My main use case for Check Point Harmony Endpoint is for security purposes, which is used to stop threats, to stop malware inside, and to stop ransomware.
A specific situation where Check Point Harmony Endpoint helped block a threat is when a user connects their device to the network with a malfunction; immediately, the Check Point device gives me an update that this particular device has a threat, is connected to the internal network, and I receive a pop-up on my phone and email to block the device.
There is nothing else to add about my main use case; this is the main thing that I am using to stop all the threats that are coming inside.
There are many specific features in Check Point Harmony Endpoint that I find most useful, especially when it comes to device connection processes; it shows each device in a segregated method, unlike many SMB devices that categorize everything into the same column. Check Point Harmony Endpoint has a special feature utilizing AI to segregate devices, allowing me to see how many laptops, desktops, mobile devices, tabs, and watches are connected, making it easy to identify and block any problematic devices.
This level of detail is crucial for my organization because it allows immediate alerts if my device has any glitches while connected to the internal network. If there's an issue, the Check Point device will alert me about a mobile phone with a specific MAC and IP address, preventing it from affecting our entire network infrastructure and allowing me to block the device seamlessly.
Additionally, Check Point Harmony Endpoint features an easy-to-use VPN, which is very beneficial because users can install it themselves without needing IT admin support, making the installation process straightforward.
This ease of use is important for my organization as it leads to quicker setup times. Previously, I had to remote into user devices to install VPNs, which wasted IT productivity; now, users can download and install the VPN themselves with just the IP address.
Check Point Harmony Endpoint has positively impacted my organization by saving me at least 50% of my time compared to previous SMB solutions because it effectively segregates devices and provides a clear overview.
One standout positive impact from using Check Point Harmony Endpoint is its easy pop-up alert system when any infected device connects, allowing me as an IT admin to block it quickly.