We changed our name from IT Central Station: Here's why
2019-02-19T08:38:00Z

What is your primary use case for Check Point Harmony Endpoint?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

ITCS user
Guest
3030 Answers

author avatar
Top 5LeaderboardMSP

We use the solution for many things. We don't only use it as an Endpoint client for antivirus. It is used for our next-generation antivirus. We are also using Harmony on other things, for example, our email. There's a Harmony email and office solution, which we also are using in order to protect our email.

2021-11-18T10:13:44Z
author avatar
Top 10Real User

Kaspersky is suitable for small and medium-sized businesses (SMB), while Harmony is for enterprise segments. There are different requirements for enterprises versus SMBs. At an SMB, one administrator handles the firewall, network, and endpoints. You have more specialization in an enterprise. So at a larger scale, where you have a 5,000 or 10,000 users use case, Harmony helps pinpoint where security is lacking on a particular machine.

2021-10-07T12:44:00Z
author avatar
User

The main option for which this solution is used is to have all the peripheral equipment protected - avoiding risks due to malware and viruses. The solution can be managed by device, with filtering and analysis of the information of all collaborators available there. It's used to analyze emails from key users and for content filtering rules. It does not allow dangerous downloads, which protects the work of the organization outside the main network. It gives tools to the collaborators to make the work outside the installations (home office) easy.

2021-09-07T23:57:00Z
author avatar
Top 10Real User

In my organization, we have deployed the Harmony Endpoint Check Point tool with the idea of being able to secure the deployed part of our mobile corporate devices in order to start the security processes at the point as close to the user as possible. Using its ease of deployment capacity and its power in detecting malware or insecure elements, this tool provides us with the peace of mind we were looking for in an environment of several thousand terminals deployed on the network in many places and environments.

2021-08-18T11:17:00Z
author avatar
User

We use it for multiple purposes. It's for securing the endpoints. We have about 200 endpoints added to this solution and being maintained. Its server is cloud-based and here our in-house IT team takes care of the installation and configuration on endpoints. We are required to secure our endpoint from any external attacks. It's also well controlled so that only required access is to be given to end-users. Whether it's about blocking unwanted websites or port blocking, we use the solution to manage everything.

2021-07-14T08:31:00Z
author avatar
Top 5LeaderboardReal User

It's a very good solution and it is a complete endpoint security solution. We get almost all the features we need, including features like Threat Emulation/Threat Extraction, Antibot, Anti- Exploit, Anti Ransomware protection, UBA, Zero-day Phishing protection, Behavioral Guard, Encryption, VPN, compliance, and many more. It's well integrated with Check Point Threat Cloud, as well as other Check Point solutions. The product provides complete visibility of threats with forensics analysis. There is direct Integration with all well-known SIEM solutions as well as the support of standard SIEM integration features.

2021-07-13T21:22:00Z
author avatar
Top 20Real User

Check Point Harmony Endpoint is antimalware and antivirus software, and it also has features such as in firewall autoresponse and autonotification, autoprotection, definition updates, and policies that we can apply. We have medium-sized companies who use this solution.

2021-06-11T14:03:38Z
author avatar
Top 5LeaderboardReal User

The solution should be able to provide next-generation security for endpoints and should be able to monitor, detect, mitigate, and block attacks, as well as provide complete visibility in terms of the chain of events so that forensics can be performed accordingly. All of the security features should be provided on a single agent and it should be lightweight and should not have a performance impact on the endpoint. Provide required/relevant logs on the console and also should be able to forward to the SIEM solution. So accordingly, a use case can be created. The agent should be tamperproof and the admin should not be able to shut down or stop services without the security team concerned, or by using a password. We should be able to integrate and share IOC with other security devices.

2021-05-14T13:24:00Z
author avatar
Real User

The organization I work for is a bank and we use the solution to protect against malware and viruses.

2021-04-03T15:37:30Z
author avatar
Top 20Real User

Currently, our servers are not protected by a working anti-virus solution that receives updates. These servers & particularly the business are at extreme risk of not only suffering a breach and losing data, but also have a high risk of infecting the rest of the subsidiaries owned by Tyrion. The solution hinges on the following requirements: * The ability to be completely managed from a Cloud environment, including the ability to download new signatures whilst not on the corporate network; * The ability to generate reports based on set criteria (which can help justify the cost); * Ability to generate alerts or notifications to an administrator in the event an infection is detected so that Security Incident Response can be initiated; * Where possible, the tool should have the ability to complement existing tools sets, replace already existing toolsets, or bring something beneficial to the table to help strengthen the security posture;

2021-03-01T14:08:00Z
author avatar
Real User

We primarily use this product for the SandBlast module. It is used for sandboxing, malware detection, antivirus, and forensics blade.

2021-02-24T06:26:50Z
author avatar
Top 5Real User

We have used Check Point Sandblast Agent as an anti-malware solution. We were already working in a Check Point environment, which made the decision to purchase an endpoint security product from Check Point easy. We first tested it in a Lab environment, where we sampled various malware, some less complicated than others. We were impressed with the results.

2021-01-20T11:07:00Z
author avatar
Top 5LeaderboardReal User

We are using Check Point Endpoint security to protect our remote users, as well as our roaming users that are accessing our on-premises resources externally. We have come to know that our remote and roaming users are completely secure with Check Point Endpoint Security. With this confidence, we are now planning to roll out this solution for our on-premises resources, including machines and devices, as well. This will give us complete endpoint security.

2021-01-13T08:50:00Z
author avatar
Top 20Real User

With every new firewall that we're purchasing, we're deploying the SandBlast Agent. At the moment we're only running it on about 20 firewalls, just because the licensing isn't retroactive. What we need to do is produce a proof of concept to say, "This is the stuff we're getting." We're looking at it in a learning mode and then we can consider getting into a more aggressive mode of stopping everything. At the moment, we're trying to use it to give us information rather than to fully stop everything. It's deployed on our physical firewalls, on-prem.

2020-10-29T10:12:00Z
author avatar
Top 20Consultant

Our use case for SandBlast Agent is that our team is set up in multiple geographies, such as, India, Sri Lanka, UK, North America, and Australia (where we have a bit of business). We have courses for an educational client which need go to market, schools, instructors for hire, and students. Given that there was COVID-19 and a lockdown, there was an increase in the digital demand for learning courses. So, we wanted to secure our courses from cyber attacks. Thus, we wanted an end-to-end security system in place that would prevent/save us from cyber attacks and protect our sensitive data. Systems can be accessed on multiple devices, whether they be laptops, Macs, Windows, or mobile devices. Those devices could be connected to a home or public network on a platform, like a Chrome browser, Mozilla Firefox, or Safari. We have been able to track this through reports by seeing how vulnerable those agents are to attacks. Then, we determine how they can become more secure, so we can stay on the cloud and mobile devices. These are the areas where we are trying to use their reports and tighten our security, putting more systems in place to prevent attacks.

2020-09-09T06:29:00Z
author avatar
Top 5Real User

The platform is our anti-ransomware agent, where it helps us prevent any cyber-attack. We find it intuitive, as it unpacks files and decrypts any hidden malware, thus enabling us to work in a safe environment and keep our own data, as well as that of our customers, safe and secure. Our work environment is the banking industry and on a daily basis, we handle lots of customer data. This makes us a potential target for malware attacks but with the platform in place, we are able to shun all of that.

2020-09-03T12:00:00Z
author avatar
Top 5LeaderboardReal User

We were looking for a solution as complete as possible to replace the existing antivirus and, if possible, integrate it with other products that we have, such as the CheckPoint firewall. We decided to use the Check Point SandBlast agent to prevent ransomware on users' computers. We subsequently expanded the scope of the solution to detect malicious activity on our network. It is a very complete product but you have to know how to parameterize it well to avoid high CPU consumption. It is also missed that it does not have a client for Linux.

2020-08-10T12:51:00Z
author avatar
Top 20Real User

We use it to manage our entire network and protect network traffic in terms of files that go out and come in. This protects our network between any platform we access or interactions between our clients and us. Also, it helps to monitor and block malicious applications, then it prevents these sites from accessing our stuff. We use it for the endpoints and all the additional points which access the network in the organization. It protects everything across the board, from the server to the many other devices, like your phones and laptops.

2020-08-04T07:26:00Z
author avatar
Real User

In our environment, we didn't have an "official" security system. After implementing the Check Point SandBlast Agent system, we have benefited from getting a strong security system that gives us stability and security on our internal network.

2020-08-03T15:33:00Z
author avatar
Top 5LeaderboardReal User

Previously, one of our clients was using Symantec and we provided POV to them with Check Point SandBlast agent after that customer found that it's very easy and stable to use after E83 version released. There were many bugs or cosmetic issues that Check Point rectified and provided the stable version. It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks.

2020-08-02T18:15:00Z
author avatar
Top 20Real User

Our primary use case for this solution is Antivirus capabilities. These include Antimalware, Antibot, Anti-Ransomware, and Threat Emulation and Anti Exploit. We have a mixed environment that includes Windows 2012 R2 Windows 7 Windows 10 and macOS 10.xx. We also use VMware. The client has been installed on all servers, PC,s, laptops and MAC machines. We need all this infrastructure monitored for malicious activity and reporting if something happens in realtime. This solution has worked very well.

2020-07-27T16:52:00Z
author avatar
Real User

We mostly use Check Point Endpoint Security on-premise. But there are instances in which we use it in the cloud as well. It's mostly integrated into Microsoft Windows and that makes it really simple. They have an integration solution for the whole spectrum of endpoint features. For example, their Keystone solution. They also have a lot of other features. You can easily keep track of user access, how their device has been protected, and what software they have. We can see what processes are running and what network connections they have. We used it to control which devices can connect. It's a balance of freedom for the users and confidentiality.

2020-06-30T08:17:00Z
author avatar
Top 10Real User

We use this solution for endpoint protection in our office.

2019-12-23T07:05:00Z
author avatar
Real User

We use it primarily for mobile phones. That is it. We really aren't using it in depth at all. We're using it just with basic configuration.

2019-10-28T06:33:00Z
author avatar
Top 5Real User

The primary use case for this solution is security.

2019-10-03T07:51:00Z
author avatar
Real User

We primarily use the solution to prevent and detect the abnormalities and viruses on endpoints. It's also to monitor endpoints and the use of endpoints when it comes to identifying items like USB sticks, etc. because it's not really in our company policy to allow the use of a USB at work stations.

2019-09-05T05:37:00Z
author avatar
Consultant

We have implemented Check Point for endpoint protection.

2019-05-29T10:40:00Z
author avatar
Top 5Real User

We primarily use this solution as the main firewall for the perimeter of the hospital. We use the firewall itself for URL filtering, application filtering, and identity awareness.

2019-05-22T07:18:00Z
author avatar
Real User

We use it for government utility billing, with all of our systems located in different places, working remotely as well. We also have an on-prem data center here in India. We have Check Point to cover all these things.

2019-03-31T09:41:00Z
author avatar
Top 10Real User

We are an international systems integrator company for Check Point Endpoint Security software solutions.

2019-02-19T08:38:00Z
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: January 2022.
564,643 professionals have used our research since 2012.