Check Point CloudGuard Harmony Connect (CloudGuard Connect) Features
What are the features of Check Point CloudGuard Harmony Connect (CloudGuard Connect)?
Management
- Multicloud Management
- DLP Configuration
- Dynamic Scaling
- Policy Enforcement
Monitoring
- Data Center Networking
- Multicloud Visibility
- Anomaly Detection
Protection
- Firewall-as-a-Service
- Cloud Application Brokerage
- Web Gateway
- Adaptive Access Control
Top Rated Check Point CloudGuard Harmony Connect (CloudGuard Connect) Alternatives
(18)
4.8 out of 5
Visit Website
Sponsored
Check Point CloudGuard Harmony Connect (CloudGuard Connect) Categories on G2
Filter for Features
Security - Unified Threat Management
Antivirus | Tools to protect a system from viruses by scanning and quarantining any threats. | Not enough data | |
Whitelists | The ability to green light a specific URL or system to bypass the scanning process. | Not enough data | |
Antispam Filtering | Tools to prevent spam emails and other spam from entering the network. | Not enough data | |
Content Filtering | Tools to filter specific content based on the MME type or file extension. | Not enough data | |
Web Filtering | Tools to block certain websites from being viewed by those in a network. | Not enough data | |
Firewall | Tools to block off a network or system from outside networks or systems to protect the data within. | Not enough data |
Administration
Reports & Analytics | The ability to digest a large amount of data into visual representations and analytics. | Not enough data | |
Dashboard | The ability to view a large amount of data in one place using customizable widgets. | Not enough data | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Administration Console - | Provides a centralized console for administation tasks and unified control. | Not enough data | |
API / integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data |
Prevention
Intrusion Prevention | Enforces security paramaters to prevent unauthorized access. | Not enough data | |
Firewall | Protects servers, data center infrastructure and information from a variety of attacks and malware threats. | Not enough data | |
Encryption | Provide some level of encryption of information, protecting sensitive data while it exists within the data center. | Not enough data | |
Security hardening | Facilitates system and network security by identifying and remediating vulnerabilities | Not enough data | |
Cloud Data Protection | Provides high quality and wide scope of in-cloud and offline data security capabilities. | Not enough data |
Detection
Intrusion Detection | Detects unauthorized access and use of privileged systems. | Not enough data | |
Security Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Anti-Malware / Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data |
Network Management
Network Segmentation | Allows administrative control over network components, mapping, and segmentation. | Not enough data | |
Network Mapping | Allows visual display of networks segmented components and their connected resources. | Not enough data | |
Security Analytics | Utilizes behavioral analysis to improve security procedures and documentation. | Not enough data | |
API/Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data |
Security
Security Automation | Allows administrative control over automated security tasks. | Not enough data | |
Application Security | Protects application access and data. Prompts additional authentication for suspicious users. | Not enough data | |
Workload Protection | Protects computing resources across a network. Prompts additional authentication for suspicious users. | Not enough data | |
Data Protection | Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users. | Not enough data |
Identity Management
Adaptive Access Control | Provides a risk-based approcach to determining trust within the network. | Not enough data | |
Identity Scoring | Calculates risk based on user behavior, permissions, and requests. | Not enough data | |
User Monitoring | Monitors users attempting unauthorized access to databases, applicaitons, and othe network components. | Not enough data |
Management
Multicloud Management | Based on 13 Check Point CloudGuard Harmony Connect (CloudGuard Connect) reviews. Allows users to track and control cloud spend across cloud services and providers. | 83% (Based on 13 reviews) | |
DLP Configuration | Based on 13 Check Point CloudGuard Harmony Connect (CloudGuard Connect) reviews. Offers data loss prevention tools to protect data from leaving the environments it is allowed to. | 82% (Based on 13 reviews) | |
Dynamic Scaling | Scale resources automatically, adjusting for usage demands. 12 reviewers of Check Point CloudGuard Harmony Connect (CloudGuard Connect) have provided feedback on this feature. | 74% (Based on 12 reviews) | |
Policy Enforcement | Based on 13 Check Point CloudGuard Harmony Connect (CloudGuard Connect) reviews. Enables administrators to create access policies and applies policy controls throughout request and provisioning processes | 82% (Based on 13 reviews) |
Monitoring
Data Center Networking | Based on 13 Check Point CloudGuard Harmony Connect (CloudGuard Connect) reviews. Provides advanced data center network services to deliver multiple high-speed IP. | 77% (Based on 13 reviews) | |
Multicloud Visibility | Based on 12 Check Point CloudGuard Harmony Connect (CloudGuard Connect) reviews. Allows users to track and control activity across cloud services and providers. | 78% (Based on 12 reviews) | |
Anomaly Detection | Constantly monitors system to detect anomalies in real time. 13 reviewers of Check Point CloudGuard Harmony Connect (CloudGuard Connect) have provided feedback on this feature. | 78% (Based on 13 reviews) |
Protection
Firewall-as-a-Service | Managed, cloud-delivered firewall that protects devices, assets, networks, and other cloud services from web-based threats. 13 reviewers of Check Point CloudGuard Harmony Connect (CloudGuard Connect) have provided feedback on this feature. | 81% (Based on 13 reviews) | |
Cloud Application Brokerage | Provides a single access point for users to access multiple cloud applications, services, and products through a central gateway This feature was mentioned in 12 Check Point CloudGuard Harmony Connect (CloudGuard Connect) reviews. | 78% (Based on 12 reviews) | |
Web Gateway | Provides a private web gateway for secure internet browsing. This feature was mentioned in 12 Check Point CloudGuard Harmony Connect (CloudGuard Connect) reviews. | 83% (Based on 12 reviews) | |
Adaptive Access Control | Based on 13 Check Point CloudGuard Harmony Connect (CloudGuard Connect) reviews. Provides a risk-based approach to determining trust within the network. | 78% (Based on 13 reviews) |
Web Content and Traffic Filtering - Secure Web Gateways
SSL/TLS Inspection | Decrypts and inspects encrypted web traffic to detect and block threats hidden within encrypted connections. | Not enough data | |
Content Filtering | Analyzes web content to filter out malicious code, malware, and inappropriate material. | Not enough data | |
URL Filtering | Blocks access to known malicious or unauthorized websites based on predefined policies. | Not enough data | |
Real-Time Traffic Inspection | Inspects and analyzes inbound and outbound web traffic in real-time for threats and compliance. | Not enough data | |
Ad and Tracker Blocking | Blocks ads and trackers to enhance user privacy and reduce exposure to potential threats. | Not enough data |
Data Protection and Loss Prevention - Secure Web Gateways
Data Loss Prevention (DLP) | Monitors outgoing web traffic to prevent sensitive data from being leaked or exfiltrated. | Not enough data | |
Phishing Protection | Detects and blocks phishing attempts to protect users from fraudulent websites and email links. | Not enough data | |
Malware Protection | Uses signature-based scanning, heuristic analysis, and sandboxing to detect and block malware threats. | Not enough data | |
Cloud Access Security | Monitors and controls access to cloud applications and services to prevent unauthorized use and data leakage. | Not enough data |
Access Control and Authentication - Secure Web Gateways
Application Control | Regulates access to web-based applications and services as per organizational policies. | Not enough data | |
Authentication and Access Control | Verifies users' identities and enforces access control policies to ensure only authorized users can access permitted web resources. | Not enough data | |
User and Group Policies | Supports the creation of policies based on user roles, groups, or other attributes for more granular control. | Not enough data |
Performance and Management - Secure Web Gateways
Customizable Policy Enforcement | Allows organizations to create and enforce custom web usage policies tailored to their specific needs. | Not enough data | |
Bandwidth Management | Prioritizes and allocates network resources based on predefined policies to optimize performance. | Not enough data | |
Integration Capabilities | Integrates with other security tools and systems, such as firewalls, SIEMs, and endpoint security solutions. | Not enough data | |
Reporting and Logging | Provides comprehensive reports and logs of web activity, including sites visited, user activity, security events, and policy violations. | Not enough data | |
Threat Intelligence Integration | Leverages threat intelligence feeds to stay updated on the latest threats and enhance protection. | Not enough data |