What is our primary use case?
The implementation of Check Point Harmony Endpoint has provided great improvements in the functioning of our organization. Therefore, we wanted to protect our courses from cyber attacks and required an end-to-end security system that could prevent/save us from cyber attacks and protect our sensitive data.
The advantages that it presents is that you can access the systems on multiple devices, be it laptops, Mac, Windows or mobile devices and this is a great benefit. It provides reports where it brings the details of vulnerabilities.
How has it helped my organization?
Check Point Harmony Endpoint was implemented due to the fact that malware and cyber-attacks have been steadily increasing lately and we needed a tool that would prevent cyber-attacks. With Harmony Endpoint, it is possible to identify those attacks and prevent them. It has also given us the possibility to qualify all these possible attacks and thus take into account where and how they want to penetrate our network.
This implementation provided a fully functional antivirus solution that gave the company the ability to defend against almost all threats occurring inside or outside the network.
What is most valuable?
Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner.
The threat extraction and threat emulation have been a great benefit to give more autonomy to users.
On the other hand, it cannot be left out that it reduces the number of malicious attacks. It has helped us to properly monitor what has been happening with our network traffic and prevent individual attacks from accessing certain sites where we want to have restrictions or limitations.
What needs improvement?
Some problems that I have had with this and other Check Point tools in the cloud is when entering the portal since it stops responding or takes a long time to process a query and this causes delays and efficiency.
They should also add new functions such as threat hunting.
Finally, it should be able to implement with and have a good integration and interaction with Azure in the management of vulnerabilities, and data management that between the two can be integrated 100% with Check Point Harmony Endpoint and thus be able to make good automated management.
For how long have I used the solution?
It was implemented approximately 2 years ago
What do I think about the stability of the solution?
The product is very stable. It has some problems in the cloud where the access is stuck, however, nothing has caused improper functioning.
What do I think about the scalability of the solution?
Check Point Harmony Endpoint is an easy to scale tool.
How are customer service and support?
We have had good experiences. The cases have been successfully concluded.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Nothing was implemented that was similar to this type of tool.
How was the initial setup?
As mentioned before, the configuration of this tool is very simple and interactive.
What about the implementation team?
When the installation was done, a vendor helped us and explained how it worked.
What was our ROI?
With this tool, you can be sure of and have confidence that the investment made will protect the company's complete information.
What's my experience with pricing, setup cost, and licensing?
Check Point Harmony Endpoint is a tool that I highly recommend. Its implementation is very easy, as is its configuration.
Which other solutions did I evaluate?
Several tools were taken into account, however, Check Point was chosen as we have already used several tools and it has given us confidence and solidity.
What other advice do I have?
It is an excellent tool in the management of vulnerabilities.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.