Battle Card - HARMONY Endpoint
Battle Card - HARMONY Endpoint
Hunting capabilities 2 F C. On average, samples are processed within 30 minutes when using Sandbox as a Service.
Containment & D. No Corporate Password Protection in a non-corporate website.
E
Remediation E. Lacks phishing Protection engine, URL Filtering and FDE is not included.
F. Required 2 products to achieve MITRE results, APEX & XDR because only the XDR provides incident information
G. 5 minutes or more of delay until the incident appeared on dashboard (source)
Annual Price-list per user $38 $72 $70 $65 $63 $62 H. Don’t support Linux OS deployment
(1-50)
A. Phishing Protection Based on previously known malicious, cannot prevent 0-day phishing site & Limited threat
extraction(CDR)[Safe documents]
1.Use reputation database 7.Not a zero-day phishing
B. Data restoration capability is based on windows Shadow copy, which can be Deleted by a sophisticated ransomware.
2.Separated product
C. Microsoft Defender forensic analysis provides unnecessary information leading to increased incident response times
3.Only view mode
D. Sandbox can take up to 14 minutes in order to get verdict on unknown malicious file. (source) And MS sandbox doesn’t
4.based on windows Shadow copy
prevent unknown malicious files, it just notifies 10 minutes later after a verdict is reached
5.Additional cost
E. On average time to incident remediation is almost 10 minutes!
6.Detect, does not prevent [Internal Use] for Check Point employees F. MS threat hunting involves manual creation of complex queries; Harmony offers simple, object-oriented query creation
Battle Card – Check Point Harmony Endpoint
Comparison How to Compete Against...
Matrix A. Cannot prevent post-infection communication (C&C)
(Traps)
Sandbox B 2 6 5 D. No automatic remediation – only provides remediation recommendations that must be manually performed, Cannot
recover encrypted files from ransomware attack.
Anti-Malware / AV E. No preemptive approach to protect against threats, Harmony delivers zero-malware documents with threat
extraction(CDR)
Bot protection (C&C) 6 F. Protection against Phishing or URL Filtering requires different product & agent such as Prisma Access (equivalent to
harmony connect).
Zero-day Phishing site A. Must export endpoints from Sophos ‘Enterprise Console” to “Central Endpoint Mgmt” to have its CryptoGuard
capabilities. This adds to deployment complexity and additional labor hours
Malicious site protection
B. Sandbox is only part of their Firewall / Email solution – additional costs
URL Filtering C. No preemptive approach to protect against threats, Harmony delivers zero-malware documents with TH extraction(CDR)
EPP
Application Control
F. The MITRE Engenuity report exposed that Carbon Black lacks visibility into C&C attempts – Example from MITRE
G. Critical bug in Carbon Black could enable attacker w/ network access to the server to get admin without authenticating
Machine learning (AI)
A. Cannot fully remediate from ransomware attacks when the host is fully encrypted
Corporate Password B. Bitdefender EDR capability lacks advanced threat hunting, automated threat feed integration, custom blocking rules
Protection C. The application control capability is only available with the on-premises platform
Exploit protection D. The Sandbox capability is only available with the on-premises deployment
E. Only subscription for GravityZone Elite can Compete against Harmony Advance
CDR 1
Hunting capabilities F
Containment & F
Remediation