Try our new research platform with insights from 80,000+ expert users
CLAUDIO SANTOS - PeerSpot reviewer
Operation Director at GLOBALIP
Reseller
Top 5Leaderboard
Provides browser protection and has an easy deployment

What is our primary use case?

When you purchase Check Point Harmony Browse, you can access this feature. For example, if an employee works from home using their laptop, and you can't install the endpoint protection agent on their device because it's owned by the employee rather than the company, you can still use the browser protection feature.

You don’t need to install anything directly on the laptop. Instead, you install a browser extension for Chrome or Microsoft Edge. This extension provides many of the benefits of endpoint protection—about 80% of the features. For instance, if the employee tries to access a malicious URL, the browser extension can block access to that site. If the employee attempts to download a file, the extension can scan it to determine if it's malicious and prevent the download if necessary. The browser extension can also block access to known malicious sites and provide other protective measures.

What needs improvement?

Support could be improved.

For how long have I used the solution?


What do I think about the stability of the solution?

The solution is stable.

Buyer's Guide
Check Point Harmony Browse
September 2025
Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,370 professionals have used our research since 2012.

What do I think about the scalability of the solution?

This solution offers scalability. Once you create and apply a policy, it automatically deploys the feature to new employees as they connect to the company network. 

How are customer service and support?

Support is good.

How would you rate customer service and support?

Positive

How was the initial setup?

You only need to create one policy in Microsoft Active Directory. This policy can be applied to all workstations and will manage access using your credentials across the network.

The implementation depends on the number of employees. For smaller organizations with 100 to 400 employees, it's straightforward and quick. The process becomes more complex for larger organizations with 3,000 to 6,000 employees.

What was our ROI?

ROI is very good because you have your environment protected. Employees don't care about the site they access. Because of this, you need to put a solution like this in their computer to protect the employee behaviors.

What's my experience with pricing, setup cost, and licensing?

It is not expensive.

What other advice do I have?

Overall, I rate the solution a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS
Real User
Top 5Leaderboard
Efficient features, good threat prevention, and helps protect privacy
Pros and Cons
  • "The product enforces the privacy of the users, which is good."
  • "The only thing they should add or improve is the reporting series."

What is our primary use case?

The company has implemented several types of Check Point technology, which is why Check Point Harmony Browse was implemented. It allowed users to access the internet safely regardless of where our users were. This allowed us to prevent them from entering sites that contain zero-day phishing, from downloading malware, or from accessing websites that do not comply with the regulations and reusing passwords. 

With this solution, we avoid being able to contain and reduce security breaches that our users could cause.

How has it helped my organization?

Implementing this new solution in our company helped us a lot to be able to ensure that the internal or external connections of all users will have a very secure connection to the business network. 

We were also able to collect information on the URLs where they connect and thus minimize the gaps. Since many use the PC for personal use, care must be taken as this can cause vulnerabilities and cause problems with the integrity of the information. 

It also provides us with a series of reports that help us make decisions.

What is most valuable?

The tool has several efficient features in addition to its easy implementation with agents. 

One feature is the prevention of high threats. It prevents users from visiting unsafe sites and being able to download some type of malware or reuse passwords.

It also has navigation. It's a very efficient and fast website which helps avoid latency. It also has very good management since it has an integration with the different platforms on the market.

The product enforces the privacy of the users, which is good.

What needs improvement?

The tool so far has a series of very excellent features and has fulfilled its functionality very well. 

The only thing they should add or improve is the reporting series. It needs to provide more detailed information. Apart from that, it has many very efficient qualities to meet the needs. 

Compliance standards must improve in the support area. The SLA is not met. The resolutions are tough. There is no area where users can find centralized documentation. This is one of the priorities that must be taken into account in improving the product in the future.

For how long have I used the solution?

I've used the solution for four years.  

What do I think about the stability of the solution?

The stability is good since its implementation has been very stable.

What do I think about the scalability of the solution?

It has very efficient scalability and integration with third parties.

How are customer service and support?

Dealing with technical support has been the only bad experience. The support is not very efficient.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Other tools are used. However, a similar solution has not been implemented.

How was the initial setup?

The implementation is simple; it was implemented with the IT department.

What about the implementation team?

The implementation was carried out in conjunction with the vendor's engineering team.

What was our ROI?

The ROI is achieved with the security made possible for the company.

What's my experience with pricing, setup cost, and licensing?

It is a very efficient tool; the price is moderately affordable.

Which other solutions did I evaluate?

We did not evaluate other options since we follow the same brand line across the company.

What other advice do I have?

It is a very efficient tool for securing a company's infrastructure.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Browse
September 2025
Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,370 professionals have used our research since 2012.
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Strengthens security, protects devices, and provides good centralized management
Pros and Cons
  • "It has content filtering, which has helped us a lot in being able to apply the necessary filtering policies where we can allow or block websites."
  • "They should focus on new areas of product. In the last year, they have not released any updates with improvements or extra options."

What is our primary use case?

Check Point Harmony Browse was implemented in the company since the world is constantly changing in technology and cyber security. Our company has connectivity for all its users by mobile phone, laptop, and tablet since our collaborators need to be out of the office. They work from home and need to access our applications for their work functions. Due to this requirement, we decided to do an implementation using Check Point. It is one of the leading brands in perimeter security.

How has it helped my organization?

This solution further strengthened the security of the organization since we had been growing in technology and access points in different parts of the country. We needed to be able to control these accesses to avoid any attack. This solution gave us security and visibility of all devices. 

In addition to that, it protects each of the devices from sophisticated devices and guarantees zero-trust access to all our corporate applications. In this way, our company is safe and is evaluated day by day to check against new cyber attacks.

What is most valuable?

Check Point Harmony Browse has several features, such as secure browsing, which has helped us have a secure and threat-free connection. It has content filtering, which has helped us a lot in being able to apply the necessary filtering policies where we can allow or block websites. 

Finally, it presents a centralized management that helps to manage and configure security policies. This simplifies the tasks and control of each of the applications or options found in the application. 

What needs improvement?

Although it is a tool that has many very good features, it should make some improvements. For example, the graphical interface should be improved and made a little more intuitive. They could organize each of the configuration options and improve the latency that occurs when entering the Interface. 

They should focus on new areas of product. In the last year, they have not released any updates with improvements or extra options..

For how long have I used the solution?

I have been using this solution for three years.

What do I think about the stability of the solution?

With the workloads it receives, its stability is good.

What do I think about the scalability of the solution?

The product has very good scalability; it handles the workload very well, and it manages to maintain network traffic.

How are customer service and support?

The support area must improve. It is always very slow, and it does not provide quick solutions. Its SLAs are not very good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, in my organization, there was no tool for this purpose.

How was the initial setup?

For a person who does not have the experience, it is a little complex to set up. At the beginning of the process, we needed help with the implementation.

What about the implementation team?

The configuration in the first instance was done with the seller, who was very good and fast during the implementation.

What was our ROI?

With respect to ROI, it is always good to make an investment in the area of security. This will keep all sensitive information protected.

What's my experience with pricing, setup cost, and licensing?

The tool, being one of the pioneering brands in safety, is a bit expensive. They should make some improvements in the pricing.

Which other solutions did I evaluate?

Several tools were evaluated, such as Sophos XG Firewall, FortiGate Web Filtering, and Palo Alto Networks GlobalProtect.

What other advice do I have?

It is a very good tool that serves its purpose in security.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
Assistant Manager at ASCI
User
Secure with great next-gen zero-day phishing and zero-day malware features
Pros and Cons
  • "Its potential features of Threat Detection and Threat Emulation have helped businesses to browse securely hassle-free without any tension."
  • "More focus and emphasis is required on customization and real-time notification and alert system."

What is our primary use case?

Check Point Harmony Browse is the one-stop shop for ensuring end-to-end security while browsing online from anywhere, anytime. It helps in providing strict security to browsing access and content for the workforce sitting remotely and on the premises. Half of our workforce is working through Hybrid mode, and before the introduction of Check Point Browse, it became extremely difficult for us to monitor and ensure secure browsing and working in online mode across different platforms.

Due to Check Point Browse security solutions, we now feel more confident in working online, and there is no fear about malware attacks and phishing attempts on our IT system and mobile devices precisely. All our data security is intact with Check Point Browse.

How has it helped my organization?

Check Point Harmony Browse became everyone's favorite in no time. It helped my IT team to develop capabilities and ensure easy deployment and integration of Check Point Browse with other third-party vendors and client applications to ensure that there is no lapse in security checks and all the working data is secure from any malware attacks. 

It boosted our compliance and audit reporting, and now we receive fewer observations from the audit and compliance desk as they can see that there is an advanced IT security mechanism in place with equal capability to monitor 24/7 for the remote and on-premise workforce. Certainly, it leads to the attraction of more new clients on board and greater client satisfaction in the end.

What is most valuable?

It offers safe access to the internet anywhere, anytime due to advanced next-gen zero-day phishing and zero-day malware features, ensuring malware-free downloading of any kind of content from any internet website.

This has created a technological revolution in 100% web security due to advanced and proactive threat detection from anywhere on the internet and warns the user of its potential to harm IT systems.

Its potential features of Threat Detection and Threat Emulation have helped businesses to browse securely hassle-free without any tension, and also it helps the users to ensure no data breach happened in an insecure internet environment. Check Point Browse is an expert in diffusing internet threats within a fraction of a second.

Highly integrated and user-friendly secure browsing solution, accepted globally by all 

What needs improvement?

Check Point Browse is doing a fantastic job and doing great justice to the IT world. 

More focus and emphasis is required on customization and real-time notification and alert system. The system is there, however, it needs more strengthening and robustness to cater to the business requirements in the quickest and most accurate manner.

Also, a strong push is required on research and technological intervention to understand the emerging market demand and customize our present and future upcoming solutions so that there is no hassle in deployment and integration of the software/platform across any channel and can be done smoothly.

For how long have I used the solution?

I've used the solution for almost three to six months now.

What do I think about the stability of the solution?

The solution offers high intensity and stability.

What do I think about the scalability of the solution?

This is a fantastic scalable solution.

How are customer service and support?

The support is amazing and commendable.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Kaspersky Internet Security solutions earlier and switched to Check Point as it's now a well-known and recognized name in the market and offers great offerings end-to-end at a reasonable cost. There is no cost burden on small, medium, and marginalized organizations.

How was the initial setup?

The solution is easy and straightforward.

What about the implementation team?

We implemented the setup with the help of a vendor.

What was our ROI?

The ROI is amongst the best.

What's my experience with pricing, setup cost, and licensing?

I recommend all to start using Check Point Harmony Browse as it's the best available security software in the market currently. It will never disappoint you on anything. They are the leading market player now and will capture half of the market quickly due to their agility and high business ethical attitude. Their solutions are cost-effective and save our pockets from high burnout. 

Licensing is easy and trouble-free. 

Which other solutions did I evaluate?

We evaluated software like Quick Heal, AVG Antivirus, and other solutions to meet our requirements.

What other advice do I have?

Check Point Harmony Browse will secure your system 100% in no time, and there are 24/7/365 days of security on systems, servers, and devices in on-premise and remote mode. 

The monitoring process through the desktop would be an effortless activity, and all monitoring insights will be presented through a dashboard in real-time so that no lapse occurs at all.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
User
Top 5Leaderboard
Very good real-time threat protection, phishing protection, and malware prevention
Pros and Cons
  • "This solution has improved my organization by providing enhanced web security."
  • "Check Point Harmony Browse can be improved by reducing false positive reports."

What is our primary use case?

Check Point Harmony Browse is primarily designed to protect users from web-based threats. It acts as a robust defense mechanism for web browsing activities. Primary use cases are threat prevention, data protection, zero-day protection and performance optimization. 

How has it helped my organization?

This solution has improved my organization by providing enhanced web security, increased productivity, reduced risk of data breaches, improved compliance and better threat visibility.

What is most valuable?

The valuable features are real-time threat protection, phishing protection, malware prevention, data loss prevention, and performance optimization.

What needs improvement?

Check Point Harmony Browse can be improved by reducing false positive reports, performance optimization and user interface improvement.

Additional features like privacy features, integration with password managers, and VPN Integration can be enhanced.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Our experience with technical support has been good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, I did not use a different solution. 

How was the initial setup?

The initial setup is straightforward.

What about the implementation team?

We implemented the solution via our in-house team.

What was our ROI?

The ROI is good.

What's my experience with pricing, setup cost, and licensing?

Check Point needs to improve pricing and licensing.

Which other solutions did I evaluate?

No, I did not evaluate other options. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Shrinkhala Jain - PeerSpot reviewer
Project Consultant at a consultancy with 10,001+ employees
User
Easy to install with excellent features and boosts productivity
Pros and Cons
  • "The software is easy to install and deploy across any business environment and it is becoming a game changer for us."
  • "A slight reduction in the cost subscription model can prove to be a game changer."

What is our primary use case?

Check Point Harmony Browse is one of the best securities solutions software in the current market. It enables the user and their devices to be completely secured and protected in an unsecured business environment. The software enables the user to access the web browser in a secure mode without any interruption and without any data leaks. It helps us to improve the performance of the organization and also enhance compliance due to this security software. We have been able to increase the performance by 50% and decrease the expenses by 20%. Check Point Harmony Browse has some great potential in restricting malware and ransomware and protects the user and their devices from attacks of phishing websites and phishing sources.

How has it helped my organization?

Check Point Harmony Browse has increased the efficiency and proficiency of work output in our organization. It has also resulted in boosting productivity and more compliance in the organizational system. Now, our people are more confident while operating systems and browsing as there is no fear in terms of data leakage on data loss. 

This is a savior for the entire IT system, and our workforce is feeling more empowered and strengthened thanks to the introduction of this software in the organization. 

The software is easy to install and deploy across any business environment and it is becoming a game changer for us.

What is most valuable?

Check Point Harmony Browse has some amazing features and parameters which come out of the box. The software is quite light, and it never hangs while operating. Also, the software is very easy to install and deploy in the IT system. It's easy to orient and train new employees and professionals about this software as it is easy to understand and absorb. 

It's a comprehensive software with global acceptability and a highly trusted feedback system. No problem is faced while browsing, and it never hangs or shuts down.

What needs improvement?

There are many areas, or scope for improvement for Check Point Harmony Browse to stay relevant in the market. 

It could have more and more public domain feedback from business users. This will enable and increase the customer base, and more trust and accountability will flow into the ecosystem. 

Also, a slight reduction in the cost subscription model can prove to be a game changer. It would make for a better alternative for major small and marginal enterprises to come into this market and use this software. More and more customization is needed as customization is the key.

For how long have I used the solution?

I've used the solution for over a year now.

What do I think about the stability of the solution?

The solution is quite stable.

What do I think about the scalability of the solution?

The solution is highly scalable and replicable.

How are customer service and support?

Technical support is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I am using this software for the first time and found it amazing and quite useful.

How was the initial setup?

The setup is easy.

What about the implementation team?

We implemented the solution through the vendor.

What was our ROI?

We've witnessed an ROI of over 90%.

What's my experience with pricing, setup cost, and licensing?

The setup cost and the initial onboard cost for Check Point Harmony Browse is quite affordable. It is not very costly in the pocket of the organization and it's a better alternative to pick up and continue in the market. 

I have utilized the trial version of the software and got some great feedback in the market. There is a high level of trust and a high level of confidence in the vendor. Check Point is offering a trial version of 30 days which is a great time to explore the features and the parameters at your convenience and try to explore and match usability with the available features.

Which other solutions did I evaluate?

I evaluated a lot of available options in the market. Some of them are Falcon, Trend micro, Cortex XDR, etc.

What other advice do I have?

I strongly recommend the solution to all my fellow colleagues. It is one of the best solutions available in the market today. The features and the security parameters offered in the software are great and they are out of the box when compared to other alternatives in the market. They are available at a cheaper cost and have great utilities so users should go for them.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at IRMA Anand
User
Great for protecting and preventing zero-day threat attacks and offers good URL filtering
Pros and Cons
  • "It completely restricts and blocks phishing attacks and any threat entry into the system and keeps the work pace fast and secure without showing any signs of lag or latency."
  • "More strengthening and robustness are required in zero-day threat prevention to ensure its efficiency at 100%."

What is our primary use case?

Check Point Harmony Browse brings a world-class web security solution to professionals and organizations by providing the strongest protection possible against all sorts of web attacks and also ensures that there should not be any disturbance in the productivity of the work and employees. With this solution, companies will not face any trouble. It is one of the most advanced and smartest solutions for preventing zero-day threats and malware attacks on browsers and ensures fast and secure access to the web without any hassle.

How has it helped my organization?

Check Point Harmony Browse is a one-stop shop for businesses to ensure they are compliant with internal policies and regulatory requirements. 

It completely restricts and blocks phishing attacks and any threat entry into the system and keeps the work pace fast and secure without showing any signs of lag or latency. 

It has increased the web security revolution multifold, resulting in compliance and transparency flowing into the system. Now, users do not have to worry about any mishaps about security issues, and everything can be tackled efficiently through Check Point Harmony's Browse integrated solution.

What is most valuable?

The blocking of threats and ensuring end-to-end web security for a remote workforce is now possible in a cost-effective way through Check Point Harmony Browse. 

It is an ideal solution for protecting and preventing zero-day threat attacks on a web browser without any slip-ups. It is one of the most cost-effective solutions for businesses to adopt and deploy. 

The URL filtering is done throughout without any issues. Any unknown malware and ransomware phishing sites are proactively restricted for the complete security of the user and their device.

What needs improvement?

More strengthening and robustness are required in zero-day threat prevention to ensure its efficiency at 100%. 

It is one of the smartest web security solutions for safe browsing of the internet from anywhere, anytime. 

Sometimes, we see that it blocks unknown websites and browsers, and, upon seeing their URL we realize it's blocking authentic and genuine websites. Smart AI is needed to help with accidental restrictions. 

For how long have I used the solution?

I've used the solution for one year so far.

What do I think about the stability of the solution?

The product is stable.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

Technical support has been great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution. We are using this for the very first time, and the response is quite encouraging from other team members.

How was the initial setup?

The initial setup is easy and straightforward.

What about the implementation team?

We deployed the solution in-house with our team and the help of the vendor.

What was our ROI?

The ROI is very good.

What's my experience with pricing, setup cost, and licensing?

People should go for Check Point Harmony Browse as it is one of the most encouraging solutions that ensures safe browsing and helps avoid threats gaining access to the into system, server, and device.

It is easy to use and operate. The product is easy to comprehend.

Pricing is one lower side, and its affordability makes it very attractive.

Licensing and renewal of agreements are easy, and no hassle has ever been encountered.

Which other solutions did I evaluate?

We did evaluate other options. We looked into other security solutions like Quick Heal and McAfee. 

What other advice do I have?

Try this solution, and you will not be disappointed at all. It is a reliable solution and helps ensure safe browsing online.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Web administration is great, great secure tool.
Pros and Cons
  • "Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance."
  • "It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow."

What is our primary use case?

Teleworking and the mobility of users led us to understand that we needed to improve the security of the user and of the team. We also implemented this tool through a super light agent.   

How has it helped my organization?

The downloads were completely safe from the browsers. Its great virtue is its security from the start of the download itself in the browser.

We also established policies in a granular way. We create user profiles for different types of blocking or web access, to guarantee that we can protect users and managers.

What is most valuable?

Check Point Harmony Browse came to innovate security from the browser. I will comment on the best virtues of the tool:

1. Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance.

2. Its protection against modern threats such as credential theft is incredible. With this feature, you can browse with confidence knowing that your accounts are safe.

3. Its administration portal through Check Point Infinity is incredible, really intuitive, and easy to implement for users.

What needs improvement?

There are few improvements. No manufacturer is perfect. It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow. They can improve the performance, and it would be even more amazing.

The documentation of these tools is scarce. They could share more of the new tools at a public level.

The costs are competitive. However, they are only accessible through a partner. It would be better if they were public to make references against other products and make decisions.

For how long have I used the solution?

This Check Point tool, used in recent years, is modern and is great for identity security.

Which solution did I use previously and why did I switch?

We did not know a tool with these qualities.

What's my experience with pricing, setup cost, and licensing?

It is important to find a Check Point partner, validate costs, request documentation, and take a proof of concept. That would be my recommendation before purchasing the product.

Which other solutions did I evaluate?

Our partner told us about this tool. We immediately validated the market, verified costs, and made the decision. It really wasn't difficult due to everything that Check Point represents.

What other advice do I have?

It is a very good tool, however, not necessary for everyone, since some companies already have other tools that provide security at this point. However, I recommend trying it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user