Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
What I like the most about the application is that it is a navigation application that allows us to establish services, configurations and traffic through it in a secure and private way.
This tool installs a very small agent in browsers. It does not cause performance problems on the host computer, which makes it less annoying for users.
Check Point Harmony Browse is a secure web browsing solution that provides users with a safe and seamless browsing experience. It is designed to protect users from web-based threats such as malware, phishing, and other cyber attacks. Harmony Browse uses advanced threat prevention technologies to detect and block malicious websites and downloads in real-time. It also provides users with a secure connection to the internet, ensuring that their online activities are not intercepted or monitored...
The product is stable.
It has content filtering, which has helped us a lot in being able to apply the necessary filtering policies where we can allow or block websites.
The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete.
The software is easy to install and deploy across any business environment and it is becoming a game changer for us.
All the files that enter the company are fully scanned at the browser level.
It gives our customers a sense of security they might not have found anywhere else.
Its content filtering is great.
What I like the most about the application is that it is a navigation application that allows us to establish services, configurations and traffic through it in a secure and private way.
Among its most important features is the integration of its analytics.
This tool installs a very small agent in browsers. It does not cause performance problems on the host computer, which makes it less annoying for users.
It analyzes and verifies in detail how secure or insecure a file, document, or object is that is being downloaded.
This solution has multiple protections that are generally very simple to configure and work quickly with little intrusiveness for the user.
The downloaded protection as it scans and emulates the files on a browser level is great.