We are a company that is rapidly expanding our presence across multiple regions and moving key operations to a hybrid cloud model and needed a scalable, prevention-first security platform to bolster its security stack. Check Point Security Tooling by Check Point Software Technologies offers a robust and comprehensive cybersecurity solution tailored for the insurance industry. With features like advanced threat detection using AI and machine learning, firewalls, intrusion prevention, and endpoint protection, it ensures the security of sensitive customer data and compliance with industry regulations. Its user-friendly interface and seamless integration with existing IT systems allow for minimal disruption and quick deployment, making it adaptable to both small and large insurance firms.
Technical Associate at Seamless Infotech Pvt. Ltd.
Real User
Top 5
2024-05-31T08:07:00Z
May 31, 2024
We use Harmony SASE to manage remote users across multiple countries, including India, Poland, and the US. The customer required a setup to control access for different groups and users, protecting them from threats and securing their systems.
The platform manages remote access by allowing employees to log into a secure portal, where they are only given access to the specific applications they are authorized to use. This access is based on an HTTPS connection, ensuring security.
One use case of SASE is for a partner customer who needs a secure and fast connection for their employees to access the final customer's data center and cloud. Green protection and security measures enable access to all information, including the data center's applications and networks.
In our company, Quantum SASE is available for namesake in our environment since we rely on Check Point Secure Web Gateway for its firewall functionalities. Most of our company's customers use firewalls from Check Point Software, Palo Alto, or Fortinet. The simple use case of the tool for our company's customers stems from the fact that they have a general internal network or many users for which a firewall is required to secure the network traffic flow and communications that happen from outside to inside the company.
Learn what your peers think about Check Point Harmony SASE (formerly Perimeter 81). Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
We utilize cryptographic techniques, leveraging the tool's capabilities in Blockchain, to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements. Integrating Quantum-resilient technology into our decentralized enterprise framework ensures the security of our clients' sensitive data. This proactive approach protects client data from potential threats associated with Quantum computing.
This tool was acquired when the organization made the decision to move the entire infrastructure to the cloud. It was going to handle different types of schemes such as IaaS and SaaS up to Office 365, so all these schemes were going to meet the need for accessibility by users. We needed a tool with complex, centralized management that would help us prevent all types of malicious attacks both from inside and outside in order to guarantee security and reliability for all our clients.
My company integrates the solution into other companies where we are required to do a project for them per the requirements. I had the opportunity to suggest Check Point Harmony Connect two years ago at the Bank of Brazil.
Regarding use cases, I can say that the solution's user experience is very good. Also, the solution's UI is excellent. In general, we use it for SASE use cases, and to access VPN, ZTNA etcetera.
For the past two months, we have been evaluating Harmony Connect because it has some limitations on routing and account control, so we are testing it for three customers to check this function. In some areas, Harmony Connect can replace older VPN products and also add some features, like DRP and security gateway.
Sales Manager, Checkpoint at South Asian Technologies
Reseller
Top 5
2022-12-21T11:25:04Z
Dec 21, 2022
Our company installed the solution locally to test it and gain user experience. In the future, we plan to sell the solution to customers. The solution provides internet access, network access, and security. Both on-premises and cloud versions are available. Initially, we installed the on-premises version but are now testing the cloud version.
Our company needed a security solution for our clients' computers. We also noticed that it had the functions of Security Web Gateway for off-premises users.
On the other hand (as we are a partner of Microsoft), we offer the Check Point solution and it has been widely accepted by our clients.
Therefore, it complied with what our clients need in their infrastructure and we have received good positive cases.
Cloud Support at a tech company with 51-200 employees
User
2022-04-06T15:56:00Z
Apr 6, 2022
We use the solution primarily as security for business equipment, and optimization of their use. We are very happy with the features. In the company, it is about finding a way in which employees can optimize time in addition to validating the security found in personal equipment, thus providing protection over the information contained in personal equipment. In this way, it is the main defense against attacks. Besides being quite friendly and reliable as a super recognized brand worldwide, the managers are quite happy with the use.
The solution is predominantly used for Internet access when mobile. In the office, we have already deployed a Quantum Spark appliance, and this was focused on mobile users. We don't have on-premise applications or servers, so there is no use case for Remote access. However, we were keen to try it out from an evaluation perspective by bridging to the existing Check Point gateway at the site. Simplicity was needed, and importantly, we wanted something to not be too intrusive to mobile users. The interface has a few simple options, and it makes it easier.
I have experience with Check Point Harmony Connect and Harmony Endpoint, mainly in an enterprise setting for the cloud-based access control and firewall functionality. It is a good, easy-to-deploy solution that is ideal when it comes to managing access to enterprise resources for those working in a home office type of scenario.
Check Point Harmony Connect is a modern security tool from the prestigious brand that helps us provide web filter or web gateway security to our employees, from the office or anywhere they can be covered with the security of this application. It is a tool with great potential. It gave us access to security and user control to enhance productivity. In the company, we are pleased with the functionalities and benefits provided by Check Point Harmony Connect. It is an excellent option and an excellent tool.
In our company, we needed to be able to provide security to our teams that are outside the offices due to pandemic issues. With it, we found we were able to shield them through Harmony Connect. It provided us with the way to provide governance, control and monitoring of the visited sites, see vulnerabilities and find out how to deal with them in order to avoid cyber attacks. With this tool, we can guarantee that the equipment will not be an easy target for cybercriminals. It is really simple to implement.
It was implemented at work to be able to monitor collaborators and know what pages they are using and thus be able to take the necessary actions to block pages that are not authorized in the company and also know in which pages collaborators spend more time and be able to measure their work performance and thus be more effective in our company. Once all the security breaches of our collaborators have been detected, we can determine which options to mitigate in the company and improve security.
We are a company of around 30-50 people who have been working from home since the pandemic began. Our environment is completely cloud-based and all our computers are managed by our organization. We needed a solution that would help us protect users and the information that is handled in our company. This solution had to comply with characteristics such as the protection of network connections, prevention of threats such as malware and phishing, data protection, and, above all, it had to be easy to implement and manage. This is why we implemented Check Point Harmony Connect.
Project Management and Deployment Team Leader at Sefisa
MSP
2022-04-06T17:50:00Z
Apr 6, 2022
We needed to connect the branches with the users, and, in turn, we needed to connect the users with the applications of the organization. However, we needed to secure this connection since the users were at home. The branches had Citrix SD-WAN and therefore we needed a solution that would integrate with the current solution that connected the branches to the central site. The client's requirements were that the solution could: * Be designed to prevent the most evasive cyberattacks * Have Zero-Trust network access to enterprise applications * Secure Internet access for remote users * Protect branch office (SD-WAN) connections to the Internet and the cloud
Information Security Team Lead at Oregon State Treasury
Real User
2022-04-06T14:53:00Z
Apr 6, 2022
Our primary use case is as a Security Web Gateway for off-premises users. We use Check Point for application control, IPS, and web filter on-premises and wanted an in-kind solution for off-prem users. The primary requirement was for the Harmony policy to be able to be managed from the same SmartConsole instance as our on-premises gateways are managed. We wanted to be able to have one single policy, managed in one place, and for our users to have the same browsing experience whether off-prem or on-prem. It was also a primary requirement to be able to have the logs generated from Harmony merged into the same locations (SmartConsole and our SIEM) as our on-prem gateway logs go.
Even with our old anti-virus solution, users were able to download files and receive it through e-mail with no inspection or emulation. Also, they were able to use external pen drives or external HDs with no control of the data that was being transferred and where it was going to. The internet navigation had no filter and even the traffic to porn websites or malicious websites was passing normally with no inspection. If one of the machines were stolen or lost we did not have something to block access to the data inside the disk, sensitive information could have been lost.
My production environment today is hybrid and I use several cloud solutions and more than one on-premise data center. The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment. It does all this with an additional gain of the possibility of auditing some accesses to the environment.
Perimeter 81 is a cloud-based network security and software-defined perimeter (SDP) solution designed to provide secure access to resources in the cloud, data centers, and on-premises environments. It offers a unified platform for organizations to manage and secure their network infrastructure, regardless of the location or type of resources.
Perimeter 81 Benefits:
Easy to use
Flexible access policies
Strong encryption and authentication protocols
Scalable
Compatible with various...
We are a company that is rapidly expanding our presence across multiple regions and moving key operations to a hybrid cloud model and needed a scalable, prevention-first security platform to bolster its security stack. Check Point Security Tooling by Check Point Software Technologies offers a robust and comprehensive cybersecurity solution tailored for the insurance industry. With features like advanced threat detection using AI and machine learning, firewalls, intrusion prevention, and endpoint protection, it ensures the security of sensitive customer data and compliance with industry regulations. Its user-friendly interface and seamless integration with existing IT systems allow for minimal disruption and quick deployment, making it adaptable to both small and large insurance firms.
We use Harmony SASE to manage remote users across multiple countries, including India, Poland, and the US. The customer required a setup to control access for different groups and users, protecting them from threats and securing their systems.
The platform manages remote access by allowing employees to log into a secure portal, where they are only given access to the specific applications they are authorized to use. This access is based on an HTTPS connection, ensuring security.
Check Point Quantum SASE is a next-generation email security solution. It can be used to protect users from phishing emails.
One use case of SASE is for a partner customer who needs a secure and fast connection for their employees to access the final customer's data center and cloud. Green protection and security measures enable access to all information, including the data center's applications and networks.
In our company, Quantum SASE is available for namesake in our environment since we rely on Check Point Secure Web Gateway for its firewall functionalities. Most of our company's customers use firewalls from Check Point Software, Palo Alto, or Fortinet. The simple use case of the tool for our company's customers stems from the fact that they have a general internal network or many users for which a firewall is required to secure the network traffic flow and communications that happen from outside to inside the company.
We utilize cryptographic techniques, leveraging the tool's capabilities in Blockchain, to safeguard financial transactions against potential threats, especially those posed by Quantum computing advancements. Integrating Quantum-resilient technology into our decentralized enterprise framework ensures the security of our clients' sensitive data. This proactive approach protects client data from potential threats associated with Quantum computing.
We use the solution for security.
This tool was acquired when the organization made the decision to move the entire infrastructure to the cloud. It was going to handle different types of schemes such as IaaS and SaaS up to Office 365, so all these schemes were going to meet the need for accessibility by users. We needed a tool with complex, centralized management that would help us prevent all types of malicious attacks both from inside and outside in order to guarantee security and reliability for all our clients.
I'm using the solution on my laptop and desktop in the office.
My company integrates the solution into other companies where we are required to do a project for them per the requirements. I had the opportunity to suggest Check Point Harmony Connect two years ago at the Bank of Brazil.
Regarding use cases, I can say that the solution's user experience is very good. Also, the solution's UI is excellent. In general, we use it for SASE use cases, and to access VPN, ZTNA etcetera.
The primary use case has to do with the remote connectivity of sites.
For the past two months, we have been evaluating Harmony Connect because it has some limitations on routing and account control, so we are testing it for three customers to check this function. In some areas, Harmony Connect can replace older VPN products and also add some features, like DRP and security gateway.
Our company installed the solution locally to test it and gain user experience. In the future, we plan to sell the solution to customers. The solution provides internet access, network access, and security. Both on-premises and cloud versions are available. Initially, we installed the on-premises version but are now testing the cloud version.
Our company needed a security solution for our clients' computers. We also noticed that it had the functions of Security Web Gateway for off-premises users.
On the other hand (as we are a partner of Microsoft), we offer the Check Point solution and it has been widely accepted by our clients.
Therefore, it complied with what our clients need in their infrastructure and we have received good positive cases.
We use the solution primarily as security for business equipment, and optimization of their use. We are very happy with the features. In the company, it is about finding a way in which employees can optimize time in addition to validating the security found in personal equipment, thus providing protection over the information contained in personal equipment. In this way, it is the main defense against attacks. Besides being quite friendly and reliable as a super recognized brand worldwide, the managers are quite happy with the use.
The solution is predominantly used for Internet access when mobile. In the office, we have already deployed a Quantum Spark appliance, and this was focused on mobile users. We don't have on-premise applications or servers, so there is no use case for Remote access. However, we were keen to try it out from an evaluation perspective by bridging to the existing Check Point gateway at the site. Simplicity was needed, and importantly, we wanted something to not be too intrusive to mobile users. The interface has a few simple options, and it makes it easier.
I have experience with Check Point Harmony Connect and Harmony Endpoint, mainly in an enterprise setting for the cloud-based access control and firewall functionality. It is a good, easy-to-deploy solution that is ideal when it comes to managing access to enterprise resources for those working in a home office type of scenario.
Check Point Harmony Connect is a modern security tool from the prestigious brand that helps us provide web filter or web gateway security to our employees, from the office or anywhere they can be covered with the security of this application. It is a tool with great potential. It gave us access to security and user control to enhance productivity. In the company, we are pleased with the functionalities and benefits provided by Check Point Harmony Connect. It is an excellent option and an excellent tool.
In our company, we needed to be able to provide security to our teams that are outside the offices due to pandemic issues. With it, we found we were able to shield them through Harmony Connect. It provided us with the way to provide governance, control and monitoring of the visited sites, see vulnerabilities and find out how to deal with them in order to avoid cyber attacks. With this tool, we can guarantee that the equipment will not be an easy target for cybercriminals. It is really simple to implement.
It was implemented at work to be able to monitor collaborators and know what pages they are using and thus be able to take the necessary actions to block pages that are not authorized in the company and also know in which pages collaborators spend more time and be able to measure their work performance and thus be more effective in our company. Once all the security breaches of our collaborators have been detected, we can determine which options to mitigate in the company and improve security.
We are a company of around 30-50 people who have been working from home since the pandemic began. Our environment is completely cloud-based and all our computers are managed by our organization. We needed a solution that would help us protect users and the information that is handled in our company. This solution had to comply with characteristics such as the protection of network connections, prevention of threats such as malware and phishing, data protection, and, above all, it had to be easy to implement and manage. This is why we implemented Check Point Harmony Connect.
We needed to connect the branches with the users, and, in turn, we needed to connect the users with the applications of the organization. However, we needed to secure this connection since the users were at home. The branches had Citrix SD-WAN and therefore we needed a solution that would integrate with the current solution that connected the branches to the central site. The client's requirements were that the solution could: * Be designed to prevent the most evasive cyberattacks * Have Zero-Trust network access to enterprise applications * Secure Internet access for remote users * Protect branch office (SD-WAN) connections to the Internet and the cloud
Our primary use case is as a Security Web Gateway for off-premises users. We use Check Point for application control, IPS, and web filter on-premises and wanted an in-kind solution for off-prem users. The primary requirement was for the Harmony policy to be able to be managed from the same SmartConsole instance as our on-premises gateways are managed. We wanted to be able to have one single policy, managed in one place, and for our users to have the same browsing experience whether off-prem or on-prem. It was also a primary requirement to be able to have the logs generated from Harmony merged into the same locations (SmartConsole and our SIEM) as our on-prem gateway logs go.
Even with our old anti-virus solution, users were able to download files and receive it through e-mail with no inspection or emulation. Also, they were able to use external pen drives or external HDs with no control of the data that was being transferred and where it was going to. The internet navigation had no filter and even the traffic to porn websites or malicious websites was passing normally with no inspection. If one of the machines were stolen or lost we did not have something to block access to the data inside the disk, sensitive information could have been lost.
My production environment today is hybrid and I use several cloud solutions and more than one on-premise data center. The Harmony Connect solution helped by unifying in a single portal all the necessary accesses for the company's internal employees, such as RDP, SSH, bank access databases, and even internal portals, bringing security and organization to the entire environment and facilitating employee access with a single, centralized login to the entire environment. It does all this with an additional gain of the possibility of auditing some accesses to the environment.