Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Check Point Harmony SaaS

Check Point Software Technologies

Reviews from AWS customer

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

232 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Stephano M.

Intuitive suite of endpoint and remote access tools with complex deployment

  • August 20, 2025
  • Review provided by G2

What do you like best about the product?
Check Point Harmony offers a comprehensive suite of endpoint and remote access security tools that integrate seamlessly into enterprise environments. it's a good approach to protecting users, devices, and internet access, with features like zero-trust network access, advanced threat prevention, and secure web browsing. The user interface is intuitive, and policy management is centralized, making it easier for security teams to enforce consistent controls across distributed workforces.
What do you dislike about the product?
Initial deployment and configuration process is complex. Team needs to have high-level of know-how. Performance can occasionally be impacted by aggressive inspection settings, and licensing can be a bit rigid when scaling across large organizations.
What problems is the product solving and how is that benefiting you?
Check Point Harmony Endpoint has been a solid addition to our security stack, especially in environments where remote work and cloud access are the norm. One of the biggest problems it solves is the fragmentation of endpoint protection—by consolidating anti-malware, threat prevention, and secure access into a single agent, it simplifies management and reduces overhead. I’ve found its behavioral analysis and zero-day protection particularly effective in catching threats that traditional antivirus tools miss. The integration with Check Point’s ThreatCloud gives us real-time threat intelligence, which adds a layer of confidence when dealing with emerging attacks. On the downside, the initial rollout wasn’t entirely smooth—some compatibility issues with legacy systems and occasional performance dips during scans required tuning. Also, the policy granularity, while powerful, can be overwhelming at first. But once configured properly, it’s been reliable and has noticeably reduced the number of endpoint-related incidents. Overall, Harmony Endpoint has helped us strengthen our security posture without adding too much operational complexity.


    Logistics and Supply Chain

Robust Endpoint Defense that integrates well with Check point ecosystem.

  • August 20, 2025
  • Review provided by G2

What do you like best about the product?
The comprehensive protection features and ease of centralized management stand out, giving confidence that endpoints are well-secured with minimal manual effort. The implementation is of lesser burden as there are API's exposed for most of their functionalities. Customer support structure is good in terms of immediate response and attention. Since it is daily used by the users, it is trouble free and bug free. Integration with other platforms is of a great ease.
What do you dislike about the product?
The solution can be resource-intensive on some endpoints, and the learning curve for policy configuration is steep. Licensing is also on the higher side compared to some competitors.
What problems is the product solving and how is that benefiting you?
Check Point Harmony Endpoint is helping us address ransomware, phishing, malware, and zero-day threats across our distributed workforce. It gives us centralized visibility and control over endpoint activity, which is critical with hybrid and remote working. The solution also ensures regulatory compliance by providing detailed reporting and logging.

The biggest benefit has been reduced incident response time—with automated prevention and forensics, many threats are blocked before they can spread. Integration with the broader Check Point ecosystem means we get consistent security policies across network and endpoint, reducing operational overhead. Overall, it has strengthened our endpoint security posture and lowered the risk of business disruption.


    Computer & Network Security

A good EDR but did not make the cut

  • August 20, 2025
  • Review provided by G2

What do you like best about the product?
Our overall experience with Harmony Endpoint during the PoC was mixed, as while the product offers a wide range of strong endpoint security features in a single agent, it ultimately did not make the cut for our environment.
What do you dislike about the product?
I dislike that the management interface is not intuitive and the lack of real-time reporting without configuring SmartEvent, which made administration less efficient.
What problems is the product solving and how is that benefiting you?
Check Point Harmony Endpoint is solving the challenge of protecting our endpoints with a single, unified solution that covers everything from anti-malware and anti-phishing to a host-based firewall and user behavior analytics. It gives us strong prevention, detection, and response capabilities all in one agent, which makes it much easier to manage and reduces the effort needed from our IT team. The forensic visibility is fantastic, and having centralized management through the cloud means we can keep a tighter grip on endpoint security without adding unnecessary complexity.


    suraj s.

Best and Esay Platform to filter your Mail

  • August 20, 2025
  • Review provided by G2

What do you like best about the product?
We are using this product for filtering our mail, and it's working very smoothly without any human interference.

It's easy to filter unwanted mail or spam mail and quarantine it.

Also easy to implement its policy and easily integrate with our G Suite.

After using this product, our mailboxes are easily manageable, and they are free from spam mail.

After all of this, their customer support is also fabulous.
What do you dislike about the product?
Best in class. So, there is nothing to dislike here.
What problems is the product solving and how is that benefiting you?
Before, we were really frustrated with spam mail and phishing mail, but after trying Check Point Harmony, we easily communicate with external parties, as we know they are genuine, as Check Point has already filtered unwanted users.


    Nishant .

Hybrid solutions improve user experience but security features offer room for enhancement

  • August 14, 2025
  • Review provided by PeerSpot

How has it helped my organization?

We use account hijacking prevention in email security for account takeover prevention. This ability to prevent account takeover helps our organization secure data through Check Point Harmony Email and Collaboration. The engines detect all users' patterns, metadata, and behaviors. It categorizes those behaviors under the category of anomalies and understands user behavior patterns. If it finds a user based in the U.S. and suddenly their location shows they have logged in from Canada after 40 minutes, it analyzes this.

It understands if a user has a pattern of writing emails starting with 'Dear' and suddenly starts writing mails with 'Hi'. In such cases, it will recognize this as anomalous behavior and categorize the user under an account takeover. It will automatically stop that user from communicating with the outside world or other users. This is how account takeover prevention works for every vendor.

What is most valuable?

One of the best features with Check Point Harmony SaaS is that they provide a static IP to every customer who enrolls for the service. It differs from Prisma Access, Zscaler, or Netskope that give a shared static IP of the PoP. For example, if you are in the U.S. or in India, in the Kolkata or Mumbai region, every customer in that location will connect to the nearest PoP, which might be in the South U.S. region. With other providers, every customer shares the same static IP.

With Check Point Harmony SaaS, they always provide dedicated static IP, which activates when you turn on the network for your cloud. The benefit is that you receive a high level of security. If Prisma Access becomes compromised, every customer could be affected, but that is not the case with Check Point Harmony SaaS. This is a unique feature that has received positive feedback from users.

What needs improvement?

Check Point Harmony SaaS continues to evolve. They are planning to announce their industry browser within seven to ten days, which will change the market of Check Point Harmony SaaS. Similar to Chrome and Safari, they will provide the Check Point browser. Enterprise users will browse everything from this particular browser, which will provide top-notch security. It will include features such as copy-paste restrictions and direct OCR capabilities, offering more granular control through their browser integration with Check Point Harmony SaaS.

How are customer service and support?

The support from Check Point rates as a seven out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

Setting up Check Point Harmony SaaS is very straightforward and easy.

What's my experience with pricing, setup cost, and licensing?

Check Point Harmony SaaS pricing is competitive. Customers appreciate the pricing structure. When comparing Check Point, Palo Alto, or Zscaler, Netskope in terms of SASE, these are enterprise solutions. The prices are higher compared to other basic solutions, but when compared to the big four providers, Check Point Harmony SaaS is more affordable.

What other advice do I have?

Check Point Harmony SaaS collaborated with and acquired Perimeter 81, and they continue to evolve their SASE solutions to compete with Zscaler. Check Point Harmony SaaS offers different features compared to other SASE solutions by providing hybrid SASE solutions. While Prisma Access, Zscaler, and Netskope require cloud inspection for all traffic, Check Point operates differently. They offer hybrid SASE solutions where network Internet access traffic can be inspected either on the cloud or from the local ISP. When inspection occurs from the local ISP, users experience smoother performance with better latency.

On a scale of 1-10, this solution rates as 7.5.


    Roberto Amauri L.

Very good tool, very intuitive with many benefits in management.

  • August 08, 2025
  • Review provided by G2

What do you like best about the product?
A good protection, with useful administrative tools, integration with other tools, good response against ransomware and other types of attacks.
What do you dislike about the product?
There were some threats that cannot be directly cleaned by the tool, some of the policies are difficult to understand and apply, on the other hand, during uninstallation there were problems with the operating system.
What problems is the product solving and how is that benefiting you?
Make remediations in different ways on all managed devices.


    Computer & Network Security

Powerful, All-in-One Endpoint Protection That Rewards a Deliberate Approach.

  • July 22, 2025
  • Review provided by G2

What do you like best about the product?
The standout feature is the unified management console within the Check Point Infinity Portal. The ability to manage endpoint, mobile, and email security from a single pane of glass is highly efficient. The anti-ransomware and behavioral analysis engines are also exceptionally effective.
What do you dislike about the product?
The agent can be resource-intensive on older hardware, leading to a noticeable performance impact for some users. Additionally, the sheer number of features and policy settings can be overwhelming at first and requires a steep learning curve to master.
What problems is the product solving and how is that benefiting you?
It benefits our organization by proactively stopping advanced threats like ransomware and zero-day malware through behavioral analysis, while its Zero-Phishing capability protects users from credential theft. For our security team, the integrated EDR provides deep visibility for rapid incident response, and features like full disk encryption ensure data on lost or stolen devices remains secure and compliant with GDPR.


    YounggiSeo

Offers reliable security with extensive monitoring and efficient cloud integration

  • July 21, 2025
  • Review provided by PeerSpot

What is our primary use case?

As a cybersecurity engineer, I have nothing to do with the use case for Check Point Harmony SaaS.

What is most valuable?

The best features that Check Point Harmony SaaS provides include my feature or strength, and I use Python, Excel, and other cybersecurity programs.

Check Point Harmony SaaS provides great network security. When I used Check Point in some sites in Korea, it was used for network points and network nodes, so most traffic could be monitored by the Check Point solution.

I am satisfied with the visibility that I have with the solution.

In terms of improvements, Check Point Harmony SaaS has an integrated function for all infrastructure, making it similar to an all-in-one solution, which is really efficient to monitor, and the visibility provides great security advantages.

What needs improvement?

The interface of Check Point Harmony SaaS was a little tricky to integrate compared to other security solutions, so at that time, I was confused about controlling Check Point's functions.

For how long have I used the solution?

I have been using Check Point Harmony SaaS for nine years.

How are customer service and support?

I contacted technical support of Check Point Harmony SaaS when I worked at a previous site, and I called the Check Point partner. At that time, the engineer provided assistance to check the services, and the service was great, so we monitored the situation and it improved.

How would you rate customer service and support?

Positive

How was the initial setup?

The installation of Check Point Harmony SaaS was not hard; it simply required setting up the program for each router and network solution.

Which other solutions did I evaluate?

When browsing network solutions and security solutions, I learned that Palo Alto solutions were really expensive, whereas Check Point Harmony SaaS was more suitable to introduce to clients.

What other advice do I have?

These days, Check Point Harmony SaaS provides benefits as it is also adapting for CNet on cloud infrastructure, and Check Point has actually introduced many features for cloud users and cloud sites. I rate Check Point Harmony SaaS eight out of ten.


    BLAGHUL R.

Check Point Endpoint Security.

  • July 16, 2025
  • Review provided by G2

What do you like best about the product?
It has excellent customer support performance, Easily can be use as well as easily can be implemented and integrated. Robust encryption helps in protecting data. In single console it can manage endpoint security components.
What do you dislike about the product?
I dislike giving policies with more careful. It requires deep learning and knowledge.
What problems is the product solving and how is that benefiting you?
It solve most critical endpoint problems. It is beneficial in preventing malware attacks and business disruption.


    Ankur R.

Check Point Harmony Endpoint: An Effective EDR Solution with Behavioral Analysis Capabilities

  • July 02, 2025
  • Review provided by G2

What do you like best about the product?
My experience is overall good. it provide strong security against a wide range of threats. Harmony endpoint integrates advanced threat prevention and detection features to safeguard endpoint from evolving cyber threats. providing an in-depth analysis of its effectiveness in securing modern IT environments. Support and Implementation is also very easy and effective.
What do you dislike about the product?
There is nothing to dislike for this checkpoint EDR solution. But Support part can be approved.
What problems is the product solving and how is that benefiting you?
I like the most about EDR solution is behavioral analysis to detect and respond to anomalous activities that may indicate a security threat. including monitoring for unusual patterns in file activity, process behavior and network connections etc. Comprehensive, multi-layered protection. Ease of use. Threat Intelligence with Advanced Threat Protection can be summarized as some good to have features in the solution. Lastly, the integration with Checkpoint Threat Cloud for up-to-date threat intelligence is a competitive killer and a standout feature.