Harmony Endpoint provides a comprehensive solution to protect remote workers from today's complex threats. It protects your endpoint from the most serious threats such as ransomware and phishing. The system also provides an automated detection and response that minimizes breach impact.
Remote users can connect to corporate applications from any location, increasing your organization's attack area.
Check Point Harmony is the first industry-wide unified security solution that protects users' devices from sophisticated attacks and allows them to access corporate applications with zero trust.
These modules form the basis of the course:
Introduction
Architecture
Architecture and the Flow
Architecture-Accessing the Endpoint Server
Deployment
Deployment-Installing the Client on Windows
Deployment-Installing the Client on Linux
Deployment-Visibility
Change Policy for Deployment
Deployment-Upgrade
Client Removal - Deployment
Communication
Communication-Port, Services and URLs
Exclusions
Summary
Check Point Software Technologies Ltd., a global leader in cybersecurity solutions for governments and corporations worldwide. Check Point's solutions provide protection against 5th-generation cyber-attacks. They have an industry-leading catch-rate for malware, ransomware and other types. Check Point's multilevel security architecture, "Infinity", Total Protection with Gen V advanced threats prevention, protects enterprise cloud, network and mobile device-held data. Check Point offers the most intuitive and comprehensive one-point of control security management system. Check Point provides security for over 100,000 organizations, regardless of size.