Try our new research platform with insights from 80,000+ expert users
Ido Sarusi - PeerSpot reviewer
Developer at Shavit-security
Real User
Top 10
Incorporates security AI features and effectively manages bandwidth with its DRS capabilities, but the software could be more resource-efficient
Pros and Cons
  • "This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities."
  • "The software requires considerable resources and can strain less powerful computers."

What is our primary use case?

We continue to offer our support solutions to other companies as requested. I focus on cyber security, specifically specializing in detecting malware in text and searching for remote access or reverse channels on computers.

What is most valuable?

This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities. However, there's still room for improvement and the addition of more features. Nevertheless, in the broader market landscape, it's considered one of the leading products. While there might be some competition from others like Cisco, it remains a strong choice. The feature lies in mapping and providing top-notch malware protection.

What needs improvement?

Perhaps the software could be made more resource-efficient. While many improvements come to mind, I don't have them readily available. Essentially, I aim to enhance the software's efficiency so that it places fewer demands on computer resources.

For how long have I used the solution?

I have been working with Check Point Harmony Endpoint for the past two years.

Buyer's Guide
Check Point Harmony Endpoint
August 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,649 professionals have used our research since 2012.

What do I think about the stability of the solution?

It is a stable solution and I would rate it seven out of ten.

What do I think about the scalability of the solution?

It isn’t very scalable since I wasn't able to bypass the security a couple of times. I would rate it a six out of ten. 

How was the initial setup?

I would rate it a six out of ten because it could have been easier. It might be somewhat challenging due to the numerous policies in place. For instance, it's more straightforward for me when users can easily set up policies because they come built-in. However, with Check Point, you do have the option to create custom policies. I'm not entirely certain if it's a strict either/or situation, as there might be some flexibility. Nonetheless, having a predefined "zero one" option can make it easier for users, as they don't necessarily have to customize policies themselves.

The deployment takes long enough.

What other advice do I have?

Currently, this software stands out as one of the top choices in the field. It's undoubtedly a strong contender for enhancing computer security, and while there are various other products available, this one ranks among the best.

I recommend the solution, but I would rate it a six out of ten, mainly because the software requires considerable resources and can strain less powerful computers. It tends to impact system efficiency, especially on computers with weaker hardware, causing frequent restarts and putting a significant load on the CPU and memory.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Sales Manager, Checkpoint at South Asian Technologies
Reseller
A solution with a number of valuable blades that make it competitive
Pros and Cons
  • "With the prevention blade, Harmony scales higher than many other solutions."
  • "I have a few issues when attempting to install Harmony on some of the machines."

What is our primary use case?

I handle Check Point SMB along with Check Point Harmony Endpoint, and I have recently provided around 400 endpoints to a construction company in Sri Lanka.

What is most valuable?

The Rollback feature is valuable because ransomware attacks are very familiar nowadays, and anti-phishing and anti-ransomware blades are required by many of our customers. Other features, like prevention blades, are also okay, where you get threat extraction and evaluation. Likewise, the forensic report is also very important.

With the prevention blade, Harmony scales higher than many other solutions. Even CrowdStrike has technical problems when you're offline. But Harmony is not like that. Even if I don't have Internet connectivity, I have seen how remediation and rollback happen. All the encrypted files come to a state where it works with micro-backups.

Customers would like to have a very advanced endpoint to protect themselves from anti-phishing, especially ransomware.

What needs improvement?

I have clients who use very old Windows versions, so I have a few issues when attempting to install Harmony on some of the machines. At times, even with the latest Windows versions, the machines' performance gets slower. We still don't have a clear idea of what has been happening. If you take 100 PCs, two, three, or four are still troublesome when you attempt to install Harmony.

Also, the price could come down slightly, and I am not saying by a huge gap, but slightly. Even Sri Lanka's smaller customers have to buy a minimum quantity, and with Harmony Connect, they have to buy 50 licenses at once. If they could come down to 20, 30, or something like that, I should be able to sell much more. Some customers would like to have Harmony, but they have to buy a minimum quantity of 50. That's a bit troublesome for me as a salesperson.

For how long have I used the solution?

I have worked with Checkpoint Harmony Endpoint for almost one year now.

What do I think about the stability of the solution?

I rate the solution's stability a nine out of ten.

What do I think about the scalability of the solution?

I highly rate the solution's scalability.

How are customer service and support?

We have a set of engineers who specialize in Harmony Endpoint and Harmony Connect.

How would you rate customer service and support?

Positive

How was the initial setup?

The deployment takes one or two weeks. The deployer always creates a tenant, through which they install the solution. They also trained customers and end users to install Harmony, and they managed to install the entire license.

What's my experience with pricing, setup cost, and licensing?

I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high.

What other advice do I have?

Features like factory remediation, basically callback, are getting familiarized by Sri Lankan customers. Many have bought Harmony endpoints, so many customers have been considering Harmony Connect. This will lead to it having a good future.

When speaking to customers, I first communicate what ThreatCloud is all about. ThreatCloud is shared by other solutions like CloudGuard, Quantum, and Quantum Spark. It's very common to them. This means you will get the prevention blade, not the detection blade. Whenever you have phishing attacks, malware attacks, DDoS attacks, and even zero-day attacks, they are all always prevented by Check Point Harmony and Check Point products.

I always advise people to go for an advanced endpoint because IT managers have less of a hassle when using products like Check Point.

I have been facing lots of competition with CrowdStrike and Kaspersky. I don't think other products should compete with Check Point Harmony Endpoint because it is a different level endpoint altogether. I want to give them competition with the pricing.

I rate Check Point a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
August 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,649 professionals have used our research since 2012.
reviewer2098998 - PeerSpot reviewer
Software Engineer at Mercado Libre
User
Good pricing, easy to deploy, and useful antivirus capabilities
Pros and Cons
  • "The virus detection models orchestrate real-time monitoring of data with reliable reporting information."
  • "The next release can focus more on timely upgrades to enhance computing compatibility."

What is our primary use case?

Check Point Antivirus helps us to detect malware attacks and any phishing attacks that can destroy data and affect programs. 

When installed in any computing device, it provides tracking information that enables members to connect virtually with colleagues in remote areas. It is less costly since it enables members to access company websites from anywhere. 

The endpoint protection services ensure there is data security across the defined network infrastructure. It protects our devices against virus attacks.

How has it helped my organization?

The antivirus has enhanced the secure implementation of most projects and tasks among teams in the enterprise. 

The pricing is good, and it is easy to deploy this software. 

When linking with my colleagues from remote areas, it ensures the communication network is free from cyber attacks. 

The virus detection models orchestrate real-time monitoring of data with reliable reporting information. 

It has reduced the cost of attending events physically and catering accommodations for employees. 

The threat response system has saved teams from engaging with unsafe content and visiting unprotected online sites.

What is most valuable?

It provides automatic scans to most websites to ascertain security situations and alerts the user when there are potential threats that can affect data. 

The webcam protection system prevents unauthorized members from joining virtual meetings organized by employees. 

The phishing protection system prevents teams from spamming across email conversation channels. 

It is easy to install and learn how this platform works. 

It has various location connection that enables the user to select preferred sites that are safe.

What needs improvement?

I am satisfied with the set features due to their competitive performance since we deployed them. 

Integration with some applications was challenging during the deployment process. 

The next release can focus more on timely upgrades to enhance computing compatibility. 

The cost is worth its functionalities and contribution towards the protection of our systems. 

The software services and functions have met the company's requirements and policies. 

There are many notifications that keep streaming in when using the antivirus, and that can be improved.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

It is stable in virus prevention.

What do I think about the scalability of the solution?

I am impressed by the reliable services of this platform.

How are customer service and support?

There have been improved customer support services since we deployed them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used any similar antivirus products.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The implementation took place through the vendor.

What was our ROI?

There is increased ROI from a stable performance.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is the best platform for preventing virus penetration.

Which other solutions did I evaluate?

I looked into other options. The cost and performance capability of this version were the best.

What other advice do I have?

This is a great product that I recommend to other organizations.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle
User
Great support with faster data processing capabilities and a high level of security
Pros and Cons
  • "Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information."
  • "It blocks safe URLs sometimes when there are network interruptions."

What is our primary use case?

We deployed this product to harmonize our products and have one central access point. 

It helps us to set security features that protect the computing devices from malware attacks. 

It gives me an opportunity to manage applications that works on various workflows centrally. 

Integration with all employee devices has enabled my team to monitor the security situation and put in place emergency measures in case of any threat. 

Team members can connect their working devices from a central networking connection that is secure and reliable.

How has it helped my organization?

The high-level security provided by Check Point Harmony Endpoint has given my team all the required tools for setting up a central network control platform. It provides solutions to challenges that affect workflows slowing down performance. 

There is improved business work processes agility that keeps all the sectors functional. 

There has been improved security compliance and risk management in all the business transactions that we undertake since we deployed this application. 

Laptops and mobile devices that operate within the enterprise have been secured, and teams can easily focus on more productive roles without fear of being attacked.

What is most valuable?

Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information. 

The cloud management system provides security to hybrid information and saved files. 

The customer support services are efficient and always reliable when reached for any consultation. 

It supports operating systems that are deployed in computers and mobile devices. 

New users familiarize themselves easily with the operation of UI since it has flexible dashboards. 

The faster data processing capability saves time and costs for accomplishing given tasks.

What needs improvement?

It has full performance capability to execute the given duties. 

It blocks safe URLs sometimes when there are network interruptions. 

The cost of deployment varies with the existing working conditions and the organization's size. 

The cloud networking infrastructure can be attacked if there are limited security features and poor monitoring capacity from the IT team. 

The overall performance impressed my team. Check Point Harmony Endpoint is the sure deal for enterprise security coverage and computing device control.

For how long have I used the solution?

I've used the solution for ten months.

What do I think about the stability of the solution?

It is stable in the provision of reliable security.

What do I think about the scalability of the solution?

I am impressed by the performance of this product.

How are customer service and support?

The customer support staff is ever supportive.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used a similar solution previously.

How was the initial setup?

The initial setup procedure was straightforward.

What about the implementation team?

There was high-level expertise from the vendor team during implementation.

What was our ROI?

There has been a positive ROI since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The setup cost and licensing terms vary according to enterprise size.

Which other solutions did I evaluate?

I evaluated several options. This platform was the best.

What other advice do I have?

I recommend the implementation of this platform in other organizations.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Improves security, defines policies, and helps with compliance
Pros and Cons
  • "Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity."
  • "There needs to be more internally connected systems in order to achieve real-time effectiveness."

What is our primary use case?

In search of a solution that allowed us to analyze, detect, evaluate and, above all, correct at the antivirus level within the network in a perimeter way, we have used the solutions that come in the Check Point appliances, thus giving us the possibility of enabling a lot of its most outstanding features.

How has it helped my organization?

We had been trying to complement the antivirus solution across our computers. We searched and tested different providers, reaching the conclusion that we could get the most out of solutions that we already had as they were already giving us additional protection. We needed, however, additional protection that would allow us to configure from a perimeter device all the conditions, rules, policies, and needs for blocking or security in the organization's network. With this solution, we could generate value and security in each of the actions that users have within the perimeter network. 

What is most valuable?

Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease. 

What needs improvement?

We should be able to generate client applications based on a structure and scheme that uses the power of computation of local devices to generate interaction and remote management. There needs to be more internally connected systems in order to achieve real-time effectiveness. The solution should establish communication in real-time, thereby multiplying those possibilities of interaction in a faster way when it comes to communicating against your central server. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Ankita  Singh - PeerSpot reviewer
Application Developer at Capegemini Consulting India Private Limited
Real User
Top 20
Highly productive, compatible, and easy-to-use
Pros and Cons
  • "Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background."
  • "Overall I didn't personally face any issues while implementing Check Point Antivirus."

What is our primary use case?

After implementing Check Point Antivirus, we've had a few compatibility issues with my devices.

Check Point Antivirus proved to be highly productive for my work and has helped with data security via its features. It offers VPN capabilities and provides multiple device protection. It is very easy to monitor results across all covered devices.

Check Point Antivirus is highly compatible with other solutions and is scalable while offering extremely low pricing.

How has it helped my organization?

Check Point Antivirus proved to be highly productive and scalable for my work. The data security features, including malware detection and escalation, operated quickly. There are multiple devices protected by the software. It is now very easy to carry out and monitor results from the same task across all devices.

Check Point Antivirus automatically fixes pop-up ads and effortlessly detects all kinds of malware and threats while syncing systems in the background.

What is most valuable?

Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background.

Along with Check Point Antivirus, the support provides multiple updates and upgrades in quick succession. It's quick to restore the management of the database and has scheduled security system and network upgrades for risk-free work management.

Overall, Check Point Antivirus is highly productive, scalable, compatible, and easy-to-use software for data security and system management. I highly recommend this platform.

What needs improvement?

There are no areas that Check Point Antivirus needs to work on.

Overall I didn't personally face any issues while implementing Check Point Antivirus. In comparison to alternatives present in the market Check Point Antivirus has high efficiency and a better ability to protect our devices both online and offline.

Personally, I highly recommend this platform to professionals for data security and management.

For how long have I used the solution?

I've used Check Point Antivirus integration for approximately one year or so.

Which solution did I use previously and why did I switch?

I haven't used any other such platform for data security and system management.

What's my experience with pricing, setup cost, and licensing?

Overall, Check Point Antivirus is highly productive, scalable, compatible, and very easy to use. It's good software for data security and systems management and I highly recommend it.

Which other solutions did I evaluate?

I did look into other options. For a simple comparison, I visited certain websites for product reviews. In the end, I found Check Point Antivirus to be the best option.

What other advice do I have?

Go for it. First, implement it and see the change in your levels of security.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC
User
Timely updates, comprehensive data management features, and good monitoring
Pros and Cons
  • "It monitors data flow across the networking system to enhance comprehensive workflow infrastructure."
  • "The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis."

What is our primary use case?

Harmony Endpoint helps the company to protect devices from phishing attacks. 

It offers instant notification when it senses any form of external threat that can compromise data. 

It can be easily deployed on both mobile and desktop devices. 

The product has saved my team a lot of time and resources during the project implementation process. 

It responds quickly to data threats that can leak internal information into an unsafe environment. We have accomplished many projects and submitted them successfully to our clients without any challenges since deploying Harmony Endpoint.

How has it helped my organization?

This solution provides threat intelligence to all sectors to enhance effective planning and decision-making before we get into trouble. 

It monitors data flow across the networking system to enhance comprehensive workflow infrastructure. 

Real-time monitoring provides essential tools for security configurations that cannot be interfered with by ransomware attacks easily. This is the best solution, far from other related software in attack prediction and threat analysis. It is cloud-based, and teams across the organization find it to be more flexible for real-time analytics.

What is most valuable?

Network monitoring provides the best reports based on real-time performance, which helps our members locate any drawbacks across the workflow system.

The threat response system from the user dashboard blocks malware attacks that can affect email and the flow of information among colleagues. 

Endpoint protection is fundamental in security enhancement; it's effectively protecting our devices from internet viruses.

The application investigation system enables the IT team to come up with reliable reports on the cause and prevention measures that can be adapted to prevent any future attacks.

What needs improvement?

The system has comprehensive data management features that have saved us from incurring unplanned losses. 

Timely updates and suitable configurations can block malware attacks and provide effective reports on security situations. 

The setup process was complicated, however, when the customer service team came in, they provided productive guidelines that have kept the system working efficiently. 

The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis.

For how long have I used the solution?

I've used the solution for 18 months.

What do I think about the stability of the solution?

This platform is highly stable, and the performance is awesome.

What do I think about the scalability of the solution?

The scalability has impressed all relevant teams.

How are customer service and support?

The customer service team is passionate about their work, and they provide timely responses.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with other related products.

How was the initial setup?

The setup was straightforward. We had assistance from the customer support team.

What about the implementation team?

implementation took place through the vendor team.

What was our ROI?

The targeted ROI has been achieved since we deployed the application.

What's my experience with pricing, setup cost, and licensing?

The setup and cost depend on the number of devices that have to be secured.

Which other solutions did I evaluate?

I evaluated Intercept X Endpoint. However, it did not impress the entire team.

What other advice do I have?

I am satisfied with the current performance and I thoroughly recommend Harmony Endpoint to other business enterprises.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1777338 - PeerSpot reviewer
Supervisor Tecnico at M.Coutinho Douro - ComÉrcio De AutomÓveis, S.A.
User
Good URL filtering and application control with useful dick encryption
Pros and Cons
  • "The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options."
  • "Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant."

What is our primary use case?

We're using this for our endpoint protection in terms of antivirus and malware protection, disk encryption, and URL and application filtering on our client computers.

We integrate the VPN feature with Check Point's firewall allowing our clients to access internal resources with security policies enforced and controlled.

The reports given by the software are also a benefit since it allows better management and control of access to all our client computers at any time from anywhere.

The web console is also nice.

How has it helped my organization?

We have all our information and policies on one platform for all the features, and we can assign our technicians' several permissions and roles on the product.

Our customers are also better protected, and we can guarantee that security policies are enforced and compliant in each one of them.

Security has been a significant focus for us, and Harmony Endpoint, together with the entire Check Point ecosystem, made it easy for our organization to enforce such policies.

We value the URL and app filtering of the platform.

What is most valuable?

The URL filtering and application control are very helpful since it's typically hard to block productivity loss apps/URLs on clients when abroad. Harmony made it easy to control the usage of the company resources and bandwidth.

Disk encryption is a nice feature if you don't have other systems. However, since we've already had BitLocker deployed, we saved a few dollars on this licensing type.

The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options.

What needs improvement?

Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant. URL filtering should allow for time-based rules, for example, don't allow media streaming during work hours yet allow it on weekends.

The same applies to application control. When in our headquarters, we can solve this on the Check Point Firewall. However, the Harmony client does not support this type of condition, and we had to find a "middle ground" between policies and usability for our clients.

For how long have I used the solution?

We've been using this solution for two years.

Which solution did I use previously and why did I switch?

We did use Microsoft Defender. It lacked features, and therefore we moved away from the solution.

What's my experience with pricing, setup cost, and licensing?

I'd advise users to try to implement BitLocker for disk encryption since it's free.

Which other solutions did I evaluate?

We did not evaluate other options. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: August 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.