoint. On a scale from one to ten, I would rate this solution at eight.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-05-14T13:24:00Z
May 14, 2021
In case you want to set up the solution on-premises and you want to deploy multiple policy servers, it is complicated. You will need an OVF to be deployed at each location and sometimes, organizations don't have the compute or supporting platform for deployment. Also, for connecting remote users there is a dependency on the VPN, hence it's again a challenge for users to connect to the policy server for updates.
Information Security Analyst at VPS Holdings Limited
Real User
2021-03-01T14:08:00Z
Mar 1, 2021
If you have never used a Check Point product before, I would highly recommend engaging with a Professional Services provider to help with the deployment of the tool & ensuring you implement the tool based on best practices. Additionally completing the training for the Checkpoint Sandblast tool will equally achieve the same goals.
Engineer at a tech services company with 51-200 employees
Real User
2021-02-24T06:26:50Z
Feb 24, 2021
My advice to anyone who is considering Check Point Endpoint Security is that it is a great solution that is very easy to deploy, and it really gives you visibility of what's happening on your endpoint. It helps you do deal with security issues pretty fast. I would rate this solution a nine out of ten.
In my opinion, it is a very good solution for organizations with a complex environment. We can secure it. From a security perspective, we trust only Check Point endpoint security. This product is a market leader.
What we've gained is more of an understanding of what's on our network. If I were to go and do this again from scratch, I probably would have looked to integrate more with our Check Point sales team and would have gotten more help from them. My advice would be to involve your SE. He can help you through a lot more of the options when you deploy. We don't use the solution’s Management Platform for the creation of virtual endpoint management services in the cloud. We haven't got to that cloud point yet. It's something we could do, potentially. We're going to work with our account team about that. But that's the one of the lessons learned: We did it by just playing around with it rather than doing a full deployment. I would rate it at nine out of 10. What comes to mind is its effectiveness. Normally, I don't get involved in the costing too much. Is it doing everything that it said it was going to do? Yes it is, at the moment. Could it be enhanced more? Sure. But we have a relationship with Check Point and they do deliver on the RFEs for us. If we say we want it to do this, they'll get their engineering team looking at that.
In this digital ecosystem, we need to secure our data at every moment and have something in place, like SandBlast, to keep our networks scanned at each moment. You never know where the next attack is coming from: malware, phishing, denial-of-service attacks, man-in-the-middle attacks, etc. Therefore, we need to be on the lookout for these type of attacks and any other unauthorized URLs trying to get into our systems to access data for any purpose. Have a system in place to keep your data secure. You should definitely give SandBlast Agent a try. It is worth it. The solution is very secure and has very impressive features. I would rate this solution as an eight out of 10. We are very impressed and happy with the features, its stability, reports, and the parameters covered in the reports.
It is a very complete product but you have to know how to parameterize it well to avoid high CPU consumption. It is also missed that it has no client for linux.
Novell, Microsoft, and UNIX Network Administration at GDDC
Real User
2019-12-23T07:05:00Z
Dec 23, 2019
My advice to anybody who is researching this type of solution is to consider their budget. This does not seem to be Check Point's area, although they are getting better. I would rate this solution a nine out of ten.
Head of IT at a real estate/law firm with 11-50 employees
Real User
2019-10-28T06:33:00Z
Oct 28, 2019
It's very basic from what I see. It's not a full MDM solution and it's restricted with other MDM provisions. If you want to use an MDM with it to do other things like your email provisioning to mobile devices, you don't have very many options. I think it's AirWatch, MobileIron, Intune, or SOTI: only the most expensive products. If you want to look at something a little bit cheaper, you've got to pay through the nose. You can't have a cheaper solution as an MDM and run this concurrently. That's why they need to look at integrating with more MDM vendors. Other than that, it's okay. It does what it needs to do and it's going to tick a box that protects me for the next 12 months until I'm ready for the next project, which I am not yet. I'm one man trying to deal with 140 users across five different countries. So, I'm flat out and I don't have some time to do all the other bits. The biggest lesson I learned is just because it's expensive, it's not always the best. If you want it to integrate with other products, though, you've got to pay a lot of money for other products as well. That's the only issue that I've got with that. I would rate this solution as eight out of ten, purely because there are additional features I'd love to see, but that is it. If you're doing it on the deployment side of things, I'd give it a ten out of ten. If you're looking at the product as a whole, however, there are a few things I think are missing, but only as additional features. Nine out of ten other customers would probably give it a ten out of ten because they don't need the features that I need. For me personally, it is a little bit empty in certain places. There's so much more they could do with that to make it the most awesome market cornering product there is, but it's not there yet.
CIO / CTO at a financial services firm with 51-200 employees
Real User
2019-09-05T05:37:00Z
Sep 5, 2019
My advice to others considering implementing the solution is, depending of course on if the company is looking for a new kind of firewall solution, is "Don't do it yourself." I would rate the solution eight out of ten.
Senior Security Consultant - Checkpoint Technologies at a tech services company with 11-50 employees
Consultant
2019-05-29T10:40:00Z
May 29, 2019
My advice to others that are looking to implement Check Point Endpoint Security is that it's very secure. The only issue is that the disc encryption is bound to the hardware in the machine that it's in. It takes a bit long to decrypt the hard drive. That's the only issue. I'd give Check Point Endpoint Security about a nine out of ten.
My advice is to get Check Point, even without trying it first. Use it, and you will be very, very secure. Check Point guarantees the security and stability of your network. I would rate this solution as nine out of ten.
If you have a medium-size environment like ours, this solution should serve the purpose, although you may need different things. In security, one thing cannot suit everybody. We have about 500 users of the solution. We don't have any immediate plans to increase our usage. Any increase would be at least two to three years in the future, given the type of environment and workloads that we have.
The anti-malware we found very good on Check Point Endpoint Security. Mainly we observe the overall deployment and then maintenance is easy. It is only one click and you can deploy everything. Whoever wants their data secure, and they want to have peace of mind, make sure to go with the anti-malware capabilities on the SandBlast Agent. We consider Check Point Endpoint Security to be one of the best systems for SAP. The zero-day anti-exploit solutions should be there with Check Point Endpoint Security. Because of the budget, people keep the software, but my advice is that it is also a must-have software. You should have SandBlast Agent along with the anti-malware capabilities installed. I would rate it a ten out of ten.
Check Point Harmony Endpoint integrates security solutions, allowing comprehensive protection against cyber threats. It's designed to suit enterprise-scale operations with robust features for threat prevention and management.Check Point Harmony Endpoint offers advanced security capabilities that prioritize threat analysis, detection, and prevention. Tailored for professional environments, it provides tools to handle endpoint vulnerabilities effectively. Its user-centric design ensures that IT...
I would recommend Harmony Endpoint to others. I'd rate the solution eight out of ten.
Overall, I would rate it a nine out of ten.
The integration capabilities are very easy to install. We just need to deploy them after the download process for our requirements. Deploying the systems takes only five minutes. We can deploy them via the ADE Server. The tool has some AI and ML-based integration, and it offers features like ThreatCloud AI. ThreadCloud AI is installed, so you can just only deploy the soluton. I found Check Point Harmony Endpoint's deployment to be easier than implementation procedures for other solutions. I rate the tool a nine out of ten.
The solution is good, hence I'm more concerned about the pricing. It would be good if that can be been reduced.
We tried integrating Check Point Harmony Endpoint with other third-party solutions, such as Microsoft services, Adobe, and Google Workspace. Since Check Point Harmony Endpoint is focused more on endpoint devices, it is a very good option for users who want to secure their endpoints. If they have fewer devices or endpoints, they can look for other solutions in the market, such as Symantec Endpoint, Veritas, and Palo Alto. From my perspective, Check Point Harmony Endpoint is sufficient. Overall, I rate the solution a nine out of ten.
Check Point Harmony Endpoint is easy to integrate with any Avaya platform. The interface is very user-friendly. In terms of promotions, the product is visible in the market. I rate it a nine out of ten.
We haven’t deployed the antivirus yet. We’re trying to implement AV on Windows. Currently, AV is deployed on a Linux machine. When I implemented it, I didn't have any idea about the product. I just went through some documents. People who want to use the solution must go through the documents and understand the concepts. Overall, I rate the product a nine out of ten.
Check Point is a good solution if an organization needs a secure end-to-end security and malware protection solution. I recommend the tool to others. It is a big competitor for Palo Alto and Cisco. It is fully optimized in terms of cost and features for any organization. Overall, I rate the product a nine out of ten.
The maintenance of the product is difficult since it is something to be done online. To those who plan to use the solution of the future, I would say that they get the support involved in the contract before purchasing the product. I rate the overall tool an eight out of ten.
Check Point Harmony Endpoint is a well-known solution among cybersecurity companies. With Check Point Harmony Endpoint, if my company gets good profit margins along with good opportunities, then we can penetrate into the market to sell it. My company expects support from Check Point, though we don't deal in many of its solutions. I rate the overall tool a ten out of ten.
We would try to add exceptions for false positives or mitigate threats earlier to clean up the experience.
I'd recommend users to be careful with low-resource devices as the solution has several security modules that can affect the performance of these devices. In our case, we had some old machines where we grouped them and created a more optimized policy for these legacy devices.
Currently, this software stands out as one of the top choices in the field. It's undoubtedly a strong contender for enhancing computer security, and while there are various other products available, this one ranks among the best. I recommend the solution, but I would rate it a six out of ten, mainly because the software requires considerable resources and can strain less powerful computers. It tends to impact system efficiency, especially on computers with weaker hardware, causing frequent restarts and putting a significant load on the CPU and memory.
It is easy to integrate Check Point Harmony Endpoint with other vendors. Check Point Harmony Endpoint is easy to implement. I recommend Check Point Harmony Endpoint to other users. Check Point Harmony Endpoint is a good product. Check Point Harmony Endpoint and SentinelOne are the only two products that can compete in the endpoint space. Majorly, we push Check Point Harmony Endpoint to our customers. Other than Check Point, if something comes up, we go with SentinelOne. We only sell CrowdStrike when the customer asks for it. We position Check Point Harmony Endpoint and SentinelOne depending on the customer's requirement. Sentinel One has a bit better breach prevention rate. If a customer needs a consolidated security solution and anti-ransomware protection with ransomware 2.0, then Check Point Harmony Endpoint is the best solution over SentinelOne. Overall, I rate Check Point Harmony Endpoint ten out of ten.
Overall this is a great solution with a lot of benefits and ease of use.
New users need to identify the needs of the organization, evaluate any security solution, and clearly define the security needs and priorities of the organization prior to use.
I recommend the implementation of this platform in other organizations.
I am satisfied with the current performance and I thoroughly recommend Harmony Endpoint to other business enterprises.
Comprehensive security for the company's network infrastructure is essential, and this is what this platform has provided.
It is a great product. Check Point could work on their Technical Assistance Center (TAC) to assist customers, however, they usually get the job done in the end.
I rate Check Point Harmony Endpoint a seven out of ten.
I recommend this security tool, it is always important to test the tool at the test level to decide if it is what you are looking for.
My previous company was a partner of Check Point. I no longer work there. I was involved in pre-sales activities with the client who uses the product. We're a distributor of Check Point. I'd rate the solution nine out of ten. We had some problems with implementations during proof of concept with a particular customer with a lot of Apple products, however, it is a small number of problems.
It's still being actively developed and still needs some improvement. In general, it's quite good now regarding security and might get even better.
I am very positive in terms of the solution and Check Point in general.
My advice to others is they need to have Check Point expertise internally, if they don't have any in-house Check Point expertise, I wouldn't recommend this product. I rate Check Point Harmony Endpoint a six out of ten.
We are a reseller. My advice to new users would be to reconsider installing administration servers on-premise. The cloud solution can do it. It's going to lower the maintenance costs. Also, if you are on-premises, you often need some sort of expert on-side, whether it's a vendor or someone else - especially if you are upgrading. That requires knowledge. In contrast, on the cloud, everything is done for you. They have a high availability network so that when you upgrade the servers can keep up. You can upgrade without downtime if you choose the cloud. I would rate the solution at a ten out of ten.
I rate Check Point Harmony 10 out of 10. It's a unique product. It's the best in this class. I feel that Harmony is better than Crowd Strike or any other similar solution in that class. However, I would like to see more competitive pricing and better training for partners.
Harmony Endpoint is a good product and scalable with business growth.
I am still in the initial stages of using the product, but I feel it to be very good. It satisfies all my needs and this includes the EDR, which I consider good. The solution gives good visibility when it comes to attacks. As the solution satisfies all my needs, I rate Check Point Harmony Endpoint as a ten out of ten.
It's a very good product. Over the past year, the team has been improving it day by day and we're now more focused on endpoint security with the latest features on offer.
I would recommend this solution because the protection works well, and it is cost is effective. They also have cloud-based management, so it is like a SaaS service, and we don't need to buy a server to host it and to implement any hardware just for running the management of Check Point Harmony Endpoint. On a scale from one to ten, I would rate this solution at eight.
In case you want to set up the solution on-premises and you want to deploy multiple policy servers, it is complicated. You will need an OVF to be deployed at each location and sometimes, organizations don't have the compute or supporting platform for deployment. Also, for connecting remote users there is a dependency on the VPN, hence it's again a challenge for users to connect to the policy server for updates.
I recommend this solution to others. It is easy to implement. I rate Check Point Harmony Endpoint a ten out of ten.
If you have never used a Check Point product before, I would highly recommend engaging with a Professional Services provider to help with the deployment of the tool & ensuring you implement the tool based on best practices. Additionally completing the training for the Checkpoint Sandblast tool will equally achieve the same goals.
My advice to anyone who is considering Check Point Endpoint Security is that it is a great solution that is very easy to deploy, and it really gives you visibility of what's happening on your endpoint. It helps you do deal with security issues pretty fast. I would rate this solution a nine out of ten.
In my opinion, it is a very good solution for organizations with a complex environment. We can secure it. From a security perspective, we trust only Check Point endpoint security. This product is a market leader.
What we've gained is more of an understanding of what's on our network. If I were to go and do this again from scratch, I probably would have looked to integrate more with our Check Point sales team and would have gotten more help from them. My advice would be to involve your SE. He can help you through a lot more of the options when you deploy. We don't use the solution’s Management Platform for the creation of virtual endpoint management services in the cloud. We haven't got to that cloud point yet. It's something we could do, potentially. We're going to work with our account team about that. But that's the one of the lessons learned: We did it by just playing around with it rather than doing a full deployment. I would rate it at nine out of 10. What comes to mind is its effectiveness. Normally, I don't get involved in the costing too much. Is it doing everything that it said it was going to do? Yes it is, at the moment. Could it be enhanced more? Sure. But we have a relationship with Check Point and they do deliver on the RFEs for us. If we say we want it to do this, they'll get their engineering team looking at that.
In this digital ecosystem, we need to secure our data at every moment and have something in place, like SandBlast, to keep our networks scanned at each moment. You never know where the next attack is coming from: malware, phishing, denial-of-service attacks, man-in-the-middle attacks, etc. Therefore, we need to be on the lookout for these type of attacks and any other unauthorized URLs trying to get into our systems to access data for any purpose. Have a system in place to keep your data secure. You should definitely give SandBlast Agent a try. It is worth it. The solution is very secure and has very impressive features. I would rate this solution as an eight out of 10. We are very impressed and happy with the features, its stability, reports, and the parameters covered in the reports.
It is a very complete product but you have to know how to parameterize it well to avoid high CPU consumption. It is also missed that it has no client for linux.
It is a great fit for any organization. I would rate the solution a 10 out of 10.
Check Point Endpoint Security just works. You will not be disappointed.
I would rate Check Point Endpoint Security at a seven out of a scale of ten.
My advice to anybody who is researching this type of solution is to consider their budget. This does not seem to be Check Point's area, although they are getting better. I would rate this solution a nine out of ten.
It's very basic from what I see. It's not a full MDM solution and it's restricted with other MDM provisions. If you want to use an MDM with it to do other things like your email provisioning to mobile devices, you don't have very many options. I think it's AirWatch, MobileIron, Intune, or SOTI: only the most expensive products. If you want to look at something a little bit cheaper, you've got to pay through the nose. You can't have a cheaper solution as an MDM and run this concurrently. That's why they need to look at integrating with more MDM vendors. Other than that, it's okay. It does what it needs to do and it's going to tick a box that protects me for the next 12 months until I'm ready for the next project, which I am not yet. I'm one man trying to deal with 140 users across five different countries. So, I'm flat out and I don't have some time to do all the other bits. The biggest lesson I learned is just because it's expensive, it's not always the best. If you want it to integrate with other products, though, you've got to pay a lot of money for other products as well. That's the only issue that I've got with that. I would rate this solution as eight out of ten, purely because there are additional features I'd love to see, but that is it. If you're doing it on the deployment side of things, I'd give it a ten out of ten. If you're looking at the product as a whole, however, there are a few things I think are missing, but only as additional features. Nine out of ten other customers would probably give it a ten out of ten because they don't need the features that I need. For me personally, it is a little bit empty in certain places. There's so much more they could do with that to make it the most awesome market cornering product there is, but it's not there yet.
I would rate this solution a ten out of ten.
My advice to others considering implementing the solution is, depending of course on if the company is looking for a new kind of firewall solution, is "Don't do it yourself." I would rate the solution eight out of ten.
My advice to others that are looking to implement Check Point Endpoint Security is that it's very secure. The only issue is that the disc encryption is bound to the hardware in the machine that it's in. It takes a bit long to decrypt the hard drive. That's the only issue. I'd give Check Point Endpoint Security about a nine out of ten.
My advice is to get Check Point, even without trying it first. Use it, and you will be very, very secure. Check Point guarantees the security and stability of your network. I would rate this solution as nine out of ten.
If you have a medium-size environment like ours, this solution should serve the purpose, although you may need different things. In security, one thing cannot suit everybody. We have about 500 users of the solution. We don't have any immediate plans to increase our usage. Any increase would be at least two to three years in the future, given the type of environment and workloads that we have.
The anti-malware we found very good on Check Point Endpoint Security. Mainly we observe the overall deployment and then maintenance is easy. It is only one click and you can deploy everything. Whoever wants their data secure, and they want to have peace of mind, make sure to go with the anti-malware capabilities on the SandBlast Agent. We consider Check Point Endpoint Security to be one of the best systems for SAP. The zero-day anti-exploit solutions should be there with Check Point Endpoint Security. Because of the budget, people keep the software, but my advice is that it is also a must-have software. You should have SandBlast Agent along with the anti-malware capabilities installed. I would rate it a ten out of ten.