Skip to main content
TrustRadius
Check Point Harmony Endpoint

Check Point Harmony Endpoint
Formerly Sandblast Agent

Overview

What is Check Point Harmony Endpoint?

Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.

Read more
Recent Reviews
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Check Point Harmony Endpoint?

Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.

Entry-level set up fee?

  • Setup fee optional

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

158 people also want pricing

Alternatives Pricing

What is Microsoft Defender for Endpoint?

Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection…

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no…

Return to navigation

Product Demos

Harmony Endpoint with MITRE ATT&CK Inside Demo

YouTube
Return to navigation

Product Details

What is Check Point Harmony Endpoint?

Check Point Harmony Endpoint Videos

Check Point SandBlast Agent - Advanced Endpoint Protection & Forensics
SandBlast Agent Product Tour

Check Point Harmony Endpoint Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(19)

Reviews

(1-2 of 2)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
ResellerIncentivized
I currently use Check Point Sandblast Agent within the organisation for Anti-Ransomware. I have found that the product identified and re-mediated a ransomware attack that we experienced.

The product un-encrypted the files that the ransomware encrypted on its own. Cleaned all infections and I was able to work in 10 min. Sandblast Agent also has no impact on computer resources.
  • Identifies ransomware
  • Low resource usage
  • Self remediation
  • Nothing
Sandblast Agent can be used in any user environment. It is also great for server solutions.
Endpoint Security (7)
100%
10.0
Anti-Exploit Technology
100%
10.0
Endpoint Detection and Response (EDR)
100%
10.0
Centralized Management
100%
10.0
Hybrid Deployment Support
100%
10.0
Infection Remediation
100%
10.0
Vulnerability Management
100%
10.0
Malware Detection
100%
10.0
  • Stops Ransomware attacks
  • Easy to manage
  • Easy to deploy
I found that Check Point identified more Ransomware attacks than Kaspersky.
David Hundley | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Check Point Endpoint Security is used across our whole company to prevent risk of compromised customer information by ensuring that only authorized users are able to access our secure networks and computer systems.
  • Requires authorized passwords and logins from end users.
  • Utilizes voiceprint recognition to validate users.
  • Allows for a one time login from end users working remotely away from their desks.
  • The prompts for one time logins are rather lengthy and it takes around five minutes to go through all of the authentication required. I believe this could be improved upon.
Check Point Endpoint Security is well suited for businesses where confidentiality must be maintained in order to mitigate risk and compromise of customer information.
  • It has enabled us to maintain privacy which has enhanced our highly rated brand standard. While basically it is a team member specific, behind the scenes program that protects systems from being used by unauthorized individuals, it contributes to the overall integrity of the organization which results in increased market share and return on investment for shareholders.
It is one of the most highly rated systems in use and has superior security features that make it desirable for usage.
Return to navigation