Try our new research platform with insights from 80,000+ expert users

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Check Point Harmony Endpoint offers effective anti-ransomware protection, which can isolate infected devices and block malicious processes before they spread.
Check Point Harmony Endpoint provides advanced threat detection capabilities, capable of identifying sophisticated attack techniques with 100% detection.
Check Point Harmony Endpoint's integration with ThreatCloud AI delivers real-time updates and threat intelligence, protecting against newly emerging threats globally.
Check Point Harmony Endpoint's central management allows for consistent policy enforcement across all endpoints, streamlining security operations.
Check Point Harmony Endpoint includes SandBlast Zero-Day Protection, which uses advanced sandboxing and threat emulation to prevent unknown threats before execution.

CONS

Check Point Harmony Endpoint requires improvement in remote deployment as it depends heavily on deployment tools, making the process challenging.
The setup and configuration of Check Point Harmony Endpoint are complex and could be simplified to enhance user experience and deployment efficiency.
Check Point Harmony Endpoint is reportedly priced higher than competitors, creating affordability concerns for users, especially in comparison to other market offerings.
The bandwidth regulation feature is lacking in Check Point Harmony Endpoint, which limits the ability to monitor and control bandwidth allocation effectively.
Customization and the creation of tailored reports for specific needs in Check Point Harmony Endpoint require extra effort, suggesting the need for more flexible custom reporting options.
 

Check Point Harmony Endpoint Pros review quotes

NetworkAc063 - PeerSpot reviewer
Network Architect at Leprino Foods
Feb 12, 2019
Its ease of use is the most valuable feature. We had existing endpoints and it was an easy upgrade process. The interface board is also easy to use.
CP
Owner at a tech services company with 1-10 employees
Feb 12, 2019
Its ability to rollback anti-ransomware once an attack has started is the most valuable feature.
Bala_Krishna - PeerSpot reviewer
Director at esupport Solutions Pvt ltd
Feb 19, 2019
The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature.
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.
Lead547e - PeerSpot reviewer
Lead at a financial services firm with 10,001+ employees
Mar 11, 2019
It provides remote access for the staff and increases their productivity.
MT
Operations Director at a tech services company with 1-10 employees
Mar 11, 2019
The end-user facilities for managing the tool are good.
reviewer1039464 - PeerSpot reviewer
Network Administrator at a healthcare company with 1,001-5,000 employees
Mar 17, 2019
Administratively, it's easy to control.
GC
ICT Officer at Kenyatta National Hospital
May 22, 2019
Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved.
seniorse527517 - PeerSpot reviewer
Senior Security Consultant - Checkpoint Technologies at a tech services company with 11-50 employees
May 29, 2019
We had a ransomware attack and the SandBlast agent automatically picked up the ransomware.
PA
CIO / CTO at a financial services firm with 51-200 employees
Sep 5, 2019
The most valuable feature is the integration with CheckPoint's firewalls. You can have one port, and follow the logs from both Endpoint and firewall security.
JG
Owner at Giliam Network & System Solutions
Oct 3, 2019
The most valuable feature of this solution is the VPN.
 

Check Point Harmony Endpoint Cons review quotes

NetworkAc063 - PeerSpot reviewer
Network Architect at Leprino Foods
Feb 12, 2019
There was a learning curve for our general population of employees (the user).
CP
Owner at a tech services company with 1-10 employees
Feb 12, 2019
It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects.
Bala_Krishna - PeerSpot reviewer
Director at esupport Solutions Pvt ltd
Feb 19, 2019
The remote deployment with Check Point Endpoint Security requires improvement. We have to depend on some of their deployment tools. I would like a system endpoint protection management tool or a remote deployment tool.
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.
Lead547e - PeerSpot reviewer
Lead at a financial services firm with 10,001+ employees
Mar 11, 2019
A couple of times, we experienced some sales issues.
MT
Operations Director at a tech services company with 1-10 employees
Mar 11, 2019
Areas that have room for improvement are the scope of the product and, while I think the support is good, they can improve support as well.
reviewer1039464 - PeerSpot reviewer
Network Administrator at a healthcare company with 1,001-5,000 employees
Mar 17, 2019
Off the top of my head, I can't think of a way it has improved my organization.
GC
ICT Officer at Kenyatta National Hospital
May 22, 2019
They should provide bandwidth regulation, so we can monitor and regulate bandwidth.
seniorse527517 - PeerSpot reviewer
Senior Security Consultant - Checkpoint Technologies at a tech services company with 11-50 employees
May 29, 2019
One area of this product that has room for improvement is the disc encryption.
PA
CIO / CTO at a financial services firm with 51-200 employees
Sep 5, 2019
The solution could improve VPN functionality and the VPN user-interface.
JG
Owner at Giliam Network & System Solutions
Oct 3, 2019
I would like to see support for a policy in the appliance that will refuse to create a connection if it does not detect an active virus scanner.