Check Point Harmony Endpoint

Check Point Harmony Endpoint
Formerly Sandblast Agent

About TrustRadius Scoring
Score 9.0 out of 100
Check Point Harmony Endpoint

Overview

Recent Reviews

Read all reviews

Video Reviews

Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of Check Point Harmony Endpoint, and make your voice heard!

Pricing

View all pricing
N/A
Unavailable

What is Check Point Harmony Endpoint?

Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.

Entry-level set up fee?

  • Setup fee optional

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services

Would you like us to let the vendor know that you want pricing?

41 people want pricing too

Alternatives Pricing

What is Microsoft Defender for Endpoint?

Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection…

What is Kaspersky Endpoint Security?

Kaspersky Work Space Security is antivirus / endpoint security software from Russian company Kaspersky.

Features Scorecard

No scorecards have been submitted for this product yet..

Product Details

What is Check Point Harmony Endpoint?

Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.

Check Point Harmony Endpoint Videos

Check Point SandBlast Agent - Advanced Endpoint Protection & Forensics
SandBlast Agent Product Tour

Check Point Harmony Endpoint Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Comparisons

View all alternatives

Compare with

Reviews and Ratings

 (18)

Reviews

(1-3 of 3)
Companies can't remove reviews or game the system. Here's why
PRAPHULLA DESHPANDE | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
As we [are a] service provider[,] we provide solutions to [customers] based on their requirements. [Our customer] was looking for [a] centralized endpoint management for end users along with roaming users itself. As Checkpoint is [a] industry [leader] and taking security to [the] next level we thought to provide [Check Point Harmony Endpoint Security (formerly Sandblast Agent)] [as the] solution for endpoint security. Checkpoint plays different role when come to EDR as it provide not only centralized management but Threat Emulation Threat Extraction and Ransomware protection which are key component / modules of it which ultimately provides better security for roaming users also.
  • Compliance Check
  • Ransomware and Forensic
  • Threat Emulation and Extraction
  • Centralized management
  • Disk encryptions
  • Intelligence from Threat Cloud
  • URL filtering Antibot application control
  • Stability improvement require for communication with Endpoints
  • Cloud management console takes time to push rules on endpoint
  • Can integrate with API to authenticate users
[Check Point Harmony Endpoint Security (formerly Sandblast Agent) is well suited for] customers having less IT resources and need to handle multiple locations where physical IT persons present is not possible[.] Also roaming users are accessing organization resources from BYOD devices[.] Check Point [Harmony Endpoint Security (formerly Sandblast Agent)] suits perfect as they use compliance ,encryption and all together firewall feature sets.
Also sometime for roaming users its become not possible to download threat database for them its perfectly suit as we can provide them signature update with external file which they can simply put in their computer as database.
Score 10 out of 10
Vetted Review
Reseller
Review Source
I currently use Check Point Sandblast Agent within the organisation for Anti-Ransomware. I have found that the product identified and re-mediated a ransomware attack that we experienced.

The product un-encrypted the files that the ransomware encrypted on its own. Cleaned all infections and I was able to work in 10 min. Sandblast Agent also has no impact on computer resources.
  • Identifies ransomware
  • Low resource usage
  • Self remediation
  • Nothing
Sandblast Agent can be used in any user environment. It is also great for server solutions.
David Hundley | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source
Check Point Endpoint Security is used across our whole company to prevent risk of compromised customer information by ensuring that only authorized users are able to access our secure networks and computer systems.
  • Requires authorized passwords and logins from end users.
  • Utilizes voiceprint recognition to validate users.
  • Allows for a one time login from end users working remotely away from their desks.
  • The prompts for one time logins are rather lengthy and it takes around five minutes to go through all of the authentication required. I believe this could be improved upon.
Check Point Endpoint Security is well suited for businesses where confidentiality must be maintained in order to mitigate risk and compromise of customer information.