We continue to offer our support solutions to other companies as requested. I focus on cyber security, specifically specializing in detecting malware in text and searching for remote access or reverse channels on computers.
We continue to offer our support solutions to other companies as requested. I focus on cyber security, specifically specializing in detecting malware in text and searching for remote access or reverse channels on computers.
This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities. However, there's still room for improvement and the addition of more features. Nevertheless, in the broader market landscape, it's considered one of the leading products. While there might be some competition from others like Cisco, it remains a strong choice. The feature lies in mapping and providing top-notch malware protection.
Perhaps the software could be made more resource-efficient. While many improvements come to mind, I don't have them readily available. Essentially, I aim to enhance the software's efficiency so that it places fewer demands on computer resources.
I have been working with Check Point Harmony Endpoint for the past two years.
It is a stable solution and I would rate it seven out of ten.
It isn’t very scalable since I wasn't able to bypass the security a couple of times. I would rate it a six out of ten.
I would rate it a six out of ten because it could have been easier. It might be somewhat challenging due to the numerous policies in place. For instance, it's more straightforward for me when users can easily set up policies because they come built-in. However, with Check Point, you do have the option to create custom policies. I'm not entirely certain if it's a strict either/or situation, as there might be some flexibility. Nonetheless, having a predefined "zero one" option can make it easier for users, as they don't necessarily have to customize policies themselves.
The deployment takes long enough.
Currently, this software stands out as one of the top choices in the field. It's undoubtedly a strong contender for enhancing computer security, and while there are various other products available, this one ranks among the best.
I recommend the solution, but I would rate it a six out of ten, mainly because the software requires considerable resources and can strain less powerful computers. It tends to impact system efficiency, especially on computers with weaker hardware, causing frequent restarts and putting a significant load on the CPU and memory.
I handle Check Point SMB along with Check Point Harmony Endpoint, and I have recently provided around 400 endpoints to a construction company in Sri Lanka.
The Rollback feature is valuable because ransomware attacks are very familiar nowadays, and anti-phishing and anti-ransomware blades are required by many of our customers. Other features, like prevention blades, are also okay, where you get threat extraction and evaluation. Likewise, the forensic report is also very important.
With the prevention blade, Harmony scales higher than many other solutions. Even CrowdStrike has technical problems when you're offline. But Harmony is not like that. Even if I don't have Internet connectivity, I have seen how remediation and rollback happen. All the encrypted files come to a state where it works with micro-backups.
Customers would like to have a very advanced endpoint to protect themselves from anti-phishing, especially ransomware.
I have clients who use very old Windows versions, so I have a few issues when attempting to install Harmony on some of the machines. At times, even with the latest Windows versions, the machines' performance gets slower. We still don't have a clear idea of what has been happening. If you take 100 PCs, two, three, or four are still troublesome when you attempt to install Harmony.
Also, the price could come down slightly, and I am not saying by a huge gap, but slightly. Even Sri Lanka's smaller customers have to buy a minimum quantity, and with Harmony Connect, they have to buy 50 licenses at once. If they could come down to 20, 30, or something like that, I should be able to sell much more. Some customers would like to have Harmony, but they have to buy a minimum quantity of 50. That's a bit troublesome for me as a salesperson.
I have worked with Checkpoint Harmony Endpoint for almost one year now.
I rate the solution's stability a nine out of ten.
I highly rate the solution's scalability.
We have a set of engineers who specialize in Harmony Endpoint and Harmony Connect.
Positive
The deployment takes one or two weeks. The deployer always creates a tenant, through which they install the solution. They also trained customers and end users to install Harmony, and they managed to install the entire license.
I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high.
Features like factory remediation, basically callback, are getting familiarized by Sri Lankan customers. Many have bought Harmony endpoints, so many customers have been considering Harmony Connect. This will lead to it having a good future.
When speaking to customers, I first communicate what ThreatCloud is all about. ThreatCloud is shared by other solutions like CloudGuard, Quantum, and Quantum Spark. It's very common to them. This means you will get the prevention blade, not the detection blade. Whenever you have phishing attacks, malware attacks, DDoS attacks, and even zero-day attacks, they are all always prevented by Check Point Harmony and Check Point products.
I always advise people to go for an advanced endpoint because IT managers have less of a hassle when using products like Check Point.
I have been facing lots of competition with CrowdStrike and Kaspersky. I don't think other products should compete with Check Point Harmony Endpoint because it is a different level endpoint altogether. I want to give them competition with the pricing.
I rate Check Point a nine out of ten.
Check Point Antivirus helps us to detect malware attacks and any phishing attacks that can destroy data and affect programs.
When installed in any computing device, it provides tracking information that enables members to connect virtually with colleagues in remote areas. It is less costly since it enables members to access company websites from anywhere.
The endpoint protection services ensure there is data security across the defined network infrastructure. It protects our devices against virus attacks.
The antivirus has enhanced the secure implementation of most projects and tasks among teams in the enterprise.
The pricing is good, and it is easy to deploy this software.
When linking with my colleagues from remote areas, it ensures the communication network is free from cyber attacks.
The virus detection models orchestrate real-time monitoring of data with reliable reporting information.
It has reduced the cost of attending events physically and catering accommodations for employees.
The threat response system has saved teams from engaging with unsafe content and visiting unprotected online sites.
It provides automatic scans to most websites to ascertain security situations and alerts the user when there are potential threats that can affect data.
The webcam protection system prevents unauthorized members from joining virtual meetings organized by employees.
The phishing protection system prevents teams from spamming across email conversation channels.
It is easy to install and learn how this platform works.
It has various location connection that enables the user to select preferred sites that are safe.
I am satisfied with the set features due to their competitive performance since we deployed them.
Integration with some applications was challenging during the deployment process.
The next release can focus more on timely upgrades to enhance computing compatibility.
The cost is worth its functionalities and contribution towards the protection of our systems.
The software services and functions have met the company's requirements and policies.
There are many notifications that keep streaming in when using the antivirus, and that can be improved.
I've used the solution for two years.
It is stable in virus prevention.
I am impressed by the reliable services of this platform.
There have been improved customer support services since we deployed them.
Positive
I have not used any similar antivirus products.
The initial setup was straightforward.
The implementation took place through the vendor.
There is increased ROI from a stable performance.
Check Point Antivirus is the best platform for preventing virus penetration.
I looked into other options. The cost and performance capability of this version were the best.
This is a great product that I recommend to other organizations.
We deployed this product to harmonize our products and have one central access point.
It helps us to set security features that protect the computing devices from malware attacks.
It gives me an opportunity to manage applications that works on various workflows centrally.
Integration with all employee devices has enabled my team to monitor the security situation and put in place emergency measures in case of any threat.
Team members can connect their working devices from a central networking connection that is secure and reliable.
The high-level security provided by Check Point Harmony Endpoint has given my team all the required tools for setting up a central network control platform. It provides solutions to challenges that affect workflows slowing down performance.
There is improved business work processes agility that keeps all the sectors functional.
There has been improved security compliance and risk management in all the business transactions that we undertake since we deployed this application.
Laptops and mobile devices that operate within the enterprise have been secured, and teams can easily focus on more productive roles without fear of being attacked.
Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information.
The cloud management system provides security to hybrid information and saved files.
The customer support services are efficient and always reliable when reached for any consultation.
It supports operating systems that are deployed in computers and mobile devices.
New users familiarize themselves easily with the operation of UI since it has flexible dashboards.
The faster data processing capability saves time and costs for accomplishing given tasks.
It has full performance capability to execute the given duties.
It blocks safe URLs sometimes when there are network interruptions.
The cost of deployment varies with the existing working conditions and the organization's size.
The cloud networking infrastructure can be attacked if there are limited security features and poor monitoring capacity from the IT team.
The overall performance impressed my team. Check Point Harmony Endpoint is the sure deal for enterprise security coverage and computing device control.
I've used the solution for ten months.
It is stable in the provision of reliable security.
I am impressed by the performance of this product.
The customer support staff is ever supportive.
Positive
I have not used a similar solution previously.
The initial setup procedure was straightforward.
There was high-level expertise from the vendor team during implementation.
There has been a positive ROI since we deployed it.
The setup cost and licensing terms vary according to enterprise size.
I evaluated several options. This platform was the best.
I recommend the implementation of this platform in other organizations.
In search of a solution that allowed us to analyze, detect, evaluate and, above all, correct at the antivirus level within the network in a perimeter way, we have used the solutions that come in the Check Point appliances, thus giving us the possibility of enabling a lot of its most outstanding features.
We had been trying to complement the antivirus solution across our computers. We searched and tested different providers, reaching the conclusion that we could get the most out of solutions that we already had as they were already giving us additional protection. We needed, however, additional protection that would allow us to configure from a perimeter device all the conditions, rules, policies, and needs for blocking or security in the organization's network. With this solution, we could generate value and security in each of the actions that users have within the perimeter network.
Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease.
We should be able to generate client applications based on a structure and scheme that uses the power of computation of local devices to generate interaction and remote management. There needs to be more internally connected systems in order to achieve real-time effectiveness. The solution should establish communication in real-time, thereby multiplying those possibilities of interaction in a faster way when it comes to communicating against your central server.
I've used the solution for one year.
After implementing Check Point Antivirus, we've had a few compatibility issues with my devices.
Check Point Antivirus proved to be highly productive for my work and has helped with data security via its features. It offers VPN capabilities and provides multiple device protection. It is very easy to monitor results across all covered devices.
Check Point Antivirus is highly compatible with other solutions and is scalable while offering extremely low pricing.
Check Point Antivirus proved to be highly productive and scalable for my work. The data security features, including malware detection and escalation, operated quickly. There are multiple devices protected by the software. It is now very easy to carry out and monitor results from the same task across all devices.
Check Point Antivirus automatically fixes pop-up ads and effortlessly detects all kinds of malware and threats while syncing systems in the background.
Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background.
Along with Check Point Antivirus, the support provides multiple updates and upgrades in quick succession. It's quick to restore the management of the database and has scheduled security system and network upgrades for risk-free work management.
Overall, Check Point Antivirus is highly productive, scalable, compatible, and easy-to-use software for data security and system management. I highly recommend this platform.
There are no areas that Check Point Antivirus needs to work on.
Overall I didn't personally face any issues while implementing Check Point Antivirus. In comparison to alternatives present in the market Check Point Antivirus has high efficiency and a better ability to protect our devices both online and offline.
Personally, I highly recommend this platform to professionals for data security and management.
I've used Check Point Antivirus integration for approximately one year or so.
I haven't used any other such platform for data security and system management.
Overall, Check Point Antivirus is highly productive, scalable, compatible, and very easy to use. It's good software for data security and systems management and I highly recommend it.
I did look into other options. For a simple comparison, I visited certain websites for product reviews. In the end, I found Check Point Antivirus to be the best option.
Go for it. First, implement it and see the change in your levels of security.
Harmony Endpoint helps the company to protect devices from phishing attacks.
It offers instant notification when it senses any form of external threat that can compromise data.
It can be easily deployed on both mobile and desktop devices.
The product has saved my team a lot of time and resources during the project implementation process.
It responds quickly to data threats that can leak internal information into an unsafe environment. We have accomplished many projects and submitted them successfully to our clients without any challenges since deploying Harmony Endpoint.
This solution provides threat intelligence to all sectors to enhance effective planning and decision-making before we get into trouble.
It monitors data flow across the networking system to enhance comprehensive workflow infrastructure.
Real-time monitoring provides essential tools for security configurations that cannot be interfered with by ransomware attacks easily. This is the best solution, far from other related software in attack prediction and threat analysis. It is cloud-based, and teams across the organization find it to be more flexible for real-time analytics.
Network monitoring provides the best reports based on real-time performance, which helps our members locate any drawbacks across the workflow system.
The threat response system from the user dashboard blocks malware attacks that can affect email and the flow of information among colleagues.
Endpoint protection is fundamental in security enhancement; it's effectively protecting our devices from internet viruses.
The application investigation system enables the IT team to come up with reliable reports on the cause and prevention measures that can be adapted to prevent any future attacks.
The system has comprehensive data management features that have saved us from incurring unplanned losses.
Timely updates and suitable configurations can block malware attacks and provide effective reports on security situations.
The setup process was complicated, however, when the customer service team came in, they provided productive guidelines that have kept the system working efficiently.
The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis.
I've used the solution for 18 months.
This platform is highly stable, and the performance is awesome.
The scalability has impressed all relevant teams.
The customer service team is passionate about their work, and they provide timely responses.
Positive
I have not worked with other related products.
The setup was straightforward. We had assistance from the customer support team.
implementation took place through the vendor team.
The targeted ROI has been achieved since we deployed the application.
The setup and cost depend on the number of devices that have to be secured.
I evaluated Intercept X Endpoint. However, it did not impress the entire team.
I am satisfied with the current performance and I thoroughly recommend Harmony Endpoint to other business enterprises.
We're using this for our endpoint protection in terms of antivirus and malware protection, disk encryption, and URL and application filtering on our client computers.
We integrate the VPN feature with Check Point's firewall allowing our clients to access internal resources with security policies enforced and controlled.
The reports given by the software are also a benefit since it allows better management and control of access to all our client computers at any time from anywhere.
The web console is also nice.
We have all our information and policies on one platform for all the features, and we can assign our technicians' several permissions and roles on the product.
Our customers are also better protected, and we can guarantee that security policies are enforced and compliant in each one of them.
Security has been a significant focus for us, and Harmony Endpoint, together with the entire Check Point ecosystem, made it easy for our organization to enforce such policies.
We value the URL and app filtering of the platform.
The URL filtering and application control are very helpful since it's typically hard to block productivity loss apps/URLs on clients when abroad. Harmony made it easy to control the usage of the company resources and bandwidth.
Disk encryption is a nice feature if you don't have other systems. However, since we've already had BitLocker deployed, we saved a few dollars on this licensing type.
The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options.
Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant. URL filtering should allow for time-based rules, for example, don't allow media streaming during work hours yet allow it on weekends.
The same applies to application control. When in our headquarters, we can solve this on the Check Point Firewall. However, the Harmony client does not support this type of condition, and we had to find a "middle ground" between policies and usability for our clients.
We've been using this solution for two years.
We did use Microsoft Defender. It lacked features, and therefore we moved away from the solution.
I'd advise users to try to implement BitLocker for disk encryption since it's free.
We did not evaluate other options.