Try our new research platform with insights from 80,000+ expert users
Shrinkhala Jain - PeerSpot reviewer
Project Consultant at a consultancy with 10,001+ employees
User
Nov 17, 2022
Quick to deploy with a threat catchment rate and good security
Pros and Cons
  • "It is a great, cost-effective, and stable security solution to opt for."
  • "More posting of user feedback is requested across all websites and Google so that more traction can be attained. Seeing reviews helps create more confidence with clients and partners."

What is our primary use case?

This is the best security software for all organizations to have. It restricts 100% entry of all malicious files and prevents any threatening attacks from the system. 

It's one of the best software to have and increases the security checks for various verticals. 

It removes any unwanted and malicious files and folders and ensures round-the-clock protection from any threat sources. 

It came highly recommended by peers in different fields. 

Their business and tech team is highly competent and gives the best solution to users instantly without any challenges. They are highly ethical and quite professional in how they see things.

How has it helped my organization?

Check Point Antivirus is a good security software for businesses to prevent systems and their components from any ransomware and malware threat attempts. 

Also, it is one of the best solutions to counter threat sources and threat attacks through global scanning and cloud integration with third-party secure portals. It ensures complete end-to-end security of information flows throughout. It is quite a customizable solution and meets all kinds of demands in a much more streamlined manner without any hiccups. 

It is a great, cost-effective, and stable security solution to opt for.

What is most valuable?

The solution offers a quick deployment without any issues. 

The threat catchment rate of the software is very high and quite impressive. 

It is easy to integrate with all kinds of other software and hardware and works with cloud integration. We have no more tension around compatibility parameters as the software is quite stable and works efficiently across varied business environments. 

It is quick and agile and, with global scanning, it scans with great speed and works flawlessly in the background of the system without interrupting the front-end work

What needs improvement?

They could improve across many areas, like bringing in more customization and reducing the cost further. The price can be a restraining factor for many to adopt a new solution and leave an old option behind. 

More posting of user feedback is requested across all websites and Google so that more traction can be attained. Seeing reviews helps create more confidence with clients and partners. 

We demand more training orientation and quick upgrades in security parameters and utility features to have better exposure end to end.

Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.

For how long have I used the solution?

I've been using the solution for over 1.5 years now.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is completely scalable.

How are customer service and support?

Technical support is good so far.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a localized solution from one of our partners.

How was the initial setup?

The initial setup is easygoing. We've had no pain at all.

What about the implementation team?

We implemented the product using an in-house team.

What was our ROI?

The ROI is great.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is one of the best and fastest virus-scanning software in the market and you will not be disappointed at all. It's easy to deploy and integration is great. The pricing is also quite affordable. They offer easy renewal and signing of SLAs, which are hassle-free.

Which other solutions did I evaluate?

We looked at a lot of different options. We tried ESET, Norton, Kaspersky, etc.

What other advice do I have?

Try this security solution. Millions of like us are choosing this option. It's the best solution.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at a financial services firm with 51-200 employees
Real User
Nov 3, 2022
Centrally managed with good visualizations and very good security
Pros and Cons
  • "It offers a centralized administration which allows us to be much more productive."
  • "We need the ability to integrate this solution with the other existing solutions, such as Harmony."

What is our primary use case?

Over the years, with experience using Check Point applications, we have needed to protect ourselves against new attacks and attacks that could involve a significant loss of information. These requirements we took into consideration when preparing for the next need, and we were looking for a solution that we could integrate into our perimeter zone, enabling antivirus and protection functions for our teams and our users. As a result of all our complex needs, we implemented this under the solutions that we already use from Check Point.

How has it helped my organization?

The solution gives us protection and a visualization of security analysis in real-time. Many of its functions and characteristics are of significant value to our institution. It's a strategic ally at the level of perimeter security within our organization and thus protects each one of our assets. 

It offers a centralized administration that allows us to be much more productive and has, within reach, a greater general visualization of everything that happens in our environment.

What is most valuable?

One of the characteristics that has given us the most value when implementing the antivirus solution is being able to have a conglomerate of solutions and to be able to manage and give to the administrators something that can observe what is happening within the network. The dashboards allow us to export this information so it can be delivered to senior managers, who are often the ones in charge of making decisions at the infrastructure level in terms of security and management of our organization. 

What needs improvement?

One of the features that we could use in the future, or would be something additional that we as users and network administrators would want to see, is the ability to integrate this solution with the other existing solutions, such as Harmony. We'd like to be able to manage all this from the same centralized management area that we use today for the perimeter lantern. It would thus provide a 360° integration of the features that we check regularly. 

For how long have I used the solution?

I've used the solution for three years.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at a computer retailer with 501-1,000 employees
Real User
Nov 2, 2022
Secures equipment, integrates with the cloud, and offers real-time filtering
Pros and Cons
  • "It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks."
  • "For the future, I would like to see maybe a content-filtering emulation feature in Harmony Endpoint."

What is our primary use case?

We had the need for every employee to be protected inside and outside of the organization and mainly the sales areas, which often are exposed yet constantly have the greatest mobility within our organization. There were uncertainties and needs for security. We have been testing solutions that will allow us to complete this requirement. We opted for and used the Check Point Harmony Endpoint, which gave us easy administration and management of the equipment, ensuring safety in the best possible way. 

How has it helped my organization?

Check Point Harmony Endpoint gives our organization and us a solution that we could manage while complying with internal and external policies and regulations. It's been a great ally in the security and internal strategies of our organization. After testing and using it, we have realized that its capacity is not only to secure the devices. It also gives added value in its way of managing and allows us to have control over inventory and management of the equipment that we have.  

What is most valuable?

The best feature is that it can secure the equipment. It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks. It has detection management with all types of computing power used in the equipment and outside of it in the cloud to which it is connected. This comes to give us a complete solution.

What needs improvement?

For the future, I would like to see maybe a content-filtering emulation feature in Harmony Endpoint. It would already be cataloged in the app. It would help filter other types of characteristics that we have in our equipment, and allow us to see the ones that are also very vulnerable. We'd like to have everything integrated into a single solution that communicates with the cloud.

For how long have I used the solution?

I've used the solution for a full year.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at a financial services firm with 51-200 employees
Real User
Oct 31, 2022
Minimally invasive, good for securing devices of remote users, and does not slow performance
Pros and Cons
  • "It is minimally invasive. From a single installer, the equipment is protected and secured."
  • "This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market."

What is our primary use case?

We were having several difficulties when we were presented with the design that we had to implement for the teams and personnel that had to work outside of the organization due to the pandemic. 

As a result of all this and all these uncertainties, the need to secure the equipment was the reason we adopted the Harmony endpoint solution. It came to protect us inside and outside the institution. The equipment itself does not need to be connected and secured by the perimeter area of ​​our organization.

How has it helped my organization?

We have adopted this solution in a quick, simple way. It integrated well based on these three characteristics: 

1. It is minimally invasive. From a single installer, the equipment is protected and secured. 

2. The solution is really not burdened with the need for computing power for the local management of the device, which will prevent the teams from slowing down. 

3. It is integrated with a cloud administration which makes it easy, fast, and simple to manage each of your policies for the security of the equipment. 

What is most valuable?

Its most outstanding feature is the power to manage everything from a dashboard, a window that is in the cloud, which allows us to manage it from anywhere in the world through any browser, from anywhere. This is a feature that came to give administrators the possibility to work from home. Today many of us are remote workers who are not at the company, on-site. We are not in a single site, and yet we manage well and have the capacity and the assurance of managing everything easily, quickly, and simply.

What needs improvement?

This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market.  

I would very much like to have the opportunity to see applications access at the web level and have applications from different brands and devices give simplicity to the management that we are going to need in the future.

For how long have I used the solution?

I've used the solution for about two years.

What do I think about the stability of the solution?

The solution is really stable. I have had the opportunity to try it on Mac and to try it on Windows. Its functionality, filtering, and execution have been really stable.

What do I think about the scalability of the solution?

It is a fairly scalable solution that is simple to use and quick to install on the devices of each user, that is, on their computers.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
OumarDiallo - PeerSpot reviewer
Cyber Security Engineer at a comms service provider with 201-500 employees
Real User
Oct 21, 2022
Easy to set up, allows you to manage all the endpoints, works against every attack, and has helpful technical support
Pros and Cons
  • "What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security. You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution."
  • "An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher."

What is our primary use case?

We use Check Point Antivirus for cyber security purposes.

What is most valuable?

What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security.

You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution.

What needs improvement?

An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher.

For how long have I used the solution?

I've been using Check Point Antivirus for six months.

What do I think about the stability of the solution?

Check Point Antivirus is a stable solution. It's a very good solution.

What do I think about the scalability of the solution?

Check Point Antivirus is a scalable solution.

How are customer service and support?

The technical support for Check Point Antivirus is helpful, but sometimes, it isn't easy to reach the support team.

On a scale of one to five, my rating for Check Point Antivirus support is four.

How was the initial setup?

Setting up Check Point Antivirus wasn't difficult because it just required downloading the software, then installing it where you want to install it. There wasn't any issue with the initial setup of Check Point Antivirus.

How long the deployment of Check Point Antivirus takes would depend on the number of client endpoints, but the process could take just five or six minutes maximum. If your internet connection is slow, then deploying Check Point Antivirus would take longer.

What about the implementation team?

I implemented Check Point Antivirus myself.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is an expensive solution, especially for clients that don't have as many endpoints.

Check Point Antivirus has a free trial for one month, and within the trial period, there's no limit to the number of endpoints it can support, but when the trial expires, you'll have to buy the license, which covers one year.

You can't buy a license for the solution without being a Check Point partner first.

What other advice do I have?

I'm using the latest version of Check Point Antivirus.

I deploy Check Point Antivirus for the customer. I'm a network and cyber security engineer, so I provide Check Point Antivirus to clients. I'm an integrator, and currently, my clients have a total of one hundred fifty endpoints on Check Point Antivirus. I also manage the solution for clients, which includes reporting, looking into the traffic and attacks, then I explain whatever's going on to the clients.

Maintenance can be done on Check Point Antivirus, and you just have to select the user that's very vulnerable to attacks, then that would trigger maintenance, and Check Point Antivirus would update automatically. It isn't difficult as long as your internet is good.

I would recommend Check Point Antivirus to others because it's very good software, and it works against every attack. Check Point Antivirus is an important solution.

On a scale of one to ten, my rating for the solution is eight because there's still room for improvement.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Assistant Manager at a consultancy with 51-200 employees
User
Sep 18, 2022
Great support, good threat detection, and high customization
Pros and Cons
  • "Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users."
  • "Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner."

What is our primary use case?

Check Point Antivirus software is highly reliable and dependable security software that restricts malware entry into our IT system and keeps secure our IT system at its best. It is the most advanced security solution which enables the IT system to scan all the system components effortlessly and do proactive threat detection onto the system to identify any incumbent threats. 

It helps run the scanning on integrated system components and the cloud server with fewer false negative cases to ensure the system's performance at its best. It provides the system with foolproof security and ensures high customer satisfaction always.

How has it helped my organization?

This security solution is one of the best so far. It enables IT professionals and businesses to work carefree with internal and external stakeholders and their IT systems and exchange information securely without any data theft or leakage. It is highly advised to incorporate this solution at all the critical windows and stages of system flow so that no malware attack can come inside the system under any circumstance.

It has improved the turnaround time for our project completion and system integration activities as it's the need of the hour for all the stakeholders in today's world.

It has lead to improved positive performance outcomes with high-end productivity. There are no more system issues, and complaints as IT does not bother us now.

What is most valuable?

Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users. 

The Check Point Partner keeps updating its EDR system and ensures no lapses occurred during the operating time. The entire team of Check Point is quite agile and proactive in terms of their advanced product development and their reaction time to any issue or complexity is just fantastic which ensures no deep damage to the system from threats.

EDR improvement checks system security and a proactive business and tech team improves customer interaction in the greatest manner possible.

What needs improvement?

Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner. This will ensure more credibility and confidence in customers and helps relationships last longer. High-end wonderful experiences for clientele will result in peer recommendations, which will certainly enhance the customer base for Check Point.

Keep improving your business offerings and go for an extension of the trial version for a longer period so that everyone can be benefitted from the same.

For how long have I used the solution?

It's been over six months now since we started using the product. It's one of the best available solutions so far.

What do I think about the stability of the solution?

The product offers high stability and flexibility.

What do I think about the scalability of the solution?

The product is quite scalable and replicable across all kinds of IT environments 

How are customer service and support?

Support is wonderful and we highly recommend them. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a few peer-recommended security solutions earlier.

How was the initial setup?

The setup is not complicated at all. We had smooth onboarding and easy deployment.

What about the implementation team?

We implemented it through a vendor.

What was our ROI?

We've seen over 75% ROI.

What's my experience with pricing, setup cost, and licensing?

It's cheap and quite low presently, and the room for customization is humongous currently. High time to go for these solutions as they are accelerating with great performance and pace.

Which other solutions did I evaluate?

We looked at McAfee and Kaspersky. They were evaluated thoroughly by our business and tech teams.

What other advice do I have?

I strongly recommend this solution to all IT businesses and professionals. This is a one-stop solution for all your security woes. Go for its trial today and experience the new age security utilities on your own.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1958124 - PeerSpot reviewer
CEO / direktor at a tech services company with 11-50 employees
Reseller
Sep 12, 2022
Great sandboxing and phishing protection with the ability to expand
Pros and Cons
  • "The product improved the overall security of our organization with the features like sandboxing and phishing prevention."
  • "We need a higher maximum file size in the sandboxing feature."

What is our primary use case?

We were searching for a next-generation antivirus solution, and this was the best choice on the market.

We have 25 users who work from home and the office.

All computers have Windows Professional version 10 or 11 installed.

We implemented a policy in which every client (either PC or mobile) has to have the Endpoint protection software installed with all the available blades.

Our company's cyber security monitoring process includes centralized product monitoring. 

How has it helped my organization?

The product improved the overall security of our organization with the features like sandboxing and phishing prevention.

We have centralized monitoring of the security of the clients even if they are not connected to our VPN network.

The e-mail and office solution is a great add-on to our existing Office 365 protection on our company's e-mails.

I also have to mention that we did not have our mobile devices protected before the implementation of Harmony mobile. That was really the next step in securing our company's overall IT security.

What is most valuable?

The sandboxing is good. We didn't have any file ransomware attacks since implementation.

The phishing protection works. It prevented a lot of nasty situations with fake websites.

Using this solution in e-mail and Office, we recognized how many man-in-the-middle attacks have been started to get some credential information from our employees.

In mobile, we didn't realize before how much harm can be done from the mobile devices in the network.

It replaced the ESET solutions we used before in our company.

What needs improvement?

We need a higher maximum file size in the sandboxing feature.

Maybe the exceptions could be made much more understandable and easy to use.

There should be an option added to temporarily disable the protection of all or some blades for testing reasons.

The email and Office solution could have some options for exceptions, for example: don't scan e-mails sent to the local PDF scanner e-mail address.

Maybe an option to auto-upgrade the client version to the next stable release of the client software would be nice.

For how long have I used the solution?

We have been using this solution for more then two years.

What do I think about the stability of the solution?

We didn't have any stability issues. We always use the stable releases of the client software.

What do I think about the scalability of the solution?

The solution offers very good scalability.

How are customer service and support?

So far, support is very good. I recommend them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used ESET, which was not satisfying.

How was the initial setup?

It was straightforward.

What about the implementation team?

We implemented through a local implementor.

What was our ROI?

The protection it gives to the clients is priceless.

What's my experience with pricing, setup cost, and licensing?

Get in contact with your local Check Point solution provider to give you an offer regarding the implementation.

Which other solutions did I evaluate?

We evalute the Fortinet solution.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1957878 - PeerSpot reviewer
IT Manager at a financial services firm with 11-50 employees
User
Sep 11, 2022
Easy to install and deploy with great threat mitigation
Pros and Cons
  • "Deploying new versions of the endpoint are easy."
  • "The Infinity Portal login is "iffy" at times."

What is our primary use case?

Endpoints have always been a network's weak point, as they are the main interface users use daily. A good endpoint security product must be able to be flexible in both deployments and across multiple OS versions. 

Check Point Harmony Endpoint does that for us. With multiple blades that add security to these weak points, I can be assured that threats are being mitigated in real-time. Also, Harmony Endpoint works seamlessly with Check Point's new MDR product, so logging, detecting, and responding couldn't be easier. 

How has it helped my organization?

With the new Harmony interface, I don't have to worry about a local endpoint management server anymore, making my deployments and updating of endpoints so much easier across the board. 

I haven't had issues with anti-malware updates anymore, and I can manage my endpoints from one Infinity Cloud portal. 

Being short-staffed in my department, this solution has absorbed some of the daily tasks of monitoring endpoint products to ensure they are up and running. Also, reporting services/blades that aren't running lets me use my time more freely. 

What is most valuable?

Deploying new versions of the endpoint are easy. It was a hassle before with a local management server, and now it's as easy as selecting the version you want from a drop-down menu. 

The options for removing/adding blades with the click of a button from the portal are great. The built-in VPN blade makes it so easy to deploy on my endpoints if I need employee remote access to my LAN. 

The installation is so easy with the simple MSI deployment packages, and I can watch the deployment process in real-time from the Cloud Portal. 

What needs improvement?

The Infinity Portal login is "iffy" at times. I would like to restrict it to only US traffic, however, due to the hosting in the cloud, it sometimes retrieves data from the EU and across seas. 

Also, if there was a way to simplify the SmartConsole login more, there could be an opportunity to take away some clicks to log in. Navigating back to the browser to log in through that portal site just makes for a more extended login transition. Just have the MFA capability right there on the local application and be done with it. 

For how long have I used the solution?

I've been using Check Point's endpoint solution for five years, however, just recently moved to the Harmony interface this summer. 

What do I think about the stability of the solution?

The stability makes it easy to move up or down. 

What do I think about the scalability of the solution?

The scalability makes it easy to move up or down. 

How are customer service and support?

Support could be improved. I'd give them a 7/10 before COVID, and maybe a 5/10 post-COVID. If you know who to ask for, it's more an 8/10. 

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We did not use a different solution previously.

How was the initial setup?

The setup is straightforward. Check Point assists the whole way, so it was very easy. 

What about the implementation team?

I handled the deployment in-house, myself. 

What was our ROI?

I'm not sure if we have seen an ROI. 

What's my experience with pricing, setup cost, and licensing?

Our rep has been great to work with concerning quotes/licensing. The setup is relatively easy, being in the cloud. A new customer could be up and running on a new Harmony install within days. 

Which other solutions did I evaluate?

CrowdStrike was the main one we evaluated against this product. 

What other advice do I have?

It is a great product. Check Point could work on their Technical Assistance Center (TAC) to assist customers, however, they usually get the job done in the end. 

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.