The scope is for email security requirements only.
Check Point Harmony SaaS
Check Point Software TechnologiesReviews from AWS customer
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Highly efficient Security solution
You can implement the solutions easily with an RMM solution.
It has a considerable number of features such as quarantining and on demand scanning.
Once you set it up, you don't need to always go in and change settings daily.
Easy to integrate with other products/siem solutions.
The platform is helpful but the dashboards lack details.
Defence Against Cyber Threats
Quite easy to configure and deploy.
The support response could be faster though is acceptsble..
It provides ATP and block 0-day attacks in real time.
Best Secuirty solution for your End Points
Advanced email threat protection with AI-driven features and geographical security
What is our primary use case?
How has it helped my organization?
Some of the investments in IT particularly related to security may not provide direct ROI, but we can arrange the ROI indirectly by considering information security risk incidents and compliance requirements. For example, by putting security measures in place, it helps prevent monetary losses from phishing attacks.
What is most valuable?
They have a sandboxing feature and are developing advanced threat protection technologies. Check Point Harmony also provides in-line API-based security, which is fast and reliable. Its API services should be available within our geography, India. This ensures that I can restrict emails from outside India, helping prevent geography-based phishing attacks. Additionally, Check Point is building AI capabilities for behavioral threat detection.
What needs improvement?
Check Point does not have identity management features, which could be considered for future implementation. The ability to identify the origin country of emails would be useful, allowing me to restrict emails generated outside of India to prevent phishing attacks.
How are customer service and support?
We have to explore it since the deployment is in progress. Based on users' complaints, if they have a good connection with Check Point's technical team and implementation partner, they will be able to resolve issues. I have a direct connect with Check Point and the partner implementing it.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have compared Check Point with Palo Alto, Proofpoint, Cisco, Tumor was evaluated, Kaspersky email security, and FortiMail. Microsoft Defender was not used because it only supports the Microsoft platform and not Google Meet.
What about the implementation team?
I am working directly with Check Point and an implementation partner.
What was our ROI?
There is no direct calculation for ROI, but we can evaluate it based on the prevention of security incidents and compliance. By implementing security measures, we can prevent monetary losses from incidents such as phishing attacks.
What's my experience with pricing, setup cost, and licensing?
I may not be able to share specific cost information, but Check Point is more competitive in pricing compared to some competitors.
Which other solutions did I evaluate?
I have compared Check Point with Palo Alto, Proofpoint, Cisco, Tumor, and Kaspersky email security.
Great product
Provides secure web gateway with reasonable pricing and quick support
What is our primary use case?
We use the solution for content solutions for secure web gateway and SMP's model.
What needs improvement?
The solution could improve monitoring activity. When users have access to the Internet, they can reduce exposure or maybe change their login password.
What do I think about the scalability of the solution?
It is suitable for enterprise businesses and high-tech industries. We have employed 200 employees for this solution.
How are customer service and support?
Support is satisfactory. You can open tickets for support, and they will respond within a day.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used Fortinet and Trend Micro. We opted for Check Point because of the technical, price, and vendor.
How was the initial setup?
The initial is difficult because you have to analyze a lot. It takes two months to deploy.
What was our ROI?
It saves money for our customers.
What's my experience with pricing, setup cost, and licensing?
The product costs 100-120 dollars, which is reasonable.
What other advice do I have?
Overall, I rate the solution an eight out of ten.
My harmony
Harmony Endpoint The Best of All
The full disk encryption is works excellent and makes sure the data is highly encrypted.
The push operation makes easy to change the user password for the end users on daily basis and helps in troubleshooting the endpoint.
Integration of the product was easy and took less time.
The appropriate endpoint security solution you are looking for!
Check Point AV the solution you can trust!
Limited Operating System Support
More utilization of EP resources: Performance Impact: consume system resources such as CPU, memory, and disk space.
Zero-Day Threat Protection: The solution aims to protect against zero-day threats, which are previously unknown vulnerabilities or malware that do not have known signatures. It uses advanced heuristics and machine learning algorithms to detect and block zero-day threats based on their behavior, even without specific signatures.