We performed a comparison between Check Point Harmony Endpoint and SentinelOne based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Comparison Results: Based on the parameters we compared, SentinelOne seems to be a slightly superior solution. All other things being more or less equal, our reviewers found Check Point Harmony Endpoint to be expensive.
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"Fortinet is very user-friendly for customers."
"Ability to get forensics details and also memory exfiltration."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"The solution was relatively easy to deploy."
"The setup is pretty simple."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"Compared to its competitors, Check Point Harmony Endpoint has advantages in areas like EDR and behavioral detection."
"Harmony's endpoint sandboxing is really good."
"Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner."
"It offers complete endpoint protection for all assets."
"It has extended OS support to ensure your legacy endpoints also have zero-day protection."
"The main advantage of the solution is the ability to implement complete security policies for the terminals in order to address how apps are installed on corporate devices."
"Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard."
"Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum."
"Our impressions of the solution's ability to ingest and correlate across our security solutions is perfect."
"It gives you good visibility of any threats or vulnerabilities that you might have on your network."
"The most valuable features include the agent installation and update processes."
"The remediation and rollback features are pretty impressive."
"Tracking down which devices don't currently have SentinelOne on them is the most valuable feature of the product."
"The user interface, ease of maintenance, and the efficient way to identify the root cause of an incident to see all the factors that contributed to it are the most valuable features."
"Singularity's rollback feature is one of the primary reasons we bought the product. If there's an attack on the machine, the system can automatically roll back the data and the hard drive of the machine that was attacked."
"The process visualization, automated response, and snapshotting are valuable. The integration and automation possibilities are also valuable."
"We'd like to see more one-to-one product presentations for the distribution channels."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"The solution should address emerging threats like SQL injection."
"FortiEDR can be improved by providing more detailed reporting."
"The solution is not stable."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"Making the portal mobile friendly would be helpful when I am out of office."
"The SIEM could be improved."
"I think some work needs to be done to improve the integration with other third-party products, namely SIEM solutions."
"Technical support can be a bit slow at times."
"There should be some way of managing this solution outside the organization's network, possibly with some type of remote access. For example, if I'm the admin of Check Point who manages the entire network, I would like to have access on my home device or maybe a mobile app to get reports, etc."
"As I understand there will be a URL filtering feature included with the browser agent in the future. This will allow URL filtering without the need for a Gateway Device. This is something I am looking forward to and would be a great addition to list of features."
"Improvements are required in two key areas: notifications and setup simplification."
"We need a higher maximum file size in the sandboxing feature."
"I would like to see more automation."
"The product updates are a manual process for my administrator and can take several hours out of his day."
"I encountered issues running Singularity Complete alongside other machine-learning tools."
"An area for improvement in SentinelOne is the search feature. You can't go beyond twenty thousand events, which ruins the task because it isn't enough when you're doing your investigation."
"The mobile agents need improvement, especially in their integration with the dashboard of the normal Windows Image-based agents."
"The ease of use can be better in Deep Visibility. It is not always the easiest. If I have not been in there in the Deep Visibility module for a long time, I do not always find it that easy to use. I tend to go and have to consult the help quite often if I have not been in there a long time."
"The training for SentinelOne Singularity should be free. The solution has a lot of features but we do not know how to use them all. The moment someone purchases the solution they should contact them and provide them with a feature session on how to use the features."
"The improvement could be in terms of reducing more noise and continuing to cut that down. AI seems to be the big thing with Purple. We are excited to get our hands on that."
"The solution’s distributed intelligence at the endpoint is pretty effective, but from time to time I see that the agent is not getting the full execution history or command-line parameters. I would estimate the visibility into an endpoint is around 80 percent. There is 20 percent you don't see because, for some reason, the agents don't get all of the information."
"Periodically we have an application that does not work correctly when SentinelOne is installed, yet performs as expected when SentinelOne is removed."
More SentinelOne Singularity Complete Pricing and Cost Advice →
Check Point Harmony Endpoint is ranked 8th in Endpoint Detection and Response (EDR) with 103 reviews while SentinelOne Singularity Complete is ranked 2nd in Endpoint Detection and Response (EDR) with 177 reviews. Check Point Harmony Endpoint is rated 8.8, while SentinelOne Singularity Complete is rated 8.8. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of SentinelOne Singularity Complete writes "Provides peace of mind and is good at ingesting data and correlating". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and Cortex XDR by Palo Alto Networks, whereas SentinelOne Singularity Complete is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace, ThreatLocker Protect and ESET Endpoint Protection Platform. See our Check Point Harmony Endpoint vs. SentinelOne Singularity Complete report.
See our list of best Endpoint Detection and Response (EDR) vendors and best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.