Check Point Harmony Endpoint and ThreatLocker Zero Trust Endpoint Protection Platform compete in the endpoint protection category. Harmony Endpoint may have an edge in environments relying heavily on firewall integration due to its seamless integration with Check Point's firewalls.
Features: Check Point Harmony Endpoint offers anti-malware, threat emulation, VPN, and anti-ransomware capabilities. It integrates seamlessly with firewall technologies and provides robust threat extraction capabilities. ThreatLocker Zero Trust focuses on application control, ring-fencing, and elevation features, delivering a granular zero trust approach. Its strict regulation of application behavior distinguishes it in application control.
Room for Improvement: Harmony Endpoint needs to improve tech support response times, compatibility with newer OS versions, and ease of setup and management, as well as disk encryption and VPN functionalities. ThreatLocker should enhance the user interface, learning curve, targeted training options, and integration features to improve usability and accessibility.
Ease of Deployment and Customer Service: Harmony Endpoint offers flexible deployment options for on-premises and cloud environments and is well-received for its tech support, though response times can be long. Its integration with other Check Point products is beneficial. ThreatLocker emphasizes straightforward setup and seamless system integration, with adequate customer service but room for improved response times. Both integrate well into varied environments.
Pricing and ROI: Check Point Harmony Endpoint is generally pricier but offers varied licensing models and justifies the cost with high-level security. ThreatLocker is considered competitively priced, offering good value, although some perceive it as expensive. Both products deliver measurable ROI with features that reduce security breaches and streamline management.
Initially, we spent two to three days on the investigation process, but now we are able to investigate alerts in only half a day, which has really boosted our performance and shown a return on investment.
The product is affordable and provides excellent coverage and protection across multiple platforms.
I have seen a return on investment with Check Point Harmony Endpoint, as it has saved money and time due to the minimum disruption of production hours, which allows users to focus on their main tasks and desired targets, avoiding downtime and contributing to business growth.
If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
The main return on investment is peace of mind, knowing that with ThreatLocker on any endpoint, it will almost always block all malicious code or exploits, even zero-day exploits.
It keeps malware, Trojans, and ransomware at bay.
We use premium support, and it is beneficial as 24/7 support is available.
While they handle simple issues quickly, resolution for more complex problems can take four to six months.
Only email support is available, leading to delays in getting assistance.
They have been very responsive, helpful, and knowledgeable.
I would rate their customer support a ten out of ten.
Their support is world-class.
We initially purchased only 100 licenses and as we grew, we acquired many more licenses without encountering any issues.
Allowing us to add more users or endpoints for protection as our organization grows without any issues.
The scalability of Check Point Harmony Endpoint is effective, as it manages behaviors, process trees, and analysis in a centralized way.
I started off with just the servers, and within a month and a half, I set up the entire company with ThreatLocker.
It seems to primarily operate on the endpoints rather than at a central location pushing out policies.
I would rate it a ten out of ten for scalability.
The stability of the tool is high, as I have not experienced any downtime.
Check Point Harmony Endpoint is stable for our organization size of 1,000 to 10,000 members.
Occasionally, there are some backend issues where the tenant is down, but apart from that, Check Point Harmony Endpoint is stable and working effectively.
For five years, we have not had a problem.
Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter.
It has been very stable, reliable, and accessible.
Better technical support would enhance the product's competitiveness.
High resource consumption, requiring high-performance PCs on our endpoint site.
The Endpoint Agent can be more lightweight so that older machines and laptops can easily handle its consumption.
Controlling the cloud environment, not just endpoints, is crucial.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
It is not expensive and provides comprehensive coverage.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
My experience with pricing, setup costs, and licensing reveals that while it is a bit higher than previous SMB devices, the pricing is worth it for what we are getting in terms of protection and features.
After conversations with other partners, it became clear we underpriced it initially, which caused most of our issues.
We are moving towards the Unified solution, where they basically bundle everything together, providing us better stability with the ability to bring in new product offerings without having to go back to the customer and say, 'This is going to cost you.'
I had a really good deal at the time, and it continues to be cost-effective.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features.
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent.
It protects our customers.
The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
Check Point Harmony Endpoint integrates security solutions, allowing comprehensive protection against cyber threats. It's designed to suit enterprise-scale operations with robust features for threat prevention and management.
Check Point Harmony Endpoint offers advanced security capabilities that prioritize threat analysis, detection, and prevention. Tailored for professional environments, it provides tools to handle endpoint vulnerabilities effectively. Its user-centric design ensures that IT teams can manage network security with streamlined operations. Continuous updates and threat intelligence are offered to counter emerging threats, and its deployment is optimized for ease of use.
What are the key features of Check Point Harmony Endpoint?In specific industries like finance and healthcare, Check Point Harmony Endpoint is deployed to secure sensitive data and protect against sector-specific threats. Its flexibility allows adaptation to meet industry standards, ensuring critical infrastructures maintain operational security without hindrance.
ThreatLocker Zero Trust Endpoint Protection Platform offers robust endpoint security through application control and allowlisting, safeguarding servers and workstations from unauthorized software execution.
ThreatLocker Zero Trust Endpoint Protection Platform provides extensive application control with features like ring-fencing and selective elevation, ensuring meticulous execution management. Offering learning mode and extensive support, it integrates threat detection and activity monitoring to enhance compliance, reduce costs, and bolster cybersecurity through alerts and approvals. Despite its strengths, there are areas for improvement in training flexibility, policy updates, and interface enhancements, along with challenges in handling non-digitally signed software. Deployed across environments, it works well with existing cybersecurity instruments for real-time threat prevention.
What are the top features of ThreatLocker?ThreatLocker Zero Trust Endpoint Protection Platform is widely implemented to safeguard IT infrastructures against unauthorized access and application use. In sectors where data security is paramount, this platform enables users to prevent unauthorized software installations and control device applications, ensuring real-time threat prevention and compliance with industry regulations.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.