Download PDF version Contact company

Check Point Software Technologies Ltd., a provider of cybersecurity solutions globally launches Check Point Harmony, the first unified solution to enable secure connectivity to any resource anywhere and give total endpoint protection for users on any device.

Harmony secures both corporate and BYOD devices, and internet connections from known and zero-day attacks while giving Zero-Trust access to business applications in a single, easy to manage solution. Securing the new work from anywhere environment is a priority for enterprises, as 81% have adopted mass remote working, and 74% plan to do so permanently.

Social engineering attacks

However, they have serious concerns about securing remote users: 52% stated their top concern was securing staff endpoints, and 47% said stopping social engineering attacks, yet just 29% deploy endpoint protections on employees' devices.

Check Point Harmony addresses these challenges, unifying endpoint, browser, email, and remote access security components to protect all user devices and the enterprise networks they connect to against known and unknown threats.

Enhancing overall protection

Harmony integrates key security capabilities in a single solution to deliver:

  • Complete web security: As a core component of Harmony, the new Harmony Browse uniquely provides secure, fast, and private web browsing by inspecting all SSL traffic directly on the endpoint without adding latency or re-routing traffic through a secure web service. Harmony Browse blocks zero-day malware downloads, access to phishing websites, and prevents the reuse of corporate passwords. It also keeps users browsing history private, ensuring compliance with data privacy regulations. Harmony Browse is easily deployed as a nano-agent in users' browsers and can be combined with any secure web gateway or endpoint security solution to enhance overall protection.
  • Secure remote access from any device, anywhere: Harmony Connect securely connects any user or branch to any resource, supporting clientless Zero Trust Network Access from any browser.
  • Protects users' email and productivity apps: Harmony Email & Office secures users' email clients and, gives complete protection for Microsoft Office 365, Exchange, Google G Suite, and more.
  • Total endpoint and device security: Harmony Endpoint protects users' PCs from ransomware, phishing, and malware, and minimizes breach impact with autonomous detection and response capability. Harmony Mobile secures employees' mobile devices against malicious apps and network or OS attacks.

Mass remote working

The forecasts show that by 2024, mobile workers will account for nearly 60% of the total U.S. workforce

In the past year, organizations have made significant IT infrastructure changes to enable mass remote working, and they will continue to do so, says Michael Suby, Research VP at IDC. The forecasts show that by 2024, mobile workers will account for nearly 60% of the total U.S. workforce. These accelerated changes open up security gaps and dramatically expand organizations' attack surfaces, especially on employees' own devices and PCs and remote connections to corporate applications.

The move to mass remote working created security gaps in organizations' security infrastructures that cannot easily be addressed with multiple different point products from several different security vendors, said Rafi Kretchmer, VP Product Marketing at Check Point Software.

Single-Console management

Harmony closes these gaps with unified, multi-layered security and prevention technologies, blocking against all exploit techniques across all attack vectors. This protects the enterprises' network end to end, ensuring uncompromised security for the new work from anywhere enterprise environment, with easy deployment and single-console management.

Check Point Harmony is easy to deploy with a simple per-user pricing model and is managed via a cloud service, enabling user-centric security policies to be applied across organizations' environments.

Download PDF version Download PDF version

In case you missed it

Luxury Londoner Hotel Secured By OPTEX Laser Sensors
Luxury Londoner Hotel Secured By OPTEX Laser Sensors

OPTEX, the pioneering global sensing manufacturer, has specified and installed its compact and intelligent REDSCAN RLS-2020 LiDAR laser sensors at the new luxury five-star Londoner...

ASSA ABLOY eCLIQ: Secure Access At Hofbräuhaus Munich
ASSA ABLOY eCLIQ: Secure Access At Hofbräuhaus Munich

Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world&r...

How Should Total Cost of Ownership (TCO) Impact Security Decisions?
How Should Total Cost of Ownership (TCO) Impact Security Decisions?

Direct costs such as purchase price and maintenance are important elements in the total cost of ownership (TCO). However, there are others. Elements such as opportunity costs of lo...