Try our new research platform with insights from 80,000+ expert users
Shrinkhala Jain - PeerSpot reviewer
Project Consultant at a consultancy with 10,001+ employees
User
Feb 14, 2023
Easy to install with excellent features and boosts productivity
Pros and Cons
  • "The software is easy to install and deploy across any business environment and it is becoming a game changer for us."
  • "A slight reduction in the cost subscription model can prove to be a game changer."

What is our primary use case?

Check Point Harmony Browse is one of the best securities solutions software in the current market. It enables the user and their devices to be completely secured and protected in an unsecured business environment. The software enables the user to access the web browser in a secure mode without any interruption and without any data leaks. It helps us to improve the performance of the organization and also enhance compliance due to this security software. We have been able to increase the performance by 50% and decrease the expenses by 20%. Check Point Harmony Browse has some great potential in restricting malware and ransomware and protects the user and their devices from attacks of phishing websites and phishing sources.

How has it helped my organization?

Check Point Harmony Browse has increased the efficiency and proficiency of work output in our organization. It has also resulted in boosting productivity and more compliance in the organizational system. Now, our people are more confident while operating systems and browsing as there is no fear in terms of data leakage on data loss. 

This is a savior for the entire IT system, and our workforce is feeling more empowered and strengthened thanks to the introduction of this software in the organization. 

The software is easy to install and deploy across any business environment and it is becoming a game changer for us.

What is most valuable?

Check Point Harmony Browse has some amazing features and parameters which come out of the box. The software is quite light, and it never hangs while operating. Also, the software is very easy to install and deploy in the IT system. It's easy to orient and train new employees and professionals about this software as it is easy to understand and absorb. 

It's a comprehensive software with global acceptability and a highly trusted feedback system. No problem is faced while browsing, and it never hangs or shuts down.

What needs improvement?

There are many areas, or scope for improvement for Check Point Harmony Browse to stay relevant in the market. 

It could have more and more public domain feedback from business users. This will enable and increase the customer base, and more trust and accountability will flow into the ecosystem. 

Also, a slight reduction in the cost subscription model can prove to be a game changer. It would make for a better alternative for major small and marginal enterprises to come into this market and use this software. More and more customization is needed as customization is the key.

Buyer's Guide
Check Point Harmony Browse
March 2026
Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,286 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for over a year now.

What do I think about the stability of the solution?

The solution is quite stable.

What do I think about the scalability of the solution?

The solution is highly scalable and replicable.

How are customer service and support?

Technical support is great.

Which solution did I use previously and why did I switch?

I am using this software for the first time and found it amazing and quite useful.

How was the initial setup?

The setup is easy.

What about the implementation team?

We implemented the solution through the vendor.

What was our ROI?

We've witnessed an ROI of over 90%.

What's my experience with pricing, setup cost, and licensing?

The setup cost and the initial onboard cost for Check Point Harmony Browse is quite affordable. It is not very costly in the pocket of the organization and it's a better alternative to pick up and continue in the market. 

I have utilized the trial version of the software and got some great feedback in the market. There is a high level of trust and a high level of confidence in the vendor. Check Point is offering a trial version of 30 days which is a great time to explore the features and the parameters at your convenience and try to explore and match usability with the available features.

Which other solutions did I evaluate?

I evaluated a lot of available options in the market. Some of them are Falcon, Trend micro, Cortex XDR, etc.

What other advice do I have?

I strongly recommend the solution to all my fellow colleagues. It is one of the best solutions available in the market today. The features and the security parameters offered in the software are great and they are out of the box when compared to other alternatives in the market. They are available at a cheaper cost and have great utilities so users should go for them.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 20
Jan 22, 2023
Great encryption, MKA, and browser isolation capabilities
Pros and Cons
  • "It provides end-to-end encryption for the communication between the user's device and the remote browser, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks."
  • "The solution needs greater automation to reduce the need for manual configuration and management."

What is our primary use case?

Check Point Harmony Browse is a browser isolation solution that aims to protect organizations against web-borne threats. It uses a remote browser to securely render web pages and deliver them to the end user, isolating the user's device from any potential threats.

The use case of Check Point Harmony Browse is to protect organizations against web-borne threats such as malware, phishing, and other types of cyber attacks. 

It can be especially useful for organizations that have a high level of web-based activities such as online banking, and e-commerce, or those working with sensitive data.

How has it helped my organization?

One way it can improve an organization is by providing a secure way of accessing web-based resources, as it isolates the user's device from potential threats. This can help to reduce the risk of data breaches or other security incidents caused by web-borne threats.

Another way it can improve an organization is by providing a secure way of accessing web-based resources for employees, contractors, and partners who need to access web-based resources while working remotely. This can increase productivity and allow employees to be more flexible in their work arrangements. 

What is most valuable?

The most valuable aspects of the solution include: 

Browser isolation. This feature allows organizations to use a remote browser to securely render web pages and deliver them to the end user, isolating the user's device from any potential threats.

Multi-factor authentication. This feature allows organizations to use a combination of authentication methods such as certificates, tokens, biometric authentication, and user credentials to secure access to web-based resources.

Encryption. This feature provides end-to-end encryption for the communication between the user's device and the remote browser, which helps to protect against eavesdropping and other forms of man-in-the-middle attacks. 

What needs improvement?

Areas for improvement include:

Greater automation to reduce the need for manual configuration and management.

Improved scalability by allowing the solution to handle larger numbers of users and devices without a significant impact on performance.

Advanced reporting and analytics capabilities in order to have more detailed visibility into security incidents and events and allow for better decision-making.

An enhanced user experience by allowing users to have a seamless browsing experience with minimal latency and interruption. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Browse
March 2026
Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,286 professionals have used our research since 2012.
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at IRMA Anand
User
Dec 13, 2022
Great for protecting and preventing zero-day threat attacks and offers good URL filtering
Pros and Cons
  • "It completely restricts and blocks phishing attacks and any threat entry into the system and keeps the work pace fast and secure without showing any signs of lag or latency."
  • "More strengthening and robustness are required in zero-day threat prevention to ensure its efficiency at 100%."

What is our primary use case?

Check Point Harmony Browse brings a world-class web security solution to professionals and organizations by providing the strongest protection possible against all sorts of web attacks and also ensures that there should not be any disturbance in the productivity of the work and employees. With this solution, companies will not face any trouble. It is one of the most advanced and smartest solutions for preventing zero-day threats and malware attacks on browsers and ensures fast and secure access to the web without any hassle.

How has it helped my organization?

Check Point Harmony Browse is a one-stop shop for businesses to ensure they are compliant with internal policies and regulatory requirements. 

It completely restricts and blocks phishing attacks and any threat entry into the system and keeps the work pace fast and secure without showing any signs of lag or latency. 

It has increased the web security revolution multifold, resulting in compliance and transparency flowing into the system. Now, users do not have to worry about any mishaps about security issues, and everything can be tackled efficiently through Check Point Harmony's Browse integrated solution.

What is most valuable?

The blocking of threats and ensuring end-to-end web security for a remote workforce is now possible in a cost-effective way through Check Point Harmony Browse. 

It is an ideal solution for protecting and preventing zero-day threat attacks on a web browser without any slip-ups. It is one of the most cost-effective solutions for businesses to adopt and deploy. 

The URL filtering is done throughout without any issues. Any unknown malware and ransomware phishing sites are proactively restricted for the complete security of the user and their device.

What needs improvement?

More strengthening and robustness are required in zero-day threat prevention to ensure its efficiency at 100%. 

It is one of the smartest web security solutions for safe browsing of the internet from anywhere, anytime. 

Sometimes, we see that it blocks unknown websites and browsers, and, upon seeing their URL we realize it's blocking authentic and genuine websites. Smart AI is needed to help with accidental restrictions. 

For how long have I used the solution?

I've used the solution for one year so far.

What do I think about the stability of the solution?

The product is stable.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

Technical support has been great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution. We are using this for the very first time, and the response is quite encouraging from other team members.

How was the initial setup?

The initial setup is easy and straightforward.

What about the implementation team?

We deployed the solution in-house with our team and the help of the vendor.

What was our ROI?

The ROI is very good.

What's my experience with pricing, setup cost, and licensing?

People should go for Check Point Harmony Browse as it is one of the most encouraging solutions that ensures safe browsing and helps avoid threats gaining access to the into system, server, and device.

It is easy to use and operate. The product is easy to comprehend.

Pricing is one lower side, and its affordability makes it very attractive.

Licensing and renewal of agreements are easy, and no hassle has ever been encountered.

Which other solutions did I evaluate?

We did evaluate other options. We looked into other security solutions like Quick Heal and McAfee. 

What other advice do I have?

Try this solution, and you will not be disappointed at all. It is a reliable solution and helps ensure safe browsing online.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 20
Aug 24, 2022
Great protection, good notifications, and helpful analysis of threats
Pros and Cons
  • "It analyzes and verifies in detail how secure or insecure a file, document, or object is that is being downloaded."
  • "One of the great advantages is being able to ensure that each of our users is protected from the best browsing solution."
  • "Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies."
  • "Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies."

What is our primary use case?

In my experience, since the beginning of the pandemic, we have been adopting better security measures mainly due to the fact that we have more users who are working outside the perimeter of our organization. They are working from home or some other country or place more often now.

For this reason and to protect these users, most of whom are people who are not computer technicians and whose knowledge and experience in malicious or unsafe places is less, we have implemented Check Point Harmony Browse to help keep users safe.

How has it helped my organization?

One of the great advantages is being able to ensure that each of our users is protected from the best browsing solution. Many times we applied the antivirus and protected the equipment, however, we leave aside that these threats arrive many times through browsers. Harmony Browse gives us the protection before accessing an address or trying to download X content from a site. And it always notifies us, which contributes to the learning of the less experienced.

What is most valuable?

Being able to have a tool that analyzes and emulates any activity that may occur from a downloaded document is of great value. It analyzes and verifies in detail how secure or insecure a file, document, or object is that is being downloaded. It provides value. 

Another important feature that many can ignore is its large number of notifications. For less experienced users, these are helpful as they help teach and properly guide users.

What needs improvement?

It is one of the best solutions, however, with respect to its support in IOS and Android, it can improve a little more.

Something that is worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies.

Its guides are identical to the existing ones. These guides need to be updated and improved in terms of their design. 

For how long have I used the solution?

We've used the solution for the last two years.

Which solution did I use previously and why did I switch?

We did not previously use a different solution. 

What's my experience with pricing, setup cost, and licensing?

Check Point is a very good brand. However, its cost is high> that said, it complies with what each of its products says it will do.

Which other solutions did I evaluate?

We did not previously evaluate other options. 

What other advice do I have?

I'd advise users to test the solution. It will really help you to have more security for each of your users inside and outside your organization. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Feb 20, 2023
Web administration is great, great secure tool.
Pros and Cons
  • "Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance."
  • "It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow."

What is our primary use case?

Teleworking and the mobility of users led us to understand that we needed to improve the security of the user and of the team. We also implemented this tool through a super light agent.   

How has it helped my organization?

The downloads were completely safe from the browsers. Its great virtue is its security from the start of the download itself in the browser.

We also established policies in a granular way. We create user profiles for different types of blocking or web access, to guarantee that we can protect users and managers.

What is most valuable?

Check Point Harmony Browse came to innovate security from the browser. I will comment on the best virtues of the tool:

1. Its Nano Agent, which integrates with the browser, is incredibly invisible to the user and the computer since it does not require much performance.

2. Its protection against modern threats such as credential theft is incredible. With this feature, you can browse with confidence knowing that your accounts are safe.

3. Its administration portal through Check Point Infinity is incredible, really intuitive, and easy to implement for users.

What needs improvement?

There are few improvements. No manufacturer is perfect. It seems to us that the performance in some opportunities of Check Point Infinity and the administration web portal is slow. They can improve the performance, and it would be even more amazing.

The documentation of these tools is scarce. They could share more of the new tools at a public level.

The costs are competitive. However, they are only accessible through a partner. It would be better if they were public to make references against other products and make decisions.

For how long have I used the solution?

This Check Point tool, used in recent years, is modern and is great for identity security.

Which solution did I use previously and why did I switch?

We did not know a tool with these qualities.

What's my experience with pricing, setup cost, and licensing?

It is important to find a Check Point partner, validate costs, request documentation, and take a proof of concept. That would be my recommendation before purchasing the product.

Which other solutions did I evaluate?

Our partner told us about this tool. We immediately validated the market, verified costs, and made the decision. It really wasn't difficult due to everything that Check Point represents.

What other advice do I have?

It is a very good tool, however, not necessary for everyone, since some companies already have other tools that provide security at this point. However, I recommend trying it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Dec 5, 2022
Good for validation and control with helpful security aspects
Pros and Cons
  • "Its content filtering is great."
  • "I would like the solution to be implemented more easily for teams and directly on Android or iOS devices."

What is our primary use case?

Currently, with the mobility that we have within different teams, and the different internal organizations that have been deployed to work from home, we worry about opening ourselves up to security breaches when users work from home or in places outside the organization.

We have been adopting Harmony services for much of the team and departments that do telework.

How has it helped my organization?

When users are working off-site, we've found it is important to have reporting that is very important in order to validate, control, and determine if the users are working in a corresponding way. We want to be able to give them protection as long as it is established that they have the power or the capacity to work outside the institution. This solution has allowed us to give users secure access to pages, addresses, and resources that can now be accessed inside or outside our institution while always maintaining security guidelines.

What is most valuable?

Its content filtering is great. It protects the information of our institution and the personal data of the users, meaning that this solution always maintains the privacy of the data at all times. It's not invasive or created in such a way that it would bother the end users when using it. The data can be filtered or exposed in the Harmony browser and we can use it with total flexibility. The security and the filtering that they have It is really efficient.

What needs improvement?

I would like the solution to be implemented more easily for teams and directly on Android or iOS devices. That way, we could provide teams with devices like tablets.  

They have become a technological ally for people who have greater mobility. As long as they have easier portability, we'd be happier. We need a solution with applications directly installed on cell phones in a more native way that allows for allowing web browsing, thus helping, and always contributing to device security.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Top 20
Oct 12, 2022
Good security, useful analytics, and helps keep devices secure
Pros and Cons
  • "Among its most important features is the integration of its analytics."
  • "At this point, we saw this solution provided great value to our organization as the security is integrated with the services of the Check Point cloud."
  • "One of the new features I would like to see is the possibility that these tools can be brought to mobile devices such as tablets and cell phones in iOS or Android applications."
  • "One of the new features I would like to see is the possibility that these tools can be brought to mobile devices such as tablets and cell phones in iOS or Android applications."

What is our primary use case?

We find ourselves with the need to ensure the navigation of our users, providing safe navigation solutions protecting equipment and searches, mainly since, in many cases, users are people with little knowledge of security and are entering any type of web page where we can find malicious environments which can compromise the infrastructure and associated services.

We have a need to secure equipment and be able to have our users protected when they browse anywhere, especially when we have many of our users working from home.

How has it helped my organization?

In our search for solutions to protect users inside or outside the organization, and to provide security when browsing wherever they go, we came across this product. We wanted the protection that we previously had only in the perimeter area. At this point, we saw this solution provided great value to our organization as the security is integrated with the services of the Check Point cloud. This integration is so powerful that each request leads us to conduct a deep inspection of each one of the queries, being one of the best in the market and providing protection at all times. 

What is most valuable?

Among its most important features is the integration of its analytics. It allows us to be faster and predicts events that violate the security of the equipment. We can avoid zero-day events and intrusions. We can avoid malware and ransomware infections which are the most common. It gives us the possibility of protecting each of the activities. 

What needs improvement?

One of the new features I would like to see is the possibility that these tools can be brought to mobile devices such as tablets and cell phones in iOS or Android applications. 

I would like is to be able to take this solution and be able to take existing designs and integrate the product into all services since it's one of the most important solutions. 

We must be more proactive and integrate existing solutions into a single integrated package so that customers feel more secure. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
IT Security at Akros Tech
Real User
Sep 13, 2022
Reduces vulnerabilities, easy to implement and has an excellent nano agent
Pros and Cons
  • "This tool installs a very small agent in browsers. It does not cause performance problems on the host computer, which makes it less annoying for users."
  • "We needed to provide advanced security to these teams with a reliable tool, which could help protect against phishing, malware, and especially ransomware - since it is one of the most damaging threats today, and this tool fulfills what we were looking for in an incredible way."
  • "Support must be faster in solving problems."
  • "Support must be faster in solving problems."

What is our primary use case?

Check Point Harmony Browse has been used by our company to provide security in the browsers of user computers that work remotely. They connect from many places, some with a lot of security, others with too many vulnerabilities. We needed to provide advanced security to these teams with a reliable tool, which could help protect against phishing, malware, and especially ransomware - since it is one of the most damaging threats today. This tool fulfills what we were looking for in an incredible way.

How has it helped my organization?

Previously, we had many vulnerabilities with the files downloaded by users through their browsers. Sometimes they were malware and sometimes ransomware. Since they were not in the perimeter, they were easy targets for these modern threats. However, thanks to this powerful tool, we have achieved the business security that we required.

This tool installs a very small agent in browsers. It does not cause performance problems on the host computer, which makes it less annoying for users.

With this, we have improved and secured the company's computers from anywhere against these threats.

What is most valuable?

We value the entire Check Point Harmony Browse tool. One of its greatest benefits is the ease of implementation. Its nano agent is incredible; it securely protects all devices.

The administration from the centralized Infinity Portal provides an additional plus for the IT department since, in addition to being centralized, it is very intuitive. This benefits the administration and the time spent by the engineers during an event or in the case of daily management.

As for the costs, it seems pretty comfortable.

What needs improvement?

Check Point has always been a constant tool, with its new tools, it has taken a lot of advantage over its competition. However, there are always features that need improvement, for example:

1. Support must be faster in solving problems. Sometimes it takes many days to have a solution.

2. Check Point could put more facilities in its manuals and documentation, including more graphics to make it simple for the client.

3. The prices are only visible through a partner. It would also be good to be able to see them publicly.

For how long have I used the solution?

This is a great simple security tool for browsers that is easy to install an has been used throughout this year (2022).

Which solution did I use previously and why did I switch?

It is such a punctual tool. It is easy to use and so powerful in a way that we have not seen in other manufacturers. That's why we love Check Point.

What's my experience with pricing, setup cost, and licensing?

It is important to assess the costs and scope of the solution in order to meet the needs of the clients.

Which other solutions did I evaluate?

We evaluated tools, that were not the same, from other manufacturers such as Cisco and Fortinet. However, we chose Check Point Harmony browse for all its features and security power.

What other advice do I have?

I'd advise people to try the tool. Personally, I was amazed.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user