- Feb 7, 2023
- 2,349
I bought the unmanaged one. I don’t need their managment.If you don't know how to set up an endpoint, they will take care of it for you. The question is, whether its worth it coughing up the extra cash for white glove service.
I bought the unmanaged one. I don’t need their managment.If you don't know how to set up an endpoint, they will take care of it for you. The question is, whether its worth it coughing up the extra cash for white glove service.
I bought the unmanaged one. I don’t need their managment.
Oh it’s exceptionally easy, I will publish all related information soon.How easy is it to set up the unmanaged one? Many endpoint software is complicated to set up, configure and manage. Can you just install the client and do the rest?
On par with CrowdStrike, Palo Alto and tools like Joe Sandbox. It’s amazing and extremely effective. Once you get your hands on it you will wonder how you’ve used products without such capabilities.The Threat Emulation blade is on par with VMRay. Really solid
so tempted to push that Harmony button... but think I'll wait a few more days, perhaps see how ZA/ESNG does in @Shadrowra's test.On par with CrowdStrike, Palo Alto and tools like Joe Sandbox. It’s amazing and extremely effective. Once you get your hands on it you will wonder how you’ve used products without such capabilities.
ZoneAlarm on Shadowra test is not important, Harmony Endpoint is a different product.so tempted to push that Harmony button... but think I'll wait a few more days, perhaps see how ZA/ESNG does in @Shadrowra's test.
It is possible to create as many policies as you want and move different devices to different policies. In the next few days we’ll explore reports, logs, changing policies and others.@Trident, is it possible to have different setups for different computer? Like one for mine and another for my daughter?
I almost don't want people to know about this hidden gem. LolIt is possible to create as many policies as you want and move different devices to different policies. In the next few days we’ll explore reports, logs, changing policies and others.
Check Point uses both their engine and a third-party engine. Their engine is based on static analysis (next-gen AV) and they have full-blown emulations as well. Between the two, a gap (dynamic analysis) remains, which is filled by Kaspersky/Sophos. It’s actually a very smart design. It’s the same with ZoneAlarm but there you don’t have choice of engines, anti-malware is always Sophos.The question is why Checkpoint is using Kaspersky instead of its own in-house native AV engine.
They switched to it for their next-gen AV product.
Can the Harmony Endpoint be used with Windows Defender or do you have to install the AV package?
Check Point uses both their engine and a third-party engine. Their engine is based on static analysis (next-gen AV) and they have full-blown emulations as well. Between the two, a gap (dynamic analysis) remains, which is filled by Kaspersky/Sophos. It’s actually a very smart design. It’s the same with ZoneAlarm but there you don’t have choice of engines, anti-malware is always Sophos.
Harmony can be used with Defender but I am unsure why anyone would want to do that. You just need not to install anti-malware.
Ransomware Remediation is just one layer. Having it or not having it doesn’t mean anything. Trelix with Dynamic Application Containment and various policies has powerful prevention, but they still use anti-ransomware. Deep Instinct just hasn’t developed it.So there's a possibility that this endpoint software can be infected with ransomeware because it has files rollback feature despite all other fantastic features just like other endpoints.
How about those files not monitored and not protected? How to rollback after a ransomware attack? Such files can be in the tens of thousands throughout the system since a ransomware is crafted to infect as many file extension types as possible
Just for compariaon. Deep Instinct don't talk about remediation so I assume there's none. Trellix has a system remediation feature.
My point is that if after a ransomware attack how to deal with unmonitored and unprotected files which are encrypted?Ransomware Remediation is just one layer. Having it or not having it doesn’t mean anything. Trelix with Dynamic Application Containment and various policies has powerful prevention, but they still use anti-ransomware. Deep Instinct just hasn’t developed it.
On an Endpoint you can’t assume, produce statements and verdicts or take chances. You need to cover every vector, every corner in every way possible. To boost ransomware detection and protection, since the version 87.00 Check Point also supports Intel TDT (11th and 12th core Intel CPUs) to enhance ransomware behaviour detection. Something Deep Instinct still doesn’t do.My point is that if after a ransomware attack how to deal with unmonitored amd unprotected files which are encrypted?
If an endpoint can confidently says no ransomware can bypass it then there's no need of remediation since it has so many other fantastic features to detect/block/remove ransomware. But can they?
Yes, you don't take chances against ransomware attack.On an Endpoint you can’t assume, produce statements and verdicts or take chances. You need to cover every vector, every corner in every way possible. To boost ransomware detection and protection, since the version 87.00 Check Point also supports Intel TDT (11th and 12th core Intel CPUs) to enhance ransomware behaviour detection. Something Deep Instinct still doesn’t do.
You will deal with unmonitored files by having the appropriate backup and disaster recovery policies in place.
They do, yes. Not all of them are equal though. If anyone finds this feature not useful, they can disable it.As I mentioned endpoints do come with fantastic features to detect/block/remove ransomware, Bascially they have the same or similar features like deep AI/ML/BB/signature and what not.