When it comes to Check Point Harmony Endpoint, I have not dealt with any of our company's clients yet since I am still in the discovery phase.
Network and Cybersecurity Engineer at Respiro
A tool that offers great functionalities in areas like web protection and threat prevention
Pros and Cons
- "The most valuable features of the solution are web protection and threat prevention."
- "A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings."
What is our primary use case?
What is most valuable?
The most valuable features of the solution are web protection and threat prevention.
What needs improvement?
A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings. Sometimes the product's page doesn't load at all, and sometimes it does. The position of the tabs and the other stuff on the product page needs to change a little bit.
I think the product's deployment process is much quicker in Mac devices, and it takes a bit more steps for Windows and the area, which needs a bit of improvement so that some balance is created when it comes to the steps in the deployment phase.
Considering last year, the pace at which the technical support team is progressing is a bit slow, making it an area where improvements are required.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for a year. My company has a partnership with Check Point Harmony Endpoint.
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,311 professionals have used our research since 2012.
What do I think about the stability of the solution?
Stability-wise, I rate the solution a ten out of ten.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution a nine out of ten.
My company mostly caters to the needs of small companies where the solution is used.
How are customer service and support?
I rate the technical support an eight out of ten.
How was the initial setup?
I rate the product's initial setup phase a ten on a scale of one to ten, where one is a difficult setup phase, and ten is an easy setup process.
The solution is deployed on the cloud.
The solution can be deployed in around ten minutes.
What's my experience with pricing, setup cost, and licensing?
I recently started to look for the prices of other products in the market and found out that Check Point Harmony Endpoint is cheaper than most of the other available solutions in my country. Price-wise, the product is affordable. There are no additional costs apart from the licensing charges that are attached to the product.
What other advice do I have?
Check Point Harmony Endpoint is a really good endpoint security solution because it comes as a full package. With the solution, there are not many additional costs for add-on features, especially when compared to the costs of the add-ons offered by other solutions in the market.
I rate the solution a ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer.
Chief Information Security Officer at a consultancy with 1-10 employees
A scalable tool that offers great EDR functionalities
Pros and Cons
- "Scalability-wise, I rate the solution a ten out of ten."
- "It's not easy to investigate an incident that you find in the company. Users often face trouble when downloading files, so it is very slow in terms of how it works."
What is our primary use case?
I work as a consultant for a company where the solution is needed as an EDR solution. After my company made comparisons between a few companies, we felt Check Point Harmony Endpoint won, considering the pricing model that it offered in the market. The company that uses the product wants to set up a big business for some local authorities with the help of the EDR functionalities provided by Check Point Harmony Endpoint, which is why Check Point is also trying to push its product into the market.
What is most valuable?
The most valuable features of the solution stem from the EDR functionalities it provides to users, as it does its work properly.
What needs improvement?
The tool is not too intuitive if you want to monitor and see the results to investigate in a layer. It's not easy to investigate an incident that you find in the company. Users often face trouble when downloading files, so it is very slow in terms of how it works. The tool is not very supportive of all the versions when it comes to the part of loading hash codes, so it may support SHA-1 but not SHA-256, meaning it doesn't support all the formats. Calling the support team for the solution doesn't help.
The support team of the solution lacks etiquette. The technical team of the product told our company that we need to get Check Point products through an official vendor only. Technical support for the solution is an area with issues where improvements are needed.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for two years. I work as a consultant for a company where the solution is used.
What do I think about the stability of the solution?
It is not a stable solution because if users find a problem with it, they have to disable the product.
Stability-wise, I rate the solution a six out of ten.
What do I think about the scalability of the solution?
It is easy to use the scalability feature of the product since users just need to acquire more licenses.
Scalability-wise, I rate the solution a ten out of ten.
The product is used mostly by small-sized businesses.
How are customer service and support?
I rate the technical support a four out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
CrowdStrike, SentinelOne, Cynet, and Fortinet FortiGate are a few of the solutions that I have worked with in the past. Among all the solutions that I have used to date, CrowdStrike is the best.
How was the initial setup?
I rate the product's initial setup phase a seven out of ten on a scale of one to ten. Compared to Check Point Harmony Endpoint, the deployment process of CrowdStrike was much easier.
Compared to Check Point Harmony Endpoint, the deployment process of CrowdStrike was much easier as it could be deployed in hundreds of locations in two hours. Check Point Harmony Endpoint's deployment process takes a week to be completed. Check Point Harmony Endpoint's deployment process takes time since there are many troubles, as my company has to meet with the client to conduct certain checks, owing to which it cannot be deployed through a central management process.
The number of people required to take care of Check Point Harmony Endpoint's deployment process depends on the organization's size. One good engineer is enough to take care of the product's deployment process. Having ten engineers without knowing the product or issue cannot help a user deal with the tool's deployment area, and it is usually the same for each product deployed in any company.
What's my experience with pricing, setup cost, and licensing?
I rate the product price a four on a scale of one to ten, where one is low, and ten is high.
The problem with the product is that Check Point tries to push it to the market. FortiGate, a firewall solution I purchased for the first time around twelve years ago, was very cheap because Fortinet had to push the product into the market. Users can get it for good prices only during the beginning phase of the tool.
Our company has to make yearly payments towards the licensing charges attached to the solution. There are no additional charges attached to the product apart from the licensing costs attached to the solution.
What other advice do I have?
The maintenance of the product is difficult since it is something to be done online.
To those who plan to use the solution of the future, I would say that they get the support involved in the contract before purchasing the product.
I rate the overall tool an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,311 professionals have used our research since 2012.
Trainee - cybersecurity engineer at Integrated Tech9labs Pvt. Ltd.
Good threat detection with real-time scanning and automatic updates
Pros and Cons
- "It has significantly bolstered our overall cybersecurity posture."
- "One aspect that could see enhancement is the user interface."
What is our primary use case?
In our corporate environment, the primary use case for Check Point Antivirus is to provide robust endpoint antivirus protection.
Our organization operates within a complex digital ecosystem, and ensuring the security of our network and devices is of utmost importance.
Check Point Antivirus serves as the frontline defense, guarding against a myriad of cyber threats that could compromise our sensitive data and operations.
Our organization operates in a dynamic and interconnected digital landscape, and ensuring the security of our network and devices is paramount
How has it helped my organization?
Check Point has brought about tangible improvements within our organization. It has significantly bolstered our overall cybersecurity posture.
We've witnessed a noticeable enhancement in our ability to detect and respond to threats promptly.
This solution has reduced risks and vulnerabilities, contributing to a more secure and reliable digital environment for our company.
However, it's worth noting that no antivirus solution is foolproof, and the effectiveness of our security measures also relies on user awareness and best practices.
What is most valuable?
Among the features offered by Check Point Antivirus, the real-time scanning and automatic updates stand out as the most valuable. Real-time scanning ensures that threats are detected as soon as they appear, minimizing the potential damage they can cause. Automatic updates, on the other hand, keep our antivirus protection up-to-date with the latest threat intelligence and security patches. These features combine to offer a proactive and effective defense against a constantly evolving threat landscape.
What needs improvement?
While we find Check Point Antivirus to be a powerful tool, there are areas where it could be improved. One aspect that could see enhancement is the user interface. A more user-friendly and intuitive interface would make it easier for our security team to navigate and manage the solution efficiently. Additionally, improvements in reporting capabilities would enable us to better analyze security incidents and fine-tune our defenses.
Looking ahead to the next release of Check Point Antivirus, we hope to see advanced threat analytics as a part of the package. This would enable us to proactively identify emerging threats and vulnerabilities, allowing us to stay one step ahead of potential risks.
Furthermore, greater customization options would be valuable, as they would allow us to tailor our security measures to the specific needs of our organization. In an ever-evolving cybersecurity landscape, these features would further empower us to protect our digital assets effectively.
For how long have I used the solution?
We have been using this antivirus within our company for six to eight months now.
What do I think about the stability of the solution?
It is quite a stable product.
What do I think about the scalability of the solution?
It is a scalable product across your enterprise and secures you from threats.
How are customer service and support?
Sometimes there is a delay in customer support, however, the issue is resolved at the end.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We've used Sophos previously, however, it made our systems very slow in performance.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
We implemented the solution with an in-house team.
What's my experience with pricing, setup cost, and licensing?
There is minimal effort needed for the setup and deployment.
Which other solutions did I evaluate?
We also evaluated Trend Micro before choosing Check Point.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sales Manager, Checkpoint at South Asian Technologies
A solution with a number of valuable blades that make it competitive
Pros and Cons
- "With the prevention blade, Harmony scales higher than many other solutions."
- "I have a few issues when attempting to install Harmony on some of the machines."
What is our primary use case?
I handle Check Point SMB along with Check Point Harmony Endpoint, and I have recently provided around 400 endpoints to a construction company in Sri Lanka.
What is most valuable?
The Rollback feature is valuable because ransomware attacks are very familiar nowadays, and anti-phishing and anti-ransomware blades are required by many of our customers. Other features, like prevention blades, are also okay, where you get threat extraction and evaluation. Likewise, the forensic report is also very important.
With the prevention blade, Harmony scales higher than many other solutions. Even CrowdStrike has technical problems when you're offline. But Harmony is not like that. Even if I don't have Internet connectivity, I have seen how remediation and rollback happen. All the encrypted files come to a state where it works with micro-backups.
Customers would like to have a very advanced endpoint to protect themselves from anti-phishing, especially ransomware.
What needs improvement?
I have clients who use very old Windows versions, so I have a few issues when attempting to install Harmony on some of the machines. At times, even with the latest Windows versions, the machines' performance gets slower. We still don't have a clear idea of what has been happening. If you take 100 PCs, two, three, or four are still troublesome when you attempt to install Harmony.
Also, the price could come down slightly, and I am not saying by a huge gap, but slightly. Even Sri Lanka's smaller customers have to buy a minimum quantity, and with Harmony Connect, they have to buy 50 licenses at once. If they could come down to 20, 30, or something like that, I should be able to sell much more. Some customers would like to have Harmony, but they have to buy a minimum quantity of 50. That's a bit troublesome for me as a salesperson.
For how long have I used the solution?
I have worked with Checkpoint Harmony Endpoint for almost one year now.
What do I think about the stability of the solution?
I rate the solution's stability a nine out of ten.
What do I think about the scalability of the solution?
I highly rate the solution's scalability.
How are customer service and support?
We have a set of engineers who specialize in Harmony Endpoint and Harmony Connect.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment takes one or two weeks. The deployer always creates a tenant, through which they install the solution. They also trained customers and end users to install Harmony, and they managed to install the entire license.
What's my experience with pricing, setup cost, and licensing?
I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high.
What other advice do I have?
Features like factory remediation, basically callback, are getting familiarized by Sri Lankan customers. Many have bought Harmony endpoints, so many customers have been considering Harmony Connect. This will lead to it having a good future.
When speaking to customers, I first communicate what ThreatCloud is all about. ThreatCloud is shared by other solutions like CloudGuard, Quantum, and Quantum Spark. It's very common to them. This means you will get the prevention blade, not the detection blade. Whenever you have phishing attacks, malware attacks, DDoS attacks, and even zero-day attacks, they are all always prevented by Check Point Harmony and Check Point products.
I always advise people to go for an advanced endpoint because IT managers have less of a hassle when using products like Check Point.
I have been facing lots of competition with CrowdStrike and Kaspersky. I don't think other products should compete with Check Point Harmony Endpoint because it is a different level endpoint altogether. I want to give them competition with the pricing.
I rate Check Point a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer.
Complaints analysis/investigation at compugana
Great features, helps with blocking unauthorized access, and protects data
Pros and Cons
- "With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access."
- "We'd like to see better integration with other security tools."
What is our primary use case?
Check Point Antivirus helps us to protect our networks and systems against computer threats such as viruses, spyware, malware, and online attacks. It helped us greatly improve the security perimeter with its advanced features, such as intrusion prevention, threat detection, and access control, which help to protect sensitive data and company information. It's helped us shrink all the security gaps and is an excellent tool for protecting all the endpoints of an organization. If the company must be audited, it helps a lot to meet many of the compliance requirements.
How has it helped my organization?
Check Point Antivirus helped us to improve in several ways. It offers advanced features such as data protection. With it, we were able to protect sensitive and confidential company data from online threats and external attacks.
We also achieved intrusion prevention using intrusion detection to prevent attacks on the company network.
With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access.
With its various features, we can enable business continuity with adequate protection while minimizing risks in operations.
What is most valuable?
Some of the Check Point Antivirus features that users may find valuable include:
The firewall helps provide protection to block unauthorized access to the network.
Intrusion prevention prevents attacks on the company network and helps companies to comply with regulatory requirements related to data protection.
It has a wide range of features that help make this tool one of the best on the market.
What needs improvement?
As with any tool, improvements can be made. Some improvements that would be useful include:
- An updated user interface to improve it to make it easier to use.
- Integration with other security tools. We'd like to see better integration with other security tools.
- They should incorporate artificial intelligence and machine learning
- Performance could be better to reduce the impact on system resources as it consumes a lot of resources from some endpoints.
For how long have I used the solution?
The solution was implemented approximately five years ago.
What do I think about the stability of the solution?
The tool was designed to be highly stable with regular software updates and proactive monitoring.
What do I think about the scalability of the solution?
It is a highly scalable tool that has centralized management, automatic updates, and load-balancing capabilities.
How are customer service and support?
They must improve support and customer service by improving response times and their SLA.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we only used an antivirus on the devices. After migrating our platform to the cloud, we needed a more robust tool and chose Check Point.
How was the initial setup?
The installation of the product is complex if you do not have any previous knowledge. Once that learning curve is overcome, the administration and configuration become easy.
What about the implementation team?
The implementation was done in conjunction with an engineer from the provider and the IT department.
What was our ROI?
It is always good to generate an implementation plan for the acquisition and company requirements to make the best purchase decision and to gain a quick return.
What's my experience with pricing, setup cost, and licensing?
The price and licenses will depend on the features and functions that need to be implemented, as well as the number of devices needed. It is easy to install, however, you must have prior knowledge of the product.
Which other solutions did I evaluate?
We evaluated several solutions on the market that met the characteristics and requirements that we needed. Some were:
- McAfee Endpoint Security
- Trend Micro OfficeScan
- Sophos Endpoint Protection
What other advice do I have?
It is always important to do a cost analysis and check requirements before making a decision.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at RSUP Dr. Sardjito
Great real-time scans, east central management, and helpful support
Pros and Cons
- "The reporting feature where we can see and monitor what happened on our client computers is useful."
- "Check Point Harmony Endpoint (endpoint antivirus) has helped our organization by preventing further damage to the computers and the network by detecting and taking appropriate action (quarantine, clean, delete) to viruses and malware."
- "They need to make the user interface on the server more intuitive and user-friendly."
- "They need to make the user interface on the server more intuitive and user-friendly."
What is our primary use case?
We use Check Point on our 500 computers to protect them from viruses and malware. The network is a protected local area network with limited connectivity to the internet. Not all computers are connected to the internet; only users with the necessity to connect can access it. We also increase the protection from viruses/malware by disabling USB ports for mobile storage. With all the protection steps taken, we still see that antivirus is a must to have as standard computer protection.
How has it helped my organization?
With all security steps taken to protect the network, viruses and malware still appeared in the network. Check Point Harmony Endpoint (endpoint antivirus) has helped our organization by preventing further damage to the computers and the network by detecting and taking appropriate action (quarantine, clean, delete) to viruses and malware.
By doing this, our organization's business can maintain its operational state without any significant disturbance, and that is the most important thing to achieve.
What is most valuable?
Some of the most valuable features from Check Point include:
1. Its ability to run real-time scans in the background and detect all the malware and viruses while taking action to clean the system from the threat.
2. On-premise centralized management, so the client can do signature updates locally and save the internet bandwidth.
3. The reporting feature where we can see and monitor what happened on our client computers. For example, which client has out-of-date signatures, which client is infected by what virus, et cetera.
What needs improvement?
Some areas of improvement could be :
1. Making the user interface on the server more intuitive and user-friendly.
2. Making it easier for the user to do tuning and configuration to the server or the client application. For example, to turn off notifications, the user should be able to do that with some clicks on the user interface instead of searching and reading about how to do it in the knowledge base first and then trying to do it.
3. Our application version is quite old, and Check Point already released a newer version for endpoint protection, which includes a cloud version. After doing some trials, we see that Check Point already made many improvements to the features and user interface.
For how long have I used the solution?
I've been using the solution for five years.
What do I think about the stability of the solution?
Tthis solution runs with good stability.
What do I think about the scalability of the solution?
If we deploy it on-premise, we should see the server hardware requirement first and match it with the number of clients we want to handle.
How are customer service and support?
Customer service gave good support when we needed it. For example, when we need support on renewing the license or when we need to upgrade the client version, they have a quick response time to deal with the problem.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did use a different solution previously. We switched as we want to use the same brand for our NGFW and our endpoint protection.
How was the initial setup?
The setup was quite straightforward. We installed the server first and then made the client installer. If you have an active directory on the network, you can install it with push installation. That said, we don't have it, so we needed to install the client by accessing the client directly.
What about the implementation team?
We implemented the product together with the vendor and an in-house team. The vendor team has good knowledge when it comes to implementing the product.
What's my experience with pricing, setup cost, and licensing?
At the time we purchased it, the licensing was separated into some modules. There were antivirus modules, data protection modules, and full modules if I'm not mistaken. You should make sure that the module you choose fits your requirement.
Which other solutions did I evaluate?
We evaluated the ESET antivirus.
What other advice do I have?
Check Point has released their new product on endpoint protection, which includes a cloud version. You could try it for free to see if this product matches your needs before purchasing it.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CEO / direktor at S3Next
Great sandboxing and phishing protection with the ability to expand
Pros and Cons
- "The product improved the overall security of our organization with the features like sandboxing and phishing prevention."
- "The product improved the overall security of our organization with features like sandboxing and phishing prevention."
- "We need a higher maximum file size in the sandboxing feature."
- "We need a higher maximum file size in the sandboxing feature."
What is our primary use case?
We were searching for a next-generation antivirus solution, and this was the best choice on the market.
We have 25 users who work from home and the office.
All computers have Windows Professional version 10 or 11 installed.
We implemented a policy in which every client (either PC or mobile) has to have the Endpoint protection software installed with all the available blades.
Our company's cyber security monitoring process includes centralized product monitoring.
How has it helped my organization?
The product improved the overall security of our organization with the features like sandboxing and phishing prevention.
We have centralized monitoring of the security of the clients even if they are not connected to our VPN network.
The e-mail and office solution is a great add-on to our existing Office 365 protection on our company's e-mails.
I also have to mention that we did not have our mobile devices protected before the implementation of Harmony mobile. That was really the next step in securing our company's overall IT security.
What is most valuable?
The sandboxing is good. We didn't have any file ransomware attacks since implementation.
The phishing protection works. It prevented a lot of nasty situations with fake websites.
Using this solution in e-mail and Office, we recognized how many man-in-the-middle attacks have been started to get some credential information from our employees.
In mobile, we didn't realize before how much harm can be done from the mobile devices in the network.
It replaced the ESET solutions we used before in our company.
What needs improvement?
We need a higher maximum file size in the sandboxing feature.
Maybe the exceptions could be made much more understandable and easy to use.
There should be an option added to temporarily disable the protection of all or some blades for testing reasons.
The email and Office solution could have some options for exceptions, for example: don't scan e-mails sent to the local PDF scanner e-mail address.
Maybe an option to auto-upgrade the client version to the next stable release of the client software would be nice.
For how long have I used the solution?
We have been using this solution for more then two years.
What do I think about the stability of the solution?
We didn't have any stability issues. We always use the stable releases of the client software.
What do I think about the scalability of the solution?
The solution offers very good scalability.
How are customer service and support?
So far, support is very good. I recommend them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used ESET, which was not satisfying.
How was the initial setup?
It was straightforward.
What about the implementation team?
We implemented through a local implementor.
What was our ROI?
The protection it gives to the clients is priceless.
What's my experience with pricing, setup cost, and licensing?
Get in contact with your local Check Point solution provider to give you an offer regarding the implementation.
Which other solutions did I evaluate?
We evalute the Fortinet solution.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
An all-in-one solution that prevents attacks and is easy to set up
Pros and Cons
- "It has a customer-savvy interface and easily customizable as per client and business requirements."
- "Check Point antivirus is a one-stop solution for managing endpoint security solutions along with providing advanced security features to prevent malware attacks."
- "We'd like the solution to kindly start this service offering on SaaS and PaaS models also."
- "We'd like the solution to kindly start this service offering on SaaS and PaaS models also."
What is our primary use case?
I work in a technologically advanced environment of data analytics and data mining services. We are experts in providing management consulting in the field of financial audit and data analytics for corporates to determine future business projections. We use a large number of tech tools and software with APIs with various platforms and portals of different vendors and clients' systems. Check Point antivirus is a one-stop solution for managing endpoint security solutions along with providing advanced security features to prevent malware attacks.
How has it helped my organization?
Check Point antivirus software is an all-in-one solution for providing system security from malware and phishing attacks from multiple systems and web sources. We are living in an era of hyper cyber threats and attacks and to tackle such threats, it is essential to have foolproof system security from all kinds of endpoints.
The antivirus software should be able to prevent all kinds of system attacks in a smart and efficient way without harming the system configuration. It is highly cost-effective and results in an umbrella solution against all kinds of malware and spam. It provides 360 degrees in security management for web and cloud systems.
What is most valuable?
Check Point antivirus software is agile and efficient in managing spam and threat attacks on web and cloud systems. The software is extremely efficient in scanning computers and websites all the time. The software runs in the back of the system and never hampers the work at the front end.
It is highly cost-effective and saves enough manpower cost in tackling such phishing attacks on the system.
It has a customer-savvy interface and easily customizable as per client and business requirements.
Deployment is easily adjustable.
What needs improvement?
We'd like the solution to kindly start this service offering on SaaS and PaaS models also. It would help more and more small, marginal and large businesses to come forward and try the solution. Customer attraction and retention are the need of the hour.
It is highly advisable to receive more and more genuine feedback from users and publish it on websites as feedback traffic is extremely important to gauge business performance progress.
It is advised to have a longish trial period for business users as an extended trial period will help customers to assess their requirements in a better way and will greatly help in their buying decision.
For how long have I used the solution?
It's been more than two years now since I started using the solution and the experience is so far so good.
What do I think about the stability of the solution?
It is highly stable in the most fragile environments. It never breaks down.
What do I think about the scalability of the solution?
The solution is impressive and highly scalable
How are customer service and support?
Technical support is highly responsive and attentive to any of our service requests.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used the Quick Heal Total Security Antivirus solution in past and found the same little costly and ineffective in a few performance parameters which pushed me to switch from the earlier solution to Check Point.
How was the initial setup?
It is an easy deployment with no tech detailing as things were crystal clear since inception and were not at all fussy.
What about the implementation team?
We used a vendor team only. We had a good experience with them. I'd rate them five out of five.
What was our ROI?
We've seen an ROI of almost 30%.
What's my experience with pricing, setup cost, and licensing?
Always aim to optimize the setup cost, pricing, and licensing as any overboard in these costs can backfire on the organization and business can get adversely affected.
Which other solutions did I evaluate?
We also looked at Norton, McAfee, and Trend Micro security solutions.
What other advice do I have?
It's a one-stop solution for 360-degree endpoint security management for your web and cloud systems. It provides end-to-end protection from viruses and malware attacks and strengthens our system security to the fullest.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Cortex XDR by Palo Alto Networks
SentinelOne Singularity Complete
Fortinet FortiEDR
HP Wolf Security
Huntress Managed EDR
Elastic Security
Microsoft Defender XDR
Trellix Endpoint Security Platform
WatchGuard Firebox
TrendAI Vision One
Fortinet FortiClient
Symantec Endpoint Security
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?


















