Try our new research platform with insights from 80,000+ expert users
reviewer1678761 - PeerSpot reviewer
Assistant Manager at CIANS ANALYTICS PVT. LTD
User
A good antivirus with excellent email alerts but needs better technical support
Pros and Cons
  • "We like the sandbox feature."
  • "Technical support could be better."

What is our primary use case?

We primarily use the solution as an antivirus. We want to protect our systems from malware and viruses.

We are still doing work from home and we are not sure how long this will last. Before Check Point Harmony software, we depended on Windows Defender Antivirus, but we realized that it was not so good. We wanted some good AV so that users who are working on a VPN would have an antivirus installed on their system. 

Also, we wanted a sandbox feature so that, if any machine got infected, we can automatically isolate it from the network.

How has it helped my organization?

When starting, we faced many issues. It was due to a partner mistake, however. The partner gave us the wrong setup which caused laptops to crash and it lowered the efficiency. We escalated to our Check Point sales account manager. He immediately set us up with some other partner and tried to resolve the issue. He found the root cause, but still, we needed to format the system. It has been more than 3 months, and now the user's system is working fine. 

We always receive alert emails from Check Point regarding malware or virus status, which is helpful.

What is most valuable?

We like the sandbox feature. If any machine got infected, it would get automatically isolated from the network. As such, we haven't faced any issues. We like that we have an option to isolate. 

The alert email from Check Point is also very valuable. If any machine didn't get a scan or has a virus due to visiting various websites on a browser, it automatically sends us an email to warn us. Accordingly, we can take action on that particular machine. 

Overall, the antivirus is good.

What needs improvement?

Technical support could be better. When we register a complaint, we need to register it via the portal only, which is atime consuming.

When we register the complaint, it says there's a minimum of four hours of turnaround time which is high. It should be a minimum of 60 minutes. 

The GUI of Harmony is very slow to upload. I'm not sure if it is due to the internet, but still, at times, we found that when we click on any tab, it takes a minimum of five seconds to get it open.

All other things are okay from our end.

One feature we want to add is an EDR/XDR into this antivirus module.

Buyer's Guide
Check Point Antivirus
June 2025
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
857,028 professionals have used our research since 2012.

For how long have I used the solution?

I've been using the solution for 4 months.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

I found the solution to be okay. I'm not sure how others are providing the support as we haven't checked that.

How are customer service and support?

Technical support is good.

Which solution did I use previously and why did I switch?

No, we haven't used any other antivirus. It was by default in Windows.

How was the initial setup?

The initial setup was okay.

What about the implementation team?

We implement it through a vendor. 

I would rate their level of service at a 2 out of 5 where 1 is lowest and 5 is best.

What was our ROI?

If we talk about ROI, then the solution is good, as we are getting a sandbox feature in it plus the VPN licenses if we have the Check Point firewall.

What's my experience with pricing, setup cost, and licensing?

The setup is okay depending on the partner and what the relationship is with you and your partner. The pricing is okay.

Which other solutions did I evaluate?

Yes, we have evaluated other options. For example, we've evaluated Sophos.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
User
Top 5Leaderboard
Has good threat cloud integration, sandboxing, and behavioral analysis features
Pros and Cons
    • "Performance and resource consumption should be reduced."

    What is our primary use case?

    Check Point Antivirus has a great design for network, security gateway deployment, threat detection, and prevention.                                              

    How has it helped my organization?

    Check Point Antivirus is a valuable tool for organizations because it helps them secure the network and data.                                                                              

    What is most valuable?

    The most valuable features of Check Point are threat cloud integration, sandboxing, and behavioral analysis.

    What needs improvement?

    Performance and resource consumption should be reduced. 

    Additional features should be EDR, Advanced sandboxing technology, deeper cloud integration, etc.                                                                                         

    For how long have I used the solution?

    I have been using it for the past four years.

    What do I think about the stability of the solution?

    The stability is good.

    What do I think about the scalability of the solution?

    Scalability is good.

    How are customer service and support?

    The support is good.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The initial setup is excellent.

    What about the implementation team?

    We did the implementation in-house.

    What was our ROI?

    We have seen good ROI.

    Which other solutions did I evaluate?

    We also evaluated CrowdStike Falcon and Sophos Intercept X.

    Which deployment model are you using for this solution?

    Private Cloud
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Check Point Antivirus
    June 2025
    Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
    857,028 professionals have used our research since 2012.
    Enterprise architect at Kapsch
    Real User
    Very robust, providing good ransomware protection
    Pros and Cons
    • "A very good and robust antivirus solution."
    • "Reporting and management could be improved."

    What is our primary use case?

    We use Check Point for ransomware protection. It provides standard endpoint protection. 

    What is most valuable?

    We need ransomware protection and that's what we get. It's a very good and robust antivirus solution.

    What needs improvement?

    As with most antivirus products, the reporting and management could be improved. 

    For how long have I used the solution?

    I've been using this solution for one year. 

    What do I think about the stability of the solution?

    The solution is stable. 

    What do I think about the scalability of the solution?

    The solution is scalable, we have a few thousand users. 

    How are customer service and support?

    We haven't had any issues with the technical support. 

    Which solution did I use previously and why did I switch?

    I previously used Symantec and McAfee depending on the requirements at the time. There's not much difference between all the solutions in this area. It comes down to how manageable they are and how frequently false positives exist in that environment and whether they slow down the transactions or the processing of the machine. 

    How was the initial setup?

    The initial setup is fairly straightforward, deployment takes a few minutes. It's just a matter of setting up the server, your policies, and pushing out the agents. 

    What was our ROI?

    Our ROI has been from an operational perspective. If you're not fighting with a product every day, it saves you time and money. 

    What's my experience with pricing, setup cost, and licensing?

    Licensing costs are usually paid annually or every three years. This is not a particularly expensive solution. 

    What other advice do I have?

    I rate this solution eight out of 10. 

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Hazel Zuñiga Rojas - PeerSpot reviewer
    Administrative Assistant at Tecapro
    Real User
    Good prevention and detection with helpful analytics
    Pros and Cons
    • "Its most valuable feature is the integration of analytics with the cloud."
    • "I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available."

    What is our primary use case?

    Today, with our current organizational needs, we find great complexities when it comes to protecting each of our users inside and outside of the network. As a result, we came to use solutions that had not been deployed yet, and one of them is the integration that Check Point has in its range of solutions, such as the Blade and what we know today as the Check Point Antivirus. Thanks to this solution, we are protected.

    How has it helped my organization?

    The  Antivirus is part of the added value we are getting from Check Point. It's offering greater prevention and detection of attacks. The solution adds value to our organization since it is protecting us and integrates analytics with the Check Point cloud. We're getting great computing power and analysis behind the security. 

    What is most valuable?

    Its most valuable feature is the integration of analytics with the cloud. We like that we can detect zero-day incidents, problems, or virus attacks inside or outside the organization. It's one of the most complex and integrated antivirus solutions. The value of analysis in real-time every time we are having an attack, vulnerability, or security breach is very helpful. Today, we want to have integrated solutions and quick solutions that will protect us mainly with new attacks and solutions that protect us from the hijacking of our data (ransomware).

    What needs improvement?

    I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available. We want the solution to help us achieve 360-degree security across all work teams. 

    For how long have I used the solution?

    I've used the solution for about two years.

    What do I think about the stability of the solution?

    The solution is really simple. It is not difficult to configure, and it is very stable for me, from my experience.

    What do I think about the scalability of the solution?

    Due to its deployment, it is integrated within our network, and it is a quick and easy solution to scale or modify.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    reviewer1853787 - PeerSpot reviewer
    Systems Engineer at HarborTech Mobility
    User
    Good file scanning, stops malicious files, and detects/blocks malware
    Pros and Cons
    • "Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters."
    • "I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics."

    What is our primary use case?

    The Check Point Antivirus offers our company a high level of security. It helps us to filter outgoing URLs with possible malevolent threats. Also, this great solution secures endpoints efficiently so that connections, applications, websites, and software.

    The Check Point Antivirus uses real-time anti-virus protection and protection based on Threat Cloud anomalies. It's very useful.

    I like that the antivirus hardly affects the performance of our security gateways, thus offering additional security almost without penalty.

    How has it helped my organization?

    Check Point Antivirus really is a great solution. It helps us to improve our company. First, it offers a high-security level. It helps me filter out outgoing URLs with potential malicious threats. Second, Check Point Antivirus is very easy to configure and enables me to take measurements under any threat quickly. Thanks to its constant updates in real-time, it is always up to date with possible new threats, so it is very effective at detecting all kinds of instructions, malware, or viruses.

    Also, Check Point Antivirus allows me to keep all my computers protected against any potential cyber threat. It gives me the capability to detect and block malware threats by using virus signatures in real-time.

    What is most valuable?

    If you need a good antivirus, Check Point Antivirus is more than great. 

    Check Point Anti-Virus has many positive characteristics. First, Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters. Second, Like the other Check Point blades, the visibility and logging of events are remarkable.

    One of the features that I love the most about this large software is that It allows me to stop incoming malicious files, and stop users from accessing malicious software-infested sites. Also, it gives me the opportunity to get very comprehensive reports where we can collect summaries of infections and trends to provide greater visibility of threats, which is absolutely fantastic.

    What needs improvement?

    Until now, I've found no negative features sufficiently important to complain about. In general terms, the software works perfectly. One time, I had a little issue, however, the technical support staff resolved it almost immediately.

    I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics.

    I like that activating Check Point antivirus hardly affects the performance of our security gateways, thus providing additional security almost without penalty.

    For how long have I used the solution?

    We are started using Check Point Antivirus in 2016. This great solution allows us to avoid malware traffic before reaching end users.

    Check Point Antivirus is also really easy to set up. In just one click in the Smart Console, you can set up the policy and you're ready to go. Check Point Antivirus has a number of positive features that make it stand out through other means such as software.

    Which solution did I use previously and why did I switch?

    We use just Check Point Antivirus. We found everything we want in this great solution. It helps us to improve and secure our network. Also, Checkpoint Antivirus does excellent environmental protection work in many ways.

    What's my experience with pricing, setup cost, and licensing?

    I have just one piece of advice: if you can lower the price for this solution so that more companies can use this great solution and protect their environment, that would be ideal.  

    Which other solutions did I evaluate?

    We just work with Check Point Antivirus until now and we found that this solution is the best.

    What other advice do I have?

    If you are looking for a good antivirus, Check Point Antivirus is more than good, you will be surprised how excellent it is in all its aspects.

    Which deployment model are you using for this solution?

    Private Cloud
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    JamesYa - PeerSpot reviewer
    Senior Solutions Architect at Cloud4C Services
    Real User
    Easy to set up with good performance but needs a better user interface
    Pros and Cons
    • "The initial setup is easy."
    • "We'd like to see a friendlier user interface."

    What is our primary use case?

    We primarily use the solution as antivirus, antimalware, et cetera. It's standard antivirus software. Every PC must have an antivirus on it in our organization.

    What is most valuable?

    It just has standard antivirus. It does what it needs to.

    The solution offers good performance. 

    Its stability has been good.

    The initial setup is easy.

    What needs improvement?

    There is no real scalability.

    We'd like to see a friendlier user interface.

    For how long have I used the solution?

    I've been using the solution for one year.

    What do I think about the stability of the solution?

    The stability is decent and the performance is good. There are no bugs or glitches and it doesn't crash or freeze. It's reliable. 

    What do I think about the scalability of the solution?

    This solution does not scale. It's only installed on your PC and it has nothing to do with scale.

    We have 2,000 users right now. We do plan to increase usage within a year.

    How are customer service and support?

    We have never reached out to technical support. I can't speak to how helpful or responsive they are. 

    Which solution did I use previously and why did I switch?

    I've also used Microsoft Defender.

    I'm not sure if the company used a different solution previously. I just joined this company one year and they had already started using Check Point.

    How was the initial setup?

    The installation process is very simple and straightforward. The deployment is quick. It only takes a few minutes. 

    We have individuals in our department that can handle deployment and maintenance tasks. It only takes about 3% of our personnel.

    What about the implementation team?

    I handled the initial setup myself. I did not need the assistance of any consultants or integrators. 

    What's my experience with pricing, setup cost, and licensing?

    Users need to pay a yearly licensing fee.

    What other advice do I have?

    We are using the latest version of the solution. 

    I'm much more likely to suggest Microsoft Defender to other users. 

    I'd rate the solution at a seven out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    reviewer1536681 - PeerSpot reviewer
    Network, Systems and Security Engineer at SOLTEL Group
    Real User
    Easy to scale, heuristic scanning protects against previously unknown threats, and the support is good
    Pros and Cons
    • "Heuristic detection scans for suspicious characteristics that can be found in unknown, new viruses and modified versions of known viruses."
    • "It is very difficult to get ahead of what's coming in terms of new threats, however, I think that Check Point Antivirus must improve against zero-day attacks."

    What is our primary use case?

    We use this solution to protect our computers and remove all malicious software or code designed to damage our computers or data that belongs to our clients. We are notified of these actions.

    It is very important to protect all endpoints in our networks because these devices are entry points and every time, it is more difficult for our users to detect what object is malware and what object is legitimate software.

    Malware is evolving so rapidly that some estimate a new malware instance is created nearly every second.

    How has it helped my organization?

    We decided to implement Check Point Antivirus because they are an avant-garde company and they design the latest technology. In this case, their solution implements:

    • Signature-based detection identifies malware by comparing code in a program to the code of known virus types that have already been encountered, analyzed, and recorded in a database.
    • Heuristic detection scans for suspicious characteristics that can be found in unknown, new viruses and modified versions of known viruses.
    • Rootkit detection scans and blocks malicious code designed to gain administrative access to a machine.
    • Real-time detection scans and monitors files as they are accessed.

    What is most valuable?

    For us, the most valuable feature of Check Point Antivirus is the real-time detection scan that monitors files as they are accessed. It is important because we can react quickly.

    Today, malicious coders and hackers are experts at evasive tactics that shield their activities. Therefore, in today’s cybersecurity landscape, antivirus is just one of the many tools in an organization’s cybersecurity arsenal to keep the business safe.

    The antivirus solution should be implemented as part of the organization’s endpoint security solution that combines global threat intelligence and advanced threat prevention engines that address zero-day and other next-generation threats.

    What needs improvement?

    It is very difficult to get ahead of what's coming in terms of new threats, however, I think that Check Point Antivirus must improve against zero-day attacks.

    Today, next-gen approaches extend signature-based detection with behavioral detection, machine learning, sandboxing, and other techniques that are optimized to address threats such as malicious URLs, browser hijackers, advanced persistent threats, and phishing exploits. However, zero-day attacks keep happening quite frequently.

    For how long have I used the solution?

    We have been using Check Point Antivirus for 11 months.

    What do I think about the stability of the solution?

    In 11 months, we haven't had any problems. Our system is very stable and works fine.

    What do I think about the scalability of the solution?

    This solution is easily scalable.

    We deployed this solution once, and we have only needed to add new devices/servers/endpoints to our infrastructure to expand it.

    How are customer service and technical support?

    Check Point Service Support is very good. Normally, they contact you shortly after you open the ticket, and in all cases, they have given us a good solution.

    Which solution did I use previously and why did I switch?

    We use only this solution as a centralized solution. At other times, we used free software products.

    How was the initial setup?

    Before the initial setup, we used a training pack. For this, we can set up the entire system in a short time and we only use a small number of support hours.

    What about the implementation team?

    We implemented it through the best vendor team in Spain. They are 100% recommendable.

    Which other solutions did I evaluate?

    My team and I evaluated other products and vendors based on price, experience, technology, ease of configuration, integration time, licensing, etc. Finally, we opted for this Check Point solution.

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    PeerSpot user
    Senior Network/Security Engineer at Skywind Group
    Real User
    Regularly updated and has good event visibility and logging
    Pros and Cons
    • "There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives."
    • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

    What is our primary use case?

    Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment, located in Asia (Taiwan).

    The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

    The Check Point Antivirus software blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of scanning files that are traversing the network for the presence of viruses or other malicious software.

    How has it helped my organization?

    The Check Point HA Clusters are used to protect our company's datacenter, located in Asia (Taiwan). This software blade, the Check Point Antivirus, is activated in conjunction with the others and serves to scan the files traversing via the network. They may be in the form of email attachments or via HTTP/S.

    Such files are scanned for the presence of known viruses and malware with the help of the built-in database. The database is updated as per schedule, which for us is four times per day.

    The software is quite simple to use, yet still efficient. The antivirus scans are the basic security mechanism, which should be implemented on all the levels. In my opinion, the Check Point Antivirus does its job just right.

    What is most valuable?

    1. The Antivirus software blade is part of the Next Generation Threat Prevention license bundle.
    2. The Antivirus is able to scan files downloaded from the internet or traversing the network via Check Point Gateways/Clusters.
    3. The Antivirus software blade is configured via the Unified Threat Prevention policy in the Smart Console (at least for R80.10, the version we use).
    4. There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives.
    5. The updates for the blade are downloaded every two hours.
    6. As with the other Check Point blades, the visibility and logging of events are outstanding.

    What needs improvement?

    I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

    Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

    We also had several support cases opened for software issues, but none of them were connected with the Check Point Antivirus software blade.

    For how long have I used the solution?

    We have been using this product for about three years, starting in late 2017.

    What do I think about the stability of the solution?

    The Check Point Antivirus software blade is stable and we haven't faced any issues with it.

    What do I think about the scalability of the solution?

    The Check Point Antivirus software blade scales well with the gateways we use, since it doesn't affect the overall performance much after activation.

    How are customer service and technical support?

    We have had several support cases opened, but none of them were connected with the Check Point Mobile Access Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

    The longest issue took about one month to be resolved, which we consider too long.

    Which solution did I use previously and why did I switch?

    No, we didn't previously use another network antivirus solution.

    How was the initial setup?

    The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

    What about the implementation team?

    Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

    What's my experience with pricing, setup cost, and licensing?

    Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

    Which other solutions did I evaluate?

    No, since we had Check Point NGFWs implemented, we just enabled the new software blade.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.
    Updated: June 2025
    Product Categories
    Anti-Malware Tools
    Buyer's Guide
    Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.