Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Harmony Endpoint

Check Point Software Technologies

Reviews from AWS customer

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

285 reviews
from

External reviews are not included in the AWS star rating for the product.


    Ishant G.

The appropriate endpoint security solution you are looking for!

  • November 23, 2023
  • Review provided by G2

What do you like best about the product?
Easy to deploy, much better user interface than competitors. Provides easy VPN connections and protection for your endpoints with the NGAV capabilities.
What do you dislike about the product?
Some features are only available in the advanced version, which is relatively expensive.
What problems is the product solving and how is that benefiting you?
Checkpoint Harmony Endpoint has proven to be a valuable asset. The user-friendly interface stands out, offering a straightforward experience for us and its real-time threat detection operates seamlessly. Checkpoint Harmony Endpoint AV emerges as a reliable partner in maintaining a secure digital landscape for our company.


    Pravin I.

Check Point AV the solution you can trust!

  • May 17, 2023
  • Review provided by G2

What do you like best about the product?
Real-time Protection: The antivirus solution offers real-time protection, actively monitoring files and processes on endpoints to detect and block malware in real-time. It scans incoming files, email attachments, and web downloads to prevent malware from executing and spreading across the network.
What do you dislike about the product?
Below can be hurdles :
Limited Operating System Support
More utilization of EP resources: Performance Impact: consume system resources such as CPU, memory, and disk space.
What problems is the product solving and how is that benefiting you?
Centralized Management: Check Point Antivirus can be centrally managed through Check Point's security management console. This allows administrators to deploy and configure the antivirus software, monitor the security status of endpoints, schedule scans, and receive alerts and reports from a centralized interface.
Zero-Day Threat Protection: The solution aims to protect against zero-day threats, which are previously unknown vulnerabilities or malware that do not have known signatures. It uses advanced heuristics and machine learning algorithms to detect and block zero-day threats based on their behavior, even without specific signatures.


    Hazel Z.

With the best protection against the worst viruses

  • March 01, 2023
  • Review provided by G2

What do you like best about the product?
I think it has a very large and wide capacity to analyze malware threats including Trojan viruses, worms and other types of malware. It is also a solution that advances the detection of threats to protect us at all times. And it is constantly one of the most evolving in its analysis firm and I think it is one of the solutions and its features that I like the most
What do you dislike about the product?
Among the characteristics that should be improved is the perfume of system performance when performing real-time analysis, this can affect the productivity of users, in some cases it can result in the exclusion of certain applications and threat detection systems, this is one of the forms of analysis to detect this type of vulnerabilities.
What problems is the product solving and how is that benefiting you?
We are really looking for solutions that give us benefits including effective protection against a wide variety of malware threats and real-time text Querreque are very substantial advantages that we have from the solution and we must take advantage of them because with it we will avoid system infection In addition, the solution also offers centralized management and easy implementation, which will make it really suitable for our company.


    Imon S.

Endpoint Security is the leading EDR for enabling protection from advanced threat attack !

  • February 25, 2023
  • Review provided by G2

What do you like best about the product?
The software takes care of data security and security check compliance efficiently. The software prevents any threat entry into the IT system and ensures no data loss or lapses. It is the leading unified security management solution for IT systems. Highly customizable and flexible EDR software.
What do you dislike about the product?
No problems have been faced and reported till now. Going well with the software running and its performance on the security ecosystem. It would be great if more customized security features were enabled for better use.
What problems is the product solving and how is that benefiting you?
Check Point Endpoint Security is the one-stop solution for business security concerns and improves business productivity through security enhancement. It helps restrict the endpoints in the IT system and ensures strengthened cybersecurity. It has led to enhanced security compliance, better transparency on security checks, and 100% system protection from malware attacks.


    Emilio P.

This is a useful tool to add to a cybersecurity team's arsenal.

  • February 16, 2023
  • Review provided by G2

What do you like best about the product?
One of the most impressive things about SandBlast Threat Extraction is its ability to automatically extract active content from files and reconstruct them in a safe format, without disrupting the user's productivity. This feature provides a powerful layer of protection against advanced threats and zero-day attacks, while the solution's ease of use and integration with existing security solutions make it a convenient choice for organizations looking to enhance their security posture.
What do you dislike about the product?
At times, it can take a considerable amount of time for threat emulation to sanitize a file. Additionally, there is a restriction of 25MB for file emulation, which can allow larger files to bypass antivirus checks.
What problems is the product solving and how is that benefiting you?
SandBlast Threat Extraction solves the critical problem of threat prevention by providing advanced protection against zero-day and advanced threats in real-time. Its ability to extract active content from files provides a powerful layer of protection, while its ease of use and integration with existing security solutions make it a practical choice for organizations looking to enhance their security posture.


    Netram M.

Secure all your files with Harmony Endpoint.

  • February 03, 2023
  • Review provided by G2

What do you like best about the product?
First of all, I am thrilled with the checkpoint's services. Harmony Endpoint is a complete solution to detect all outside attacks and threats. It also has a file monitoring system, which is why it provides a comprehensive data breach solution for attacks like ransomware.
What do you dislike about the product?
There is nothing much to dislike about Harmony Endpoint. But I think they should update their virus definition regularly so that it won't ring false alarm for some file types.
What problems is the product solving and how is that benefiting you?
Harmony Endpoint provides us safe environment with their built-in antivirus and file monitoring system. I really like the quality services that Check Point provides us with their products.


    fabian m.

reliable management and security

  • January 27, 2023
  • Review provided by G2

What do you like best about the product?
Some of the features we like about the app are:

updates quickly and easily on devices.
detailed reports and inventory tracking.
easy to use to manage and protect endpoints.
Block malicious websites and prevent data leakage.
What do you dislike about the product?
Some disadvantages that the tool presents are the following:
You must have previous experience to be able to administer the tool
Tech support is not very efficient
it's a bit expensive
The documentation is not ordered
What problems is the product solving and how is that benefiting you?
One of the benefits that the tool gave us was Inventory tracking and compliance, endpoints are updated, Manage and maintain end devices and Protection against security threats, all these benefits were provided and we needed it since we had migrated our entire platform to the cloud. e azure and we needed to completely close vulnerability gaps in the cloud to prevent information theft.


    Serdar S.

A successful MTD product

  • January 18, 2023
  • Review provided by G2

What do you like best about the product?
interface is a user friendly MTD product. This product can make restrictions according to the category in the application catalog.
What do you dislike about the product?
If you do not make the necessary configs for this product, the errors do not block you, but only display them.
What problems is the product solving and how is that benefiting you?
It provides ease of integrating the product with the mdm product. It can make related tag assignments and restrictions on the integrated product.


    Anh N.

Fairly good overall

  • January 18, 2023
  • Review provided by G2

What do you like best about the product?
This solution helps to ensure that we can patch and keep security going without talking to everyone for change management.
What do you dislike about the product?
The biggest thing would be the ability to update the SMO's and gateways through Gaia instead of always completing it through the command line.
What problems is the product solving and how is that benefiting you?
Highly availability for the most critical systems helps administrators a lot.


    Information Technology and Services

Fair experience

  • January 17, 2023
  • Review provided by G2

What do you like best about the product?
Has a lot of features and a good technical support team available.
What do you dislike about the product?
Very difficult to deploy, Virtual IP deployment is very difficult and vrrp configuration doesn't work as desired.
What problems is the product solving and how is that benefiting you?
we were using check point firewall to secure our servers.