Check Point Harmony Endpoint

Check Point Harmony Endpoint

Check Point Software Technologies
+
+

Related Products

  • ESET PROTECT Advanced
    2,088 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    383 Ratings
    Visit Website
  • Guardz
    87 Ratings
    Visit Website
  • ThreatLocker
    478 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • SpamTitan
    813 Ratings
    Visit Website
  • EasyDMARC
    151 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,279 Ratings
    Visit Website
  • Syncro
    450 Ratings
    Visit Website
  • ConnectWise SIEM
    191 Ratings
    Visit Website

About

Check Point Harmony is the industry’s first unified security solution for users, devices and access. The solution protects devices and internet connections from the most sophisticated attacks while ensuring Zero-Trust Access to corporate applications. Protecting today’s hyper-distributed workspace requires endless security functions across user devices, applications and networks. However, stitching together point solutions often leaves security gaps and creates a cumbersome infrastructure that is difficult to manage and scale. Harmony offers an alternative that saves you the overhead and increases security. Harmony unifies 6 cloud-based security products to keep you 100% safe. Wherever you connect from, whatever you connect to, and however you connect – Your home, your devices, your privacy and your organizational data are secured and protected from any cyber threat.

About

Juniper Advanced Threat Prevention (ATP) is the threat intelligence hub for your network. It contains a litany of built-in advanced security services that use the power of AI and machine learning to detect attacks early and optimize policy enforcement networkwide. Juniper ATP runs as a cloud-enabled service on an SRX Series Firewall or as a virtual appliance deployed locally. It finds and blocks commodity and zero-day malware within files, IP traffic, and DNS requests. The service assesses risk from encrypted and decrypted network traffic and connected devices, including IoT devices, and distributes that intelligence throughout the network, drastically decreasing your attack surface and helping avoid breaches. Automatically discover and mitigate known and zero-day threats. Identify and stop threats hiding within encrypted traffic without decrypting. Detect targeted attacks on your network, including high-risk users and devices, and automatically mobilize your defenses.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a solution to manage their users security functions

Audience

Organizations looking for a solution to discover and mitigate known and zero-day threats

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 4.0 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Check Point Software Technologies
Founded: 1993
Israel
www.checkpoint.com/harmony/

Company Information

Juniper Networks
Founded: 1996
United States
www.juniper.net/us/en/products/security/advanced-threat-prevention.html

Alternatives

Alternatives

SandBlast Network

SandBlast Network

Check Point Software Technologies
CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike
Trend Vision One

Trend Vision One

Trend Micro
Trend Vision One

Trend Vision One

Trend Micro

Categories

Categories

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Integrations

ARIA SDS Packet Intelligence
Active Directory
Juniper MX Series Routers
Juniper Mist AI
Revelstoke
SCADAfence
SecIntel
Techstep Essentials MDM
Veriti

Integrations

ARIA SDS Packet Intelligence
Active Directory
Juniper MX Series Routers
Juniper Mist AI
Revelstoke
SCADAfence
SecIntel
Techstep Essentials MDM
Veriti
Claim Check Point Harmony Endpoint and update features and information
Claim Check Point Harmony Endpoint and update features and information
Claim Juniper Advanced Threat Protection and update features and information
Claim Juniper Advanced Threat Protection and update features and information