Check Point Harmony Endpoint

Check Point Harmony Endpoint

Check Point Software Technologies
+
+

Related Products

  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • Cloudflare
    1,948 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • 1Password
    16,550 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • EasyDMARC
    188 Ratings
    Visit Website

About

Check Point Harmony is the industry’s first unified security solution for users, devices and access. The solution protects devices and internet connections from the most sophisticated attacks while ensuring Zero-Trust Access to corporate applications. Protecting today’s hyper-distributed workspace requires endless security functions across user devices, applications and networks. However, stitching together point solutions often leaves security gaps and creates a cumbersome infrastructure that is difficult to manage and scale. Harmony offers an alternative that saves you the overhead and increases security. Harmony unifies 6 cloud-based security products to keep you 100% safe. Wherever you connect from, whatever you connect to, and however you connect – Your home, your devices, your privacy and your organizational data are secured and protected from any cyber threat.

About

deviceTRUST brings together all the context and control needed to protect your digital workspace whilst allowing the modern access your users demand. Always up-to-date contextual information describing the user, the device and their environment, brought together to where it's needed. Control real-time access to digital workspaces and their resources, independent of the platform. Secure digital workspace to protect your business, keep the users productive and support your Zero-Trust strategy. Employees must be able to work from their home office with unrestricted access to all necessary applications, identical to when they are working within the corporate network. Employees of external partners and suppliers should have access to applications and resources that are provided in the virtual workspace of the company. Requirements Employees and external partners should only have access to applications and resources provided in the company’s virtual workspace at certain times.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a solution to manage their users security functions

Audience

Companies seeking a contextual security tool to protect their digital workspace

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 4.0 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Check Point Software Technologies
Founded: 1993
Israel
www.checkpoint.com/harmony/

Company Information

deviceTRUST
Germany
devicetrust.com

Alternatives

Alternatives

Trend Vision One

Trend Vision One

Trend Micro
Citrix Endpoint Management

Citrix Endpoint Management

Cloud Software Group

Categories

Categories

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Management Features

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Integrations

ARIA SDS Packet Intelligence
Applivery
Revelstoke
SCADAfence
Techstep Essentials MDM
Veriti

Integrations

ARIA SDS Packet Intelligence
Applivery
Revelstoke
SCADAfence
Techstep Essentials MDM
Veriti
Claim Check Point Harmony Endpoint and update features and information
Claim Check Point Harmony Endpoint and update features and information
Claim deviceTRUST and update features and information
Claim deviceTRUST and update features and information