Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Web administration is great, great secure tool.
Pros and Cons
  • "Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance."
  • "It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow."

What is our primary use case?

Teleworking and the mobility of users led us to understand that we needed to improve the security of the user and of the team. We also implemented this tool through a super light agent.   

How has it helped my organization?

The downloads were completely safe from the browsers. Its great virtue is its security from the start of the download itself in the browser.

We also established policies in a granular way. We create user profiles for different types of blocking or web access, to guarantee that we can protect users and managers.

What is most valuable?

Check Point Harmony Browse came to innovate security from the browser. I will comment on the best virtues of the tool:

1. Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance.

2. Its protection against modern threats such as credential theft is incredible. With this feature, you can browse with confidence knowing that your accounts are safe.

3. Its administration portal through Check Point Infinity is incredible, really intuitive, and easy to implement for users.

What needs improvement?

There are few improvements. No manufacturer is perfect. It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow. They can improve the performance, and it would be even more amazing.

The documentation of these tools is scarce. They could share more of the new tools at a public level.

The costs are competitive. However, they are only accessible through a partner. It would be better if they were public to make references against other products and make decisions.

Buyer's Guide
Check Point Harmony Browse
April 2024
Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,857 professionals have used our research since 2012.

For how long have I used the solution?

This Check Point tool, used in recent years, is modern and is great for identity security.

Which solution did I use previously and why did I switch?

We did not know a tool with these qualities.

What's my experience with pricing, setup cost, and licensing?

It is important to find a Check Point partner, validate costs, request documentation, and take a proof of concept. That would be my recommendation before purchasing the product.

Which other solutions did I evaluate?

Our partner told us about this tool. We immediately validated the market, verified costs, and made the decision. It really wasn't difficult due to everything that Check Point represents.

What other advice do I have?

It is a very good tool, however, not necessary for everyone, since some companies already have other tools that provide security at this point. However, I recommend trying it.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Security Browse - Infinity Portal
Pros and Cons
  • "It is easy to implement and has great security potential to avoid vulnerabilities through internet browsing."
  • "The documentation of the most current applications is sometimes not so clear, and it is difficult to understand."

What is our primary use case?

We required a solution that could granularly provide access and navigation policies for both inside and outside the perimeter. The Check Point Harmony Browse solution allowed us to provide this security.

Thanks to its silent installation agent (that does not require high consumption of host performance), we were able to provide security against malware and ransomware, among other modern threats.

Customers have had no problems provisioning this tool and are satisfied with the results.

How has it helped my organization?

Check Point Harmony Browse has helped us improve the security of browsing, downloading files, and dealing with malware that can be found when connecting from different sites. For example, our salespeople tend to leave the company a lot and connect from any site to company resources. They can be vulnerable and be an easy target for attacks.

This tool helped us to close those vulnerabilities that browsers have. In this way, our laptops are more secure.

What is most valuable?

This is a very practical solution. It is easy to implement and has great security potential to avoid vulnerabilities through internet browsing.

We also like the Nano agent. It does not consume any performance from your host, and is also very easy to install, which speeds up its implementation on clients.

It can be monitored and improved by granular policies within the Check Point Infinity Portal, where its dashboard is very intuitive for the client.

We like how it works. We like the protection provided. It's a modern security application.

What needs improvement?

Check Point Harmony Browse can improve a few features. Some related to the product include:

Check Point technical support, which is somewhat slow in responding to requests generated from the portal. It generates some delays in the solution. The hours of Check Point support are different from those in Latin America, which is why this problem occurs.

The documentation of the most current applications is sometimes not so clear, and it is difficult to understand. It needs some points to help generate implementations with good practices.

For how long have I used the solution?

It's a very good security tool. We have used it since 2020. It helped us a lot during the time of the pandemic for dealing with remote work.

What do I think about the scalability of the solution?

Check Point's cloud solution is not managed by the customer.

Which solution did I use previously and why did I switch?

We had not previously used a solution like Harmony Browse.

What's my experience with pricing, setup cost, and licensing?

It is important to validate the costs, requirements, and business needs in order to choose the best Check Point solution for the company.

It is also important to have a Check Point partner to support us in all requirements and requests.

Which other solutions did I evaluate?

It is always a good practice to research the different solutions available on the market.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Browse
April 2024
Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,857 professionals have used our research since 2012.
PeerSpot user
IT Security at Akros Tech
Real User
Top 10
Reduces vulnerabilities, easy to implement and has an excellent nano agent
Pros and Cons
  • "This tool installs a very small agent in browsers. It does not cause performance problems on the host computer, which makes it less annoying for users."
  • "Support must be faster in solving problems."

What is our primary use case?

Check Point Harmony Browse has been used by our company to provide security in the browsers of user computers that work remotely. They connect from many places, some with a lot of security, others with too many vulnerabilities. We needed to provide advanced security to these teams with a reliable tool, which could help protect against phishing, malware, and especially ransomware - since it is one of the most damaging threats today. This tool fulfills what we were looking for in an incredible way.

How has it helped my organization?

Previously, we had many vulnerabilities with the files downloaded by users through their browsers. Sometimes they were malware and sometimes ransomware. Since they were not in the perimeter, they were easy targets for these modern threats. However, thanks to this powerful tool, we have achieved the business security that we required.

This tool installs a very small agent in browsers. It does not cause performance problems on the host computer, which makes it less annoying for users.

With this, we have improved and secured the company's computers from anywhere against these threats.

What is most valuable?

We value the entire Check Point Harmony Browse tool. One of its greatest benefits is the ease of implementation. Its nano agent is incredible; it securely protects all devices.

The administration from the centralized Infinity Portal provides an additional plus for the IT department since, in addition to being centralized, it is very intuitive. This benefits the administration and the time spent by the engineers during an event or in the case of daily management.

As for the costs, it seems pretty comfortable.

What needs improvement?

Check Point has always been a constant tool, with its new tools, it has taken a lot of advantage over its competition. However, there are always features that need improvement, for example:

1. Support must be faster in solving problems. Sometimes it takes many days to have a solution.

2. Check Point could put more facilities in its manuals and documentation, including more graphics to make it simple for the client.

3. The prices are only visible through a partner. It would also be good to be able to see them publicly.

For how long have I used the solution?

This is a great simple security tool for browsers that is easy to install an has been used throughout this year (2022).

Which solution did I use previously and why did I switch?

It is such a punctual tool. It is easy to use and so powerful in a way that we have not seen in other manufacturers. That's why we love Check Point.

What's my experience with pricing, setup cost, and licensing?

It is important to assess the costs and scope of the solution in order to meet the needs of the clients.

Which other solutions did I evaluate?

We evaluated tools, that were not the same, from other manufacturers such as Cisco and Fortinet. However, we chose Check Point Harmony browse for all its features and security power.

What other advice do I have?

I'd advise people to try the tool. Personally, I was amazed.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Coordinador at oesia
User
Good protection, great threat extraction capabilities, and good at detection
Pros and Cons
  • "This solution has multiple protections that are generally very simple to configure and work quickly with little intrusiveness for the user."
  • "The ease of handling should be improved, as it is currently intrusive and some users don't like it."

What is our primary use case?

This solution is essential to protect browsing against zero-day malware and zero-day phishing in a simple and easy-to-manage way. 

With this solution, users can browse without worries, focusing on their work and not on security. In addition, this solution is available for all common systems (Windows, Mac, and Chrome OS), so you can avoid big scares with it.

This solution is easily managed from a console in the cloud and only requires deploying an extension in browsers, which facilitates its administration.

How has it helped my organization?

With this solution, users' browsing is automatically protected against zero-day phishing and zero-day malware, all with almost no configuration required. In addition, you can monitor that corporate passwords are not reused, which further reduces the chances of falling into phishing.

All these protections are maintained wherever the user is, which makes it perfect for teleworking.

In my particular case, unfortunately, only a few of us in the organization have this solution installed. The rest of the users continue with these threats.

What is most valuable?

This solution has multiple protections, with Zero-phishing being the most different from the rest of the solutions on the market since it is capable of detecting and blocking all new phishing attacks quickly and easily.

The second most differentiating factor that offers effective protection is Threat Extraction. It allows us to safely download any document in a few seconds, eliminating their active content and thus avoiding the risk of malware. If the original document is necessary, it can be downloaded after the file is analyzed by its advanced sandbox system.

What needs improvement?

This solution has multiple protections that are generally very simple to configure and work quickly with little intrusiveness for the user. In the case of document download zero-day threat protection, Threat Extraction, this is not exactly the case. 

It works very well, however, it is very annoying for users, since it does not always work in the same way and sometimes it makes it show you the same window twice for each file to indicate where you want to save it. The ease of handling should be improved, as it is currently intrusive and some users don't like it.

For how long have I used the solution?

I've used the solution for about seven years.

What do I think about the stability of the solution?

It is very stable and only has a few times a year where the console cannot be accessed, although the solution still works due to updates.

What do I think about the scalability of the solution?

It is a very scalable solution since the client is very light and the management is done from a console in the cloud.

How are customer service and support?

The customer service is very good, however, the support is somewhat slow and heavy.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have tried several solutions and this seems to me the most complete and safest.

How was the initial setup?

The initial configuration is done in about ten minutes and then all you have to do is load the extension in the browsers.

What about the implementation team?

We implemented the solution internally.

What was our ROI?

By being able to avoid a first virus or phishing, ROI is achieved.

What's my experience with pricing, setup cost, and licensing?

It is an economic solution and very focused on the protection of navigation. It is also easy to configure, deploy, and manage.

Which other solutions did I evaluate?

We also looked at Crowdstrike, Symantec, Bitdefender, Netscope, and AVG.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: I work with this and other providers, always looking for the best solutions for our clients.
Flag as inappropriate
PeerSpot user
Security Consultant at Synergy
Reseller
Top 5Leaderboard
A cloud solution for detecting download files and phishing websites with reasonable pricing
Pros and Cons
  • "The product is stable."
  • "The URL filtering database should be improved."

What is our primary use case?

The solution helps us to detect download files, phishing websites, and access to non-compliant websites.

What is most valuable?

The essential feature of Harmony Browse is SEO phishing. Also, it has improved security.

What needs improvement?

The URL filtering database and website restriction should be improved.

For how long have I used the solution?

I have been using Harmony Browse as a distributor.

What do I think about the stability of the solution?

The product is stable.

What do I think about the scalability of the solution?

We cater the solution to enterprise businesses.

How was the initial setup?

The initial setup and its configuration are easy.

The tool’s deployment on a computer takes ten minutes.

What's my experience with pricing, setup cost, and licensing?

The product has a reasonable pricing.

What other advice do I have?

Harmony Browse is a part of the Check Point Harmony Endpoint security suite. It protects the endpoints.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
Flag as inappropriate
PeerSpot user
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Top 5Leaderboard
Good security, useful analytics, and helps keep devices secure
Pros and Cons
  • "Among its most important features is the integration of its analytics."
  • "One of the new features I would like to see is the possibility that these tools can be brought to mobile devices such as tablets and cell phones in iOS or Android applications."

What is our primary use case?

We find ourselves with the need to ensure the navigation of our users, providing safe navigation solutions protecting equipment and searches, mainly since, in many cases, users are people with little knowledge of security and are entering any type of web page where we can find malicious environments which can compromise the infrastructure and associated services.

We have a need to secure equipment and be able to have our users protected when they browse anywhere, especially when we have many of our users working from home.

How has it helped my organization?

In our search for solutions to protect users inside or outside the organization, and to provide security when browsing wherever they go, we came across this product. We wanted the protection that we previously had only in the perimeter area. At this point, we saw this solution provided great value to our organization as the security is integrated with the services of the Check Point cloud. This integration is so powerful that each request leads us to conduct a deep inspection of each one of the queries, being one of the best in the market and providing protection at all times. 

What is most valuable?

Among its most important features is the integration of its analytics. It allows us to be faster and predicts events that violate the security of the equipment. We can avoid zero-day events and intrusions. We can avoid malware and ransomware infections which are the most common. It gives us the possibility of protecting each of the activities. 

What needs improvement?

One of the new features I would like to see is the possibility that these tools can be brought to mobile devices such as tablets and cell phones in iOS or Android applications. 

I would like is to be able to take this solution and be able to take existing designs and integrate the product into all services since it's one of the most important solutions. 

We must be more proactive and integrate existing solutions into a single integrated package so that customers feel more secure. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Associate Technical Manager at TrustArc
Vendor
Top 10
Great support, cutting-edge technology, and good security
Pros and Cons
  • "It gives our customers a sense of security they might not have found anywhere else."
  • "Having local support everywhere in the world would be helpful."

What is our primary use case?

We provide services to clients that have to do with their websites. For a company like ours, we needed a product that could safeguard our workstations.  

We need to provide our customers with a safe and secure environment to win their business, and choosing Check Point Harmony Browse was and still is the best decision we've made. 

It gives our customers a sense of security they might not have found anywhere else. 

Since our move to Check Point Harmony, our client relationship has improved dramatically.

How has it helped my organization?

Since our move to Check Point Harmony, our client relationship has improved by quite a bit. Our trust rating has gone up immensely, and we couldn't even fathom the level of change we experienced until one of our clients mentioned it. 

We were hesitant to make this change in the beginning. However, we all have finally agreed to finalize the switch, and we have not looked back. 

The support was also very different from what we were used to; they go above and beyond to make sure that our concerns are fixed in no time.

What is most valuable?

Their support is top-notch, and their technology is cutting-edge. We had a little problem when it came to deployment. However, their support has helped us throughout the entire process. They also educated us and answered all our questions, even though some of them may have sounded ignorant. We appreciate a great support team, which has been a great factor in deciding to stay with them and renew our product. They're easy to reach out to and will not stop until all our issues are resolved. 

What needs improvement?

They can maybe improve the deployment strategy.

Having local support everywhere in the world would be helpful. 

Our deployment has taken a while to complete as there were some issues with the OS we were using. This was handled by their support team with great success; however, it would have been best if it was completed in the time frame that was originally discussed. We're still very happy with the overall support that we are getting, and that's really all we can ask for.

For how long have I used the solution?

I've used the solution for over a year.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Associate Technical Manager at TrustArc
Vendor
Top 10
Great security with helpful zero-day phishing protection and good detection capabilities
Pros and Cons
  • "The downloaded protection as it scans and emulates the files on a browser level is great."
  • "URL filtering could be better."

What is our primary use case?

We are a certification company, and clients send us details about their websites that we need to download from time to time. Having Harmony ensures that we don’t get attacked and our client's information gets protected. 

In order for us to provide certifications, we must also ensure that our services are protected to the highest level. So far, Harmony has been able to provide the level of protection that we require as a company. It not only eases our minds but also helps us sleep peacefully at night.

How has it helped my organization?

It builds trust from our clients as they’re sure that their information is safe and fully protected.

Building trust is the foundation of our company, so it is vital for us to use services that are up to our standards and are on our level. We provide our clients top-notch services and it is only sensible that we provide top-notch solutions/protection as well. 

It is necessary to be on top and remain on top by providing what’s only the best and nothing less.    

What is most valuable?

The downloaded protection as it scans and emulates the files on a browser level is great. It also blocks zero-day phishing sites so our clients and employees are safe from having their sign-ins used elsewhere and the fact it detects and prevents the use of log-in passwords on a different website to ensure that we are fully protected. 

It is a big deal for us, as there are thousands and thousands of data points that can be hacked from our credentials alone. Preventing the use of the same password somewhere else is huge protection already.

What needs improvement?

URL filtering could be better. It would be great if you can have object-based categories on the management dashboard. 

It would be best for it to be object-based instead of URL-based as it saves us a lot of time. 

Clicking the object/subject from the dashboard shortens the handling time as compared to using a URL. 

There are many questionable sites that we can’t keep track of, and it would be easier to just have them in a visible list than to find them. I’d say both URL, and object-based filtering needs to be available.

For how long have I used the solution?

I've used the solution for less than a year.

How are customer service and support?

Technical support has addressed all of our questions.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used something from ESET. We switched to Harmony as it offers more and is more “bang for the buck.”

How was the initial setup?

It was pretty straightforward to set up, and the vendor helped all the way.

What about the implementation team?

We handled the setup in-house.

What was our ROI?

We can’t be sure of ROI as of yet as it’s still pretty new.

Which other solutions did I evaluate?

We had been considering Harmony for a while and had been waiting for our contact to end to switch. We may have considered others prior. However, we had been set on getting this.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Browse Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Buyer's Guide
Download our free Check Point Harmony Browse Report and get advice and tips from experienced pros sharing their opinions.