Try our new research platform with insights from 80,000+ expert users
Support at a security firm with 51-200 employees
User
Ease of installation with fair pricing and good product documentation
Pros and Cons
  • "It offers a really simple and minimally invasive installation for users."
  • "The SLA is slow."

What is our primary use case?

We required a product recognized for its brand visibility and achievements in cybersecurity at a global level.

Check Point was perfectly suited and we decided to use it effectively for our endpoint devices that are corporate property. In this way, we have avoided daily threats on devices with a great degree of acceptance seen by users.

How has it helped my organization?

Check Point Antivirus has helped us a lot with the personal protection of users' computers and protection against current threats and ransomware, among others. It is an excellent product that generates much business confidence when dealing with any cyber threat that can compromise computers.

It offers a really simple and minimally invasive installation for users. In this way, it does not generate performance problems.

What is most valuable?

It is a good tool. The price is accessible. It protects against modern threats in a great way; there is a lot of confidence in Check Point.

There is quite a lot of product documentation to assist with a correct implementation.

The ease of installation is great.

What needs improvement?

The Check Point language for opening and solving cases is English. They could expand languages for Latin America, and it would be easier to solve problems in these areas.

Costs are only available through a Check Point partner.

The SLA is slow. The solutions provided to address problems and breakdowns are slow.

Buyer's Guide
Check Point Harmony Endpoint
August 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,649 professionals have used our research since 2012.

For how long have I used the solution?

As a product from the Check Point security family, we have been using it for one year or more.

Which solution did I use previously and why did I switch?

Previously, we used ESET, however, we were inclined to switch to Check Point.

Which other solutions did I evaluate?

Our company always evaluates the tools before buying them and before putting them into production.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Bala_Krishna - PeerSpot reviewer
Director at Rhinexa India Pvt Ltd.
Real User
Top 20
A good endpoint antivirus solution, with an excellent zero-day protection feature
Pros and Cons
  • "We find the zero-day protection to be an extremely valuable feature of this solution."
  • "We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's."

What is our primary use case?

We use this product as an endpoint antivirus solution.

What is most valuable?

We find the zero-day protection to be an extremely valuable feature of this solution.

What needs improvement?

We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's.

For how long have I used the solution?

We have been working with this solution for nearly four years.

What do I think about the stability of the solution?

We have found this to be a very stable solution during our time using it.

What do I think about the scalability of the solution?

We have not had any issues with the scalability of this solution due to the fact that it is cloud-based, and can be deployed to more users automatically as needed.

How was the initial setup?

The initial setup of this solution is very simple, and the cloud-based deployment is very quick.

What about the implementation team?

We used a team of integrators for our implementation.

Which other solutions did I evaluate?

We also evaluated Palo Alto Endpoint, but it was too complicated to configure, and presented too many technical challenges.

What other advice do I have?

We recommend the cloud-based variant of this solution to organizations of all sizes as there is no upper limit to the number of users it can cover, and the price is affordable for SMB's.

We would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
August 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,649 professionals have used our research since 2012.
Consultant at SOCIEDAD AXIOBASE S.A.
Consultant
It has a threat prevention policy that can stop different types of threats from entering the environment, but it lacks an EDL feature and is a little costly
Pros and Cons
  • "What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment."
  • "What's missing in Check Point Antivirus is the EDL feature."

What is our primary use case?

I'm using Check Point Antivirus for my customer, mainly to check threat activity and generate a report on threats in the customer environment. I then compare different reports and check for possible IP threats by reviewing the IP address database on Check Point Antivirus. I also use the tool to check malicious activity on applications and use it as an EPS solution.

What is most valuable?

What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment. It has a threat prevention policy so that I can stop different types of threats from entering a workspace or environment.

What needs improvement?

What's missing in Check Point Antivirus is the EDL feature, which I want Check Point to add in the future.

What do I think about the stability of the solution?

Check Point Antivirus is very stable, and I'd rate its stability as nine out of ten.

What do I think about the scalability of the solution?

Check Point Antivirus has excellent scalability, but you need a license because there's a limit depending on your license. The tool works fine if you have the correct number of licenses.

The scalability of the tool is a nine out of ten.

How are customer service and support?

Check Point Antivirus provides excellent technical support, but if the customer doesn't pay for the correct number of licenses, there will be issues, and support may not be as good.

I'd rate Check Point Antivirus support as eight out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup for Check Point Antivirus wasn't difficult for me. If you know your network, then it's not complicated. Configuring and setting the tool up could be difficult if you don't have networking knowledge.

Installing the architecture with different appliances takes two to three days, and learning the tool and the rules would take one week for the customer.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is a good solution, but it's a little costly and is similar to Fortinet, pricing-wise.

What other advice do I have?

I'm a consultant working with Check Point technologies, including Check Point Antivirus.

Deploying and maintaining Check Point Antivirus requires two to three engineers.

My advice to anyone planning to use Check Point Antivirus is that it's a good tool, especially if you're using an endpoint solution from Check Point.

My rating for Check Point Antivirus is seven out of ten because you need to be certified to manage the tool and for it to work well for your company. It could be a very complex tool, depending on the customer.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner/Consultant
PeerSpot user
reviewer2005803 - PeerSpot reviewer
Digital Coordinator at Modis
Real User
Blocks phishing, identifies ransomeware, and helps quash security threats
Pros and Cons
  • "When sending emails to my colleagues, it detects any virus and blocks any spam that may be shared."
  • "Configuration with some applications did not take place effectively due to setup complications."

What is our primary use case?

This software enhances the security of our remote workforce. It creates safe collaboration routes that cyber attacks cannot compromise. Data safety and communication infrastructure have been well maintained since we deployed this software. 

Endpoint protection has enabled teams to complete projects faster and monitor workflows efficiently. 

It has automated security protocols to cover the wide networking area in the enterprise. Check Point Harmony Endpoint has deployed comprehensive security that prevents any external attacks that may be a threat to our internal policies.

How has it helped my organization?

This software has quashed many security threats that could affect operations and slow down production. 

When sending emails to my colleagues, it detects any virus and blocks any spam that may be shared. It is flexible and gives the IT team full access and control during deployment. 

We have been able to attain security compliance and requirements for an excellent working environment. 

The entire organization has been doing well since we deployed this software due to safe collaboration channels and improved security data awareness.

What is most valuable?

The total cost of ownership has enabled the company's teams to identify any areas with security weaknesses and appropriately assign security models. 

The log4j-related attacks blocking system detects any vulnerable endpoints in advance. 

Identifying ransomware behaviors has upgraded the security monitoring system and put measures in place to curb such threats. 

When browsing, it blocks phishing sites that may hack personal data and leak to internet cyber criminals. 

The endpoint behavioral guard identifies online threats that easily prevent credential theft that may lead to funding theft.

What needs improvement?

The current performance of Check Point Harmony Endpoint has impressed all the sectors in the organization.

Configuration with some applications did not take place effectively due to setup complications. 

Interpreting the threat intelligence sensors may lead to poor data tabulation and slow performance. 

The cost of deployment and maintenance is high, and many small enterprises may not be able to afford premium subscriptions. 

The set security enhancement objectives have been achieved, and internet threats have been blocked effectively. I totally recommend this software to other organizations for reliable endpoint protection.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

This software offers a stable performance.

What do I think about the scalability of the solution?

The performance is good, and I am impressed by the overall output.

How are customer service and support?

We have been served well by customer service since we started engaging them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with any other product.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Deployment was done by the vendor team.

What was our ROI?

The targeted ROI has been achieved, and there is increasing growth.

What's my experience with pricing, setup cost, and licensing?

The setup and pricing are flexible depending on company size and security demands.

Which other solutions did I evaluate?

I have only worked with Check Point Harmony Endpoint.

What other advice do I have?

Comprehensive security for the company's network infrastructure is essential, and this is what this platform has provided.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2005812 - PeerSpot reviewer
Human Resources Manager at Beat
User
Good virus detection with helpful performance metrics and a simple deployment
Pros and Cons
  • "The application runs very fast and does not affect the performance speed of the device where it is installed."
  • "When there are many devices, it is more costly since each device requires unique login credentials."

What is our primary use case?

The antivirus helps the organization in securing desktops and mobile devices from external data threats. It detects the entry of viruses to devices that can destroy data and quickly takes necessary action. 

Once the software is installed, there is no additional cost that is required to run it. It troubleshoots any errors that may slow down workflows across applications. Check Point Antivirus integrates with multiple operating systems, including Windows and Linux. 

Since I installed it on my desktop, the browsing speed has improved, and I can visit several sites without fear.

How has it helped my organization?

The software has improved the digital experience of employees who have deployed it. 

I can comfortably open links attached to my emails and share documents with my colleagues without fear of cyber attacks. 

Departments that used to lose data to virus attacks can work from any site and focus more on productive business engagements. 

The antivirus provides advanced security data analytics that helps the user to work from safe sites that can affect tasks in progress. 

The software screens applications to ensure they perform effectively.

What is most valuable?

Virus detection helps teams to be aware of any threats that can harm data and take precautions in advance. 

It provides networking reports on the data security situation, which enables users to make decisions. 

Performance metrics provided regularly help the IT team plan to curb any threats to company data.

It is easy to deploy the antivirus and learn how it works. 

The application runs very fast and does not affect the performance speed of the device where it is installed. 

Daily security analysis indicators help team members to engage any abnormality with real-time insights.

What needs improvement?

The current features are doing extremely well. That said, the system coding can be simplified to enable any user to interpret the security situation of the used device. 

I am happy with the set data models since they monitor the security situation of new sites before browsing. 

I have not observed most failures since I started using this software. 

The company can embark on timely updates to ensure the application is compatible with devices. 

Customer support comes in on time when we contact them via online chats and phone calls. 

When there are many devices, it is more costly since each device requires unique login credentials. 

The product is heavy, and it requires more space for effective operation. New users can find it difficult to set up and install due to the lack of a robust user manual.

For how long have I used the solution?

I've used the solution for eight months.

What do I think about the stability of the solution?

It works for a long time without failing and does not misbehave.

What do I think about the scalability of the solution?

The antivirus performance has been excellent.

How are customer service and support?

The customer service team has never failed us.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Kaspersky Antivirus, however, it used to fail most of the time. 

How was the initial setup?

The installation process of the application is easy and straightforward.

What about the implementation team?

I deployed it through a vendor, and they are doing well.

What was our ROI?

A secure work environment has contributed to increased ROI.

What's my experience with pricing, setup cost, and licensing?

The pricing is suitable, and the setup process is simple.

Which other solutions did I evaluate?

I evaluated most free online antiviruses, however, they were not effective.

What other advice do I have?

 Check Point Antivirus is a sure bet for the detection of any virus.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Security Network Engineer at АТ "Банк інвестицій та заощаджень"
Real User
Top 20
Useful centralized management, responsive support, but resources usage could improve
Pros and Cons
  • "The most valuable feature of Check Point Harmony Endpoint is centralized management."
  • "Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features."

What is our primary use case?

We have many clients using this solution for different use cases.

The solution can be deployed on the cloud and on-premise.

Check Point Harmony Endpoint is mainly used for protection. 

What is most valuable?

The most valuable feature of Check Point Harmony Endpoint is centralized management.

What needs improvement?

Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for approximately two years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is very stable.

What do I think about the scalability of the solution?

The scalability of the Check Point Harmony Endpoint is good. It can scale easily.

We have some clients with 10,000 users that are using this solution.

How are customer service and support?

I have opened up many tickets with the support and they have been responsive. I have not had any problems with them. They have helped whenever I faced a problem.

I rate the support from Check Point Harmony Endpoint a four out of five.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup of the Check Point Harmony Endpoint is easy. We use the main policy for the installation across the organization.

We have had some problems with connection management because if we install the initial client on the computer, we cannot stop or delete this client or install the full package afterward.

If we have a new signature technical support ticket, they add this signature to the database in three to five days which they could improve.

I rate the initial setup from Check Point Harmony Endpoint a four out of five.

Which other solutions did I evaluate?

Check Point Harmony Endpoint does not have some features that SentinelOne or CloudStrike has.

What other advice do I have?

I rate Check Point Harmony Endpoint a seven out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
reviewer1954029 - PeerSpot reviewer
Head of Security and Operational Risk at Medianet
User
Great real-time click protection, web filtering, and compatability
Pros and Cons
  • "We are able to manage all our endpoints from a single cloud console."
  • "It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products."

What is our primary use case?

As a financial company, we use the solution to provide security to our CDE environment and compliance with all PCI requirements. This tool enables us to provide security to the endpoints and also, to comply with local and foreign regulations regarding platform security.

We use this solution to protect all our endpoints, including personal computers and mobile phones. 

We have deployed the solution in Windows, Linux servers, workstations, and mobile phones. 

We also use the web filter capabilities both on mobile phones and on corporate computers.  

How has it helped my organization?

We now have so many capabilities we did not have before, as follows:

  • We are able to manage all our endpoints from a single cloud console
  • We don't need adicional on-premise servers to run this solution
  • The time that the endpoint refresh and identify new policies is very short. It takes seconds and this is a great value for us to fight emerging threats
  • We are now able to protect web browsing in all web browsers and also we don't need additional policies to block browsers in private browsing
  • The integratión with our SIEM solution was very smooth and the solution provides valuable information for security analysis

What is most valuable?

The most valuable aspects include:

  • Web Filtering. This feature is easy to manage, and it applies new policies in seconds. 
  • Real-time Click Protection. It protects the user from phishing attacks in real time. 
  • Compatibility with Windows, Linux, Android, and Mac. We don't need additional solution to protect all our endpoint. 
  • Cloud Management. This feature allows us to reduce our operating burden and also improve our TCO.

We now have the ability to block a compromised machine from the network.

We now have the ability to block in near real-time IOC.

What needs improvement?

It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products. 

It would also be great to include FIM capabilities for the Endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products.

It would be great if we could have additional DLP capabilities to identify personal information or any kind of information to comply with regulations that require information protection. 

For how long have I used the solution?

I have been using the solution for about three months.

What do I think about the stability of the solution?

We haven't had any problems or downtime since we acquired the solution. It is stable.

What do I think about the scalability of the solution?

The solution is scalable. It is quite simple to add new endpoints to the solution or add additional features, all with zero downtime. 

How are customer service and support?

Customer support and channel support are also always willing to help. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have been using McAfee Endpoint protection for about ten years. We were missing so many features and needed additional tools and effort to protect our endpoint. 

How was the initial setup?

It took a few minutes to deploy the whole solution.

What about the implementation team?

It was through a vendor. They were experts on the product.

What's my experience with pricing, setup cost, and licensing?

The costs depend on the company size. In my case, I was able to have all the features, including email protection, remote access, mobile protection, and endpoint protection, for a great price. 

Which other solutions did I evaluate?

I evaluated Trend Micro and McAfee.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
SHRINKHALA SINGH - PeerSpot reviewer
Senior Manager at Advertising Standards Council of India
Real User
Top 10
Addresses zero-day threats and next-gen viral threat attacks while offering very good integration
Pros and Cons
  • "It is one of the best security solutions in the market today."
  • "The cases of false positives should substantially be reduced to the greatest extent to keep the efficiency excellent."

What is our primary use case?

Check Point Antivirus helps restrict malicious threats and trojans from entering into the IT system and secure the system end to end. 

Also, its feature of endpoint detection and response helps business users to restrict any malware attack onto the system in more robust manner and stop any threat attack attempts.

It also secures the system in a foolproof way and boosts the performance to greatest extent. This result boosted productivity and improved outcomes for the organization as a whole. It is one of the best antivirus applications on the market currently. 

How has it helped my organization?

Check Point Antivirus has removed the endpoint threats in a more secure and structured manner. 

Also, its advanced malware detection technique helped strengthen the IT system's security and permanently remove any threat entrant from the system.

Through ThreatCloud, it helps in the identification and correct detection of potential malware entry into the cloud server and also provides immediate auto-remediation upon detection of any threat attack on the server.

It is one of the best security solutions in the market today. We highly recommend it to everyone.

What is most valuable?

The ThreatCloud is an amazing feature and helps in intelligent and proactive detection of threat attacks along with auto-remediation of the system.

The industry cloud and integration services with alert notifications are some really exciting features that helped in achieving flexible and strengthened security administration.

It addresses zero-day threats and next-gen viral threat attacks on the system and also has strengthened the security administration through a single management console.

What needs improvement?

The cases of false positives should substantially be reduced to the greatest extent to keep the efficiency excellent.

Competition is huge and is strongly advised to keep innovating the features and utilities so that it stands out in comparison to its competition in the market.

They need to have an extension of the trial period/trial version so that more startups and small, marginal, and medium enterprises can also be part of this without any hesitation.

For how long have I used the solution?

I've used the solution for six to 12 months.

What do I think about the stability of the solution?

The product offers amazing stability features.

What do I think about the scalability of the solution?

The scalability is great.

How are customer service and support?

We've had the best experience with technical support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We are a first-time user.

How was the initial setup?

It is easy to use and deploy across any platform.

What about the implementation team?

The vendor assisted with the setup.

What was our ROI?

We've seen an ROI of over 80%.

What's my experience with pricing, setup cost, and licensing?

I'd advise potential users to go for the Check Point advanced security solutions as they are credible and trusted by many.

Which other solutions did I evaluate?

A lot of security solutions were checked by the tech team.

What other advice do I have?

Users should go for it; you will not regret it.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: August 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.