The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets.
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Cybersecurity Architect at a computer software company with 201-500 employees
MSP
2022-01-05T07:20:55Z
Jan 5, 2022
I have found the Zero phishing and IPS features the most useful in Check Point Harmony Endpoint. Additionally, threat emulation sandboxing is effective.
Senior Manager at a financial services firm with 10,001+ employees
Real User
2021-05-14T13:24:00Z
May 14, 2021
Harmony Endpoint is able to detect, monitor, block, and mitigate attacks on the endpoint and it builds and maintains relevant logs for later inspection.
Network Security Assurance Specialist at Visa Inc.
Real User
2021-01-20T11:07:00Z
Jan 20, 2021
Check Point Endpoint Security really helped the business stop various malware attacks throughout the time we used it, including a ransomware attack, which was stopped in minutes.
SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth.
The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry.
The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers.
Business Analyst / Developer at a tech services company
Real User
2020-08-04T07:26:00Z
Aug 4, 2020
In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations.
It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks.
Team Lead Implementation Services/Systems Integration Engineer at Trinidad Systems Limited
Real User
2020-07-27T16:52:00Z
Jul 27, 2020
One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users machine. This is a very valuable feature of this solution.
Senior Solution Architect at a comms service provider with 51-200 employees
Real User
2020-06-30T08:17:00Z
Jun 30, 2020
Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum.
Head of IT at a real estate/law firm with 11-50 employees
Real User
2019-10-28T06:33:00Z
Oct 28, 2019
The biggest value we found was ease of deployment. I haven't really used it much, so I can't really comment beyond that. I haven't used it much, but it's working.
CIO / CTO at a financial services firm with 51-200 employees
Real User
2019-09-05T05:37:00Z
Sep 5, 2019
The most valuable feature is the integration with CheckPoint's firewalls. You can have one port, and follow the logs from both Endpoint and firewall security.
Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved.
Check Point Harmony Endpoint integrates security solutions, allowing comprehensive protection against cyber threats. It's designed to suit enterprise-scale operations with robust features for threat prevention and management.Check Point Harmony Endpoint offers advanced security capabilities that prioritize threat analysis, detection, and prevention. Tailored for professional environments, it provides tools to handle endpoint vulnerabilities effectively. Its user-centric design ensures that IT...
It scans all the endpoints in your cloud and on-premises for vulnerabilities, threats, and malware attacks.
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
The remote support is good.
The tool minimizes the impact of a breach with autonomous detection and response.
Scalability-wise, I rate the solution a ten out of ten.
The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets.
Stability-wise, I rate the solution a ten out of ten.
Resource overheads have been reduced and we are overall more secure as a business.
The level of security and visibility they provide is great and it is very easy to configure and maintain.
This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities.
Check Point Harmony Endpoint has one of the most user-friendly dashboards I've seen.
Its stability during any heavy performance activity is excellent.
Detection of threats in real-time has helped protect my devices from possible attacks.
Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information.
It monitors data flow across the networking system to enhance comprehensive workflow infrastructure.
When sending emails to my colleagues, it detects any virus and blocks any spam that may be shared.
It is minimally invasive. From a single installer, the equipment is protected and secured.
The reporting feature where we can see and monitor what happened on our client computers is useful.
The most important characteristic of our requirements was the implementation of disk encryption.
We are able to manage all our endpoints from a single cloud console.
Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint.
We love the reports and monitoring they provide.
The solution has all the standard features you would expect for endpoint protection.
Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner.
It has improved the detection of malware.
It's a scalable product as it is a cloud offering.
I found the fact of working across multiple attack vectors easy and more beneficial.
It is quite easy to use and deploy the agent on endpoints to protect them from bad actors.
We're able to secure all endpoints and manage them from a single console.
The rollout and management of devices were very simple.
I have found the Zero phishing and IPS features the most useful in Check Point Harmony Endpoint. Additionally, threat emulation sandboxing is effective.
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today's complex threat landscape.
They have a great knowledge base that you can leverage as a user.
Harmony's endpoint sandboxing is really good.
The communication with the console is very dynamic and remote, without the need to return to the computer locally.
The initial setup is very easy.
It's great for securing our endpoints from any external attacks.
Forensic Analysis provides a complete analysis of threats via detailed reports.
Check Point Harmony Endpoint can be easily deployed and is cost effective and more secure.
Harmony Endpoint is able to detect, monitor, block, and mitigate attacks on the endpoint and it builds and maintains relevant logs for later inspection.
The technical support is good.
The most useful feature so far has been having a functioning and up-to-date anti-malware scanner.
The most valuable feature is forensics.
Check Point Endpoint Security really helped the business stop various malware attacks throughout the time we used it, including a ransomware attack, which was stopped in minutes.
The most valuable feature is the Zero-day protection, which covers our on-premises users, and well as those users who are outside of our network.
It's pretty complete for preventing threats to endpoints. Its capabilities are great.
SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth.
The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry.
The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers.
In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations.
We now feel more secure with our PCs, even more with the non-technical persons.
It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks.
One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users machine. This is a very valuable feature of this solution.
Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum.
We were under an attack in our environment, and the Check Point response was good because we didn't lose anything.
The biggest value we found was ease of deployment. I haven't really used it much, so I can't really comment beyond that. I haven't used it much, but it's working.
The most valuable feature of this solution is the VPN.
The most valuable feature is the integration with CheckPoint's firewalls. You can have one port, and follow the logs from both Endpoint and firewall security.
We had a ransomware attack and the SandBlast agent automatically picked up the ransomware.
Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved.
The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature.