Our SOC team uses this solution to observe any unusual behavior or processes running on the endpoint. For example, it is used for phishing detection.
The data is ingested to Splunk.
Our SOC team uses this solution to observe any unusual behavior or processes running on the endpoint. For example, it is used for phishing detection.
The data is ingested to Splunk.
One of the problems with assessing this type of product is that you don't always know when it's working. You will see when something is wrong, where no threat has been detected. If nothing has happened then you don't know if there was no threat, or instead, the protection was quite good. Also, if no threat is found then it may be that the solution is not good enough to detect these types of malicious activities.
The set of features is quite comprehensive.
The Endpoint security solution integrates with the Check Point firewall services, so it's a combined approach to security.
A unique feature with this product is that it will detect if the user is entering their password on a website, and then block it.
Check Point users a pattern-based security module, which is something that can be improved. Pattern-based security is not the latest architecture and it is insufficient because every day, there are approximately 380,000 new vulnerabilities and threats. Using patterns is difficult because the threats can hide.
I have been using Check Point Harmony Endpoint since I joined the company, several months ago. The company has been using it for longer.
From a stability perspective, I can say that we have had absolutely no problems.
We have not experienced any issues with scalability. We have more than 10,000 users in the company. The users are across a variety of roles. It's used by everybody. As our company grows, the usage also increases.
At this point, there is nowhere we can extend its usage.
I do not have personal experience with technical support so I can't assess them. However, I have heard that it is quite reasonable, so I think that it's fine.
We also use Microsoft Defender for Endpoint.
I am building my own opinion of which is better, between the Check Point product and the Microsoft product. Depending on where you do your research, you get different opinions, although much of that is supplier-driven.
In my former organization, I was using CrowdStrike. It has much better performance when looking only at processes.
I was not part of the implementation because it was in place when I joined the company.
I have done research on several similar products to try and determine the best-in-class.
From my point of view, I can't see that any features are missing. My primary complaint is that it relies on patterns for threat detection. It does the job, we get our logs, and we get the relevant warnings. Overall, it's a good product.
I would rate this solution an eight out of ten.
In our organization, we are creating Trusted, Untrusted, and DMZ zones.
We use URL filtering, antivirus and threat prevention, as well as detect and monitoring of all the outside traffic that enters the organization.
It downloads the latest signature from the Check Point database for anti-malware and it keeps my laptop clear from malware files and attacks.
We are now able to regularly scan after implementing this product and now we feel happy. In many ways, it made us feel safe.
We have installed this tool for every user.
The Harmony vendor is excellent at providing various features and updates regularly.
The main advantage of the solution is the ability to implement complete security policies for the terminals in order to address how apps are installed on corporate devices.
It secures our organization from attacks from ransomware, malware, et cetera.
The most important feature is the file scan capability. It saves us from attacks by modified files. In this way, we secure our internal traffic from outside attackers.
The below features are most valuable:
1) Anti-malware
2) Threat protection with signature
3) Anti-ransomware
4) Anti-phishing (support for all leading browsers)
1) Anti-malware (to detect and prevent malicious activity)
2) Threat protection with signatures to prevent the threat on the basis of a signature. Signatures are stored in the database.
I would suggest that the Check Point team always allocates an SME to all the vendors before implementation. This will help when the endpoint agent cannot integrate with another product or third party. It could expand the functionalities too. In addition to security functionality, they could incorporate Mobile Device Management (MDM) functionalities such as remote device management, administration of installed applications, et cetera.
The solution needs more alerts to warn of attacks.
I have used this product for the last two years.
We did not use a different solution previously.
The setup is somewhat complex the first time, however, it is not too complicated or difficult.
We implemented this product as per the organization's requirements. We did it ourselves.
Our ROI has definitely improved after installing this product.
It is a fair price and according to the quality of the product offered.
Check Point Antivirus is used with integrations in all the software of our company and also with connections to all the computers that we use in our employees. All operational areas have Check Point Antivirus implemented.
Check Point Antivirus has the ability to monitor the status of the network and know if there is any threat in our network and thus clean it immediately and maintain security.
In our organization, all departments of the company are protected and secure since the implementation and something important can be monitored in real-time from the application of Check Point Antivirus.
It was necessary to implement a tool to detect data leaks and protect the services in our business. The most sensitive software service was where Check Point began to be implemented, seeing how well it worked, it expanded to different areas of the business
With the implementation of Check Point, our computers have been safe within our network and have prevented the entry of threats thanks to the EDR system. We also needed a tool that had system recovery and this tool satisfactorily meets all our requirements.
All the features that Check Point antivirus presents are very important for the implementation of network security and the most valuable part of this tool is the easy and interactive way of its configuration through SmartConsole in Check Point.
It can scan the files that our users have downloaded to check if they have a virus, which is the most important thing. IPS and Antivirus work together, which provides more flexibility and security throughout our work environment and thus be able to have a well-secured infrastructure
One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously. However, once the update is done, it does not present any problem and works very well. The solution has high CPU and memory consumption on the firewall. It should work on the consumption of resources since we have also detected that the same thing happens with the performance of the users' machines.
The graphical interface of the solution should also improve a little since it is a little complicated to find certain objects to be able to make a configuration, in addition the guides are outdated and sometimes they do not match the interface which is sometimes complicated to implement.
Check Point Antivirus was implemented 4 years ago..
It is a very stable product. However, we've had some problems with the updates.
It has excellent scalability. The same profile can be used with the same exceptions in the management firewalls
The technical support is regular. There are well-prepared technicians. There are others who are still lacking since some problems have arisen and it has cost them to solve them.
Positive
We used Check Point as our first option.
The initial configuration is simple since it presents a very intuitive graphical interface for the user. The configuration of blocking and allowing rules is easy since the panel was designed to make it as user-friendly as possible.
The implementation was done together with the provider and was quite profitable. The provider was qualified to do this type of installation.
Our ROI is that we keep all our network and equipment safe and updated.
I'd recommend you to try it. It is a good tool that allows and gives users the confidence to manage the network and keep it safe.
As we have already been working with different Check Point products, it was the first option to maintain a consistent line of technology.
Before making the implementation, I'd advise users to verify the performance of the machines where it will be used.
We primarily install Check Point Antivirus on company computers and laptops to prevent malware infections, particularly focusing on protecting against phishing attacks and malicious downloads by employees.
The platform has significantly improved our organization's cybersecurity posture by effectively detecting and containing malware threats.
The product's sandboxing feature is valuable as it runs suspicious files in a virtual environment. It helps us analyze their behavior without risking the main system.
The platform's malware detection capabilities could be enhanced. There is room for improvement in detecting more sophisticated and emerging threats.
Additionally, including AI-driven features that can automatically generate and optimize security policies based on the organization's specific needs and threats would be beneficial.
I have been using Check Point Antivirus for about two to three years.
The platform has proven to be very stable. We have not encountered any major issues or downtime related to its operation.
The product seamlessly scales from small to large deployments without any noticeable performance degradation. I rate the scalability a ten.
I have heard positive feedback regarding the technical support team's responsiveness and expertise.
Positive
The initial setup was straightforward. Installing agents and deploying the software on devices was simple, although configuring detailed security policies required some cybersecurity knowledge.
I rate Check Point Antivirus a seven out of ten.
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client. Both features offer significant advantages from different perspectives.
From an improvement perspective, the major challenge we've faced with Harmony is the support. While the technical features and xRail-based aspects are good, support still needs to be improved. However, this concern could be addressed effectively if they focus on improving support.
We have been using Check Point Harmony Endpoint for the last three or four years.
The product is scalable.
Overall, technical support for all Check Point products has been a concern, but improvements have occurred recently. They are making significant changes, and the support is now more stable.
Before implementing Check Point Harmony Endpoint, we used a similar solution called Trend Micro SMAX.
Check Point Harmony Endpoint is easy to integrate with any Avaya platform. The interface is very user-friendly. In terms of promotions, the product is visible in the market.
I rate it a nine out of ten.
The implementation of Check Point Harmony Endpoint has provided great improvements in the functioning of our organization. Therefore, we wanted to protect our courses from cyber attacks and required an end-to-end security system that could prevent/save us from cyber attacks and protect our sensitive data.
The advantages that it presents is that you can access the systems on multiple devices, be it laptops, Mac, Windows or mobile devices and this is a great benefit. It provides reports where it brings the details of vulnerabilities.
Check Point Harmony Endpoint was implemented due to the fact that malware and cyber-attacks have been steadily increasing lately and we needed a tool that would prevent cyber-attacks. With Harmony Endpoint, it is possible to identify those attacks and prevent them. It has also given us the possibility to qualify all these possible attacks and thus take into account where and how they want to penetrate our network.
This implementation provided a fully functional antivirus solution that gave the company the ability to defend against almost all threats occurring inside or outside the network.
Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner.
The threat extraction and threat emulation have been a great benefit to give more autonomy to users.
On the other hand, it cannot be left out that it reduces the number of malicious attacks. It has helped us to properly monitor what has been happening with our network traffic and prevent individual attacks from accessing certain sites where we want to have restrictions or limitations.
Some problems that I have had with this and other Check Point tools in the cloud is when entering the portal since it stops responding or takes a long time to process a query and this causes delays and efficiency.
They should also add new functions such as threat hunting.
Finally, it should be able to implement with and have a good integration and interaction with Azure in the management of vulnerabilities, and data management that between the two can be integrated 100% with Check Point Harmony Endpoint and thus be able to make good automated management.
It was implemented approximately 2 years ago
The product is very stable. It has some problems in the cloud where the access is stuck, however, nothing has caused improper functioning.
Check Point Harmony Endpoint is an easy to scale tool.
We have had good experiences. The cases have been successfully concluded.
Positive
Nothing was implemented that was similar to this type of tool.
As mentioned before, the configuration of this tool is very simple and interactive.
When the installation was done, a vendor helped us and explained how it worked.
With this tool, you can be sure of and have confidence that the investment made will protect the company's complete information.
Check Point Harmony Endpoint is a tool that I highly recommend. Its implementation is very easy, as is its configuration.
Several tools were taken into account, however, Check Point was chosen as we have already used several tools and it has given us confidence and solidity.
It is an excellent tool in the management of vulnerabilities.
We use Check Point Antivirus to secure our enterprise network. It protects our data servers from malware attacks.
The tool comes with an in-built AI feature, which makes file management easier. It also secures the network from viruses, malware, and phishing attacks.
Check Point Antivirus' performance could be faster. It needs to include app-based support to upload screenshots of issues. It needs to add timely and regular updates. The dashboards and reporting features need to offer more efficiency.
I have been using the product for two years.
The product is stable. I rate it a nine out of ten.
Check Point Antivirus is scalable. You can add the 'n' number of servers at any time. My company has 1000 users.
The tool's tech support is good.
Positive
The tool's deployment is easy and takes two to three hours to complete. A single person can do deployment. The tool has a SmartConsole feature, which helps to deploy it efficiently without much processing. It is easy to maintain, and one person can handle the maintenance.
Check Point Antivirus is the most economical solution.
The product is an AI-based solution with the latest capabilities. It offers the most secure protection. I rate it an eight out of ten.
We use the solution for multiple purposes such as endpoint protection, organizational malware attack tracking and maintaining, blocking of IP addresses, domain and URL blocking, and prevention and detection, according to the purposes we follow.
Check Point is the best in the marketplace for next-generation firewalls. In combination with Endpoint Security, it proves to be stable, error-free, and up-to-date with the latest fixes and solutions available.
Earlier in our organization there was normally an antivirus which was used to check endpoint protection and policies according to what was applied. However, the detection of endpoints was not up to date with real-time analysis.
There is a lot of gap in analysis. The malware reports and signatures were not updated in real-time. There was no blocking of Suspicious URLs or domains in real-time. As we using Check Point in DMZ. We purchased the license and implemented it in the UAT zone for the best outcome as per the organization's requirements.
The most valuable aspects of the solution are the real-time endpoint analysis and blocking mechanism, the detection of malware and threats is the best use of this technology.
As we have the stability of this product and best practices solution is applied to the infrastructure as endpoints have a clear view of the statistics and performance.
Also, we have monitored the server level where it's been protected from the outside world. The CPU, memory, and hard disk consumption and compromisation are good.
The dashboard has also been user-friendly and easy to understand.
Check Point is the best in the marketplace. As the EDR [Endpoint Harmony] there is a lot of enhancement in fixing the solution. We have observed some policies are not working as expected. We have observed a few cosmetic issues as well, however, it's fine.
Minor release should improve the stability and overall performance of the endpoint solution. Consumption of the endpoint solution should have clear visibility on day-to-day operation tasks that are being carried out also we should monitor the malicious IP address and URL for blocking the same.
I've used the solution for four or more years.
The stability is the best in the marketplace.
The scalability is the best in the marketplace.
Their technical support is the best in the marketplace.
Positive
We did not previously use a different solution.
The initial setup is straightforward.
We handled the setup with an in-house team. I'd rate the experience foud out of five.
The ROI witnessed is the best in the marketplace.
Check Point is the best in the marketplace. It's a good EDR and the cost is minimal.
We did not evaluate other options.
