Check Point Harmony Endpoint and VMware Carbon Black Endpoint are two competing endpoint protection solutions. VMware Carbon Black Endpoint is perceived as superior in terms of its robust features, yet Check Point Harmony Endpoint receives praise for its pricing and support, providing good value for money.
Features: Check Point Harmony Endpoint's valuable features include threat intelligence, advanced threat prevention, and comprehensive endpoint protection. VMware Carbon Black Endpoint offers continuous and comprehensive data collection, real-time threat detection, and response capabilities. Both products provide strong protection, with VMware Carbon Black Endpoint highlighted for advanced detection and response.
Room for Improvement: Check Point Harmony Endpoint needs better integration capabilities, reporting features, and user interface improvements. VMware Carbon Black Endpoint requires enhancements in performance efficiency, a reduction in false positives, and improved system resource management.
Ease of Deployment and Customer Service: Check Point Harmony Endpoint users report a straightforward deployment process and responsive customer service. VMware Carbon Black Endpoint users cite a more complex deployment process but commend the knowledgeable support team.
Pricing and ROI: Check Point Harmony Endpoint setup costs are considered reasonable, with users reporting a good return on investment. VMware Carbon Black Endpoint is viewed as more expensive, but users believe the extensive features justify the higher cost, achieving positive ROI.
I have seen a return on investment with Check Point Harmony Endpoint, as it has saved money and time due to the minimum disruption of production hours, which allows users to focus on their main tasks and desired targets, avoiding downtime and contributing to business growth.
The earlier EDR devices we used were more time-consuming, and deploying that particular agent on all devices took time, but the centralized management console has significantly reduced both time consumption and the extra manual efforts required.
The product is affordable and provides excellent coverage and protection across multiple platforms.
The customer support for Check Point Harmony Endpoint is good.
The customer support for Check Point Harmony Endpoint is quite good; they are ready to help us.
Only email support is available, leading to delays in getting assistance.
Allowing us to add more users or endpoints for protection as our organization grows without any issues.
The scalability of Check Point Harmony Endpoint is effective, as it manages behaviors, process trees, and analysis in a centralized way.
Check Point Harmony Endpoint scales well and meets the growing needs of our organization.
The stability of the tool is high, as I have not experienced any downtime.
Check Point Harmony Endpoint is stable for our organization size of 1,000 to 10,000 members.
High resource consumption, requiring high-performance PCs on our endpoint site.
The Endpoint Agent can be more lightweight so that older machines and laptops can easily handle its consumption.
The integration challenges with Check Point Harmony Endpoint involve needing support with other third-party applications that I wish it worked with more seamlessly.
It is not expensive and provides comprehensive coverage.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
My experience with pricing, setup costs, and licensing has been all good with Check Point Harmony Endpoint.
Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features.
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
Check Point Harmony Endpoint integrates security solutions, allowing comprehensive protection against cyber threats. It's designed to suit enterprise-scale operations with robust features for threat prevention and management.
Check Point Harmony Endpoint offers advanced security capabilities that prioritize threat analysis, detection, and prevention. Tailored for professional environments, it provides tools to handle endpoint vulnerabilities effectively. Its user-centric design ensures that IT teams can manage network security with streamlined operations. Continuous updates and threat intelligence are offered to counter emerging threats, and its deployment is optimized for ease of use.
What are the key features of Check Point Harmony Endpoint?In specific industries like finance and healthcare, Check Point Harmony Endpoint is deployed to secure sensitive data and protect against sector-specific threats. Its flexibility allows adaptation to meet industry standards, ensuring critical infrastructures maintain operational security without hindrance.
VMware Carbon Black Endpoint provides comprehensive endpoint security against ransomware, spyware, malware, and viruses, catering to both cloud and on-premise environments.
VMware Carbon Black Endpoint facilitates endpoint detection and response, threat hunting, application control, antivirus support, and protection for virtual and physical machines. Features include intelligent learning, whitelisting, and integration with other security tools, making it suitable for distributors, MSPs, and enterprises seeking advanced threat defense and real-time monitoring. With its capability to detect and stop malicious executables, it supports both offline and online environments and offers tools like command shell access for deeper investigation.
What are the key features of VMware Carbon Black Endpoint?VMware Carbon Black Endpoint is implemented across various industries including technology, healthcare, and finance. Organizations utilize it in cloud and hybrid environments, enhancing their security frameworks with real-time monitoring, intelligent learning, and robust threat detection capabilities tailored to their specific industry needs.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.