We resell the product to various customers. We give them the latest version. We use the solution for protection purposes. It can help protect, for example, OneDrive, 365, Google Workspaces, and Exchange.
Reviews from AWS customer
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Checkpoint Harmony: A Unified Approach to Endpoint Security
Ease of use
Allows to effectively secure devices against a wide range of cyber threats
Good protection, helpful support, and easy to implement
What is our primary use case?
How has it helped my organization?
The solution offers very good protection. For example, if a user receives a URL, Check Point would be able to see the link and check it to see if it is malicious or not. The same is true if you receive an Excel file with Macros. If a Macro is malicious, it will protect the user from opening it up.
What is most valuable?
It offers transparent cloud protection. Users are protected from phishing, for example. It offers different types of endpoint protections. It prevents and decreases the likelihood of issues related to receiving dangerous or corrupt files or links.
It's not complex to implement. It's a SaaS product, so you don't need to install anything, and you can start to use it immediately.
This is a very efficient solution.
We had one experience with a Check Point customer with whom we started a POC. This solution worked in their environment for about 50 days. It was very good. There were a lot of alerts, a lot of protection, and a lot of problems were solved within that time.
What needs improvement?
The solution needs to be configured correctly. If it is not, it will begin to generate false positives.
For how long have I used the solution?
Our company started reselling Check Point in 2006.
How are customer service and support?
Support is okay. We can create tickets or call. However, the level of support is relative to the level of support the customer buys. You can purchase advanced support. In general, it's very good.
How would you rate customer service and support?
Positive
How was the initial setup?
It's a cloud solution that is very easy to set up. You get the solution, set up the credentials, and connect to the clouds. The solution immediately starts to work. You do need to configure the rules and the protection models. You need to change it from detection to protection mode. It's important even though this action is not very complex. That said, you do need to understand the configurations needed for the customer's environment. If you don't put in the correct configurations, you can start creating false positives.
As a SaaS solution, there is no maintenance needed from the user's end.
What's my experience with pricing, setup cost, and licensing?
For the benefits the customer receives, the pricing is very good. You can pay extra for more support.
What other advice do I have?
I'm a reseller.
I'd rate the solution at a nine out of ten.
Which deployment model are you using for this solution?
Highly efficient Security solution
You can implement the solutions easily with an RMM solution.
It has a considerable number of features such as quarantining and on demand scanning.
Once you set it up, you don't need to always go in and change settings daily.
Easy to integrate with other products/siem solutions.
The platform is helpful but the dashboards lack details.
Defence Against Cyber Threats
Quite easy to configure and deploy.
The support response could be faster though is acceptsble..
It provides ATP and block 0-day attacks in real time.
Best Secuirty solution for your End Points
Advanced email threat protection with AI-driven features and geographical security
What is our primary use case?
The scope is for email security requirements only.
How has it helped my organization?
Some of the investments in IT particularly related to security may not provide direct ROI, but we can arrange the ROI indirectly by considering information security risk incidents and compliance requirements. For example, by putting security measures in place, it helps prevent monetary losses from phishing attacks.
What is most valuable?
They have a sandboxing feature and are developing advanced threat protection technologies. Check Point Harmony also provides in-line API-based security, which is fast and reliable. Its API services should be available within our geography, India. This ensures that I can restrict emails from outside India, helping prevent geography-based phishing attacks. Additionally, Check Point is building AI capabilities for behavioral threat detection.
What needs improvement?
Check Point does not have identity management features, which could be considered for future implementation. The ability to identify the origin country of emails would be useful, allowing me to restrict emails generated outside of India to prevent phishing attacks.
How are customer service and support?
We have to explore it since the deployment is in progress. Based on users' complaints, if they have a good connection with Check Point's technical team and implementation partner, they will be able to resolve issues. I have a direct connect with Check Point and the partner implementing it.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have compared Check Point with Palo Alto, Proofpoint, Cisco, Tumor was evaluated, Kaspersky email security, and FortiMail. Microsoft Defender was not used because it only supports the Microsoft platform and not Google Meet.
What about the implementation team?
I am working directly with Check Point and an implementation partner.
What was our ROI?
There is no direct calculation for ROI, but we can evaluate it based on the prevention of security incidents and compliance. By implementing security measures, we can prevent monetary losses from incidents such as phishing attacks.
What's my experience with pricing, setup cost, and licensing?
I may not be able to share specific cost information, but Check Point is more competitive in pricing compared to some competitors.
Which other solutions did I evaluate?
I have compared Check Point with Palo Alto, Proofpoint, Cisco, Tumor, and Kaspersky email security.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Great product
Provides secure web gateway with reasonable pricing and quick support
What is our primary use case?
We use the solution for content solutions for secure web gateway and SMP's model.
What needs improvement?
The solution could improve monitoring activity. When users have access to the Internet, they can reduce exposure or maybe change their login password.
What do I think about the scalability of the solution?
It is suitable for enterprise businesses and high-tech industries. We have employed 200 employees for this solution.
How are customer service and support?
Support is satisfactory. You can open tickets for support, and they will respond within a day.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used Fortinet and Trend Micro. We opted for Check Point because of the technical, price, and vendor.
How was the initial setup?
The initial is difficult because you have to analyze a lot. It takes two months to deploy.
What was our ROI?
It saves money for our customers.
What's my experience with pricing, setup cost, and licensing?
The product costs 100-120 dollars, which is reasonable.
What other advice do I have?
Overall, I rate the solution an eight out of ten.