Skip to main content
TrustRadius
Harmony Endpoint

Harmony Endpoint

Overview

What is Harmony Endpoint?

Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.

Read more
Recent Reviews
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Harmony Endpoint?

Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.

Entry-level set up fee?

  • Setup fee optional

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

163 people also want pricing

Alternatives Pricing

What is Microsoft Defender for Endpoint?

Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection…

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no…

Return to navigation

Product Demos

Harmony Endpoint with MITRE ATT&CK Inside Demo

YouTube
Return to navigation

Product Details

What is Harmony Endpoint?

Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.

Harmony Endpoint Videos

Check Point SandBlast Agent - Advanced Endpoint Protection & Forensics
SandBlast Agent Product Tour

Harmony Endpoint Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(25)

Reviews

(1-4 of 4)
Companies can't remove reviews or game the system. Here's why
Raj Kumar Jha | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Check Point Endpoint Media Encryption and Port Protection is deployed and being used in my organization for a department. The best part is it is a cloud based solution and being centrally managed. The policy management for Check Point Endpoint Media Encryption and Port Protection more friendly. It strenthen the Endpoint Security and meet security compliances.
  • It is a centrally enforceable encryption of removable media devices such as flash drives, external drives and CDs/DVDs, for maximum data protection.
  • Port control enables management of all endpoint ports and centralized logging of port activity for auditing and compliance.
  • Mandatory Access Control for removal media devices can be provisioned.
  • Types of devices to control needs to be added like McAfee and GFI Endpoint Security.
  • Device whitelisting needs more granular level like by Vendor ID, Serial Number, Device ID etc.
  • Device Control and Media Protection on MacOS to be added.
Check Point Endpoint Media Encryption and Port Protection (Pointsec) is well suited for Microsoft Windows environment. While, for MacOS it is less appropriate.
  • Removal Media Protection with Encryption
  • Mobile Phones
  • Bluetooth
  • Other Devices control
  • It protects your data to being leaked from Endpoint.
  • It protects the Removal Storage Media unauthorize use on other endpoint
  • The policy management is user freindly and roll out on the endpoint is just a signle click away to protect your sensative data.
Pointsec Policy management is more user friendly and it is excellent solution for Windows machines.
Check Point Harmony Endpoint Security (formerly Sandblast Agent), Check Point CloudGuard Posture Management (formerly Dome9)
Score 10 out of 10
Vetted Review
ResellerIncentivized
I currently use Check Point Sandblast Agent within the organisation for Anti-Ransomware. I have found that the product identified and re-mediated a ransomware attack that we experienced.

The product un-encrypted the files that the ransomware encrypted on its own. Cleaned all infections and I was able to work in 10 min. Sandblast Agent also has no impact on computer resources.
  • Identifies ransomware
  • Low resource usage
  • Self remediation
  • Nothing
Sandblast Agent can be used in any user environment. It is also great for server solutions.
Endpoint Security (7)
100%
10.0
Anti-Exploit Technology
100%
10.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
100%
10.0
Hybrid Deployment Support
100%
10.0
Infection Remediation
100%
10.0
Vulnerability Management
100%
10.0
Malware Detection
100%
10.0
  • Stops Ransomware attacks
  • Easy to manage
  • Easy to deploy
I found that Check Point identified more Ransomware attacks than Kaspersky.
David Hundley | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Check Point Endpoint Security is used across our whole company to prevent risk of compromised customer information by ensuring that only authorized users are able to access our secure networks and computer systems.
  • Requires authorized passwords and logins from end users.
  • Utilizes voiceprint recognition to validate users.
  • Allows for a one time login from end users working remotely away from their desks.
  • The prompts for one time logins are rather lengthy and it takes around five minutes to go through all of the authentication required. I believe this could be improved upon.
Check Point Endpoint Security is well suited for businesses where confidentiality must be maintained in order to mitigate risk and compromise of customer information.
  • It has enabled us to maintain privacy which has enhanced our highly rated brand standard. While basically it is a team member specific, behind the scenes program that protects systems from being used by unauthorized individuals, it contributes to the overall integrity of the organization which results in increased market share and return on investment for shareholders.
It is one of the most highly rated systems in use and has superior security features that make it desirable for usage.
Bonn Chavez | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
You would think "no system is 100% secure" when a corporate laptop goes missing and that is a big problem. Pointsec's full disk encryption solution ensures your information isn't exposed.
  • The product works with Windows, Linux, and OS X.
  • The management of Pointsec has really become very simple and centralized for all IT to handle with ease.
  • Preboot encryption keys in the form of a password, by inserting a USB drive containing the key and/or using a one-time password generating device such as an RSA token.
Encryption software applies to all industries, the way you have to see the big picture is asking yourself, "How important is our data?".
  • Decreasing vulnerability to attack is the key, it's the game to play and Pointsec plays it very well.
  • Key management systems and the various recovery options are very well thought out.
  • Full disk encryption vs. file or folder encryption system. With FDE data is encrypted automatically when it's stored on the hard disk making this the best solution.
Symantec Encryption, a few management points led me to evaluate and not go with it.
Return to navigation