We continue to offer our support solutions to other companies as requested. I focus on cyber security, specifically specializing in detecting malware in text and searching for remote access or reverse channels on computers.
We continue to offer our support solutions to other companies as requested. I focus on cyber security, specifically specializing in detecting malware in text and searching for remote access or reverse channels on computers.
This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities. However, there's still room for improvement and the addition of more features. Nevertheless, in the broader market landscape, it's considered one of the leading products. While there might be some competition from others like Cisco, it remains a strong choice. The feature lies in mapping and providing top-notch malware protection.
Perhaps the software could be made more resource-efficient. While many improvements come to mind, I don't have them readily available. Essentially, I aim to enhance the software's efficiency so that it places fewer demands on computer resources.
I have been working with Check Point Harmony Endpoint for the past two years.
It is a stable solution and I would rate it seven out of ten.
It isn’t very scalable since I wasn't able to bypass the security a couple of times. I would rate it a six out of ten.
I would rate it a six out of ten because it could have been easier. It might be somewhat challenging due to the numerous policies in place. For instance, it's more straightforward for me when users can easily set up policies because they come built-in. However, with Check Point, you do have the option to create custom policies. I'm not entirely certain if it's a strict either/or situation, as there might be some flexibility. Nonetheless, having a predefined "zero one" option can make it easier for users, as they don't necessarily have to customize policies themselves.
The deployment takes long enough.
Currently, this software stands out as one of the top choices in the field. It's undoubtedly a strong contender for enhancing computer security, and while there are various other products available, this one ranks among the best.
I recommend the solution, but I would rate it a six out of ten, mainly because the software requires considerable resources and can strain less powerful computers. It tends to impact system efficiency, especially on computers with weaker hardware, causing frequent restarts and putting a significant load on the CPU and memory.
We use Check Point for ransomware protection. It provides standard endpoint protection.
We need ransomware protection and that's what we get. It's a very good and robust antivirus solution.
As with most antivirus products, the reporting and management could be improved.
I've been using this solution for one year.
The solution is stable.
The solution is scalable, we have a few thousand users.
We haven't had any issues with the technical support.
I previously used Symantec and McAfee depending on the requirements at the time. There's not much difference between all the solutions in this area. It comes down to how manageable they are and how frequently false positives exist in that environment and whether they slow down the transactions or the processing of the machine.
The initial setup is fairly straightforward, deployment takes a few minutes. It's just a matter of setting up the server, your policies, and pushing out the agents.
Our ROI has been from an operational perspective. If you're not fighting with a product every day, it saves you time and money.
Licensing costs are usually paid annually or every three years. This is not a particularly expensive solution.
I rate this solution eight out of 10.
The implementation was really easy. We were able to activate the antivirus blade and install it on the computers we required. In this way, we were able to provide security for malware protection - all represented by Check Point Security Management.
It was required to expand or have the license to use the antivirus security utility. A point that cost us at the beginning was implementing the licenses in the management server however, once up and running, it was easy.
It is an old brand that has all the anti-malware protection, signatures, and revisions to avoid vulnerabilities.
Our organization teams used a Microsoft-based antivirus. However, we already had Check Point gateways in use. We wanted to unify the protection more, and we tried the use of Check Point Antivirus. We really have no complaints. It offers good anti-malware protection and ransomware, among other modern threat protection features. The installation of the equipment was easy, and we achieved the main objective of unifying the protected environment.
We currently use Check Point Management R81, which is one of the most complete versions.
The logs and monitoring are valuable features. It generates enough visibility in terms of what happens on our equipment.
The sandboxing validates some files that have threat qualities.
We like this security tool.
Check Point is one of the best security brands according to the Gartner quadrant. However, it needs improvement in some areas.
We would like to see better guides in the future with more concrete examples of the best practices.
The support is somewhat complicated. Sometimes they take a long time to solve problems. The language barrier is an issue for Spanish-speaking people.
Support hours are generally contrary to the hours in Latin America. They could expand the support more and have more trained and effective technical personnel to help customers.
For at least eight months, we have used this solution, which greatly facilitates our security. It is an antivirus implemented through Check Point Gateway R81.
Previously, we used a Microsoft Antivirus. It's not bad. However, we wanted a tool integrated with our Check Point technologies, and therefore, we validated the options to make the required changes.
It is important to assess and verify the costs of Check Point technologies with an expert vendor to help determine the technology and tool that can meet the specific business needs of each company.
The documentation is outdated. However, if it is validated well, it is possible to obtain what is required for the implementations.
At the level of antivirus, we looked at Sophos and McAfee. However, the implementation most adopted in our environment was Check Point. We are convinced that it was the best option.
The product is an easy-to-implement and centralized antivirus solution. I recommend it.
After implementing Check Point Antivirus, we've had a few compatibility issues with my devices.
Check Point Antivirus proved to be highly productive for my work and has helped with data security via its features. It offers VPN capabilities and provides multiple device protection. It is very easy to monitor results across all covered devices.
Check Point Antivirus is highly compatible with other solutions and is scalable while offering extremely low pricing.
Check Point Antivirus proved to be highly productive and scalable for my work. The data security features, including malware detection and escalation, operated quickly. There are multiple devices protected by the software. It is now very easy to carry out and monitor results from the same task across all devices.
Check Point Antivirus automatically fixes pop-up ads and effortlessly detects all kinds of malware and threats while syncing systems in the background.
Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background.
Along with Check Point Antivirus, the support provides multiple updates and upgrades in quick succession. It's quick to restore the management of the database and has scheduled security system and network upgrades for risk-free work management.
Overall, Check Point Antivirus is highly productive, scalable, compatible, and easy-to-use software for data security and system management. I highly recommend this platform.
There are no areas that Check Point Antivirus needs to work on.
Overall I didn't personally face any issues while implementing Check Point Antivirus. In comparison to alternatives present in the market Check Point Antivirus has high efficiency and a better ability to protect our devices both online and offline.
Personally, I highly recommend this platform to professionals for data security and management.
I've used Check Point Antivirus integration for approximately one year or so.
I haven't used any other such platform for data security and system management.
Overall, Check Point Antivirus is highly productive, scalable, compatible, and very easy to use. It's good software for data security and systems management and I highly recommend it.
I did look into other options. For a simple comparison, I visited certain websites for product reviews. In the end, I found Check Point Antivirus to be the best option.
Go for it. First, implement it and see the change in your levels of security.
The antivirus helps the organization in securing desktops and mobile devices from external data threats. It detects the entry of viruses to devices that can destroy data and quickly takes necessary action.
Once the software is installed, there is no additional cost that is required to run it. It troubleshoots any errors that may slow down workflows across applications. Check Point Antivirus integrates with multiple operating systems, including Windows and Linux.
Since I installed it on my desktop, the browsing speed has improved, and I can visit several sites without fear.
The software has improved the digital experience of employees who have deployed it.
I can comfortably open links attached to my emails and share documents with my colleagues without fear of cyber attacks.
Departments that used to lose data to virus attacks can work from any site and focus more on productive business engagements.
The antivirus provides advanced security data analytics that helps the user to work from safe sites that can affect tasks in progress.
The software screens applications to ensure they perform effectively.
Virus detection helps teams to be aware of any threats that can harm data and take precautions in advance.
It provides networking reports on the data security situation, which enables users to make decisions.
Performance metrics provided regularly help the IT team plan to curb any threats to company data.
It is easy to deploy the antivirus and learn how it works.
The application runs very fast and does not affect the performance speed of the device where it is installed.
Daily security analysis indicators help team members to engage any abnormality with real-time insights.
The current features are doing extremely well. That said, the system coding can be simplified to enable any user to interpret the security situation of the used device.
I am happy with the set data models since they monitor the security situation of new sites before browsing.
I have not observed most failures since I started using this software.
The company can embark on timely updates to ensure the application is compatible with devices.
Customer support comes in on time when we contact them via online chats and phone calls.
When there are many devices, it is more costly since each device requires unique login credentials.
The product is heavy, and it requires more space for effective operation. New users can find it difficult to set up and install due to the lack of a robust user manual.
I've used the solution for eight months.
It works for a long time without failing and does not misbehave.
The antivirus performance has been excellent.
The customer service team has never failed us.
Positive
I used Kaspersky Antivirus, however, it used to fail most of the time.
The installation process of the application is easy and straightforward.
I deployed it through a vendor, and they are doing well.
A secure work environment has contributed to increased ROI.
The pricing is suitable, and the setup process is simple.
I evaluated most free online antiviruses, however, they were not effective.
Check Point Antivirus is a sure bet for the detection of any virus.
We had to protect our equipment inside and outside the perimeter network, regardless of where we were. Due to this need, we came to use Check Point Harmony Endpoint, which was extremely easy to deploy from the moment we logged in to the website.
This solution is very user-friendly. After the Check Point tenant is created, it allows us to download the application for iOS or Windows, and it is only a matter of installing it so that the teams can start reporting to the Harmony Endpoint cloud.
It came to provide us with security, reliability, and a centralized administration of unified services. It works regardless of whether you work on Mac or Windows systems, which are among the equipment we have in our organization. Today, our equipment is very diverse. However, we have managed to protect everyone with this solution. Check Point Harmony Endpoint provides support within the new organizational disruption trend of teleworking. With it, we manage to protect and manage all teams from a centralized policy.
Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard. We are achieving uniform work that is easy to manage if any changes are necessary. Being able to give us an inventory of the equipment and the health status of everything from a single place has been great. This solution has become a great ally for the prevention of threats and security problems caused by viruses such as ransomware, and we are protected against threats, which is of great value.
I would like to see this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses. We'd like to be able to integrate several products and services into one to be more efficient and user-friendly within the infrastructure.
I've used the solution for one year.
Today, with our current organizational needs, we find great complexities when it comes to protecting each of our users inside and outside of the network. As a result, we came to use solutions that had not been deployed yet, and one of them is the integration that Check Point has in its range of solutions, such as the Blade and what we know today as the Check Point Antivirus. Thanks to this solution, we are protected.
The Antivirus is part of the added value we are getting from Check Point. It's offering greater prevention and detection of attacks. The solution adds value to our organization since it is protecting us and integrates analytics with the Check Point cloud. We're getting great computing power and analysis behind the security.
Its most valuable feature is the integration of analytics with the cloud. We like that we can detect zero-day incidents, problems, or virus attacks inside or outside the organization. It's one of the most complex and integrated antivirus solutions. The value of analysis in real-time every time we are having an attack, vulnerability, or security breach is very helpful. Today, we want to have integrated solutions and quick solutions that will protect us mainly with new attacks and solutions that protect us from the hijacking of our data (ransomware).
I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available. We want the solution to help us achieve 360-degree security across all work teams.
I've used the solution for about two years.
The solution is really simple. It is not difficult to configure, and it is very stable for me, from my experience.
Due to its deployment, it is integrated within our network, and it is a quick and easy solution to scale or modify.
We have many clients using this solution for different use cases.
The solution can be deployed on the cloud and on-premise.
Check Point Harmony Endpoint is mainly used for protection.
The most valuable feature of Check Point Harmony Endpoint is centralized management.
Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features.
I have been using Check Point Harmony Endpoint for approximately two years.
Check Point Harmony Endpoint is very stable.
The scalability of the Check Point Harmony Endpoint is good. It can scale easily.
We have some clients with 10,000 users that are using this solution.
I have opened up many tickets with the support and they have been responsive. I have not had any problems with them. They have helped whenever I faced a problem.
I rate the support from Check Point Harmony Endpoint a four out of five.
Positive
The initial setup of the Check Point Harmony Endpoint is easy. We use the main policy for the installation across the organization.
We have had some problems with connection management because if we install the initial client on the computer, we cannot stop or delete this client or install the full package afterward.
If we have a new signature technical support ticket, they add this signature to the database in three to five days which they could improve.
I rate the initial setup from Check Point Harmony Endpoint a four out of five.
Check Point Harmony Endpoint does not have some features that SentinelOne or CloudStrike has.
I rate Check Point Harmony Endpoint a seven out of ten.
