2019-02-19T08:38:00Z

What do you like most about Check Point Harmony Endpoint?

8

Hi Everyone,

What do you like most about Check Point Harmony Endpoint?

Thanks for sharing your thoughts with the community!

ITCS user
Guest
2323 Answers

author avatar
Top 20Real User

Check Point Harmony Endpoint can be easily deployed and is cost effective and more secure.

2021-06-11T14:03:38Z
author avatar
Top 5LeaderboardReal User

Harmony Endpoint is able to detect, monitor, block, and mitigate attacks on the endpoint and it builds and maintains relevant logs for later inspection.

2021-05-14T13:24:00Z
author avatar
Top 20Real User

The technical support is good.

2021-04-03T15:37:30Z
author avatar
Top 20Real User

The most useful feature so far has been having a functioning and up-to-date anti-malware scanner.

2021-03-01T14:08:00Z
author avatar
Top 20Real User

The most valuable feature is forensics.

2021-02-24T06:26:50Z
author avatar
Top 5Real User

Check Point Endpoint Security really helped the business stop various malware attacks throughout the time we used it, including a ransomware attack, which was stopped in minutes.

2021-01-20T11:07:00Z
author avatar
Top 5LeaderboardReal User

The most valuable feature is the Zero-day protection, which covers our on-premises users, and well as those users who are outside of our network.

2021-01-13T08:50:00Z
author avatar
Top 20Real User

It's pretty complete for preventing threats to endpoints. Its capabilities are great.

2020-10-29T10:12:00Z
author avatar
Top 10Consultant

SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth.

2020-09-09T06:29:00Z
author avatar
Top 5Real User

The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry.

2020-09-03T12:00:00Z
author avatar
Top 5LeaderboardReal User

The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers.

2020-08-10T12:51:00Z
author avatar
Top 10Real User

In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations.

2020-08-04T07:26:00Z
author avatar
Top 20Real User

We now feel more secure with our PCs, even more with the non-technical persons.

2020-08-03T15:33:00Z
author avatar
Top 5LeaderboardReal User

It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks.

2020-08-02T18:15:00Z
author avatar
Real User

One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users machine. This is a very valuable feature of this solution.

2020-07-27T16:52:00Z
author avatar
Real User

Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum.

2020-06-30T08:17:00Z
author avatar
Real User

We were under an attack in our environment, and the Check Point response was good because we didn't lose anything.

2019-12-23T07:05:00Z
author avatar
Top 20Real User

The biggest value we found was ease of deployment. I haven't really used it much, so I can't really comment beyond that. I haven't used it much, but it's working.

2019-10-28T06:33:00Z
author avatar
Top 10Real User

The most valuable feature of this solution is the VPN.

2019-10-03T07:51:00Z
author avatar
Real User

The most valuable feature is the integration with CheckPoint's firewalls. You can have one port, and follow the logs from both Endpoint and firewall security.

2019-09-05T05:37:00Z
author avatar
Top 20Consultant

We had a ransomware attack and the SandBlast agent automatically picked up the ransomware.

2019-05-29T10:40:00Z
author avatar
Top 20Real User

Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved.

2019-05-22T07:18:00Z
author avatar
Real User

The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature.

2019-02-19T08:38:00Z
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: July 2021.
523,230 professionals have used our research since 2012.