Try our new research platform with insights from 80,000+ expert users
reviewer2049771 - PeerSpot reviewer
Business Manager at a tech services company with 51-200 employees
User
Dec 13, 2022
Good security and support with an easy implementation process
Pros and Cons
  • "The zero-day threat prevention is excellent."
  • "I would like to see them add features where we can use this license for mobile browsers, too."

What is our primary use case?

I am using this product to prevent any kind of advanced threats. It keeps monitoring in the backend and does not hamper my ongoing work at all. it also secures my web browsing and has forensics access along with a sandbox to emulate and extract too. 

Before using this product, we had tried multiple others yet were not satisfied with the performance and dashboard reports. Check Point products allow us constant filtering and protect us from any kind of threats. 

How has it helped my organization?

It has been used for a banking environment and helps us to secure our end computing where USB blocking and even disk encryption and so many features have been bundled together. 

Securing our data was critical. It helps a lot and gives control to end users while they connect through the VPN. Secure VPN connectivity is important. It helps us to avoid any kind of risk when users are at home. 

It helped us a lot during the first phase of the Covid lockdown, which revealed the benefits of this product. 

What is most valuable?

I loved almost all the features.

The zero-day threat prevention is excellent. It gives us more confidence to have automated protection from unknown threats. 

It helps to secure our browsing. It can check if something is a genuine page or not. It also masks when we browse or enter our banking user ID and password. This gives us assurance that we are in a green and safe zone. 

What needs improvement?

I would like to see them add features where we can use this license for mobile browsers, too - as we had a container kind of product under MDM. This can give us more confidence that when on the go, a user still has full access to our important and crucial data. They should be fearless while accessing this through our VPN tunnel. 

Mobile handsets are now used for 40% of work to send mail or forward any kind of document. Securing users on mobile will give more confidence to users and higher authorities that will sometimes need to have access outside of the office for doing their financial or confidential transactions.

Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for more than four years.

What do I think about the stability of the solution?

After using this product last fours year I've never seen a single case where any devices have been affected. Even a lost device has not been a deal breaker. We have full control on end-user clients with the help of Check Point SandBlast. 

What do I think about the scalability of the solution?

It is very easy to scale. There are so many testing opportunities and upgrades. The features also do not slow down the CPU. From a stability and manageability point of view, it's very impressive. 

How are customer service and support?

Support can help us define and create policies on each and every use case. We also have the in-house expertise to provide support and handle the initial trouble shooting. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using Symantec and Sophos. There was not 100% clarity on reports, and we had many challenges in terms of upgrading the features. 

When we switched to Check Point, we got a single dashboard to control end clients, DLP, and email security. Their collaboration and support team is also awesome. 

How was the initial setup?

You can set up the policies very easily. You just post and restart your devices and everything is secure. Items can be managed under group policies. You can set up your own rules and policies easily. 

What about the implementation team?

Initially, we had taken advantage of Check Point expertise. Now, an in-house team can handle everything. It is manageable on our side. 

What was our ROI?

If you talk about ROI, it's helped us to protect our end-user devices. We've also found the performance of laptops has increased in the past one and a half years. It offers good value for money. 

What's my experience with pricing, setup cost, and licensing?

Securing data, peace of mind, great support, good reports, and third-party network audits have made Check Point good value for money. 

Which other solutions did I evaluate?

I had tried Palo Alto and Fortinet, however, we got value for money in Check Point. After a POC, we started with Check Point. 

What other advice do I have?

There are so many useful examples a normal office could take advantage of. It's a great product for working from home or remote users. The Check Point team is also great and has served us by helping put in place the right kinds of products. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Shyam Lal Navatiya - PeerSpot reviewer
Senior Consultant at a consultancy with 10,001+ employees
User
Nov 3, 2022
Cost-effective with real-time and proactive detection
Pros and Cons
  • "It has zero-day attack protection."
  • "While features are really good and promising to use and implement, a certain level of improvement is required in terms of software deployment across different business environments."

What is our primary use case?

Check Point Antivirus is the best antivirus tool in the market currently. 

The malware and ransomware catchment rate of the software is just exceptional and worth recognizing and recommending to peers. We have been using the tool for quite some time now and must say that it's quite reliable and highly dependable. It ensures no malware or virus should make any kind of entry into the system and enables a virus-proof environment all over.

The performance efficiency is great and reduced expenses have literally attracted a lot of small and marginal organizations to adopt this software in the first place.

How has it helped my organization?

Check Point Antivirus has significantly improved the outcome and performance output of my organization. It is extremely usable across different business environments and quite compatible with all kinds of portals and dashboards. 

It is highly flexible and easy to integrate, with no lags or slip-ups at all. Now, all our verticals are sharing details and working across any kind of unprotected network environment without any tension. We have 100% all-around protection, which is covered by Check Point Antivirus. We'd highly recommend it to all. 

What is most valuable?

The solution offers a high malware catchment rate and increased speed, and the performance outcome efficiency is commendable.

It is a highly cost-effective antivirus software in the market compared to its competitors in the market.

The stability of the software is great and highly compatible as well.

Real-time and proactive detection of any malware or ransomware in the system means issues can be removed ASAP.

It has zero-day attack protection.

The product offers complete protection of the system from hijackers, and no phishing activity is allowed under any circumstance. It is high-grade protection with strict system security.

What needs improvement?

While features are really good and promising to use and implement, a certain level of improvement is required in terms of software deployment across different business environments. It is highly advisable to create multiple child logins to operate the running of the software across multiple interfaces in one go without any trouble. Also, it is advised to incorporate the features like round-the-clock, 24/7/365 scanning of the system in the background without disturbing the routine front-end work. This ensures no lapses or threat entry into the system at all.

For how long have I used the solution?

I've used the solution for over a year now.

What do I think about the stability of the solution?

The product is quite stable.

What do I think about the scalability of the solution?

The solution is highly scalable.

How are customer service and support?

Technical support has been great so far.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution. We started with a trial version of Check Point. 

How was the initial setup?

The initial setup is straightforward and easy.

What about the implementation team?

We implemented the solution through the vendor team.

What was our ROI?

The ROI has been good.

What's my experience with pricing, setup cost, and licensing?

The setup is easy and uncomplicated and the annual renewal is quite a smooth process. It's amazingly easy to deploy. Licensing is done in one click without any hassle at all. It was an amazing experience.

Which other solutions did I evaluate?

We looked into Trend Micro, Wipro, etc.

What other advice do I have?

I'd advise others to try the solution today and improve the security system of your organization.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.
Raj Kumar07 - PeerSpot reviewer
Senior Manager at a consultancy with 201-500 employees
User
Top 20
Oct 2, 2022
Good advanced intelligence and threat prevention with a quick response time
Pros and Cons
  • "It is one of the fastest malware prevention software with advanced upgrades to have 360-degree threat detection and system remediation."
  • "They can improve the customization features to the greatest extent possible and also help bring automation into system security in the most unified manner possible."

What is our primary use case?

Check Point Antivirus is the best-in-class security solution for all kinds of enterprises and IT servers and clouds. 

It helps in generating active threat detection intelligence responses to the system to stop the entry of virus attacks and also prevent the systems and servers from any potential harm. 

It is one of the most advanced security software that helps in threat detection and its easy remediation. 

It proactively stops threats and provides immediate security cover to existing infrastructure to avoid any great harm to the system and server.

How has it helped my organization?

Check Point Antivirus helped us to gain extra momentum on the security front, where every security access is now carefully monitored and checked. There is no security breach in our systems. The advanced threat detection intelligence is easy to operate, and even a person from a non-tech background can also go ahead with working with Check Point Antivirus and ensure that the system is secure from all rounds and corners.

The Antivirus can fight malware and ransomware attacks proactively and provides detailed reports through a dashboard and inbuilt reporting and monitoring system, which helps monitor the regular upgrades and progress of working.

What is most valuable?

The advanced intelligence is embedded in the software for ransomware and threat attack detection on systems and servers.

Its prevention of threat attacks and managing of the system security is in a unified manner with complete control covered by the authorization team without any security breach.

It is one of the fastest malware prevention software with advanced upgrades to have 360-degree threat detection and system remediation.

The quickest response time and quick turnaround time help curb the attack in the best possible manner without much harm to the system and servers.

What needs improvement?

They can improve the customization features to the greatest extent possible and also help bring automation into system security in the most unified manner possible. 

It is still one of the most remarkable systems securing software with amazing positive rates of detecting and catching malware attacks and also preventing system and data breaches. 

All the detection of threat attacks is done in real-time with round-the-clock security features like signature-based threat detection, rootkit threat detection, and many more. Users and the tech team love them.

For how long have I used the solution?

I've used the solution for over three months.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

This is a highly scalable solution.

How are customer service and support?

Technical support has been helpful and supportive.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a Trend-branded security solution earlier, and due to a smaller response from the business team, we decided to switch and change the vendor.

How was the initial setup?

The setup is streamlined and easy.

What about the implementation team?

We used a vendor team to assist with the initial setup. 

What was our ROI?

The ROI is good compared to other security software options.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus brings trust, scalability, and advanced security solution features. It is easy to integrate and use across different business environments. The cost is significantly low presently, and utilities are wonderful and worth trying. The licensing and renewal process is also smooth and not complex at all. 

Which other solutions did I evaluate?

We looked into McAfee, Avast, Norton, and Bitdefender as well. 

What other advice do I have?

Try the solution and experience the best features on your own.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

IBM
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Thao Vo - PeerSpot reviewer
Cloud Solutions Architect at a healthcare company with 201-500 employees
Real User
Top 20
Jun 13, 2024
Ensure user's machine is protected and securely connected to the network and easy to set up
Pros and Cons
  • "With Check Point Antivirus, we can ensure our user's machine is protected and securely connected to the network."
  • "Need more documentation."

What is our primary use case?

Our company is a global software product company with a lot of users all around the world. With Check Point Antivirus, we can protect our users' machines and securely connect to a network.

We also automate the installation of antivirus software to all our client machines by using Check Point. It is very good.

The customer support feedback from the Check Point engineer
is very good and makes us feel more confident in the cybersecurity world.

How has it helped my organization?

With Check Point Antivirus, we can ensure our user's machine is protected and securely connected to the network. This will improve the security of the internal and external network.

It has prevented ransomware. 

I like the key logging and keyboard detection features.

What is most valuable?

The following is a list of the valuable features:

  • Good price
  • Best virus database
  • It isolates the infected machine.                                                                 

What needs improvement?

Improvements it should make: 

  • Need more document
  • Need faster customer support
  • The price can be better                                                                                  

For how long have I used the solution?

I have used this software for more than five years.

What do I think about the stability of the solution?

The stability is really good.

What do I think about the scalability of the solution?

The scalability is good.

How was the initial setup?

The initial setup was easy.

What was our ROI?

We have seen good ROI.

What's my experience with pricing, setup cost, and licensing?

It would be better if we could get a better price. 

Which other solutions did I evaluate?

We also looked at Avast Antivirus.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
ICT Officer at a healthcare company with 1,001-5,000 employees
Real User
Top 20
Apr 16, 2024
Flexible, supports most of the operating systems, and provides good threat intelligence features
Pros and Cons
  • "The solution has good threat intelligence features."
  • "The network monitoring features must be improved."

What is our primary use case?

We use the product at the perimeter. Since we do not have a branch, only one area is protected by the solution. The networks we have are in a compact area.

What is most valuable?

I love the product’s flexibility. We can manage the blade without changing the protocols. It is easy to manage how the tool runs the network. The product is easy to deploy. It’s a good firewall. It supports most of our OS, such as Linux and Windows. We can use it even on mobile devices. The browser and data protection are good. The solution has good threat intelligence features.

What needs improvement?

The network monitoring features must be improved. If my ISP says that they gave me 300 Mbps, I would like to see where the network is used the most and where we are underutilizing it. I need features to monitor the bandwidth. I want features to monitor the upload and download speeds.

For how long have I used the solution?

I have been using the solution for the last three years.

How are customer service and support?

The technical support is good. I was working on some backups of a hospital management system to the cloud. Check Point provided us with very good support.

How would you rate customer service and support?

Positive

What's my experience with pricing, setup cost, and licensing?

The pricing is very high. The tool’s cost has increased by almost 300% in two years.

What other advice do I have?

I will recommend the tool to others. Overall, I rate the solution eight and a half out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Ishant Gupta - PeerSpot reviewer
Trainee - cybersecurity engineer at a tech services company with 11-50 employees
User
Nov 1, 2023
Good threat detection with real-time scanning and automatic updates
Pros and Cons
  • "It has significantly bolstered our overall cybersecurity posture."
  • "One aspect that could see enhancement is the user interface."

What is our primary use case?

In our corporate environment, the primary use case for Check Point Antivirus is to provide robust endpoint antivirus protection. 

Our organization operates within a complex digital ecosystem, and ensuring the security of our network and devices is of utmost importance. 

Check Point Antivirus serves as the frontline defense, guarding against a myriad of cyber threats that could compromise our sensitive data and operations. 

Our organization operates in a dynamic and interconnected digital landscape, and ensuring the security of our network and devices is paramount

How has it helped my organization?

Check Point has brought about tangible improvements within our organization. It has significantly bolstered our overall cybersecurity posture. 

We've witnessed a noticeable enhancement in our ability to detect and respond to threats promptly. 

This solution has reduced risks and vulnerabilities, contributing to a more secure and reliable digital environment for our company. 

However, it's worth noting that no antivirus solution is foolproof, and the effectiveness of our security measures also relies on user awareness and best practices.

What is most valuable?

Among the features offered by Check Point Antivirus, the real-time scanning and automatic updates stand out as the most valuable. Real-time scanning ensures that threats are detected as soon as they appear, minimizing the potential damage they can cause. Automatic updates, on the other hand, keep our antivirus protection up-to-date with the latest threat intelligence and security patches. These features combine to offer a proactive and effective defense against a constantly evolving threat landscape.

What needs improvement?

While we find Check Point Antivirus to be a powerful tool, there are areas where it could be improved. One aspect that could see enhancement is the user interface. A more user-friendly and intuitive interface would make it easier for our security team to navigate and manage the solution efficiently. Additionally, improvements in reporting capabilities would enable us to better analyze security incidents and fine-tune our defenses.

Looking ahead to the next release of Check Point Antivirus, we hope to see advanced threat analytics as a part of the package. This would enable us to proactively identify emerging threats and vulnerabilities, allowing us to stay one step ahead of potential risks. 

Furthermore, greater customization options would be valuable, as they would allow us to tailor our security measures to the specific needs of our organization. In an ever-evolving cybersecurity landscape, these features would further empower us to protect our digital assets effectively.

For how long have I used the solution?

We have been using this antivirus within our company for six to eight months now.

What do I think about the stability of the solution?

It is quite a stable product.

What do I think about the scalability of the solution?

It is a scalable product across your enterprise and secures you from threats.

How are customer service and support?

Sometimes there is a delay in customer support, however, the issue is resolved at the end.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We've used Sophos previously, however, it made our systems very slow in performance.

How was the initial setup?

The initial setup is straightforward.

What about the implementation team?

We implemented the solution with an in-house team.

What's my experience with pricing, setup cost, and licensing?

There is minimal effort needed for the setup and deployment.

Which other solutions did I evaluate?

We also evaluated Trend Micro before choosing Check Point.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Sales Manager, Checkpoint at a computer software company with 11-50 employees
Reseller
Jul 17, 2023
A solution with a number of valuable blades that make it competitive
Pros and Cons
  • "With the prevention blade, Harmony scales higher than many other solutions."
  • "I have a few issues when attempting to install Harmony on some of the machines."

What is our primary use case?

I handle Check Point SMB along with Check Point Harmony Endpoint, and I have recently provided around 400 endpoints to a construction company in Sri Lanka.

What is most valuable?

The Rollback feature is valuable because ransomware attacks are very familiar nowadays, and anti-phishing and anti-ransomware blades are required by many of our customers. Other features, like prevention blades, are also okay, where you get threat extraction and evaluation. Likewise, the forensic report is also very important.

With the prevention blade, Harmony scales higher than many other solutions. Even CrowdStrike has technical problems when you're offline. But Harmony is not like that. Even if I don't have Internet connectivity, I have seen how remediation and rollback happen. All the encrypted files come to a state where it works with micro-backups.

Customers would like to have a very advanced endpoint to protect themselves from anti-phishing, especially ransomware.

What needs improvement?

I have clients who use very old Windows versions, so I have a few issues when attempting to install Harmony on some of the machines. At times, even with the latest Windows versions, the machines' performance gets slower. We still don't have a clear idea of what has been happening. If you take 100 PCs, two, three, or four are still troublesome when you attempt to install Harmony.

Also, the price could come down slightly, and I am not saying by a huge gap, but slightly. Even Sri Lanka's smaller customers have to buy a minimum quantity, and with Harmony Connect, they have to buy 50 licenses at once. If they could come down to 20, 30, or something like that, I should be able to sell much more. Some customers would like to have Harmony, but they have to buy a minimum quantity of 50. That's a bit troublesome for me as a salesperson.

For how long have I used the solution?

I have worked with Checkpoint Harmony Endpoint for almost one year now.

What do I think about the stability of the solution?

I rate the solution's stability a nine out of ten.

What do I think about the scalability of the solution?

I highly rate the solution's scalability.

How are customer service and support?

We have a set of engineers who specialize in Harmony Endpoint and Harmony Connect.

How would you rate customer service and support?

Positive

How was the initial setup?

The deployment takes one or two weeks. The deployer always creates a tenant, through which they install the solution. They also trained customers and end users to install Harmony, and they managed to install the entire license.

What's my experience with pricing, setup cost, and licensing?

I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high.

What other advice do I have?

Features like factory remediation, basically callback, are getting familiarized by Sri Lankan customers. Many have bought Harmony endpoints, so many customers have been considering Harmony Connect. This will lead to it having a good future.

When speaking to customers, I first communicate what ThreatCloud is all about. ThreatCloud is shared by other solutions like CloudGuard, Quantum, and Quantum Spark. It's very common to them. This means you will get the prevention blade, not the detection blade. Whenever you have phishing attacks, malware attacks, DDoS attacks, and even zero-day attacks, they are all always prevented by Check Point Harmony and Check Point products.

I always advise people to go for an advanced endpoint because IT managers have less of a hassle when using products like Check Point.

I have been facing lots of competition with CrowdStrike and Kaspersky. I don't think other products should compete with Check Point Harmony Endpoint because it is a different level endpoint altogether. I want to give them competition with the pricing.

I rate Check Point a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2098998 - PeerSpot reviewer
Software Engineer at a media company with 10,001+ employees
User
Feb 26, 2023
Good pricing, easy to deploy, and useful antivirus capabilities
Pros and Cons
  • "The virus detection models orchestrate real-time monitoring of data with reliable reporting information."
  • "The next release can focus more on timely upgrades to enhance computing compatibility."

What is our primary use case?

Check Point Antivirus helps us to detect malware attacks and any phishing attacks that can destroy data and affect programs. 

When installed in any computing device, it provides tracking information that enables members to connect virtually with colleagues in remote areas. It is less costly since it enables members to access company websites from anywhere. 

The endpoint protection services ensure there is data security across the defined network infrastructure. It protects our devices against virus attacks.

How has it helped my organization?

The antivirus has enhanced the secure implementation of most projects and tasks among teams in the enterprise. 

The pricing is good, and it is easy to deploy this software. 

When linking with my colleagues from remote areas, it ensures the communication network is free from cyber attacks. 

The virus detection models orchestrate real-time monitoring of data with reliable reporting information. 

It has reduced the cost of attending events physically and catering accommodations for employees. 

The threat response system has saved teams from engaging with unsafe content and visiting unprotected online sites.

What is most valuable?

It provides automatic scans to most websites to ascertain security situations and alerts the user when there are potential threats that can affect data. 

The webcam protection system prevents unauthorized members from joining virtual meetings organized by employees. 

The phishing protection system prevents teams from spamming across email conversation channels. 

It is easy to install and learn how this platform works. 

It has various location connection that enables the user to select preferred sites that are safe.

What needs improvement?

I am satisfied with the set features due to their competitive performance since we deployed them. 

Integration with some applications was challenging during the deployment process. 

The next release can focus more on timely upgrades to enhance computing compatibility. 

The cost is worth its functionalities and contribution towards the protection of our systems. 

The software services and functions have met the company's requirements and policies. 

There are many notifications that keep streaming in when using the antivirus, and that can be improved.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

It is stable in virus prevention.

What do I think about the scalability of the solution?

I am impressed by the reliable services of this platform.

How are customer service and support?

There have been improved customer support services since we deployed them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used any similar antivirus products.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The implementation took place through the vendor.

What was our ROI?

There is increased ROI from a stable performance.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is the best platform for preventing virus penetration.

Which other solutions did I evaluate?

I looked into other options. The cost and performance capability of this version were the best.

What other advice do I have?

This is a great product that I recommend to other organizations.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.