What is our primary use case?
We use it for the complete protection of more than 5,000 devices of our company and our customers.
We have Harmony Endpoint (Advanced) managed from the Check Point Cloud, mostly for Microsoft Windows 7, 8, and 10 devices, as well as Windows Servers (mostly 2012 and 2019). We also have a few protected Linux desktops and server devices.
As for the protections enabled, we have mainly Threat Prevention (including Antimalware, Antibot, Anti-ransomware, EDR, and Threat Emulation/sandboxing); Firewall, application control, compliance, and port protection modules deployed.
How has it helped my organization?
We used to use other security solutions (Windows Defender and Kaspersky), however, we had security incidents that affected us (viruses and ransomware) and they were very difficult to identify or when we did identify them it was already a long time after the incident occurred and we did not know the cause and therefore affected the operability of our company considerably.
Since we made the decision to move to Check Point Harmony we have had greater visibility of everything that happens on our devices and take a preventive approach rather than a reactive strategy, in addition to being more confident that we have Check Point protecting us.
What is most valuable?
The characteristics that we find most valuable are its anti-ransomware protection, zero-day phishing protection, web browsing filtering, and vulnerability and patch management. The level of security and visibility they provide is great and it is very easy to configure and maintain. We have almost no false positives.
A feature that we really like is the ease of management and administration that Check Point offers us, in addition to including the management server in its cloud and the predefined dashboards and reports.
What needs improvement?
We would love to have more endpoint hardware and software inventory, as well as tools to perform troubleshooting directly on the endpoint remotely.
A further point of improvement would be to be able to optimize the consumption of resources on the device.
We would also like the application control module to be further developed in future versions to include applications commonly used or maintained by Check Point in order to be able to configure blocking policies more quickly.
For how long have I used the solution?
We have been using this product for more than three years.
What do I think about the stability of the solution?
We have not had any problems with stability so far. It has left us with a good impression.
What do I think about the scalability of the solution?
The scalability of cloud management is excellent.
How are customer service and support?
On the few times we have required support, it has taken us some time to resolve the issues completely, however, in the end, it was accomplished.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We changed solutions since what we had was not effective against the attacks we see today; besides, the visibility was very low and the management was very complicated.
How was the initial setup?
The initial deployment was simple and the solution gave us several tools to do so.
What about the implementation team?
We deployed via an in-house team.
What was our ROI?
In three years, the expected ROI was achieved.
What's my experience with pricing, setup cost, and licensing?
The management of the solution is very simple and the deployment tools are diverse, which greatly reduces the workload. Licensing is also quite simple with three main options and some add-ons.
It is licensed per device (whether it is a desktop, laptop, server, etc.), and the price is very attractive and competitive.
Which other solutions did I evaluate?
We evaluated other options including Cisco AMP and Fortinet EDR.
What other advice do I have?
I'd recommend users to be careful with low-resource devices as the solution has several security modules that can affect the performance of these devices. In our case, we had some old machines where we grouped them and created a more optimized policy for these legacy devices.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. We are a Check Point customer and partner.