Check Point Harmony Endpoint Reviews

18 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 9.0 out of 100

Do you work for this company? Learn how we help vendors

Overall Rating

Reviewer's Company Size

Last Updated

By Topic

Industry

Department

Experience

Job Type

Role

Reviews (1-3 of 3)

Companies can't remove reviews or game the system. Here's why.
June 29, 2021
PRAPHULLA DESHPANDE | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
As we [are a] service provider[,] we provide solutions to [customers] based on their requirements. [Our customer] was looking for [a] centralized endpoint management for end users along with roaming users itself. As Checkpoint is [a] industry [leader] and taking security to [the] next level we thought to provide [Check Point Harmony Endpoint Security (formerly Sandblast Agent)] [as the] solution for endpoint security. Checkpoint plays different role when come to EDR as it provide not only centralized management but Threat Emulation Threat Extraction and Ransomware protection which are key component / modules of it which ultimately provides better security for roaming users also.
  • Compliance Check
  • Ransomware and Forensic
  • Threat Emulation and Extraction
  • Centralized management
  • Disk encryptions
  • Intelligence from Threat Cloud
  • URL filtering Antibot application control
  • Stability improvement require for communication with Endpoints
  • Cloud management console takes time to push rules on endpoint
  • Can integrate with API to authenticate users
[Check Point Harmony Endpoint Security (formerly Sandblast Agent) is well suited for] customers having less IT resources and need to handle multiple locations where physical IT persons present is not possible[.] Also roaming users are accessing organization resources from BYOD devices[.] Check Point [Harmony Endpoint Security (formerly Sandblast Agent)] suits perfect as they use compliance ,encryption and all together firewall feature sets.
Also sometime for roaming users its become not possible to download threat database for them its perfectly suit as we can provide them signature update with external file which they can simply put in their computer as database.
Read PRAPHULLA DESHPANDE's full review
September 02, 2016
David Hundley | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source
Check Point Endpoint Security is used across our whole company to prevent risk of compromised customer information by ensuring that only authorized users are able to access our secure networks and computer systems.
  • Requires authorized passwords and logins from end users.
  • Utilizes voiceprint recognition to validate users.
  • Allows for a one time login from end users working remotely away from their desks.
  • The prompts for one time logins are rather lengthy and it takes around five minutes to go through all of the authentication required. I believe this could be improved upon.
Check Point Endpoint Security is well suited for businesses where confidentiality must be maintained in order to mitigate risk and compromise of customer information.
Read David Hundley's full review
June 24, 2019
Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Review Source
I currently use Check Point Sandblast Agent within the organisation for Anti-Ransomware. I have found that the product identified and re-mediated a ransomware attack that we experienced.

The product un-encrypted the files that the ransomware encrypted on its own. Cleaned all infections and I was able to work in 10 min. Sandblast Agent also has no impact on computer resources.
  • Identifies ransomware
  • Low resource usage
  • Self remediation
  • Nothing
Sandblast Agent can be used in any user environment. It is also great for server solutions.
Read this authenticated review

Check Point Harmony Endpoint Scorecard Summary

Feature Scorecard Summary

Anti-Exploit Technology (2)
10.0
Endpoint Detection and Response (EDR) (2)
10.0
Centralized Management (2)
10.0
Hybrid Deployment Support (2)
8.1
Infection Remediation (2)
9.1
Vulnerability Management (2)
9.1
Malware Detection (2)
10.0

What is Check Point Harmony Endpoint?

Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.
Categories:  Antivirus,  Endpoint Security

Check Point Harmony Endpoint Videos (2)

Check Point Harmony Endpoint Pricing

  • Does not have featureFree Trial Available?No
  • Does not have featureFree or Freemium Version Available?No
  • Does not have featurePremium Consulting/Integration Services Available?No
  • Entry-level set up fee?Optional

Check Point Harmony Endpoint Technical Details

Operating Systems: Unspecified
Mobile Application:No

Frequently Asked Questions

What is Check Point Harmony Endpoint?

Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.

Who uses Check Point Harmony Endpoint?

The most common users of Check Point Harmony Endpoint are from Mid-size Companies and the Information Technology & Services industry.