Check Point Harmony Endpoint and ThreatLocker Zero Trust Endpoint Protection Platform compete in the endpoint protection category. Harmony Endpoint may have an edge in environments relying heavily on firewall integration due to its seamless integration with Check Point's firewalls.
Features: Check Point Harmony Endpoint offers anti-malware, threat emulation, VPN, and anti-ransomware capabilities. It integrates seamlessly with firewall technologies and provides robust threat extraction capabilities. ThreatLocker Zero Trust focuses on application control, ring-fencing, and elevation features, delivering a granular zero trust approach. Its strict regulation of application behavior distinguishes it in application control.
Room for Improvement: Harmony Endpoint needs to improve tech support response times, compatibility with newer OS versions, and ease of setup and management, as well as disk encryption and VPN functionalities. ThreatLocker should enhance the user interface, learning curve, targeted training options, and integration features to improve usability and accessibility.
Ease of Deployment and Customer Service: Harmony Endpoint offers flexible deployment options for on-premises and cloud environments and is well-received for its tech support, though response times can be long. Its integration with other Check Point products is beneficial. ThreatLocker emphasizes straightforward setup and seamless system integration, with adequate customer service but room for improved response times. Both integrate well into varied environments.
Pricing and ROI: Check Point Harmony Endpoint is generally pricier but offers varied licensing models and justifies the cost with high-level security. ThreatLocker is considered competitively priced, offering good value, although some perceive it as expensive. Both products deliver measurable ROI with features that reduce security breaches and streamline management.
The product is affordable and provides excellent coverage and protection across multiple platforms.
The licensing process for Check Point Harmony Endpoint is very easy.
If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
The main return on investment is peace of mind, knowing that with ThreatLocker on any endpoint, it will almost always block all malicious code or exploits, even zero-day exploits.
It keeps malware, Trojans, and ransomware at bay.
Only email support is available, leading to delays in getting assistance.
Their support was helpful enough for me to give them a seven out of ten.
They have been very responsive, helpful, and knowledgeable.
I would rate their customer support a ten out of ten.
Their support is world-class.
Check Point Harmony Endpoint is scalable, suitable for both small and large companies.
It possesses high scalability because it is a SaaS solution from the cloud, allowing expansion as needed.
I started off with just the servers, and within a month and a half, I set up the entire company with ThreatLocker.
It seems to primarily operate on the endpoints rather than at a central location pushing out policies.
I would rate it a ten out of ten for scalability.
The stability of the tool is high, as I have not experienced any downtime.
For five years, we have not had a problem.
Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter.
It has been very stable, reliable, and accessible.
Better technical support would enhance the product's competitiveness.
High resource consumption, requiring high-performance PCs on our endpoint site.
One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days.
Controlling the cloud environment, not just endpoints, is crucial.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
It is not expensive and provides comprehensive coverage.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
After conversations with other partners, it became clear we underpriced it initially, which caused most of our issues.
We are moving towards the Unified solution, where they basically bundle everything together, providing us better stability with the ability to bring in new product offerings without having to go back to the customer and say, 'This is going to cost you.'
I had a really good deal at the time, and it continues to be cost-effective.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
Endpoint protection is valuable.
Harmony Endpoint has a geo policy that allows me to see where users log in from, enabling me to analyze if someone tries to access an account from another location.
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent.
It protects our customers.
The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
Check Point Harmony Endpoint integrates security solutions, allowing comprehensive protection against cyber threats. It's designed to suit enterprise-scale operations with robust features for threat prevention and management.
Check Point Harmony Endpoint offers advanced security capabilities that prioritize threat analysis, detection, and prevention. Tailored for professional environments, it provides tools to handle endpoint vulnerabilities effectively. Its user-centric design ensures that IT teams can manage network security with streamlined operations. Continuous updates and threat intelligence are offered to counter emerging threats, and its deployment is optimized for ease of use.
What are the key features of Check Point Harmony Endpoint?In specific industries like finance and healthcare, Check Point Harmony Endpoint is deployed to secure sensitive data and protect against sector-specific threats. Its flexibility allows adaptation to meet industry standards, ensuring critical infrastructures maintain operational security without hindrance.
ThreatLocker Zero Trust Endpoint Protection Platform offers robust endpoint security through application control and allowlisting, safeguarding servers and workstations from unauthorized software execution.
ThreatLocker Zero Trust Endpoint Protection Platform provides extensive application control with features like ring-fencing and selective elevation, ensuring meticulous execution management. Offering learning mode and extensive support, it integrates threat detection and activity monitoring to enhance compliance, reduce costs, and bolster cybersecurity through alerts and approvals. Despite its strengths, there are areas for improvement in training flexibility, policy updates, and interface enhancements, along with challenges in handling non-digitally signed software. Deployed across environments, it works well with existing cybersecurity instruments for real-time threat prevention.
What are the top features of ThreatLocker?ThreatLocker Zero Trust Endpoint Protection Platform is widely implemented to safeguard IT infrastructures against unauthorized access and application use. In sectors where data security is paramount, this platform enables users to prevent unauthorized software installations and control device applications, ensuring real-time threat prevention and compliance with industry regulations.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.