- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Slides attached below.
Selected Q&A from the session to follow.
The data is stored locally on the forensics DB so we can do near real-time remediation.
Data is kept with self protection so its protected on driver level. We have the ability to recover large amount of data which is bigger than the data needed for our engines.
To be clear: we are not decrypting the files, but we are restoring the files backed up prior to their encryption. Typically we reserve 1-2 GB on the primary disk for this purpose, but it is configurable.
Some exclusions are in place for the demo env. to work. In a production all files will be restored.
We backup files to the internal forensic DB when saved, as already mentioned.
Anti-Ransomware is a runtime protection and cannot recover files if it was installed after the attack. However, the machine will be remediated from active threats.
No - Backup is about ~2GB on the users local filesystem. We only backup files that are saved by an application not associated with the file type.
Yes - We can isolate a machine using a push operation from the management.
We’re focusing on the Threat Prevention features in this session, but yes Remote Access VPN is also included with the various Harmony Endpoint packages.
Not the full suite, but the Harmony Browse component (mentioned in this session) can also be leveraged on Chromebooks.
Web-based management is available from R81. The Threat Hunting piece currently requires cloud-based management. We are working on an on-prem/hybrid version of this.
As of now 15MB. In the next weeks the size will be increased to 100MB.
We can push the client to all AD machines, or you can distribute it using GPO or SCCM or other software distribution. Once installed, the client can be upgraded using the management interface.
These are complimentary solutions. Harmony Connect can protect traffic coming to/from an Endpoint, but provides no on-device protections such as the ones provided by Harmony Endpoint. Both solutions can run on the same system simultaneously.
You can use cloud based management service or install it on a local on premises machine. Threat Hunting currently requires cloud-based management. Some of the Threat Prevention features will benefit from access to the Internet to reach ThreatCloud.
Harmony Endpoint has a signature based anti-virus along with many other protection technologies.. However it can work a long side any 3rd party AV.
Refer to our Product Catalog. All prices are list and before discounts. We offer three different bundles in order to offer modular prices per customer needs in a very compelling and competitive price points. We also offer a bundle with Harmony Mobile as well as the Harmony Total package, which includes other pieces of the Harmony suite.
Yes - both categories and block listing is available.
Currently, no, but this will likely be part of an upcoming XDR offering.
We generally make a new release the "recommended" version every ~4 months.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY