Within the company, some departments, including the IT department, require their users to be connected from anywhere. In order to provide security to their teams, whether they were inside or outside the company, it was necessary to be able to implement a robust solution that would help us with access, equipment security, and reliability both for the protection of equipment information and to avoid vulnerabilities through applications to which users have access with credentials and administrator permissions.
Security IT at a tech services company with 51-200 employees
Harmony Endpoint - modern app security in infinity portal
Pros and Cons
- "The most important characteristic of our requirements was the implementation of disk encryption."
- "We would like to make the documentation for more modern solutions like the Harmony family easier to find."
What is our primary use case?
How has it helped my organization?
This "Harmony Endpoint" tool is a modern solution from the Check Point Harmony family and has helped us improve the company's security with anti-malware protection, ransomware, among others, real-time protection, monitoring, and review of logs from the Check Point Infinity Portal.
Thanks to these characteristics, we have gained control over the equipment to avoid data loss. For example, with the encryption of the device units, we can avoid loss of the equipment, as well as access protection and application control policies, among other options that were enabled. It's leveraged to improve security.
What is most valuable?
The most important characteristic of our requirements was the implementation of disk encryption. It's necessary to avoid loss or theft of the equipment and, therefore, loss of data from the equipment. It can be applied to all the equipment from the portal or segments.
Another advantage is the control of applications and access policies that can be carried out in a granular manner for different company profiles. It works very well.
It offers secure administration from Check Point Infinity Portal. It is a security center where many of the Check Point solutions are located.
What needs improvement?
The improvements that can be mentioned are few. The solution and its architecture are very well done.
The Check Point Infinity Portal sometimes has some latency or performance issues that are slightly worse, affecting user management. It cannot be improved by the customer.
We would also like to make the documentation for more modern solutions like the Harmony family easier to find. That way, we can implement these solutions with the best practices recommended by the manufacturer.
Buyer's Guide
Check Point Harmony Endpoint
October 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
870,697 professionals have used our research since 2012.
For how long have I used the solution?
The solution has been used for more than two years for our portable devices with high mobility.
Which solution did I use previously and why did I switch?
Previously we used ESET at endpoints, however a site once had a ransomware attack and the solution was not able to solve the problem, so it was decided to change.
What's my experience with pricing, setup cost, and licensing?
The costs are per user. It is a good option for covering company equipment.
I recommend finding a partner that can help you with the costs for this and any other Check Point solution.
What other advice do I have?
This solution is very good and complete. I recommend it. You should try it and decide.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Security IT at a tech services company with 51-200 employees
Modern Antivirus - Excellent security CheckPoint
Pros and Cons
- "There is a lot of documentation to be able to use this security feature in the best way using the best practices indicated by the manufacturer."
- "The solution is expensive."
What is our primary use case?
Due to many attacks in our country, we decided to look for a robust solution to avoid current threats, including ransomware among others.
Our company was looking to protect our infrastructure or perimeter, but due to constant attacks in our country with modern threats to computer systems, we decided to use a tool that can provide us with the correct security. In addition to validating that we could include it in our Check Point environment in a simple way.
The simple administration gave us the ability to provide greater security with the company's permission, avoiding threats such as malware, among others.
We currently have this resource and we can manage and verify it from our management server.
How has it helped my organization?
We have been able to internally provide security to our teams, with robust antivirus security policies to take actions and regulations to prevent the spread of viruses and malware that is modernizing more and more.
This antivirus blade is not like the previous security versions, it really is a powerful tool which provides this additional layer of protection against malicious files that could affect both data and systems, we feel safer and calmer with this solution despite all the attacks that have occurred in recent times in our country, but not in our company..
What is most valuable?
We really like this antivirus security tool, included in the security management server used for our Check Point gateways. The ability to include blades is very good, it allows the centralization of security in our gateways natively.
There is also a lot of documentation to be able to use this security feature in the best way using the best practices indicated by the manufacturer, with this we guarantee the use of the tool correctly.
Finally, in our company, we like the ease of implementation.
What needs improvement?
Check Point Antivirus could use improvement in some areas, as almost all blades within the security management server are not the same as in gateway management.
On the other hand, the solution is expensive, they could improve costs in order to win more customers.
There are new tools that generate this protection, so this tool can become old, I would like for it not to be discontinued.
What do I think about the scalability of the solution?
Once this tool has been implemented in Microsoft Azure, it can be used with a VSS or with a cluster to provide scalability.
Which solution did I use previously and why did I switch?
We previously used ESET, but it did not meet expectations against ransomware at an enterprise group company we support. We prefer to opt for a tool with prestige.
What was our ROI?
Check Point's tools, specifically this one, are quite stable to manage from the security management server.
What's my experience with pricing, setup cost, and licensing?
The costs are high, however, the tool fulfills its security objective very well,
I recommend looking for a good partner that will help you both with your needs and find the right tool to provide the company's internal security.
Which other solutions did I evaluate?
It is always a good practice to review the options in the security market to avoid threats and acquire the solution that best suits the company's conditions.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
October 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
870,697 professionals have used our research since 2012.
Ease of installation with fair pricing and good product documentation
Pros and Cons
- "It offers a really simple and minimally invasive installation for users."
- "The SLA is slow."
What is our primary use case?
We required a product recognized for its brand visibility and achievements in cybersecurity at a global level.
Check Point was perfectly suited and we decided to use it effectively for our endpoint devices that are corporate property. In this way, we have avoided daily threats on devices with a great degree of acceptance seen by users.
How has it helped my organization?
Check Point Antivirus has helped us a lot with the personal protection of users' computers and protection against current threats and ransomware, among others. It is an excellent product that generates much business confidence when dealing with any cyber threat that can compromise computers.
It offers a really simple and minimally invasive installation for users. In this way, it does not generate performance problems.
What is most valuable?
It is a good tool. The price is accessible. It protects against modern threats in a great way; there is a lot of confidence in Check Point.
There is quite a lot of product documentation to assist with a correct implementation.
The ease of installation is great.
What needs improvement?
The Check Point language for opening and solving cases is English. They could expand languages for Latin America, and it would be easier to solve problems in these areas.
Costs are only available through a Check Point partner.
The SLA is slow. The solutions provided to address problems and breakdowns are slow.
For how long have I used the solution?
As a product from the Check Point security family, we have been using it for one year or more.
Which solution did I use previously and why did I switch?
Previously, we used ESET, however, we were inclined to switch to Check Point.
Which other solutions did I evaluate?
Our company always evaluates the tools before buying them and before putting them into production.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director at Rhinexa India Pvt Ltd.
A good endpoint antivirus solution, with an excellent zero-day protection feature
Pros and Cons
- "We find the zero-day protection to be an extremely valuable feature of this solution."
- "We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's."
What is our primary use case?
We use this product as an endpoint antivirus solution.
What is most valuable?
We find the zero-day protection to be an extremely valuable feature of this solution.
What needs improvement?
We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's.
For how long have I used the solution?
We have been working with this solution for nearly four years.
What do I think about the stability of the solution?
We have found this to be a very stable solution during our time using it.
What do I think about the scalability of the solution?
We have not had any issues with the scalability of this solution due to the fact that it is cloud-based, and can be deployed to more users automatically as needed.
How was the initial setup?
The initial setup of this solution is very simple, and the cloud-based deployment is very quick.
What about the implementation team?
We used a team of integrators for our implementation.
Which other solutions did I evaluate?
We also evaluated Palo Alto Endpoint, but it was too complicated to configure, and presented too many technical challenges.
What other advice do I have?
We recommend the cloud-based variant of this solution to organizations of all sizes as there is no upper limit to the number of users it can cover, and the price is affordable for SMB's.
We would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Consultant at SOCIEDAD AXIOBASE S.A.
It has a threat prevention policy that can stop different types of threats from entering the environment, but it lacks an EDL feature and is a little costly
Pros and Cons
- "What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment."
- "What's missing in Check Point Antivirus is the EDL feature."
What is our primary use case?
I'm using Check Point Antivirus for my customer, mainly to check threat activity and generate a report on threats in the customer environment. I then compare different reports and check for possible IP threats by reviewing the IP address database on Check Point Antivirus. I also use the tool to check malicious activity on applications and use it as an EPS solution.
What is most valuable?
What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment. It has a threat prevention policy so that I can stop different types of threats from entering a workspace or environment.
What needs improvement?
What's missing in Check Point Antivirus is the EDL feature, which I want Check Point to add in the future.
What do I think about the stability of the solution?
Check Point Antivirus is very stable, and I'd rate its stability as nine out of ten.
What do I think about the scalability of the solution?
Check Point Antivirus has excellent scalability, but you need a license because there's a limit depending on your license. The tool works fine if you have the correct number of licenses.
The scalability of the tool is a nine out of ten.
How are customer service and support?
Check Point Antivirus provides excellent technical support, but if the customer doesn't pay for the correct number of licenses, there will be issues, and support may not be as good.
I'd rate Check Point Antivirus support as eight out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup for Check Point Antivirus wasn't difficult for me. If you know your network, then it's not complicated. Configuring and setting the tool up could be difficult if you don't have networking knowledge.
Installing the architecture with different appliances takes two to three days, and learning the tool and the rules would take one week for the customer.
What's my experience with pricing, setup cost, and licensing?
Check Point Antivirus is a good solution, but it's a little costly and is similar to Fortinet, pricing-wise.
What other advice do I have?
I'm a consultant working with Check Point technologies, including Check Point Antivirus.
Deploying and maintaining Check Point Antivirus requires two to three engineers.
My advice to anyone planning to use Check Point Antivirus is that it's a good tool, especially if you're using an endpoint solution from Check Point.
My rating for Check Point Antivirus is seven out of ten because you need to be certified to manage the tool and for it to work well for your company. It could be a very complex tool, depending on the customer.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner/Consultant
Human Resources Manager at Beat
Good virus detection with helpful performance metrics and a simple deployment
Pros and Cons
- "The application runs very fast and does not affect the performance speed of the device where it is installed."
- "When there are many devices, it is more costly since each device requires unique login credentials."
What is our primary use case?
The antivirus helps the organization in securing desktops and mobile devices from external data threats. It detects the entry of viruses to devices that can destroy data and quickly takes necessary action.
Once the software is installed, there is no additional cost that is required to run it. It troubleshoots any errors that may slow down workflows across applications. Check Point Antivirus integrates with multiple operating systems, including Windows and Linux.
Since I installed it on my desktop, the browsing speed has improved, and I can visit several sites without fear.
How has it helped my organization?
The software has improved the digital experience of employees who have deployed it.
I can comfortably open links attached to my emails and share documents with my colleagues without fear of cyber attacks.
Departments that used to lose data to virus attacks can work from any site and focus more on productive business engagements.
The antivirus provides advanced security data analytics that helps the user to work from safe sites that can affect tasks in progress.
The software screens applications to ensure they perform effectively.
What is most valuable?
Virus detection helps teams to be aware of any threats that can harm data and take precautions in advance.
It provides networking reports on the data security situation, which enables users to make decisions.
Performance metrics provided regularly help the IT team plan to curb any threats to company data.
It is easy to deploy the antivirus and learn how it works.
The application runs very fast and does not affect the performance speed of the device where it is installed.
Daily security analysis indicators help team members to engage any abnormality with real-time insights.
What needs improvement?
The current features are doing extremely well. That said, the system coding can be simplified to enable any user to interpret the security situation of the used device.
I am happy with the set data models since they monitor the security situation of new sites before browsing.
I have not observed most failures since I started using this software.
The company can embark on timely updates to ensure the application is compatible with devices.
Customer support comes in on time when we contact them via online chats and phone calls.
When there are many devices, it is more costly since each device requires unique login credentials.
The product is heavy, and it requires more space for effective operation. New users can find it difficult to set up and install due to the lack of a robust user manual.
For how long have I used the solution?
I've used the solution for eight months.
What do I think about the stability of the solution?
It works for a long time without failing and does not misbehave.
What do I think about the scalability of the solution?
The antivirus performance has been excellent.
How are customer service and support?
The customer service team has never failed us.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used Kaspersky Antivirus, however, it used to fail most of the time.
How was the initial setup?
The installation process of the application is easy and straightforward.
What about the implementation team?
I deployed it through a vendor, and they are doing well.
What was our ROI?
A secure work environment has contributed to increased ROI.
What's my experience with pricing, setup cost, and licensing?
The pricing is suitable, and the setup process is simple.
Which other solutions did I evaluate?
I evaluated most free online antiviruses, however, they were not effective.
What other advice do I have?
Check Point Antivirus is a sure bet for the detection of any virus.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Manager at First National Bank in Philip
Easy to install and deploy with great threat mitigation
Pros and Cons
- "Deploying new versions of the endpoint are easy."
- "The Infinity Portal login is "iffy" at times."
What is our primary use case?
Endpoints have always been a network's weak point, as they are the main interface users use daily. A good endpoint security product must be able to be flexible in both deployments and across multiple OS versions.
Check Point Harmony Endpoint does that for us. With multiple blades that add security to these weak points, I can be assured that threats are being mitigated in real-time. Also, Harmony Endpoint works seamlessly with Check Point's new MDR product, so logging, detecting, and responding couldn't be easier.
How has it helped my organization?
With the new Harmony interface, I don't have to worry about a local endpoint management server anymore, making my deployments and updating of endpoints so much easier across the board.
I haven't had issues with anti-malware updates anymore, and I can manage my endpoints from one Infinity Cloud portal.
Being short-staffed in my department, this solution has absorbed some of the daily tasks of monitoring endpoint products to ensure they are up and running. Also, reporting services/blades that aren't running lets me use my time more freely.
What is most valuable?
Deploying new versions of the endpoint are easy. It was a hassle before with a local management server, and now it's as easy as selecting the version you want from a drop-down menu.
The options for removing/adding blades with the click of a button from the portal are great. The built-in VPN blade makes it so easy to deploy on my endpoints if I need employee remote access to my LAN.
The installation is so easy with the simple MSI deployment packages, and I can watch the deployment process in real-time from the Cloud Portal.
What needs improvement?
The Infinity Portal login is "iffy" at times. I would like to restrict it to only US traffic, however, due to the hosting in the cloud, it sometimes retrieves data from the EU and across seas.
Also, if there was a way to simplify the SmartConsole login more, there could be an opportunity to take away some clicks to log in. Navigating back to the browser to log in through that portal site just makes for a more extended login transition. Just have the MFA capability right there on the local application and be done with it.
For how long have I used the solution?
I've been using Check Point's endpoint solution for five years, however, just recently moved to the Harmony interface this summer.
What do I think about the stability of the solution?
The stability makes it easy to move up or down.
What do I think about the scalability of the solution?
The scalability makes it easy to move up or down.
How are customer service and support?
Support could be improved. I'd give them a 7/10 before COVID, and maybe a 5/10 post-COVID. If you know who to ask for, it's more an 8/10.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We did not use a different solution previously.
How was the initial setup?
The setup is straightforward. Check Point assists the whole way, so it was very easy.
What about the implementation team?
I handled the deployment in-house, myself.
What was our ROI?
I'm not sure if we have seen an ROI.
What's my experience with pricing, setup cost, and licensing?
Our rep has been great to work with concerning quotes/licensing. The setup is relatively easy, being in the cloud. A new customer could be up and running on a new Harmony install within days.
Which other solutions did I evaluate?
CrowdStrike was the main one we evaluated against this product.
What other advice do I have?
It is a great product. Check Point could work on their Technical Assistance Center (TAC) to assist customers, however, they usually get the job done in the end.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Network Engineer at АТ "Банк інвестицій та заощаджень"
Useful centralized management, responsive support, but resources usage could improve
Pros and Cons
- "The most valuable feature of Check Point Harmony Endpoint is centralized management."
- "Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features."
What is our primary use case?
We have many clients using this solution for different use cases.
The solution can be deployed on the cloud and on-premise.
Check Point Harmony Endpoint is mainly used for protection.
What is most valuable?
The most valuable feature of Check Point Harmony Endpoint is centralized management.
What needs improvement?
Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for approximately two years.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is very stable.
What do I think about the scalability of the solution?
The scalability of the Check Point Harmony Endpoint is good. It can scale easily.
We have some clients with 10,000 users that are using this solution.
How are customer service and support?
I have opened up many tickets with the support and they have been responsive. I have not had any problems with them. They have helped whenever I faced a problem.
I rate the support from Check Point Harmony Endpoint a four out of five.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup of the Check Point Harmony Endpoint is easy. We use the main policy for the installation across the organization.
We have had some problems with connection management because if we install the initial client on the computer, we cannot stop or delete this client or install the full package afterward.
If we have a new signature technical support ticket, they add this signature to the database in three to five days which they could improve.
I rate the initial setup from Check Point Harmony Endpoint a four out of five.
Which other solutions did I evaluate?
Check Point Harmony Endpoint does not have some features that SentinelOne or CloudStrike has.
What other advice do I have?
I rate Check Point Harmony Endpoint a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner

Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2025
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
Microsoft Defender XDR
HP Wolf Security
Cortex XDR by Palo Alto Networks
Elastic Security
Fortinet FortiClient
WatchGuard Firebox
Trellix Endpoint Security Platform
Huntress Managed EDR
Symantec Endpoint Security
Trend Vision One
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?