Check Point Harmony Endpoint and Cybereason Endpoint Detection & Response are two leading products in the endpoint security market. Users report higher satisfaction with the advanced threat detection capabilities of Cybereason, whereas Check Point Harmony Endpoint is appreciated for its integration and ease of management.
Features: Check Point Harmony Endpoint is praised for comprehensive threat prevention, real-time threat intelligence, and automatic vulnerability patching. Cybereason Endpoint Detection & Response is commended for advanced threat hunting, AI-driven malware detection, and in-depth forensic analysis.
Room for Improvement: Check Point Harmony Endpoint users suggest enhancements in performance speed, more intuitive incident response workflows, and improved user interface efficiency. Cybereason users indicate a need for improved reporting functionalities, a reduction in false positives, and more streamlined operational procedures.
Ease of Deployment and Customer Service: Check Point Harmony Endpoint is noted for a streamlined deployment process and effective customer service. Cybereason enjoys positive feedback for deployment, but some users report occasional complexity in setup. Customer service for Cybereason is rated highly but not as consistently as for Check Point.
Pricing and ROI: Check Point Harmony Endpoint offers competitive setup costs and satisfactory ROI, with long-term cost-effectiveness. Cybereason, while higher in initial cost, provides robust security features yielding strong ROI. Despite the higher cost, the comprehensive security features justify the expense for many users.
Initially, we spent two to three days on the investigation process, but now we are able to investigate alerts in only half a day, which has really boosted our performance and shown a return on investment.
The product is affordable and provides excellent coverage and protection across multiple platforms.
I have seen a return on investment with Check Point Harmony Endpoint, as it has saved money and time due to the minimum disruption of production hours, which allows users to focus on their main tasks and desired targets, avoiding downtime and contributing to business growth.
The customer support for Check Point Harmony Endpoint deserves a rating of 10.
We use premium support, and it is beneficial as 24/7 support is available.
While they handle simple issues quickly, resolution for more complex problems can take four to six months.
Nine is great actually since we have people available when we ask, and they know what they are talking about.
if you're a partner with them, they provide fairly good support through a concept called invest support.
We initially purchased only 100 licenses and as we grew, we acquired many more licenses without encountering any issues.
Allowing us to add more users or endpoints for protection as our organization grows without any issues.
The scalability of Check Point Harmony Endpoint is effective, as it manages behaviors, process trees, and analysis in a centralized way.
The stability of the tool is high, as I have not experienced any downtime.
Check Point Harmony Endpoint is stable for our organization size of 1,000 to 10,000 members.
Occasionally, there are some backend issues where the tenant is down, but apart from that, Check Point Harmony Endpoint is stable and working effectively.
We inform Cybereason about any issues, and they work on a new solution, either with an update or a custom fix in anticipation of the next update.
Better technical support would enhance the product's competitiveness.
High resource consumption, requiring high-performance PCs on our endpoint site.
The Endpoint Agent can be more lightweight so that older machines and laptops can easily handle its consumption.
It is not expensive and provides comprehensive coverage.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
My experience with pricing, setup costs, and licensing reveals that while it is a bit higher than previous SMB devices, the pricing is worth it for what we are getting in terms of protection and features.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features.
What I find most valuable is the clarity of the platform.
Check Point Harmony Endpoint integrates security solutions, allowing comprehensive protection against cyber threats. It's designed to suit enterprise-scale operations with robust features for threat prevention and management.
Check Point Harmony Endpoint offers advanced security capabilities that prioritize threat analysis, detection, and prevention. Tailored for professional environments, it provides tools to handle endpoint vulnerabilities effectively. Its user-centric design ensures that IT teams can manage network security with streamlined operations. Continuous updates and threat intelligence are offered to counter emerging threats, and its deployment is optimized for ease of use.
What are the key features of Check Point Harmony Endpoint?In specific industries like finance and healthcare, Check Point Harmony Endpoint is deployed to secure sensitive data and protect against sector-specific threats. Its flexibility allows adaptation to meet industry standards, ensuring critical infrastructures maintain operational security without hindrance.
Cybereason's Endpoint Detection and Response platform detects in real-time both signature and non-signature-based attacks and accelerates incident investigation and response. Cybereason connects together individual pieces of evidence to form a complete picture of a malicious operation.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.