Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Check Point Harmony SaaS

Check Point Software Technologies

Reviews from AWS customer

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

233 reviews
from and

External reviews are not included in the AWS star rating for the product.


    John D.

Robust protection suite against cyber attacks

  • October 10, 2024
  • Review provided by G2

What do you like best about the product?
The platform offers comprehensive protection cover against all forms of external threats that can affect development lifecycle. It provides secure access with powerful VPN to our remote developers to enhance secure collaboration and connection. Check Point Endpoint Security Suite has enhnaced compliance with security policies that safeguards data.
What do you dislike about the product?
The performance has been stable since we deployed this platform in the enterprise.
What problems is the product solving and how is that benefiting you?
The software has maintained top notch security services that responds quickly to curb cyber threats. It easily integrates with CI/CD pipelines that enforces security checks for deployed codes.


    Milton P.

Comprehensive malware threat prevention platform

  • August 13, 2024
  • Review provided by G2

What do you like best about the product?
This is the most advanced tool that has highly prevented cyber attacks in my department. It offers timely alerts when there impending ransoware attacks targeting our development projects. There were high rate of cases that could lead to higher risks and expose confidential customer data to external threats. Check Point Endpoint Security Suite has promoted secure data handling ethics.
What do you dislike about the product?
I encountered few learning curve challenges after deployment which lasted shortly afer full enrollment for video and physical training sessions.
What problems is the product solving and how is that benefiting you?
It provides effective data protection services for both personal and customer data. The antivirus and firewall protections have prevented me from most risks when I am browsing.


    Maheshwar B.

Strengthening your network: An Examination of Checkpoint endpoint Security

  • July 25, 2024
  • Review provided by G2

What do you like best about the product?
Check Point Endpoint security all en-compassing approach to security is one of best quality it combines behavioral threat detection antivirus, anti-ransomware, and advanced threat protection into one package. It is easy to use.
What do you dislike about the product?
there is no downside for checkpoint endpoint security
What problems is the product solving and how is that benefiting you?
Ensuring compliance, boosting operational effectiveness strenghtening cybercsecurity posture, and meeting the changing demands of work setting are all ways Check Point endpoint Security help businesses.


    Nayana K.

Safeguarding Endpoints

  • July 23, 2024
  • Review provided by G2

What do you like best about the product?
Check Point Endpoint Security provides soutions to protecst endpoint devices from cyber threats. It protects sensational data from unverified access or sharing.
What do you dislike about the product?
While working with Check point Endpoint Security, No dislike occured about the product.
What problems is the product solving and how is that benefiting you?
As working with product,faced many challenges, protection againsd advanced cyber threats. It improves the efficiency. Due to it protects from wide range of threats, Organization focuses on various business activities.


    Evans V.

Checkpoint Harmony: A Unified Approach to Endpoint Security

  • July 19, 2024
  • Review provided by G2

What do you like best about the product?
A single platform with an emphasis on sophisticated threats and many deployment options. Also the GUI is so clean that its easy to use and ease of implementation with pre defined policies
What do you dislike about the product?
Checkpoint Harmony Endpoint have Documentation gaps, expense, and limited reporting
What problems is the product solving and how is that benefiting you?
Harmony Endpoint guards against cyberattacks, data loss, complex security, difficulties with remote work, better security postures, a nice user interface, etc.


    Chrisfhelle John B.

Ease of use

  • July 15, 2024
  • Review provided by G2

What do you like best about the product?
Very easy to use. user friendly software, makes task easier to do.
What do you dislike about the product?
App crashes sometimes, you need to reload and it takes long.
What problems is the product solving and how is that benefiting you?
Providing a complete security software.


    Financial Services

Allows to effectively secure devices against a wide range of cyber threats

  • July 08, 2024
  • Review provided by G2

What do you like best about the product?
What I appreciate is the ability to offer complete protection using an integrated approach, combining several essential features such as threat detection, prevention, response, and analysis.
What do you dislike about the product?
the cost: this can represent a significant financial investment, depending on the size of the company and the number of devices to protect.
What problems is the product solving and how is that benefiting you?
Harmony endpoint provides comprehensive protection using an integrated approach, combining several essential features such as threat detection, prevention, response, and analysis. This allows for effective security of devices against a wide range of cyber threats, while providing in-depth visibility into suspicious activities.


    CLAUDIO SANTOS

Good protection, helpful support, and easy to implement

  • July 03, 2024
  • Review provided by PeerSpot

What is our primary use case?

We resell the product to various customers. We give them the latest version. We use the solution for protection purposes. It can help protect, for example, OneDrive, 365, Google Workspaces, and Exchange.

How has it helped my organization?

The solution offers very good protection. For example, if a user receives a URL, Check Point would be able to see the link and check it to see if it is malicious or not. The same is true if you receive an Excel file with Macros. If a Macro is malicious, it will protect the user from opening it up.

What is most valuable?

It offers transparent cloud protection. Users are protected from phishing, for example. It offers different types of endpoint protections. It prevents and decreases the likelihood of issues related to receiving dangerous or corrupt files or links.

It's not complex to implement. It's a SaaS product, so you don't need to install anything, and you can start to use it immediately.

This is a very efficient solution.

We had one experience with a Check Point customer with whom we started a POC. This solution worked in their environment for about 50 days. It was very good. There were a lot of alerts, a lot of protection, and a lot of problems were solved within that time.

What needs improvement?

The solution needs to be configured correctly. If it is not, it will begin to generate false positives.

For how long have I used the solution?

Our company started reselling Check Point in 2006.

How are customer service and support?

Support is okay. We can create tickets or call. However, the level of support is relative to the level of support the customer buys. You can purchase advanced support. In general, it's very good.

How would you rate customer service and support?

Positive

How was the initial setup?

It's a cloud solution that is very easy to set up. You get the solution, set up the credentials, and connect to the clouds. The solution immediately starts to work. You do need to configure the rules and the protection models. You need to change it from detection to protection mode. It's important even though this action is not very complex. That said, you do need to understand the configurations needed for the customer's environment. If you don't put in the correct configurations, you can start creating false positives.

As a SaaS solution, there is no maintenance needed from the user's end.

What's my experience with pricing, setup cost, and licensing?

For the benefits the customer receives, the pricing is very good. You can pay extra for more support.

What other advice do I have?

I'm a reseller.

I'd rate the solution at a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud


    Transportation/Trucking/Railroad

Highly efficient Security solution

  • June 10, 2024
  • Review provided by G2

What do you like best about the product?
The platform is easy to use and user friendly.
You can implement the solutions easily with an RMM solution.
It has a considerable number of features such as quarantining and on demand scanning.
Once you set it up, you don't need to always go in and change settings daily.
Easy to integrate with other products/siem solutions.
What do you dislike about the product?
Sometimes the product will not detect every malware and some advanced attacks are not stopped.
The platform is helpful but the dashboards lack details.
What problems is the product solving and how is that benefiting you?
Security of the endpoints and infrastructure. It eases the work of security analysts by blocking malware and malicious activity.


    Information Technology and Services

Defence Against Cyber Threats

  • June 03, 2024
  • Review provided by G2

What do you like best about the product?
Single agent for comprehensive security. It has features like firewalling, removable device control, VPN, app control, DLP, file sandboxing, ransomware protection. which can be turned on or off per endpoint, groups, employees.
Quite easy to configure and deploy.
What do you dislike about the product?
The threat emulation could be resource intensive until the upgrade.
The support response could be faster though is acceptsble..
What problems is the product solving and how is that benefiting you?
To enhance security posture and improve operational efficiencies.
It provides ATP and block 0-day attacks in real time.