Check Point Harmony to protect web browsing and remote access


Check Point has deployed the Harmony unified offering to secure both internet connections as well as corporate devices and BYOD for remote workers.

San Carlos, Calif., Based platform security provider said Check Point Harmony brings together endpoint, browser, email and remote access security in a single tool managed through a service. cloud. The entire Harmony offering will be available to customers for $ 11 per user per month, while each of the individual components will cost around $ 4 per user per month on a stand-alone basis.

“Partners don’t need us to sell these products,” said Itai Greenberg, vice president of product management at Check Point. “It’s very intuitive for partners to engage their customers without even telling us about it. “

[Related: Check Point To Buy Secure Remote Access Startup Odo Security]

Check Point has noticed a huge increase in attacks on users since COVID-19 forced most people to work from home, with hackers using phishing and malicious files to take over computers, steal information from identification and take corporate data, Greenberg said. Check Point therefore focused on locking down laptops and mobile devices while providing secure access to email, apps and the internet.

The all-new Harmony Browse tool delivers secure, fast and private web browsing by inspecting all SSL traffic directly at the endpoint without adding latency or rerouting traffic through a secure web service, Check Point said. According to the company, it blocks malware downloads and access to phishing websites, while preventing the reuse of corporate passwords.

According to Check Point, Harmony Browse is easily deployed as a nano-agent in user browsers and can be paired with any secure web gateway or endpoint security tool to enhance overall protection. It also maintains compliance with data privacy regulations by keeping users’ browsing history private, Check Point said.

Securing web traffic directly in the browser rather than redirecting all traffic to Check Point’s data center will dramatically reduce latency and give organizations a much better understanding of what users are actually doing in the browser, allowing businesses to see if employees are typing corporate passwords in places where they shouldn’t like personal LinkedIn, Facebook, or Netflix accounts, according to Greenberg.

Harmony Browse will ensure that users don’t accidentally harm their employer while downloading files or visiting websites, Greenberg said. It can inspect files and make sure they are not malicious in seconds rather than minutes so users can download quickly and enable businesses to prevent user from logging passwords. ‘business on private websites, according to Greenberg.

Other elements of the Harmony offering include Connect, which securely connects any user or branch to any resource, supporting trustless clientless network access from any location. browser, according to Check Point. Harmony Browse is new to the market, Greenberg said, while Harmony Connect launched last year and has recently been enhanced with new features.

Harmony Email & Office and Harmony Endpoint, meanwhile, are more mature offerings than those that have been renamed under the Harmony moniker, according to Greenberg. All Harmony products can be managed from a single portal, Greenberg said, simplifying the day-to-day experience for users and administrators, Greenberg said.

Greenberg expects the Harmony bundle to initially gain the most traction in the mid-market, as they are more security-conscious than their smaller counterparts, but have more flexibility than large organizations to adopt the entire package. package all at once rather than evaluating each component separately.

From a metric standpoint, Greenberg said Check Point expects to track the number of customers who buy Harmony, the recurring revenue it generates, and its impact on business bottom lines. Check Point hopes that a positive experience with Harmony will inspire customers to purchase the entire Infinity wallet and reduce the number of security providers they use, Greenberg said.

Source link


Leave A Reply