This content is currently locked.

Your current McLean & Company subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
+1-877-281-0480 (US/CAN) or
+1-703-544-9513 (International)
Check Point Harmony Endpoint Logo
Check Point Harmony Endpoint Logo
Check Point

Check Point Harmony Endpoint

Composite Score
7.3 /10
CX Score
7.8 /10
Category
Check Point Harmony Endpoint
7.3 /10

What is Check Point Harmony Endpoint?

Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing or drive-by malware, while quickly minimizing breach impact with autonomous detection and response. Harmony Endpoint provides comprehensive endpoint protection at the highest security level, crucial to avoid security breaches and data compromise.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Check Point Harmony Endpoint Ratings

Real user data aggregated to summarize the product performance and customer experience.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

91 Likeliness to Recommend

100 Plan to Renew

87 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+99 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Harmony Endpoint?

0% Negative
0% Neutral
100% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Feature Ratings

Average 77

Agent Efficiency

84

IOC Consumption

82

Behavioural Analytics

82

Machine Learning

82

Continuous Monitoring

81

Whitelisting Blacklisting

77

IOC Tools

76

Malware Identification Accuracy

76

Intrusion Detection Prevention

75

Automated Threat Response

70

Task Prioritization

68

Vendor Capability Ratings

Average 77

Availability and Quality of Training

82

Vendor Support

82

Product Strategy and Rate of Improvement

82

Ease of IT Administration

79

Ease of Data Integration

77

Business Value Created

77

Breadth of Features

76

Ease of Customization

75

Quality of Features

75

Ease of Implementation

73

Usability and Intuitiveness

72

Check Point Harmony Endpoint Reviews

Jonas P.

  • Role: Information Technology
  • Industry: Telecommunications
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Dec 2022

Control and monitoring of incoming and outgoing

Likeliness to Recommend

9 /10

What differentiates Check Point Harmony Endpoint from other similar products?

It allows visualization and tracks information without affecting decision-making, boosting the company's growth in virtual spaces (networks, web, cloud), improving the customer/company/service relationship, and improving business processes and results, among others.

What is your favorite aspect of this product?

It issues notifications and alerts about possible threats the system is detecting to publish, manage and give an immediate response in real time about those threats detected by the system. Blocks and repairs all types of data that generate false positives for the company and its security system. Generates reports from the complete visualization of the activities occurring in the different virtual and physical endpoints to provide records that allow making the appropriate decisions to prevent the violation of the client's data. URL filtering is solved by the system, as it controls and monitors users from accessing malicious websites.

What do you dislike most about this product?

A very high capacity protection and security system that is not by the capabilities of the physical devices, so the user cannot acquire the whole package or simply what allows it to cover the security needs for the company, thus generating delay and slowness.

What recommendations would you give to someone considering this product?

The system analyzes every startup moment or frame to prevent a phishing attack on users. It protects, safeguards and provides security over possible malicious files in the different virtual and physical endpoints. The system provides protection and security on secure content files downloaded from the web and the cloud, performing a scan on them to detect malicious activities that violate company policies and threaten data security, preventing these files with malicious activities from being downloaded by users.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Performance Enhancing
  • Efficient Service

Shri S.

  • Role: Consultant
  • Industry: Technology
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Jul 2022

A to Z endpoint security solution for businesses

Likeliness to Recommend

9 /10

What differentiates Check Point Harmony Endpoint from other similar products?

Check Point Harmony Endpoint is also commonly known as Sandblast Agency which enables all round protection of business network and its systems from endpoints and malwares. It restricts the ransomware attacks by providing unified extended security solutions for users, devices and access. The remote accessibility of systems and softwares are going to be managed in an extended manner with security systems.

What is your favorite aspect of this product?

Robust security system and strengthened API infrastructure for all round visibility and secure accessibility of system from anywhere. Enhanced security infrastructure and management systems for 24*7*365 protection. Remote secure accessibility with end to end security from ransomware and phishing attacks. All mobile related attacks are going to be restricted by this security enablement

What do you dislike most about this product?

No dislikes please . All security features are just fantastic

What recommendations would you give to someone considering this product?

Go for Check Point Harmony Endpoint Network for resolving A to Z concerns of security in business systems. It is affordable and super easy to set up and operate anywhere, anytime. The businesses and systems are provided by high grade security from endpoints, phishing mails and messages and ransomwares through robust protection cover of Sandblast network

Pros

  • Reliable
  • Unique Features
  • Effective Service
  • Caring

Deana M.

  • Role: Information Technology
  • Industry: Healthcare
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted May 2022

It is a solution that creates efficiency

Likeliness to Recommend

9 /10

What differentiates Check Point Harmony Endpoint from other similar products?

This system provides supervision, protection and security over Endpoints, since through them users have access from different virtual and physical spaces to their work areas and to the information established or generated there. Provides a wide range of services based on its solid experience in protection, security, control, functionality, performance and monitoring of cyber-attacks. It issues reports on malicious activities detected through the different communication channels that the company and the user(s) have.

What is your favorite aspect of this product?

This solution performs threat intelligence on the piles of encrypted data, which are thoroughly examined by the system in a contextual manner, to detect real problems and with them implement the appropriate solutions to the problems present. Issuance of alerts and notifications through the different communication channels of the user and the company. Control, planning and monitoring of workflows that provide security to data and especially to both virtual and physical endpoints.

What do you dislike most about this product?

It is an expensive solution, where the complete acquisition will depend on the needs of the user and the company.

What recommendations would you give to someone considering this product?

It enhances technological innovations in security. It is designed for prevention and data control with a vision of the future. It streamlines processes within the company. Improves relationships with suppliers and partners by providing confidence and credibility on the protection and security of their data in the virtual space (cloud, web and networks) and on physical equipment (PC, Mobile).

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing