App Review CheckPoint Harmony Endpoint Security 2024

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Content created by
Shadowra

Vitali Ortzi

Level 24
Verified
Top Poster
Well-known
Dec 12, 2016
1,357
wait how do you run threat emulation by itself via API key and ESET? I have a check point lic but your solution sounds like the best of both worlds for those who hold both liceneses.
It's actually really cool
I don't need to do manual analysis anymore I just send files to Symantec , Kaspersky ,eset live guard advanced , checkpoint , xcitium (human analysis) ,sophos intelix and they together give an accurate answer to what's safe





Oh and I use eset with comodo as a sandboxing layer (I usually let files get trusted by xcitium from the ones that are rather then manually allowing them as it would defeat the purpose)

Hitman pro as another layer to exploit guard GitHub - neohiro/ExploitProtection: Windows Exploit Protection Settings (Ultimate) (I have disabled eset exploit mitigations )
Got avast scanning my emails for free and checkpoint , defender , Symantec as anti pishing extensions as well as quad9 as the DNS
And for the firewall I have disabled eset and using Symantec firewall, ips modusles

And one day I probably would set a hardware firewall using Cybersecurity as a Service Delivered | Sophos and feeds from crowsec and GitHub - PeterDaveHello/threat-hostlist: Comprehensive domain blocklists for 🚨 threats (🕷malware, 🎣phishing, 🕵️spyware, 🤖botnets). Ideal for DNS-based filtering tools like Pi-Hole, AdGuard Home, Blocky. oh and wauzh as an edr for eset , checkpoint, Symantec sophos etc
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top