What is our primary use case?
This software enhances the security of our remote workforce. It creates safe collaboration routes that cyber attacks cannot compromise. Data safety and communication infrastructure have been well maintained since we deployed this software.
Endpoint protection has enabled teams to complete projects faster and monitor workflows efficiently.
It has automated security protocols to cover the wide networking area in the enterprise. Check Point Harmony Endpoint has deployed comprehensive security that prevents any external attacks that may be a threat to our internal policies.
How has it helped my organization?
This software has quashed many security threats that could affect operations and slow down production.
When sending emails to my colleagues, it detects any virus and blocks any spam that may be shared. It is flexible and gives the IT team full access and control during deployment.
We have been able to attain security compliance and requirements for an excellent working environment.
The entire organization has been doing well since we deployed this software due to safe collaboration channels and improved security data awareness.
What is most valuable?
The total cost of ownership has enabled the company's teams to identify any areas with security weaknesses and appropriately assign security models.
The log4j-related attacks blocking system detects any vulnerable endpoints in advance.
Identifying ransomware behaviors has upgraded the security monitoring system and put measures in place to curb such threats.
When browsing, it blocks phishing sites that may hack personal data and leak to internet cyber criminals.
The endpoint behavioral guard identifies online threats that easily prevent credential theft that may lead to funding theft.
What needs improvement?
The current performance of Check Point Harmony Endpoint has impressed all the sectors in the organization.
Configuration with some applications did not take place effectively due to setup complications.
Interpreting the threat intelligence sensors may lead to poor data tabulation and slow performance.
The cost of deployment and maintenance is high, and many small enterprises may not be able to afford premium subscriptions.
The set security enhancement objectives have been achieved, and internet threats have been blocked effectively. I totally recommend this software to other organizations for reliable endpoint protection.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
This software offers a stable performance.
What do I think about the scalability of the solution?
The performance is good, and I am impressed by the overall output.
How are customer service and support?
We have been served well by customer service since we started engaging them.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I have no experience with any other product.
How was the initial setup?
The setup was straightforward.
What about the implementation team?
Deployment was done by the vendor team.
What was our ROI?
The targeted ROI has been achieved, and there is increasing growth.
What's my experience with pricing, setup cost, and licensing?
The setup and pricing are flexible depending on company size and security demands.
Which other solutions did I evaluate?
I have only worked with Check Point Harmony Endpoint.
What other advice do I have?
Comprehensive security for the company's network infrastructure is essential, and this is what this platform has provided.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.