Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Harmony Endpoint

Check Point Software Technologies | 1

Reviews from AWS Marketplace

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

150 reviews
from G2

External reviews are not included in the AWS star rating for the product.


    Susan D.

comprehensive security solution for endpoint network

  • November 06, 2024
  • Review provided by G2

What do you like best about the product?
The endpoint security suite provides powerful anti-phishing system that detects known and unknown threats over the internet. We have been able to identify harmful threats with suspicious activities in the network. The platform offers real-time forensic reports that enables the organization to launch investigations of compromised assets.
What do you dislike about the product?
I have not had bad experience from the performance of this software since we deployed it.
What problems is the product solving and how is that benefiting you?
The security suite has been effectively integrated with enterprise network to monitor data flow and discover ransomware threats. This is essential tool over the network that protects remote work teams with full security coverage over their communication infrastructure.


    Michael T.

Efficient endpoint security tracking software

  • October 30, 2024
  • Review provided by G2

What do you like best about the product?
Check Point Endpoint Security Suite has enhanced secure collaboration of teams in the enterpries and remote areas. The platform tracks data from initial processing to the end user providing best security measures that cannot be easily compromised. Data analysis has been safe and there is zero cases of malicious attacks.
What do you dislike about the product?
The security suite has achieved most crucial objectives of securing endpoint devices.
What problems is the product solving and how is that benefiting you?
We have effectively configured this software with endpoint devices to enhance reliable data safety. Remote workforce can easily share data and communicate with full protection from malware attacks.


    Tushar U.

Nevigating Security Settingmade Simple with Harmony Endpoint

  • October 25, 2024
  • Review verified by G2

What do you like best about the product?
It offers strong protection againts various threats, helping keep devices secure and user safe making it simple for it teams to navigate and manage security settings.
What do you dislike about the product?
As of now i do not dislike the product or service.
What problems is the product solving and how is that benefiting you?
it helps protect againts malware,ramsomware and phishing attacks, making it an ideal solution for environment where this threats are privalent.


    John D.

Robust protection suite against cyber attacks

  • October 10, 2024
  • Review provided by G2

What do you like best about the product?
The platform offers comprehensive protection cover against all forms of external threats that can affect development lifecycle. It provides secure access with powerful VPN to our remote developers to enhance secure collaboration and connection. Check Point Endpoint Security Suite has enhnaced compliance with security policies that safeguards data.
What do you dislike about the product?
The performance has been stable since we deployed this platform in the enterprise.
What problems is the product solving and how is that benefiting you?
The software has maintained top notch security services that responds quickly to curb cyber threats. It easily integrates with CI/CD pipelines that enforces security checks for deployed codes.


    Milton P.

Comprehensive malware threat prevention platform

  • August 13, 2024
  • Review provided by G2

What do you like best about the product?
This is the most advanced tool that has highly prevented cyber attacks in my department. It offers timely alerts when there impending ransoware attacks targeting our development projects. There were high rate of cases that could lead to higher risks and expose confidential customer data to external threats. Check Point Endpoint Security Suite has promoted secure data handling ethics.
What do you dislike about the product?
I encountered few learning curve challenges after deployment which lasted shortly afer full enrollment for video and physical training sessions.
What problems is the product solving and how is that benefiting you?
It provides effective data protection services for both personal and customer data. The antivirus and firewall protections have prevented me from most risks when I am browsing.


    Maheshwar B.

Strengthening your network: An Examination of Checkpoint endpoint Security

  • July 25, 2024
  • Review provided by G2

What do you like best about the product?
Check Point Endpoint security all en-compassing approach to security is one of best quality it combines behavioral threat detection antivirus, anti-ransomware, and advanced threat protection into one package. It is easy to use.
What do you dislike about the product?
there is no downside for checkpoint endpoint security
What problems is the product solving and how is that benefiting you?
Ensuring compliance, boosting operational effectiveness strenghtening cybercsecurity posture, and meeting the changing demands of work setting are all ways Check Point endpoint Security help businesses.


    Nayana K.

Safeguarding Endpoints

  • July 23, 2024
  • Review provided by G2

What do you like best about the product?
Check Point Endpoint Security provides soutions to protecst endpoint devices from cyber threats. It protects sensational data from unverified access or sharing.
What do you dislike about the product?
While working with Check point Endpoint Security, No dislike occured about the product.
What problems is the product solving and how is that benefiting you?
As working with product,faced many challenges, protection againsd advanced cyber threats. It improves the efficiency. Due to it protects from wide range of threats, Organization focuses on various business activities.


    Evans V.

Checkpoint Harmony: A Unified Approach to Endpoint Security

  • July 19, 2024
  • Review verified by G2

What do you like best about the product?
A single platform with an emphasis on sophisticated threats and many deployment options. Also the GUI is so clean that its easy to use and ease of implementation with pre defined policies
What do you dislike about the product?
Checkpoint Harmony Endpoint have Documentation gaps, expense, and limited reporting
What problems is the product solving and how is that benefiting you?
Harmony Endpoint guards against cyberattacks, data loss, complex security, difficulties with remote work, better security postures, a nice user interface, etc.


    Chrisfhelle John B.

Ease of use

  • July 15, 2024
  • Review provided by G2

What do you like best about the product?
Very easy to use. user friendly software, makes task easier to do.
What do you dislike about the product?
App crashes sometimes, you need to reload and it takes long.
What problems is the product solving and how is that benefiting you?
Providing a complete security software.


    Financial Services

Permet de sécuriser efficacement les appareils contre une large gamme de cybermenaces

  • July 08, 2024
  • Review verified by G2

What do you like best about the product?
Ce que j'apprécie c'est la capacité à offrir une protection complète en utilisant une approche intégrée, combinant plusieurs fonctionnalités essentielles telles que la détection des menaces, la prévention, la réponse et l'analyse.
What do you dislike about the product?
le coût : cela peut représenter un investissement financier significatif, en fonction de la taille de l'entreprise et du nombre d'appareils à protéger.
What problems is the product solving and how is that benefiting you?
Harmony endpoint fournit une protection complète en utilisant une approche intégrée, combinant plusieurs fonctionnalités essentielles telles que la détection des menaces, la prévention, la réponse et l'analyse. Cela permet de sécuriser efficacement les appareils contre une large gamme de cybermenaces, tout en fournissant une visibilité approfondie sur les activités suspectes.