TrustRadius: an HG Insights company

Check Point Harmony Endpoint

Score10 out of 10

25 Reviews and Ratings

What is Check Point Harmony Endpoint?

Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.

Media

a dashboard view
Harmony Endpoint's threat hunting
a report, in Harmony Endpoint
Harmony Endpoint's analytics
a platform overview

1 / 5

Top Performing Features

  • Anti-Exploit Technology

    In-memory and application layer attack blocking (e.g. ransomeware)

    Category average: 8.6

  • Endpoint Detection and Response (EDR)

    Continuous monitoring and response to advanced internet threats by endpoint agents.

    Category average: 9.1

  • Centralized Management

    Centralized management supporting multi-factor authentication, customized views, and role-based access control.

    Category average: 8.5

Areas for Improvement

  • Infection Remediation

    Capability to quarantine infected endpoint and terminate malicious processes.

    Category average: 8.8

  • Vulnerability Management

    Vulnerability prioritization for fixes.

    Category average: 8.3

  • Malware Detection

    Detection and blocking of zero-day file and fileless malware.

    Category average: 9

Check Point Endpoint Media Encryption and Port Protection (Pointsec) Meet Security Compliance

Use Cases and Deployment Scope

Check Point Endpoint Media Encryption and Port Protection is deployed and being used in my organization for a department. The best part is it is a cloud based solution and being centrally managed. The policy management for Check Point Endpoint Media Encryption and Port Protection more friendly. It strenthen the Endpoint Security and meet security compliances.

Pros

  • It is a centrally enforceable encryption of removable media devices such as flash drives, external drives and CDs/DVDs, for maximum data protection.
  • Port control enables management of all endpoint ports and centralized logging of port activity for auditing and compliance.
  • Mandatory Access Control for removal media devices can be provisioned.

Cons

  • Types of devices to control needs to be added like McAfee and GFI Endpoint Security.
  • Device whitelisting needs more granular level like by Vendor ID, Serial Number, Device ID etc.
  • Device Control and Media Protection on MacOS to be added.

Most Important Features

  • Removal Media Protection with Encryption
  • Mobile Phones
  • Bluetooth
  • Other Devices control

Return on Investment

  • It protects your data to being leaked from Endpoint.
  • It protects the Removal Storage Media unauthorize use on other endpoint
  • The policy management is user freindly and roll out on the endpoint is just a signle click away to protect your sensative data.

Alternatives Considered

McAfee Endpoint Security

Other Software Used

Check Point Harmony Endpoint Security (formerly Sandblast Agent), Check Point CloudGuard Posture Management (formerly Dome9)

Information Security Matters!

Pros

  • Requires authorized passwords and logins from end users.
  • Utilizes voiceprint recognition to validate users.
  • Allows for a one time login from end users working remotely away from their desks.

Cons

  • The prompts for one time logins are rather lengthy and it takes around five minutes to go through all of the authentication required. I believe this could be improved upon.

Return on Investment

  • It has enabled us to maintain privacy which has enhanced our highly rated brand standard. While basically it is a team member specific, behind the scenes program that protects systems from being used by unauthorized individuals, it contributes to the overall integrity of the organization which results in increased market share and return on investment for shareholders.

Full Disk, Hard Drive Encryption Software

Use Cases and Deployment Scope

You would think "no system is 100% secure" when a corporate laptop goes missing and that is a big problem. Pointsec's full disk encryption solution ensures your information isn't exposed.

Pros

  • The product works with Windows, Linux, and OS X.
  • The management of Pointsec has really become very simple and centralized for all IT to handle with ease.
  • Preboot encryption keys in the form of a password, by inserting a USB drive containing the key and/or using a one-time password generating device such as an RSA token.

Return on Investment

  • Decreasing vulnerability to attack is the key, it's the game to play and Pointsec plays it very well.
  • Key management systems and the various recovery options are very well thought out.
  • Full disk encryption vs. file or folder encryption system. With FDE data is encrypted automatically when it's stored on the hard disk making this the best solution.

Other Software Used

Windows Server, Symantec Backup Exec, XenApp

Sandblast Agent great for ransomware mitigation

Pros

  • Identifies ransomware
  • Low resource usage
  • Self remediation

Cons

  • Nothing

Return on Investment

  • Stops Ransomware attacks
  • Easy to manage
  • Easy to deploy

Alternatives Considered

Kaspersky Endpoint Security

Other Software Used

Sophos Intercept X, Sophos Intercept X for Server, Kaspersky Endpoint Security