The primary use case of this solution is to protect our company's LAN network from malware and viruses.
We have configured and deployed the Checkpoint NGFW and this is the security feature of Check Point.
The primary use case of this solution is to protect our company's LAN network from malware and viruses.
We have configured and deployed the Checkpoint NGFW and this is the security feature of Check Point.
With the help of Check Point Antivirus, we keep our company's LAN and DC network safe from malware and viruses. With this solution, our network has not been affected to date.
The most valuable feature of Check Point antivirus is that it scans every file type for malware and viruses.
Also, it gets regular updates of newly found threat signatures which keeps it updated.
As of now, there are not any lack of features.
I have been using this security feature of Check Point for the last year.
The stability is excellent.
The scalability is good.
My experience with customer service and support has been excellent.
We have been using Check Point antivirus only. We just upgraded the Check Point NGFW model.
The initial setup was simple.
We implemented the solution through an in-house team.
In terms of cost, everything is perfect.
No, we haven't evaluated other options.
In the intricate web of digital landscapes, my primary use of Check Point Endpoint Security is a guardian for my organization's digital footprint. This robust solution stands as a vigilant sentinel, meticulously securing each endpoint against the relentless tide of cyber threats.
Its dynamic threat prevention capabilities, seamlessly integrated into our environment, create an impervious shield against malware, ransomware, and other malicious actors.
With an intuitive interface and real-time monitoring, it not only defends but also empowers, allowing me to traverse the digital domain with confidence.
In this narrative of cyber resilience, Check Point Endpoint Security is not just a tool; it ensures that every endpoint under its watch remains secure in our interconnected digital ecosystem.
The integration of Check Point Endpoint Security has been a transformative force within my organization.
As we embraced this robust solution, a paradigm shift occurred – a palpable enhancement in our digital resilience. The advanced threat prevention mechanisms woven into the fabric of Check Point have acted as an impenetrable shield, thwarting malicious intruders and fortifying the security posture of every endpoint.
This newfound defense has not only safeguarded our sensitive data but has also instilled a sense of confidence among our team members, enabling them to navigate the digital realm without fear.
Check Point Endpoint Security has proven to be a beacon of resilience, with its multifaceted features illuminating our defense strategy. The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets.
The granular control over endpoint activities empowers us to tailor security policies, ensuring a bespoke approach that aligns with our unique operational needs. The intuitive dashboard and centralized management streamline our security operations, enhancing efficiency and providing a comprehensive overview of our digital landscape.
Notably, the seamless integration with other security components orchestrates a harmonious defense orchestra, fostering collaboration and maximizing the synergy of our security infrastructure.
In this narrative of fortified cybersecurity, it's the amalgamation of these features that makes Check Point Endpoint Security an invaluable guardian, fortifying our digital realm against the relentless march of cyber threats.
A robust threat intelligence integration could elevate proactive defense, offering real-time insights to anticipate and thwart emerging threats more effectively.
Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries.
Streamlined incident response tools within the platform would empower security teams to react swiftly and decisively in the face of potential breaches. Integration with emerging technologies, such as artificial intelligence and machine learning, could usher in a new era of adaptive and self-learning security protocols.
Furthermore, a user-friendly interface for custom reporting and analytics would empower organizations to derive actionable insights from security data. In this ongoing narrative of cybersecurity evolution, the inclusion of these features in the next release would undoubtedly fortify Check Point Endpoint Security as an even more comprehensive and dynamic guardian in the ever-expanding digital frontier.
I've used the solution for more than three years.
The solution is very stable.
The scalability is very good.
The technical support is excellent.
Positive
We used to use Kaspersky, and we switched for security reasons.
The initial setup was straightforward; it was easy.
We handled the setup in-house.
Its price is competitive.
We also evaluated Trend Micro.
This solution can provide you with robust endpoint security and has the ability to give deep-level forensics because of EDR capability.
The solution can offer you value-added features with the EPP-EDR platform to ensure complaint and posture management, category-based web access, disk encryption, password protection, and DLP over endpoint channels.
The primary key use cases for Check Point are:
1. Single console across multiple Check Point solutions using the Infinity Portal
2. Flexible deployment architecture
3. OS support
4. Rich threat intel to mitigate known/unknown attacks
5. Flexibility to bundle multiple value-added additional modules/features with the EPP platform
By using Harmony, you can provide 100 % security to the endpoints along with compliance and management features. This has a flexible deployment method.
It has extended OS support to ensure your legacy endpoints also have zero-day protection.
Using add-ons such as posture management, organizations can manage OS-level vulnerability and get rid of unwanted beaches.
Check Point Harmony also protects you from web-based attacks along with category-based restrictions to ensure the end user gets the required access.
Integration of the Check Point Threat intel cloud with the EPP-EDR platform, which is enhancing and providing efficient DB for threat hunting and preventing zero-day using an anti-exploit platform.
Apart from the EPP and EDR capability, Check Point Harmony can integrate using API with 3rd party vendors; Azure AD integration makes the whole deployment and management easy for the administrator.
Multiple endpoint protection packages are available for organizations. Also, it is an MSSP-compatible platform.
With Check Point, you will get your all required value-added features as per your requirements. That said, they need to focus on more scalability (as much as possible) so that the solution can run across all supported OS.
There are legacy OS concerns. It would be really helpful for them if legacy OS support could be extended up to Windows XP.
Aside from that, Check Point Harmony will be a suitable option for any type of organization.
I have been closely working on this solution in my organization over the last year.
Using rich threat intel and robust endpoint security, the solution ensures protection against known and unknown attacks.
The solution offers a flexible deployment and easy management through a consolidated console.
Support is good.
Positive
Previously I worked with Cylance AV. Considering all value-added features along with the robust endpoint solution and threat intel, Check Point Harmony is the better choice.
The initial setup is very simple.
We handled the implementation in-house.
The pricing is really competitive when you consider other known vendors in the market.
We explored some traditional solutions as well.
Check Point Harmony is feature-rich and robust, with great endpoint detection and response capabilities to ensure deep forensic understanding across incidents.
As a manufacturing firm, we deal with many vendors and customers via online portals and websites. Our users surf the internet a lot. Check Point Antivirus scans and blocks malware, including viruses, worms, Trojans, spyware, and ransomware. This helps prevent infections and limit the spread of malicious software within the network. It also performs real-time scanning of files and email attachments to detect and block malicious content before it reaches the end user.
Implementing Checkpoint Antivirus has significantly improved our manufacturing company’s security posture and operational efficiency. By providing robust protection against malware and other cyber threats, we have minimized the risk of production downtime caused by cyber-attacks. On the other hand, This comprehensive security solution has not only enhanced our overall cybersecurity but has also instilled greater confidence in our stakeholders, knowing that our manufacturing processes and data are well protected.
Real-time scanning is a valuable asset for our organization. Real-time scanning and behavioral analysis have ensured that both our proprietary manufacturing processes and sensitive data remain secure, preventing potential breaches that could disrupt operations or lead to intellectual property theft. The centralized management of security policies across all endpoints has streamlined our IT operations, allowing our IT team to efficiently monitor and respond to security incidents from a single dashboard
The management console could be made more intuitive and user-friendly, with simplified navigation and clearer visualizations of threat data and security statuses. Improve the performance impact on systems, especially for older hardware.
Ensuring that real-time scanning does not significantly slow down user machines would enhance overall productivity. Work on reducing the rate of false positives, which can disrupt operations and lead to unnecessary administrative overhead. As an additional feature, Integrate user behavior analytics to detect unusual patterns that could indicate insider threats or compromised accounts.
I have been using Check Point Antivirus for more than two years.
The solution consistently delivers reliable performance with minimal downtime, ensuring continuous protection without disrupting business operations.
Check Point Antivirus has strong scalability, making it highly suitable for organizations of various sizes, including large manufacturing companies. Its centralized management console allows administrators to efficiently manage and enforce security policies across numerous endpoints.
Customer Service should be improved.
Positive
Previously I was using Avast antivirus. We switched because we had many security issues. It was not meeting our requirements.
The setup is very easy.
We implemented it through the vendor. I would rate the experience an eight out of 10
The comprehensive protection against malware, ransomware, and other cyber threats has drastically reduced the risk of costly production downtimes and data breaches, which in turn has saved the company substantial potential losses.
The setup cost is low but licensing is high. It's worth the cost.
We also looked at Kaspersky Antivirus.
From what we have seen it is a reliable and dependable solution.
We use the solution for antivirus, device encryption, file encryption, and URL filtering.
The solution offers multiple features in one solution, along with data detection.
The agent side should be less. It impacts customers' asset performance because it will be more complex for the customers.
I have been using Check Point Antivirus for 6-8 months.
Check Point should provide some technical sessions on antivirus solutions. Then, it would be helpful to reach more customers in India.
I rate the solution’s stability a seven out of ten.
The solution is scalable. We have a few customers using this solution.
It is quite difficult to get a response from OEM. We are facing issues with all products except for email security, with the support team of the Check Point.
The initial setup is complex, depending on the number of assets. It takes less than half an hour for a single asset. We should set up everything after deploying and testing it. Symantec takes five to ten minutes after deploying to test everything. We use manual deployment.
The solution is helpful for a particular budget. We are getting the best solution that will cover all your parameters.
The product’s pricing is moderate.
Every feature provided by the antivirus software is good compared to other solutions. Sandboxing is helpful for customers while downloading and detecting malicious software.
1-2 persons are required for deployment, whereas the maintenance and monitoring need a team of three to five members.
I will recommend the solution. It's a very good solution compared to other antivirus capability servers. The sandboxing technology is helpful.
We have not integrated it with any other tool set. We integrated a Check Point to get the logs or connect the data.
Overall, I rate the solution an 8 out of 10.
I use Check Point Harmony Endpoint in my company to secure the endpoint devices, including computers, servers, and every single endpoint in the environment.
Check Point Harmony Endpoint offers customers enterprise-level security for all their devices, including servers, laptops, and desktops. The IT personnel can ensure that with the product, all of the devices in an environment are protected with Check Point's enterprise-based solution. The customers who buy the product need not worry about their devices being exposed to threats. In fact, if you check the reports for Check Point in Gartner Magic Quadrant, you will see that the reports are all related to Check Point's endpoint security solutions. Customers try to get information on the value they can derive, along with the other potential prospects in the market, before trying to get or onboard Check Point Harmony Endpoint in their environment.
For IT personnel, Check Point Harmony Endpoint is easy to manage since they don't need to have any expert in order to deploy or monitor devices with the help of the product, and it also allows you to try out different actions on different devices. Whenever there is an attack on any device, Check Point Harmony Endpoint has the capability to isolate the affected device from the environment. Suppose there is an attack on one computer. In that case, the security of the other computers operating in the same environment is compromised, so Check Point Harmony Endpoint isolated the affected computer and notified the required department in the company to look into it while allowing for the other computers to work properly. The product offers good value to the companies that deploy it in their environment.
I would have to describe what I feel is valuable in Check Point as a whole. Check Point provides users with a central point from where they can manage all the devices across a workplace. Whether users use Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, they don't have to log into different portals or solutions since they can manage everything from one central point. I like the fact that products from Check Point are very easy to deploy. Even if a user has 1,000 endpoints in an environment, Check Point can take care of the deployment in minutes. Check Point Harmony Endpoint is a very easy solution to deploy and requires very little maintenance or technical expertise.
I would like to see improvements in Check Point Harmony Endpoint in general because some people use it since it is available at a competitive price. Due to the competitive pricing strategy of Check Point Harmony Endpoint, it is not considered to be a good product, like Fortinet, Palo Alto, or F5. Check Point Harmony Endpoint needs to consider that people should feel that Check Point doesn't compromise on quality even though the price at which Harmony Endpoint is offered is good. People who claim that Check Point Harmony Endpoint is a cheap product don't necessarily mean that it is not a good solution. Fortinet is a very expensive product that offers good value to its customers. If Check Point can work on the value proposition it offers to customers and make them understand that even though the solution is affordable, it is not a bad solution compared to its competitors, then it would be fantastic. The potential customers can opt for Check Point products, considering that they are offered good products at the cheapest price in its categories. It is important for Check Point to ensure that people don't have a wrong perception about the products it has launched in the market.
I don't think there are any features I would like to include, and the tool offers updates when compared with the products from competitors, which I think is a good way to do it. The only challenge is that for many organizations where there is an MDM solution in the environment and an endpoint security tool, my company needs to educate such organizations to convey the message that endpoint and MDM solutions are different products for different purposes, so they are not the same. If Check Point Harmony Endpoint can incorporate MDM into the solution, it can be a fantastic enhancement. Customers need not buy endpoint and MDM solutions if both are made available together in Check Point Harmony Endpoint. My company will have to put extra effort into educating the customers and making them understand the two different solutions. MDM is used to manage your mobile devices, and Check Point Harmony Endpoint is the security for your endpoints.
I have been using Check Point Harmony Endpoint for over three years.
It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution.
It is a very scalable solution.
My company had to contact Check Point's technical team for the installations that my company carried out when we had to deal with around 40 devices that had firewalls from Check Point, which had reached the end of life. For Check Point Harmony Endpoint, my company never had any reason to contact Check Point's technical team.
Starting with the pros, I would say that Check Point Harmony Endpoint provides value for money. After purchasing Check Point Harmony Endpoint, you need to consider the fact that the cost you pay for the solution and the value you derive from the product is very proportional. When it comes to Check Point Harmony Endpoint, I can say that a user does not pay high prices for a poor solution. A user pays a decent fee for a very good product. I think the first pro is that the value you get from the solution is made available at a very competitive price. The product is seamless and easy to use. With the centralized portal, a user can manage all Check Point products, including Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, from a single point, which is also a fantastic pro for Check Point. Regarding the cons of the solution, I would say that it stems from people's perception of the solution since they feel that an affordable product may not be good enough. There is a need to work around people's wrong perception of Check Point products. Still, I don't know if such a negative perception is something that is widespread across the globe or whether it is exclusive to Nigeria or the markets in Africa. Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors.
The product's initial setup phase was straightforward. The product's deployment was done in minutes, so it didn't take long, as there was no need to do any special configurations. There was no need for the people involved in the deployment to have any special skills. The deployment process was seamless and straightforward. The product's deployment was never an issue. The IT department need not worry too much about whether they need to learn new skills to manage the product as it is easy to use and deploy and a product that can be used seamlessly. The product's deployment takes around 30 to 40 minutes.
I work with the solution's SaaS version.
I don't think Check Point Harmony Endpoint is difficult to maintain. I think there is a possibility of scheduling your updates in Check Point Harmony Endpoint, even if you want it to happen outside your working hours, like somewhere between eight o'clock in the evening and midnight. I don't think maintenance is stressful because it can be scheduled outside of working hours.
I would recommend others to use the product since the deployment process is seamless, so you don't need any specialized skills to use the portal provided by Check Point to monitor your devices. There are no specialized skills required to support or maintain the solution. It is also very easy to implement the product. You can keep a tab using the centralized portal offered by the product. In general, the product makes the life of the IT department easier since you need not worry about a lot of the technical stuff related to the solution.
From my point of view, I need to put in extra effort to convince my company's customers to use the solution. In terms of the features and the product's ability to deliver the promised value to its customers, especially when compared to other solutions in the market, I rate the overall product an eight out of ten.
We use the antivirus for FTP email scanning, attachment scanning, FTP download, HTTP download, and HTTPS download with SSL and inspection. It is also used in conjunction with the firewall gateway and security gateway.
The most valuable features include scanning, sandbox features, and antivirus reporting. The Antivirus engine's performance has been excellent.
More applications should be supported. For example, the ability to detect viruses or scan attachments within applications like Skype or similar applications could be improved.
We have been using the solution for 15 years.
The customer service and support are rated highly. The overall rating for support was 9.5 out of ten.
Positive
We used Symantec and ESET before switching to Check Point Antivirus. We switched due to its detection capabilities and the high reputation of Check Point for preventing breaches and antivirus protection. Symantec's performance had issues with heavy CPU and memory usage.
The initial setup could be rated as seven or eight out of ten. For those with experience on the Check Point platform, it's easy to set up.
However, for new administrators, the setup can be confusing because it uses a separate part of the panel and offers an option for legacy setup, which opens the old Check Point Smart dashboard.
One person handled the deployment in-house.
On a scale of one to ten for pricing, with ten being the most expensive and one being the cheapest, Check Point Antivirus is rated as one, making it the most affordable among antivirus products.
We used and evaluated Symantec, ESET, Fortinet, Cisco, and Palo Alto before switching to Check Point Antivirus.
I would definitely recommend Check Point Antivirus to others. The product is very effective and performs well without causing any significant hit on CPU or memory.
I'd rate the solution nine out of ten.
It provides encryption for operating systems and protects browsers against malware, benefiting both new and old customers.
When using Check Point Harmony Endpoint, performance issues may occur, although not necessarily a ransomware attack. The endpoint might consume excessive resources from the machine, which can impact its performance.
We have partnered with Check Point Harmony Endpoint.
We have 25 endpoints using this solution.
Email support works fine, but it needs to be on the phone.
Positive
The deployment is not complex if you have to manage it. The installation can be done directly if the customer has a good knowledge of Microsoft systems. However, we have to install it manually, which can be difficult, especially when replacing all the old agents.
If the customer doesn't have an IP directory, we only put one person in it. We are deploying up to 1500 endpoints with only one person, maybe in two weeks. If the customer doesn't have an active directory and has 100-200 endpoints to install, we normally have to use three security engineers.
I rate the initial setup a nine out of ten, where one is difficult and ten is easy.
We have a particular case where today's endpoint provides complete security against ransomware. It runs effectively from work. It is about eighty to ninety percent effective.
The pricing is high because we lost several customers to Trend Micro and Symantec. Latin America and Columbia particularly have high prices. It was probably fifty percent more.
As a partner, Check Point provides us with the best protection. We can also arrange a demo or discussion to showcase the protection features and advantages to our customers.
Overall, I rate the solution an eight out of ten.
