Try our new research platform with insights from 80,000+ expert users
Coordinador at oesia
User
Feb 28, 2024
Good protection, great threat extraction capabilities, and good at detection
Pros and Cons
  • "This solution has multiple protections that are generally very simple to configure and work quickly with little intrusiveness for the user."
  • "The ease of handling should be improved, as it is currently intrusive and some users don't like it."

What is our primary use case?

This solution is essential to protect browsing against zero-day malware and zero-day phishing in a simple and easy-to-manage way. 

With this solution, users can browse without worries, focusing on their work and not on security. In addition, this solution is available for all common systems (Windows, Mac, and Chrome OS), so you can avoid big scares with it.

This solution is easily managed from a console in the cloud and only requires deploying an extension in browsers, which facilitates its administration.

How has it helped my organization?

With this solution, users' browsing is automatically protected against zero-day phishing and zero-day malware, all with almost no configuration required. In addition, you can monitor that corporate passwords are not reused, which further reduces the chances of falling into phishing.

All these protections are maintained wherever the user is, which makes it perfect for teleworking.

In my particular case, unfortunately, only a few of us in the organization have this solution installed. The rest of the users continue with these threats.

What is most valuable?

This solution has multiple protections, with Zero-phishing being the most different from the rest of the solutions on the market since it is capable of detecting and blocking all new phishing attacks quickly and easily.

The second most differentiating factor that offers effective protection is Threat Extraction. It allows us to safely download any document in a few seconds, eliminating their active content and thus avoiding the risk of malware. If the original document is necessary, it can be downloaded after the file is analyzed by its advanced sandbox system.

What needs improvement?

This solution has multiple protections that are generally very simple to configure and work quickly with little intrusiveness for the user. In the case of document download zero-day threat protection, Threat Extraction, this is not exactly the case. 

It works very well, however, it is very annoying for users, since it does not always work in the same way and sometimes it makes it show you the same window twice for each file to indicate where you want to save it. The ease of handling should be improved, as it is currently intrusive and some users don't like it.

Buyer's Guide
Check Point Harmony Browse
March 2026
Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,286 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for about seven years.

What do I think about the stability of the solution?

It is very stable and only has a few times a year where the console cannot be accessed, although the solution still works due to updates.

What do I think about the scalability of the solution?

It is a very scalable solution since the client is very light and the management is done from a console in the cloud.

How are customer service and support?

The customer service is very good, however, the support is somewhat slow and heavy.

Which solution did I use previously and why did I switch?

I have tried several solutions and this seems to me the most complete and safest.

How was the initial setup?

The initial configuration is done in about ten minutes and then all you have to do is load the extension in the browsers.

What about the implementation team?

We implemented the solution internally.

What was our ROI?

By being able to avoid a first virus or phishing, ROI is achieved.

What's my experience with pricing, setup cost, and licensing?

It is an economic solution and very focused on the protection of navigation. It is also easy to configure, deploy, and manage.

Which other solutions did I evaluate?

We also looked at Crowdstrike, Symantec, Bitdefender, Netscope, and AVG.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. I work with this and other providers, always looking for the best solutions for our clients.
PeerSpot user
Security Consultant at Synergy
Reseller
Nov 28, 2023
A cloud solution for detecting download files and phishing websites with reasonable pricing
Pros and Cons
  • "The product is stable."
  • "The URL filtering database should be improved."

What is our primary use case?

The solution helps us to detect download files, phishing websites, and access to non-compliant websites.

What is most valuable?

The essential feature of Harmony Browse is SEO phishing. Also, it has improved security.

What needs improvement?

The URL filtering database and website restriction should be improved.

For how long have I used the solution?

I have been using Harmony Browse as a distributor.

What do I think about the stability of the solution?

The product is stable.

What do I think about the scalability of the solution?

We cater the solution to enterprise businesses.

How was the initial setup?

The initial setup and its configuration are easy.

The tool’s deployment on a computer takes ten minutes.

What's my experience with pricing, setup cost, and licensing?

The product has a reasonable pricing.

What other advice do I have?

Harmony Browse is a part of the Check Point Harmony Endpoint security suite. It protects the endpoints.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
PeerSpot user
Buyer's Guide
Check Point Harmony Browse
March 2026
Learn what your peers think about Check Point Harmony Browse. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,286 professionals have used our research since 2012.
Technical Engineer at a tech services company with 501-1,000 employees
Reseller
Aug 28, 2023
One of a kind first unified security solution for devices and access
Pros and Cons
  • "The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete."
  • "security solution for users Devices and Access" What is our primary use case? The application is good as its lightweight and its functions are really similar to a browser extension. It offers real-time protection for internet users by addressing active concerns. Moreover, it incorporates a reputation feature to ensure swift access to websites within a second. The effectiveness of Harmony Browse’s capabilities is really an advantage. What is most valuable? The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete. What needs improvement? Regarding the Harmony Browse, I call it "Kuna" which is accurate. The quantum product serves as my primary focus due to its project cost, and I aim to introduce support in this area. This is because firewall implementation holds significant importance for organizations. I want to improve more on the quantum losses. There's a concept I'd like to include in Harmony Browse, known as automatic catching. This mechanism comes into play when an individual closes their browser while possessing sensitive information, like monetary data. To counteract potential risks, we employ a browser cache-clearing process to minimize the cache's accumulation. This action ensures that malicious entities can't exploit the cached data for attacks. To enhance this further, there's potential for the implementation of a self-cleaning technology. For instance, when a user exits the browser, an automatic action could be initiated to clear the browser cache, serving as an additional layer of security. This can be helpful if added."

What is our primary use case?

The application is good as its lightweight and its functions are really similar to a browser extension. It offers real-time protection for internet users by addressing active concerns. Moreover, it incorporates a reputation feature to ensure swift access to websites within a second. The effectiveness of Harmony Browse’s capabilities is really an advantage. 

What is most valuable?

The installation process is simple. Once initiated, the process is quite straightforward and seamless, making it easy to complete.    

What needs improvement?

Regarding the Harmony Browse, I call it "Kuna" which is accurate. The quantum product serves as my primary focus due to its project cost, and I aim to introduce support in this area. This is because firewall implementation holds significant importance for organizations. I want to improve more on the quantum losses.

There's a concept I'd like to include in Harmony Browse, known as automatic catching. This mechanism comes into play when an individual closes their browser while possessing sensitive information, like monetary data. To counteract potential risks, we employ a browser cache-clearing process to minimize the cache's accumulation. This action ensures that malicious entities can't exploit the cached data for attacks. To enhance this further, there's potential for the implementation of a self-cleaning technology. For instance, when a user exits the browser, an automatic action could be initiated to clear the browser cache, serving as an additional layer of security. This can be helpful if added.

For how long have I used the solution?

I am using Check Point Harmony Browse for the past one year.

What do I think about the stability of the solution?

I didn’t have any issues with stability.

What do I think about the scalability of the solution?

The scalability is good. I would rate it 10 out of 10. 

How are customer service and support?

The support is not very helpful and the response takes very long.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I believe this product has very limited competition. This is primarily due to deliberately leaving out competitors for Dela. As of now, it appears that only one vendor offers this product.

How was the initial setup?

The setup is very straightforward. 

What's my experience with pricing, setup cost, and licensing?

The price is not very expensive for our organisation, but for others, it might be a little expensive.

What other advice do I have?

I would rate the overall product an eight out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
reviewer1931475 - PeerSpot reviewer
Associate Technical Manager at TrustArc
Vendor
Dec 7, 2022
Great support, cutting-edge technology, and good security
Pros and Cons
  • "It gives our customers a sense of security they might not have found anywhere else."
  • "Having local support everywhere in the world would be helpful."

What is our primary use case?

We provide services to clients that have to do with their websites. For a company like ours, we needed a product that could safeguard our workstations.  

We need to provide our customers with a safe and secure environment to win their business, and choosing Check Point Harmony Browse was and still is the best decision we've made. 

It gives our customers a sense of security they might not have found anywhere else. 

Since our move to Check Point Harmony, our client relationship has improved dramatically.

How has it helped my organization?

Since our move to Check Point Harmony, our client relationship has improved by quite a bit. Our trust rating has gone up immensely, and we couldn't even fathom the level of change we experienced until one of our clients mentioned it. 

We were hesitant to make this change in the beginning. However, we all have finally agreed to finalize the switch, and we have not looked back. 

The support was also very different from what we were used to; they go above and beyond to make sure that our concerns are fixed in no time.

What is most valuable?

Their support is top-notch, and their technology is cutting-edge. We had a little problem when it came to deployment. However, their support has helped us throughout the entire process. They also educated us and answered all our questions, even though some of them may have sounded ignorant. We appreciate a great support team, which has been a great factor in deciding to stay with them and renew our product. They're easy to reach out to and will not stop until all our issues are resolved. 

What needs improvement?

They can maybe improve the deployment strategy.

Having local support everywhere in the world would be helpful. 

Our deployment has taken a while to complete as there were some issues with the OS we were using. This was handled by their support team with great success; however, it would have been best if it was completed in the time frame that was originally discussed. We're still very happy with the overall support that we are getting, and that's really all we can ask for.

For how long have I used the solution?

I've used the solution for over a year.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1931475 - PeerSpot reviewer
Associate Technical Manager at TrustArc
Vendor
Aug 4, 2022
Great security with helpful zero-day phishing protection and good detection capabilities
Pros and Cons
  • "The downloaded protection as it scans and emulates the files on a browser level is great."
  • "So far, Harmony has been able to provide the level of protection that we require as a company."
  • "URL filtering could be better."
  • "URL filtering could be better."

What is our primary use case?

We are a certification company, and clients send us details about their websites that we need to download from time to time. Having Harmony ensures that we don’t get attacked and our client's information gets protected. 

In order for us to provide certifications, we must also ensure that our services are protected to the highest level. So far, Harmony has been able to provide the level of protection that we require as a company. It not only eases our minds but also helps us sleep peacefully at night.

How has it helped my organization?

It builds trust from our clients as they’re sure that their information is safe and fully protected.

Building trust is the foundation of our company, so it is vital for us to use services that are up to our standards and are on our level. We provide our clients top-notch services and it is only sensible that we provide top-notch solutions/protection as well. 

It is necessary to be on top and remain on top by providing what’s only the best and nothing less.    

What is most valuable?

The downloaded protection as it scans and emulates the files on a browser level is great. It also blocks zero-day phishing sites so our clients and employees are safe from having their sign-ins used elsewhere and the fact it detects and prevents the use of log-in passwords on a different website to ensure that we are fully protected. 

It is a big deal for us, as there are thousands and thousands of data points that can be hacked from our credentials alone. Preventing the use of the same password somewhere else is huge protection already.

What needs improvement?

URL filtering could be better. It would be great if you can have object-based categories on the management dashboard. 

It would be best for it to be object-based instead of URL-based as it saves us a lot of time. 

Clicking the object/subject from the dashboard shortens the handling time as compared to using a URL. 

There are many questionable sites that we can’t keep track of, and it would be easier to just have them in a visible list than to find them. I’d say both URL, and object-based filtering needs to be available.

For how long have I used the solution?

I've used the solution for less than a year.

How are customer service and support?

Technical support has addressed all of our questions.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used something from ESET. We switched to Harmony as it offers more and is more “bang for the buck.”

How was the initial setup?

It was pretty straightforward to set up, and the vendor helped all the way.

What about the implementation team?

We handled the setup in-house.

What was our ROI?

We can’t be sure of ROI as of yet as it’s still pretty new.

Which other solutions did I evaluate?

We had been considering Harmony for a while and had been waiting for our contact to end to switch. We may have considered others prior. However, we had been set on getting this.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1112463 - PeerSpot reviewer
Security Solutions Architect at a computer software company with 201-500 employees
Reseller
Top 10
Jul 30, 2024
Provides firewall protection and private dev browsing with accuracy

What is our primary use case?

We use the solution for firewall protection and private dev browsing.

How has it helped my organization?

The edge filtering and protection are at the border.

What is most valuable?

Accuracy is probably one of the top requirements or features. It lowers the incidence of malware or malicious software. It's easy to navigate and relatively intuitive.

What needs improvement?

Pricing could be better.

For how long have I used the solution?

I have been using Check Point Harmony Browse for five years.

How was the initial setup?

The initial setup does not take a long time.

I rate the initial setup as four out of five.

What's my experience with pricing, setup cost, and licensing?

It has moderate pricing.

What other advice do I have?

Maintenance is relatively easy.  I was able to resolve challenges with the online knowledge base.

It is a product worth of consideration and implementation.

Overall, I rate the solution an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user