Top Rated Check Point Harmony Endpoint Alternatives
Ce que j'apprécie c'est la capacité à offrir une protection complète en utilisant une approche intégrée, combinant plusieurs fonctionnalités essentielles telles que la détection des menaces, la prévention, la réponse et l'analyse. Review collected by and hosted on G2.com.
le coût : cela peut représenter un investissement financier significatif, en fonction de la taille de l'entreprise et du nombre d'appareils à protéger. Review collected by and hosted on G2.com.
Video Reviews
152 out of 153 Total Reviews for Check Point Harmony Endpoint
Overall Review Sentiment for Check Point Harmony Endpoint
Log in to view review sentiment.

Ease to use, check and maintain all the devices under one portal or dashboard, easy to deply Review collected by and hosted on G2.com.
One feature that could use improvement is the reporting capabilities. While the essential reports are available, having more customization options for data analysis would be beneficial. Review collected by and hosted on G2.com.
What I like most about the solution is that it supports almost all Operating Systems (OS) with a single agent and provides excellent endpoint security from emerging threats. Review collected by and hosted on G2.com.
As of now, there is no point in disliking the solution. Review collected by and hosted on G2.com.

The endpoint security suite provides powerful anti-phishing system that detects known and unknown threats over the internet. We have been able to identify harmful threats with suspicious activities in the network. The platform offers real-time forensic reports that enables the organization to launch investigations of compromised assets. Review collected by and hosted on G2.com.
I have not had bad experience from the performance of this software since we deployed it. Review collected by and hosted on G2.com.

It offers strong protection againts various threats, helping keep devices secure and user safe making it simple for it teams to navigate and manage security settings. Review collected by and hosted on G2.com.
As of now i do not dislike the product or service. Review collected by and hosted on G2.com.

Check Point Endpoint Security Suite has enhanced secure collaboration of teams in the enterpries and remote areas. The platform tracks data from initial processing to the end user providing best security measures that cannot be easily compromised. Data analysis has been safe and there is zero cases of malicious attacks. Review collected by and hosted on G2.com.
The security suite has achieved most crucial objectives of securing endpoint devices. Review collected by and hosted on G2.com.
Very easy to use. user friendly software, makes task easier to do. Review collected by and hosted on G2.com.
App crashes sometimes, you need to reload and it takes long. Review collected by and hosted on G2.com.

The platform offers comprehensive protection cover against all forms of external threats that can affect development lifecycle. It provides secure access with powerful VPN to our remote developers to enhance secure collaboration and connection. Check Point Endpoint Security Suite has enhnaced compliance with security policies that safeguards data. Review collected by and hosted on G2.com.
The performance has been stable since we deployed this platform in the enterprise. Review collected by and hosted on G2.com.

This is the most advanced tool that has highly prevented cyber attacks in my department. It offers timely alerts when there impending ransoware attacks targeting our development projects. There were high rate of cases that could lead to higher risks and expose confidential customer data to external threats. Check Point Endpoint Security Suite has promoted secure data handling ethics. Review collected by and hosted on G2.com.
I encountered few learning curve challenges after deployment which lasted shortly afer full enrollment for video and physical training sessions. Review collected by and hosted on G2.com.

A single platform with an emphasis on sophisticated threats and many deployment options. Also the GUI is so clean that its easy to use and ease of implementation with pre defined policies Review collected by and hosted on G2.com.
Checkpoint Harmony Endpoint have Documentation gaps, expense, and limited reporting Review collected by and hosted on G2.com.
The most agent endpoint helpful to protection threat and capability is so good
for more device control and security for us.
I can manage our network and protect my network traffic by the console. Review collected by and hosted on G2.com.
The endpoint agent cannot integrate with the other product or 3rd party.
When the device is offline, hard to deploy all clients. Review collected by and hosted on G2.com.