Authentic8 Silo vs. Check Point Harmony Browse

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Authentic8 Silo
Score 8.8 out of 10
N/A
Authentic8 in Mountain View offers the Silo web browser, dedicated to providing Internet security to individuals' and companies' mobile devices and other (cross-platform) endpoints, featuring integrated encrypted cloud storage, a disposable browser for one-time use to protect search history, rule-based and limited data exchange and web application authenticated access, spoofed identity, and other security-oriented features available in the browser.N/A
Check Point Harmony Browse
Score 9.8 out of 10
N/A
Check Point's Harmony Browse is ta web security solution that protects users and their browsers against web-based attacks, in a way designed to not compromise workers’ productivity. Harmony Browse aims to enable users to safely browse the internet no matter where they are. It protects organizations and their employees from web-based threats by inspecting all SSL web traffic directly on the endpoint, using a nano agent deployed within any browser. Harmony Browse prevents users from visiting zero…N/A
Pricing
Authentic8 SiloCheck Point Harmony Browse
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Authentic8 SiloCheck Point Harmony Browse
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Authentic8 SiloCheck Point Harmony Browse
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
Authentic8 SiloCheck Point Harmony Browse
Small Businesses
1Password
1Password
Score 9.1 out of 10
1Password
1Password
Score 9.1 out of 10
Medium-sized Companies
1Password
1Password
Score 9.1 out of 10
1Password
1Password
Score 9.1 out of 10
Enterprises
Kaspersky Endpoint Security
Kaspersky Endpoint Security
Score 9.0 out of 10
Kaspersky Endpoint Security
Kaspersky Endpoint Security
Score 9.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Authentic8 SiloCheck Point Harmony Browse
Likelihood to Recommend
10.0
(1 ratings)
9.0
(1 ratings)
User Testimonials
Authentic8 SiloCheck Point Harmony Browse
Likelihood to Recommend
Authentic8
One of the things that I like the most about using Authentic8 Silo is its security system, it is quite reliable and allows you to browse the internet without worrying that some type of information may be leaked. Currently, there are countless cyber dangers that endanger the integrity of your company, with the help of Authentic8 Silo it is much easier to determine which people may or may not have access to certain information.
Read full review
Check Point Software Technologies
Check Point Harmony Browse is particularly well suited for protecting against the various zero-day attack vectors, which is what it is designed to do. It offers very good protection against users visiting phishing sites, malware sites, downloading or opening ransomware, and just generally providing the safety net required in a corporate environment against users visiting potentially harmful websites.
Read full review
Pros
Authentic8
  • It seems incredible to me that you have web code stored on servers within a cloud.
  • Silo is truly a cloud service, leveraging the expected capacity and performance of the cloud along with resiliency.
Read full review
Check Point Software Technologies
  • Protection from phishing.
  • protection from malware.
  • protection from ransomware.
  • General protection against zero-day attack vectors.
Read full review
Cons
Authentic8
  • For us who have adopted this product very easily, we have not found any fault with it because we can perform all our activities more efficiently and quickly with efficient use.
Read full review
Check Point Software Technologies
  • When inspecting traffic there can be a some performance degradation.
  • We have had a few instances of protections interfering with legitimate traffic. Worth the trade-off though.
Read full review
Alternatives Considered
Authentic8
No answers on this topic
Check Point Software Technologies
We were already in the Check Point ecosystem and therefore did not look into alternatives like CrowdStrike or Kaspersky. Looking back, Check Point stacks up very nicely with the competitors on the market in terms of features, but I can't speak to actual real work performance having not used the others.
Read full review
Return on Investment
Authentic8
  • From my point of view, with this tool we have not found flaws in the product, so we can be very comfortable since the evaluation of vulnerabilities and the verification of block lists offer complete security beyond encryption.
Read full review
Check Point Software Technologies
  • Improved security posture overall with reduced risk.
  • Relatively low cost and easy implementation easily recouped by allowing us to shift resources to other priorities and away from manual monitoring tasks.
  • Peace of mind for our users knowing they have a safety net in place.
Read full review
ScreenShots