2019-02-19T08:38:00Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 45

What do you like most about Check Point Harmony Endpoint?

Hi Everyone,

What do you like most about Check Point Harmony Endpoint?

Thanks for sharing your thoughts with the community!

45
PeerSpot user
45 Answers
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Top 5
2022-10-25T18:15:00Z
Oct 25, 2022

It is minimally invasive. From a single installer, the equipment is protected and secured.

Search for a product comparison
Adhi Wahyu - PeerSpot reviewer
Network Engineer at RSUP Dr. Sardjito
Real User
Top 5
2022-09-21T07:01:00Z
Sep 21, 2022

The reporting feature where we can see and monitor what happened on our client computers is useful.

DH
Support at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
2022-09-19T02:52:00Z
Sep 19, 2022

The most important characteristic of our requirements was the implementation of disk encryption.

CS
Head of Security and Operational Risk at Medianet
User
2022-09-02T19:29:00Z
Sep 2, 2022

We are able to manage all our endpoints from a single cloud console.

Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 5Leaderboard
2022-08-29T00:22:00Z
Aug 29, 2022

Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint.

RL
Security Admin at a tech company with 1-10 employees
User
Top 5Leaderboard
2022-08-01T00:11:00Z
Aug 1, 2022

We love the reports and monitoring they provide.

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2022.
656,474 professionals have used our research since 2012.
JamesYa - PeerSpot reviewer
Senior Solutions Architect at Cloud4C Services
Real User
Top 5Leaderboard
2022-05-31T10:27:00Z
May 31, 2022

The solution has all the standard features you would expect for endpoint protection.

Adriamcam - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
2022-05-25T17:05:00Z
May 25, 2022

Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner.

AD
Brand Manager at Corporation Sekiura S.A.C.E.I.
User
2022-05-23T18:47:00Z
May 23, 2022

It has improved the detection of malware.

MB
CISO at a financial services firm with 51-200 employees
Real User
Top 20
2022-05-16T13:40:16Z
May 16, 2022

It's a scalable product as it is a cloud offering.

SP
Sr. Data Scientist at Infosys
MSP
Top 10
2022-05-01T01:42:00Z
May 1, 2022

I found the fact of working across multiple attack vectors easy and more beneficial.

MA
IT Security Officer at a tech services company with 1,001-5,000 employees
User
Top 10
2022-03-28T08:47:00Z
Mar 28, 2022

It is quite easy to use and deploy the agent on endpoints to protect them from bad actors.

BM
Supervisor Tecnico at Grupo MCoutinho
User
2022-02-08T15:57:00Z
Feb 8, 2022

We're able to secure all endpoints and manage them from a single console.

AK
IT Manager at a renewables & environment company with 51-200 employees
User
Top 20
2022-02-07T10:48:00Z
Feb 7, 2022

The rollout and management of devices were very simple.

VK
Cybersecurity Architect at a computer software company with 201-500 employees
MSP
Top 10
2022-01-05T07:20:55Z
Jan 5, 2022

I have found the Zero phishing and IPS features the most useful in Check Point Harmony Endpoint. Additionally, threat emulation sandboxing is effective.

Meet vataliya - PeerSpot reviewer
IT Specalist at vTech Solution
User
Top 10
2021-12-14T15:58:00Z
Dec 14, 2021

Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today's complex threat landscape.

LuisRodriguez1 - PeerSpot reviewer
Support Manager at Sefisa
MSP
Top 5Leaderboard
2021-11-18T10:13:44Z
Nov 18, 2021

They have a great knowledge base that you can leverage as a user.

BK
Director at esupport Solutions Pvt ltd
Real User
Top 5
2021-10-07T12:44:00Z
Oct 7, 2021

Harmony's endpoint sandboxing is really good.

LG
Head of IT Operations at Puerta de Hierro Hospitals
User
2021-09-07T23:57:00Z
Sep 7, 2021

The communication with the console is very dynamic and remote, without the need to return to the computer locally.

AF
Technical Engineer at a tech services company with 11-50 employees
Reseller
2021-07-28T07:30:45Z
Jul 28, 2021

The initial setup is very easy.

SJ
Assitant Manager - IT Support at a outsourcing company with 1,001-5,000 employees
User
2021-07-14T08:31:00Z
Jul 14, 2021

It's great for securing our endpoints from any external attacks.

Mantu Shaw - PeerSpot reviewer
Sr. Technology Architect at Incedo Inc.
Real User
Top 5
2021-07-13T21:22:00Z
Jul 13, 2021

Forensic Analysis provides a complete analysis of threats via detailed reports.

HP
Chief Technology Officer at a tech services company with 11-50 employees
Real User
Top 20
2021-06-11T14:03:38Z
Jun 11, 2021

Check Point Harmony Endpoint can be easily deployed and is cost effective and more secure.

Basil Dange - PeerSpot reviewer
Senior Manager at a financial services firm with 10,001+ employees
Real User
Top 5Leaderboard
2021-05-14T13:24:00Z
May 14, 2021

Harmony Endpoint is able to detect, monitor, block, and mitigate attacks on the endpoint and it builds and maintains relevant logs for later inspection.

AI
Pre-Sales Engineer at a tech services company with 51-200 employees
Real User
2021-04-03T15:37:30Z
Apr 3, 2021

The technical support is good.

reviewer1521789 - PeerSpot reviewer
Information Security Analyst at The VPS Group
Real User
Top 20
2021-03-01T14:08:00Z
Mar 1, 2021

The most useful feature so far has been having a functioning and up-to-date anti-malware scanner.

CE
Engineer at a tech services company with 51-200 employees
Real User
2021-02-24T06:26:50Z
Feb 24, 2021

The most valuable feature is forensics.

reviewer1489602 - PeerSpot reviewer
Network Security Assurance Specialist at Visa Inc.
Real User
Top 5
2021-01-20T11:07:00Z
Jan 20, 2021

Check Point Endpoint Security really helped the business stop various malware attacks throughout the time we used it, including a ransomware attack, which was stopped in minutes.

Kirtikumar Patel - PeerSpot reviewer
Network Engineer at LTTS
Real User
Top 5Leaderboard
2021-01-13T08:50:00Z
Jan 13, 2021

The most valuable feature is the Zero-day protection, which covers our on-premises users, and well as those users who are outside of our network.

NC
Network Technical Specialist at General Electric
Real User
2020-10-29T10:12:00Z
Oct 29, 2020

It's pretty complete for preventing threats to endpoints. Its capabilities are great.

Sumit B. - PeerSpot reviewer
Consultant at Cognizant
Real User
2020-09-09T06:29:00Z
Sep 9, 2020

SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth.

Jane Adams - PeerSpot reviewer
Information Technology Specialist at RBC
Real User
2020-09-03T12:00:00Z
Sep 3, 2020

The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry.

José Javier Dominguez Reina - PeerSpot reviewer
Project Manager at Junta de Andalucia
Real User
Top 5Leaderboard
2020-08-10T12:51:00Z
Aug 10, 2020

The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers.

Jacob Imo-Abasi, Jr - PeerSpot reviewer
Business Analyst / Developer at a tech services company
Real User
2020-08-04T07:26:00Z
Aug 4, 2020

In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations.

reviewer1399449 - PeerSpot reviewer
Network and Security Engineer at Information Technology Company
Real User
2020-08-03T15:33:00Z
Aug 3, 2020

We now feel more secure with our PCs, even more with the non-technical persons.

PRAPHULLA  DESHPANDE - PeerSpot reviewer
Associate Consult at Atos
Real User
Top 5Leaderboard
2020-08-02T18:15:00Z
Aug 2, 2020

It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks.

NM
Team Lead Implementation Services/Systems Integration Engineer at Trinidad Systems Limited
Real User
2020-07-27T16:52:00Z
Jul 27, 2020

One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users machine. This is a very valuable feature of this solution.

HM
Senior Solution Architect at a comms service provider with 51-200 employees
Real User
Top 20
2020-06-30T08:17:00Z
Jun 30, 2020

Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum.

JC
Novell, Microsoft, and UNIX Network Administration at GDDC
Real User
2019-12-23T07:05:00Z
Dec 23, 2019

We were under an attack in our environment, and the Check Point response was good because we didn't lose anything.

TonyPegrum - PeerSpot reviewer
Head of IT at a real estate/law firm with 11-50 employees
Real User
2019-10-28T06:33:00Z
Oct 28, 2019

The biggest value we found was ease of deployment. I haven't really used it much, so I can't really comment beyond that. I haven't used it much, but it's working.

JaapGiliam - PeerSpot reviewer
Owner at Giliam Network & System Solutions
Real User
2019-10-03T07:51:00Z
Oct 3, 2019

The most valuable feature of this solution is the VPN.

PA
CIO / CTO at a financial services firm with 51-200 employees
Real User
2019-09-05T05:37:00Z
Sep 5, 2019

The most valuable feature is the integration with CheckPoint's firewalls. You can have one port, and follow the logs from both Endpoint and firewall security.

LS
Senior Security Consultant - Checkpoint Technologies at a tech services company with 11-50 employees
Consultant
2019-05-29T10:40:00Z
May 29, 2019

We had a ransomware attack and the SandBlast agent automatically picked up the ransomware.

GeraldChege - PeerSpot reviewer
ICT Officer at Kenyatta National Hospital
Real User
Top 10
2019-05-22T07:18:00Z
May 22, 2019

Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved.

BK
Director at esupport Solutions Pvt ltd
Real User
Top 5
2019-02-19T08:38:00Z
Feb 19, 2019

The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature.

Related Questions
Yunus Yavuz - PeerSpot reviewer
Product Manager at Neteks
Nov 10, 2022
Hi peers,  I am a Product Manager at a small computer networking company. At the moment, I am researching Check Point's products. Is Check Point's software compatible with other products (including firewall products, servers, and more)? If so, which products? Are there products that are not compatible with Check Point's software? In addition, can you provide any specific documentation that ...
See 1 answer
Larry Chisholm - PeerSpot reviewer
Network Engineer at Solvonex
Nov 10, 2022
Checkpoint is an INCREDIBLY secure, but inherently frustrating platform to manage.    The gui/cli must often be used together to effect the changes you're looking for.   Don't get me started on the gaia hardware management interface.    If you must buy it, ensure that you get support.     Personally, I'll take Fortinet, Palo Alto or even Juniper SRX over anything checkpoint.
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Oct 25, 2022
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 45 answers
BK
Director at esupport Solutions Pvt ltd
Feb 19, 2019
We are an international systems integrator company for Check Point Endpoint Security software solutions.
CM
Head of IT Director at Cosyn Limited
Mar 31, 2019
We use it for government utility billing, with all of our systems located in different places, working remotely as well. We also have an on-prem data center here in India. We have Check Point to cover all these things.
Download Free Report
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions. Updated: December 2022.
DOWNLOAD NOW
656,474 professionals have used our research since 2012.