What is Check Point Harmony Endpoint?
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing or drive-by malware, while quickly minimizing breach impact with autonomous detection and response. Harmony Endpoint provides comprehensive endpoint protection at the highest security level, crucial to avoid security breaches and data compromise.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCheck Point Harmony Endpoint Ratings
Real user data aggregated to summarize the product performance and customer experience.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
91 Likeliness to Recommend
100 Plan to Renew
87 Satisfaction of Cost Relative to Value
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+99 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love Check Point Harmony Endpoint?
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Agent Efficiency
IOC Consumption
Behavioural Analytics
Machine Learning
Continuous Monitoring
Whitelisting Blacklisting
IOC Tools
Malware Identification Accuracy
Intrusion Detection Prevention
Automated Threat Response
Task Prioritization
Vendor Capability Ratings
Availability and Quality of Training
Vendor Support
Product Strategy and Rate of Improvement
Ease of IT Administration
Ease of Data Integration
Business Value Created
Breadth of Features
Ease of Customization
Quality of Features
Ease of Implementation
Usability and Intuitiveness
Check Point Harmony Endpoint Reviews
Jonas P.
- Role: Information Technology
- Industry: Telecommunications
- Involvement: End User of Application
Submitted Dec 2022
Control and monitoring of incoming and outgoing
Likeliness to Recommend
What differentiates Check Point Harmony Endpoint from other similar products?
It allows visualization and tracks information without affecting decision-making, boosting the company's growth in virtual spaces (networks, web, cloud), improving the customer/company/service relationship, and improving business processes and results, among others.
What is your favorite aspect of this product?
It issues notifications and alerts about possible threats the system is detecting to publish, manage and give an immediate response in real time about those threats detected by the system. Blocks and repairs all types of data that generate false positives for the company and its security system. Generates reports from the complete visualization of the activities occurring in the different virtual and physical endpoints to provide records that allow making the appropriate decisions to prevent the violation of the client's data. URL filtering is solved by the system, as it controls and monitors users from accessing malicious websites.
What do you dislike most about this product?
A very high capacity protection and security system that is not by the capabilities of the physical devices, so the user cannot acquire the whole package or simply what allows it to cover the security needs for the company, thus generating delay and slowness.
What recommendations would you give to someone considering this product?
The system analyzes every startup moment or frame to prevent a phishing attack on users. It protects, safeguards and provides security over possible malicious files in the different virtual and physical endpoints. The system provides protection and security on secure content files downloaded from the web and the cloud, performing a scan on them to detect malicious activities that violate company policies and threaten data security, preventing these files with malicious activities from being downloaded by users.
Pros
- Helps Innovate
- Continually Improving Product
- Performance Enhancing
- Efficient Service
Shri S.
- Role: Consultant
- Industry: Technology
- Involvement: Business Leader or Manager
Submitted Jul 2022
A to Z endpoint security solution for businesses
Likeliness to Recommend
What differentiates Check Point Harmony Endpoint from other similar products?
Check Point Harmony Endpoint is also commonly known as Sandblast Agency which enables all round protection of business network and its systems from endpoints and malwares. It restricts the ransomware attacks by providing unified extended security solutions for users, devices and access. The remote accessibility of systems and softwares are going to be managed in an extended manner with security systems.
What is your favorite aspect of this product?
Robust security system and strengthened API infrastructure for all round visibility and secure accessibility of system from anywhere. Enhanced security infrastructure and management systems for 24*7*365 protection. Remote secure accessibility with end to end security from ransomware and phishing attacks. All mobile related attacks are going to be restricted by this security enablement
What do you dislike most about this product?
No dislikes please . All security features are just fantastic
What recommendations would you give to someone considering this product?
Go for Check Point Harmony Endpoint Network for resolving A to Z concerns of security in business systems. It is affordable and super easy to set up and operate anywhere, anytime. The businesses and systems are provided by high grade security from endpoints, phishing mails and messages and ransomwares through robust protection cover of Sandblast network
Pros
- Reliable
- Unique Features
- Effective Service
- Caring
Deana M.
- Role: Information Technology
- Industry: Healthcare
- Involvement: End User of Application
Submitted May 2022
It is a solution that creates efficiency
Likeliness to Recommend
What differentiates Check Point Harmony Endpoint from other similar products?
This system provides supervision, protection and security over Endpoints, since through them users have access from different virtual and physical spaces to their work areas and to the information established or generated there. Provides a wide range of services based on its solid experience in protection, security, control, functionality, performance and monitoring of cyber-attacks. It issues reports on malicious activities detected through the different communication channels that the company and the user(s) have.
What is your favorite aspect of this product?
This solution performs threat intelligence on the piles of encrypted data, which are thoroughly examined by the system in a contextual manner, to detect real problems and with them implement the appropriate solutions to the problems present. Issuance of alerts and notifications through the different communication channels of the user and the company. Control, planning and monitoring of workflows that provide security to data and especially to both virtual and physical endpoints.
What do you dislike most about this product?
It is an expensive solution, where the complete acquisition will depend on the needs of the user and the company.
What recommendations would you give to someone considering this product?
It enhances technological innovations in security. It is designed for prevention and data control with a vision of the future. It streamlines processes within the company. Improves relationships with suppliers and partners by providing confidence and credibility on the protection and security of their data in the virtual space (cloud, web and networks) and on physical equipment (PC, Mobile).
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing