We just raised a $30M Series A: Read our story

Check Point Harmony Endpoint Pros and Cons

Check Point Harmony Endpoint Pros

NC
Network Technical Specialist at a manufacturing company with 10,001+ employees
It's pretty complete for preventing threats to endpoints. Its capabilities are great.
View full review »
Consultant at Cognizant
SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth.
View full review »
Senior Manager at a financial services firm with 10,001+ employees
Harmony Endpoint is able to detect, monitor, block, and mitigate attacks on the endpoint and it builds and maintains relevant logs for later inspection.
View full review »
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2021.
554,382 professionals have used our research since 2012.
Information Security Analyst at The VPS Group
The most useful feature so far has been having a functioning and up-to-date anti-malware scanner.
View full review »
Business Analyst / Developer at a tech services company
In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations.
View full review »
Sr. Technology Architect at Incedo Inc.
Forensic Analysis provides a complete analysis of threats via detailed reports.
View full review »
Support Manager at Sefisa
They have a great knowledge base that you can leverage as a user.
View full review »
Presales Engineer at Data Warden
There's the possibility of being able to do the administration from the Check Point portal, maintaining control and visibility of the different security events at all times.
View full review »
Sr. Manager at Incedo Inc.
Forensic Analysis provides a complete analysis of threats via detailed reports.
View full review »
NM
Team Lead Implementation Services/Systems Integration Engineer at Trinidad Systems Limited
One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users machine. This is a very valuable feature of this solution.
View full review »

Check Point Harmony Endpoint Cons

NC
Network Technical Specialist at a manufacturing company with 10,001+ employees
We use a couple of Check Point products, like SmartEvent, and SandBlast Agent is not really integrated into that. We haven't gotten the reports working yet. We are working with the account team and trying. As I said, it's still relatively new in terms of what we're trying to achieve.
View full review »
Consultant at Cognizant
It needs more documentation and better ease of deployment. For documentation, it needs more information about integrating the endpoints on SandBlast Agent mobile as well as on desktop platforms.
View full review »
Senior Manager at a financial services firm with 10,001+ employees
The application control and URL filtering features are not very strong.
View full review »
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2021.
554,382 professionals have used our research since 2012.
Information Security Analyst at The VPS Group
Sometimes, the Cloud Management Portal can become unresponsive or take a long time to process a query. This in turn will cause the browser to freeze, which will require closing and reopening of your browser.
View full review »
Business Analyst / Developer at a tech services company
There should be some way of managing this solution outside the organization's network, possibly with some type of remote access. For example, if I'm the admin of Check Point who manages the entire network, I would like to have access on my home device or maybe a mobile app to get reports, etc.
View full review »
Sr. Technology Architect at Incedo Inc.
Endpoint vulnerability management is one of the modules I believe is missing and it is something that is required.
View full review »
Support Manager at Sefisa
The only thing that our customers want, is lower prices.
View full review »
Presales Engineer at Data Warden
They could be focused on the analysis of USB devices.
View full review »
Sr. Manager at Incedo Inc.
Support's service and the response times can be improved. The triaging of the tickets takes a long time and the tickets are only resolved with escalations.
View full review »
NM
Team Lead Implementation Services/Systems Integration Engineer at Trinidad Systems Limited
As I understand there will be a URL filtering feature included with the browser agent in the future. This will allow URL filtering without the need for a Gateway Device. This is something I am looking forward to and would be a great addition to list of features.
View full review »
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2021.
554,382 professionals have used our research since 2012.