Check Point Harmony Endpoint Primary Use Case
Network Security Engineer at a financial services firm with 51-200 employees
There have been improvements in the way our organization functions, as, from an administrative perspective, and being available and taking upgrades out of our court if our users need it, it's going to be out there hanging off of AWS's internet or environment. There is no downtime.
Theirs (AWS) is probably more highly available than ours. Other than that, it's supposed to be the same product that we were using. It's a Check Point Management Station to a Check Point Management Station in the cloud. Basically, it's not that much of a difference. We have upgraded all the clients since, and we're on one of the later versions of the VPN clients that are supported by the new Management Station. The old Management Station wasn't supporting the newer clients anymore.
The new clients seem to be faster and more stable. Those are improvements that everyone in the company can appreciate. They can VPN and connect faster. They're more resilient. I've noticed that they try to reconnect. If our internet goes out for 20 minutes and you VPN'd in, it will actually reconnect on its own at the same token, which is amazing. Before, if only the slightest instability of the internet connection disconnected you from VPN, you were then required to put in your RSA token and password, and username. That is annoying for people as a lot of people's WiFi's aren't that great and/or they're in some airport or something and might momentarily disconnect.
Network Technical Specialist at a manufacturing company with 10,001+ employees
With every new firewall that we're purchasing, we're deploying the SandBlast Agent. At the moment we're only running it on about 20 firewalls, just because the licensing isn't retroactive. What we need to do is produce a proof of concept to say, "This is the stuff we're getting." We're looking at it in a learning mode and then we can consider getting into a more aggressive mode of stopping everything. At the moment, we're trying to use it to give us information rather than to fully stop everything.
It's deployed on our physical firewalls, on-prem.
The solution should be able to provide next-generation security for endpoints and should be able to monitor, detect, mitigate, and block attacks, as well as provide complete visibility in terms of the chain of events so that forensics can be performed accordingly.
All of the security features should be provided on a single agent and it should be lightweight and should not have a performance impact on the endpoint.
Provide required/relevant logs on the console and also should be able to forward to the SIEM solution. So accordingly, a use case can be created.
The agent should be tamperproof and the admin should not be able to shut down or stop services without the security team concerned, or by using a password.
We should be able to integrate and share IOC with other security devices.View full review »
Check Point Harmony Endpoint
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
633,184 professionals have used our research since 2012.
Currently, our servers are not protected by a working anti-virus solution that receives updates. These servers & particularly the business are at extreme risk of not only suffering a breach and losing data, but also have a high risk of infecting the rest of the subsidiaries owned by Tyrion.
The solution hinges on the following requirements:
- The ability to be completely managed from a Cloud environment, including the ability to download new signatures whilst not on the corporate network;
- The ability to generate reports based on set criteria (which can help justify the cost);
- Ability to generate alerts or notifications to an administrator in the event an infection is detected so that Security Incident Response can be initiated;
- Where possible, the tool should have the ability to complement existing tools sets, replace already existing toolsets, or bring something beneficial to the table to help strengthen the security posture;
We use Check Point on our 500 computers to protect them from viruses and malware. The network is a protected local area network with limited connectivity to the internet. Not all computers are connected to the internet; only users with the necessity to connect can access it. We also increase the protection from viruses/malware by disabling USB ports for mobile storage. With all the protection steps taken, we still see that antivirus is a must to have as standard computer protection.View full review »
It's a very good solution and it is a complete endpoint security solution. We get almost all the features we need, including features like Threat Emulation/Threat Extraction, Antibot, Anti- Exploit, Anti Ransomware protection, UBA, Zero-day Phishing protection, Behavioral Guard, Encryption, VPN, compliance, and many more. It's well integrated with Check Point Threat Cloud, as well as other Check Point solutions. The product provides complete visibility of threats with forensics analysis. There is direct Integration with all well-known SIEM solutions as well as the support of standard SIEM integration features.View full review »
We use the solution for many things. We don't only use it as an Endpoint client for antivirus. It is used for our next-generation antivirus. We are also using Harmony on other things, for example, our email. There's a Harmony email and office solution, which we also are using in order to protect our email.
We were looking for a solution as complete as possible to replace the existing antivirus and, if possible, integrate it with other products that we have, such as the CheckPoint firewall.
We decided to use the Check Point SandBlast agent to prevent ransomware on users' computers.
We subsequently expanded the scope of the solution to detect malicious activity on our network.
It is a very complete product but you have to know how to parameterize it well to avoid high CPU consumption.
It is also missed that it does not have a client for Linux.View full review »
We started using the product months before the start of the pandemic. It is a robust solution for the protection of endpoints. It contains the classic antivirus, however, it has anti-bot and disk encryption functions (FDE) as well as the integration of a sandboxing for the consultation and download of files in a safe way (whether they are downloaded from a page or from an email).
It is a very complete tool for users who need to be able to connect from home or some other public access point since it has a VPN service, in addition to different layered-in security solutions.View full review »
IT Manager at First National Bank in Philip
Endpoints have always been a network's weak point, as they are the main interface users use daily. A good endpoint security product must be able to be flexible in both deployments and across multiple OS versions.
Check Point Harmony Endpoint does that for us. With multiple blades that add security to these weak points, I can be assured that threats are being mitigated in real-time. Also, Harmony Endpoint works seamlessly with Check Point's new MDR product, so logging, detecting, and responding couldn't be easier.View full review »
The implementation of Check Point Harmony Endpoint has provided great improvements in the functioning of our organization. Therefore, we wanted to protect our courses from cyber attacks and required an end-to-end security system that could prevent/save us from cyber attacks and protect our sensitive data.
The advantages that it presents is that you can access the systems on multiple devices, be it laptops, Mac, Windows or mobile devices and this is a great benefit. It provides reports where it brings the details of vulnerabilities.View full review »
We primarily use it for end-to-end security for endpoints and the co-relation of events from one single console. We have been able to protect our endpoints with Harmony. The user experience is also good and there is not too much to be done with respect to the endpoint changes (the best part). Features like Threat Emulation/Threat Extraction, Antibot, Anti- Exploit, Anti Ransomware protection, UBA, Zero-day Phishing protection, Behavioral Guard, Encryption, VPN, and compliance makes it more powerful and helpful to our security team in order to protect the environment.View full review »
Head of Security and Operational Risk at Medianet
As a financial company, we use the solution to provide security to our CDE environment and compliance with all PCI requirements. This tool enables us to provide security to the endpoints and also, to comply with local and foreign regulations regarding platform security.
We use this solution to protect all our endpoints, including personal computers and mobile phones.
We have deployed the solution in Windows, Linux servers, workstations, and mobile phones.
We also use the web filter capabilities both on mobile phones and on corporate computers.View full review »
IT Manager at a renewables & environment company with 51-200 employees
We wanted to consolidate a several-point solution to one endpoint. With so many new cyber threats and having a growing environment, what we had in place had too many gaps or grey areas between solutions and vendors.
Also, with a rapid transition to hybrid working, we needed to reconsider our end point protection. Having used Check Point NGFW for five years, it seemed like a good fit. Also, the experience and long term position of Check Point in the security market gave us good confidence. This mature position in the market also helped with finding several resellers and experience.View full review »
IT Security Manager at a manufacturing company with 1,001-5,000 employees
We use Harmony on every PC to add additional protection primarily to file downloads. We use it alongside our classic AV solution (non-Check Point). Every file is scanned via Threat Emulation (virtual sandboxing) and Threat Extraction (sanitizing files by removal of active content).
The anti-phishing module scans every new web form, that the user is trying to enter data in. Based on visual similarities to known sign-in websites (like Microsoft Azure's) it blocks the phishing ones that are similar.
The forensics module allows us to retrospectively search for a wide number of events on all PCs (for example for now-known malicious URLs or files)
Senior Security Specialist at Tech Mahindra Limited
The solution is primarily used for protecting endpoints.
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s complex threat landscape.
It prevents the most imminent threats to the endpoint such as ransomware, phishing or drive-by malware, while quickly minimizing breach impact with autonomous detection and response. This way, your organization gets all the endpoint protection it needs, at the quality it deserves, in a single, efficient, and cost-effective solution and able to detect/block/monitor and response to any malicious activity happening on the endpoint. With the single agent deployed on the endpoint, it's able to provide complete EDPR functionality with help of multiple security features/modules.View full review »
Check Point Endpoint Security is to protect our employee endpoints as we're currently working from home. The user is totally unaware of the cyber threats, so the basic functionality of endpoint security provides a lot more security. With it, any threat attack can be rebuffed. Any user downloading any suspicious data from the web will first have Check Point scan it deeply. If there's malware then it quarantines it. Otherwise, the user can access it. We're using it on a primary basis. We don't have any other solutions in place apart from the Check Point.View full review »
From my point of view, the use cases involved strategy and business opportunities.View full review »
CISO, CIO, AVP at CIANS ANALYTICS PVT. LTD
We primarily use the solution for anti-malware. We installed it on around 300 systems. Since we required some application to safeguard ourselves in this situation of work from home, so we were evaluating Antimalware products.
After some research, we finalized Check Point and took a demo. The product seems fine as per our scenario and fits current conditions. We were evaluating it for work-from-home situations. it had a multifeatured tool that helps in safeguarding the current digital attack vector for organizations of all types.View full review »
Engineer at Harbers ICT
We resell Harmony Endpoint to many of our SMB customers and also use the product ourselves. It concerns environments of endpoints only, as well as (terminal) servers and a mix of these.
Our customers range from one to two endpoints to 100+ endpoints. In addition, as mentioned above, there are also customers where we deploy the Harmony Endpoint tooling on the servers. This also varies from customers with one or two servers to ten or more servers.
Both we and the customers are very satisfied with the use and functioning of the antivirus.View full review »
Chief Technology Officer at a tech services company with 11-50 employees
Check Point Harmony Endpoint is antimalware and antivirus software, and it also has features such as in firewall autoresponse and autonotification, autoprotection, definition updates, and policies that we can apply.
We have medium-sized companies who use this solution.View full review »
Manager of IT Security at a healthcare company with 5,001-10,000 employees
Our SOC team uses this solution to observe any unusual behavior or processes running on the endpoint. For example, it is used for phishing detection.
The data is ingested to Splunk.View full review »
CEO / direktor at S3Next
We were searching for a next-generation antivirus solution, and this was the best choice on the market.
We have 25 users who work from home and the office.
All computers have Windows Professional version 10 or 11 installed.
We implemented a policy in which every client (either PC or mobile) has to have the Endpoint protection software installed with all the available blades.
Our company's cyber security monitoring process includes centralized product monitoring.
A D C R
Cloud Support - Security Admin at a tech company with 1-10 employees
We tested this Check Point tool to assess the performance of our endpoints, and shield them safely while increasing the protection of our platforms.
Check Point Harmony Mobile was provided through an installed agent which has very light protection against malware and ransomware, among others. In our country, many ransomware threats have been generated at the country level, for which it was worrying that we had kidnapping or encryption of our data. At the management level, the request was given to provide additional security to protect us. The tool has been very good.View full review »
In my organization, we have deployed the Harmony Endpoint Check Point tool with the idea of being able to secure the deployed part of our mobile corporate devices in order to start the security processes at the point as close to the user as possible.
Using its ease of deployment capacity and its power in detecting malware or insecure elements, this tool provides us with the peace of mind we were looking for in an environment of several thousand terminals deployed on the network in many places and environments.View full review »
The major use was to provide protection to the mobile workforce. It gives elaborated insight about what is happening, what kind of particular applications we have installed, and what particular application they are using, and protecting them from online phishing, and random virus attacks also.
Brand Manager at Corporation Sekiura S.A.C.E.I.
The first use case is to detect malware as well as advanced threat protection for known, unknown, and zero-day malware, sandbox emulation and extraction, and enhanced by automated endpoint forensics analysis.
Zero-day attacks are a risk for the company which seemed very important to us, plus the sandbox in the cloud. We have a cloud console that is easy to use and easy to monitor.
The details of our environment are Harmony Endpoint Advanced for 100 on-premise users with cloud managment console, and support for one year.View full review »
Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees
With the changes produced by the pandemic, we needed to secure the equipment inside and outside the organization. That is why we looked for a solution that would protect business equipment, providing a robust security line and where perimeter protection for users is established. Those working from home or anywhere else are not compromised with this product on-side, and these users are connecting easily. By having the experience of using the tool, we realize that it secures and protects us from all kinds of attacks.View full review »
Project Manager at SANDETEL
In my organization, we have selected the Harmony Endpoint tool after an analysis of the market. We wanted to be able to secure the deployed part of our mobile corporate devices in order to start the security processes at the point closest to the user possible. Thanks to its ease of deployment and its power in detecting malware or insecure elements, this tool provides us with the peace of mind we were looking for in an environment of several thousand terminals deployed on the network in very different environments.View full review »
Head of IT Operations at Puerta de Hierro Hospitals
The main option for which this solution is used is to have all the peripheral equipment protected - avoiding risks due to malware and viruses. The solution can be managed by device, with filtering and analysis of the information of all collaborators available there.
It's used to analyze emails from key users and for content filtering rules. It does not allow dangerous downloads, which protects the work of the organization outside the main network. It gives tools to the collaborators to make the work outside the installations (home office) easy.View full review »
Support at a tech services company with 51-200 employees
Within the company, some departments, including the IT department, require their users to be connected from anywhere. In order to provide security to their teams, whether they were inside or outside the company, it was necessary to be able to implement a robust solution that would help us with access, equipment security, and reliability both for the protection of equipment information and to avoid vulnerabilities through applications to which users have access with credentials and administrator permissions.View full review »
Security Analyst at Infosys Ltd
It helps to protect and secure endpoints, helps to focus on incidents, and prioritizes vulnerabilities. The solution also helps with endpoint protection and recovery from an autonomous response and in conforming to the organization's policy. It helps to do SSL traffic encryption and packet sniffing and has a good way for mobile threat management and defense as well.
Security across the workspace has been the primary use case.View full review »
In our company, we use Check Point Harmony Endpoint to help our endpoints to have security against zero-day threats, malware, and ransomware that can infiltrate the network. In this way, and with all databases of vulnerabilities and Check Point threats worldwide, we can provide security robustness in our network and really avoid security problems, and have extensive control and monitoring. This was done with the help of Check Point and the Infinity Portal. It's quite a complete tool.View full review »
In our organization, we are creating Trusted, Untrusted, and DMZ zones.
We use URL filtering, antivirus and threat prevention, as well as detect and monitoring of all the outside traffic that enters the organization.
It downloads the latest signature from the Check Point database for anti-malware and it keeps my laptop clear from malware files and attacks.
We are now able to regularly scan after implementing this product and now we feel happy. In many ways, it made us feel safe.
We have installed this tool for every user.View full review »
Manager, IT Infrastructure and Security at Control Southern Inc.
This solution handles AV, malware, VPN, ransomware and so much more. It's a solution for all of our endpoints. We have 250 users spread out over the southeast US and they all connect back to corporate for onsite ERP.
Most of our workforce is remote in offices or homes in Georgia, Alabama, Florida, and Tennessee. We also have technicians that work in plants with limited or no internet connectivity so when they get to a hotel or other public internet hotspots. The auto-connect to VPN is critical to them having a secure connection to our corporate network.View full review »
We are using Check Point Endpoint security to protect our remote users, as well as our roaming users that are accessing our on-premises resources externally.
We have come to know that our remote and roaming users are completely secure with Check Point Endpoint Security. With this confidence, we are now planning to roll out this solution for our on-premises resources, including machines and devices, as well. This will give us complete endpoint security.
IT Security Officer at a tech services company with 1,001-5,000 employees
We primarily use the solution for protecting our endpoints from malware. We've provided features to group the endpoints and apply specific policies by including or excluding them in a certain policy group.
It's great for endpoint security and protection. We are using the VPN feature as well to connect to the corporate network of our organization, which is a good feature. It's used for scanning malware and other malicious files on endpoints which greatly enhances our security posture for endpoints, including Windows and Macs and other operating systems as well.View full review »
Supervisor Tecnico at Grupo MCoutinho
We're using the product to secure our endpoint users internally and for a hybrid workplace setting.
We wanted to replace Windows Defender with a more professional solution and, after checking some vendors, we opted for Check Point since we've been using their firewall product for quite some time.
The license tier is also nice as we can buy licenses to specific cases and save some money on that end.
The inclusion of URL filtering was a plus since we replaced another product we used in the company.View full review »
CISO at a financial services firm with 51-200 employees
The solution is primarily used to protect us. It's a tool that we have installed on all the users from sales.View full review »
We have many clients using this solution for different use cases.
The solution can be deployed on the cloud and on-premise.
Check Point Harmony Endpoint is mainly used for protection.View full review »
Engineer at a tech services company with 51-200 employees
We primarily use this product for the SandBlast module. It is used for sandboxing, malware detection, antivirus, and forensics blade.View full review »
We use the product for endpoint protection against viruses, malware and ransomware technologies.View full review »
Assitant Manager - IT Support at a outsourcing company with 1,001-5,000 employees
We use it for multiple purposes. It's for securing the endpoints. We have about 200 endpoints added to this solution and being maintained. Its server is cloud-based and here our in-house IT team takes care of the installation and configuration on endpoints. We are required to secure our endpoint from any external attacks. It's also well controlled so that only required access is to be given to end-users. Whether it's about blocking unwanted websites or port blocking, we use the solution to manage everything.View full review »
Check Point Harmony Endpoint is used for protection.View full review »
We have used Check Point Sandblast Agent as an anti-malware solution. We were already working in a Check Point environment, which made the decision to purchase an endpoint security product from Check Point easy.
We first tested it in a Lab environment, where we sampled various malware, some less complicated than others. We were impressed with the results.View full review »
Pre-Sales Engineer at a tech services company with 51-200 employees
The organization I work for is a bank and we use the solution to protect against malware and viruses.View full review »
Director at esupport Solutions Pvt ltd
Kaspersky is suitable for small and medium-sized businesses (SMB), while Harmony is for enterprise segments. There are different requirements for enterprises versus SMBs. At an SMB, one administrator handles the firewall, network, and endpoints. You have more specialization in an enterprise. So at a larger scale, where you have a 5,000 or 10,000 users use case, Harmony helps pinpoint where security is lacking on a particular machine.View full review »
Check Point Harmony Endpoint
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
633,184 professionals have used our research since 2012.