The scope is for email security requirements only.
Check Point Harmony SaaS
Check Point Software TechnologiesReviews from AWS customer
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Best Secuirty solution for your End Points
Advanced email threat protection with AI-driven features and geographical security
What is our primary use case?
How has it helped my organization?
Some of the investments in IT particularly related to security may not provide direct ROI, but we can arrange the ROI indirectly by considering information security risk incidents and compliance requirements. For example, by putting security measures in place, it helps prevent monetary losses from phishing attacks.
What is most valuable?
They have a sandboxing feature and are developing advanced threat protection technologies. Check Point Harmony also provides in-line API-based security, which is fast and reliable. Its API services should be available within our geography, India. This ensures that I can restrict emails from outside India, helping prevent geography-based phishing attacks. Additionally, Check Point is building AI capabilities for behavioral threat detection.
What needs improvement?
Check Point does not have identity management features, which could be considered for future implementation. The ability to identify the origin country of emails would be useful, allowing me to restrict emails generated outside of India to prevent phishing attacks.
How are customer service and support?
We have to explore it since the deployment is in progress. Based on users' complaints, if they have a good connection with Check Point's technical team and implementation partner, they will be able to resolve issues. I have a direct connect with Check Point and the partner implementing it.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have compared Check Point with Palo Alto, Proofpoint, Cisco, Tumor was evaluated, Kaspersky email security, and FortiMail. Microsoft Defender was not used because it only supports the Microsoft platform and not Google Meet.
What about the implementation team?
I am working directly with Check Point and an implementation partner.
What was our ROI?
There is no direct calculation for ROI, but we can evaluate it based on the prevention of security incidents and compliance. By implementing security measures, we can prevent monetary losses from incidents such as phishing attacks.
What's my experience with pricing, setup cost, and licensing?
I may not be able to share specific cost information, but Check Point is more competitive in pricing compared to some competitors.
Which other solutions did I evaluate?
I have compared Check Point with Palo Alto, Proofpoint, Cisco, Tumor, and Kaspersky email security.
Great product
Provides secure web gateway with reasonable pricing and quick support
What is our primary use case?
We use the solution for content solutions for secure web gateway and SMP's model.
What needs improvement?
The solution could improve monitoring activity. When users have access to the Internet, they can reduce exposure or maybe change their login password.
What do I think about the scalability of the solution?
It is suitable for enterprise businesses and high-tech industries. We have employed 200 employees for this solution.
How are customer service and support?
Support is satisfactory. You can open tickets for support, and they will respond within a day.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used Fortinet and Trend Micro. We opted for Check Point because of the technical, price, and vendor.
How was the initial setup?
The initial is difficult because you have to analyze a lot. It takes two months to deploy.
What was our ROI?
It saves money for our customers.
What's my experience with pricing, setup cost, and licensing?
The product costs 100-120 dollars, which is reasonable.
What other advice do I have?
Overall, I rate the solution an eight out of ten.
My harmony
Harmony Endpoint The Best of All
The full disk encryption is works excellent and makes sure the data is highly encrypted.
The push operation makes easy to change the user password for the end users on daily basis and helps in troubleshooting the endpoint.
Integration of the product was easy and took less time.
The appropriate endpoint security solution you are looking for!
Endpoint Security is the leading EDR for enabling protection from advanced threat attack !
Secure all your files with Harmony Endpoint.
reliable management and security
updates quickly and easily on devices.
detailed reports and inventory tracking.
easy to use to manage and protect endpoints.
Block malicious websites and prevent data leakage.
You must have previous experience to be able to administer the tool
Tech support is not very efficient
it's a bit expensive
The documentation is not ordered