My primary use case for Check Point Harmony EDR would be to get broader visibility in the environment. For instance, a pre-detection was done by Check Point Harmony when there was an attack happening. It pre-detected and remediated immediately before it got spread in the environment. The best part is the system was not in the office network but still got detected and remediated automatically.
Engineer at Digitaltrack
Offers broader visibility in the environment
Pros and Cons
- "The insight and visibility of the detection is good."
- "The services of EDR consumption should be reduced and the support needs to be improved."
What is our primary use case?
What is most valuable?
The insight and visibility of the detection is good.
What needs improvement?
As such there is nothing I can think of additional features.
The services of EDR consumption should be reduced and the support needs to be improved.
For how long have I used the solution?
I have using Harmony for the past two years.
Buyer's Guide
Check Point Harmony Endpoint
August 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,649 professionals have used our research since 2012.
What do I think about the stability of the solution?
Stability is impressive.
What do I think about the scalability of the solution?
Scalability is good.
How are customer service and support?
Support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup was straightforward.
What about the implementation team?
The implementation happened in-house team.
What's my experience with pricing, setup cost, and licensing?
The licensing and costs are good.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Enterprise architect at Kapsch
Very robust, providing good ransomware protection
Pros and Cons
- "A very good and robust antivirus solution."
- "Reporting and management could be improved."
What is our primary use case?
We use Check Point for ransomware protection. It provides standard endpoint protection.
What is most valuable?
We need ransomware protection and that's what we get. It's a very good and robust antivirus solution.
What needs improvement?
As with most antivirus products, the reporting and management could be improved.
For how long have I used the solution?
I've been using this solution for one year.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable, we have a few thousand users.
How are customer service and support?
We haven't had any issues with the technical support.
Which solution did I use previously and why did I switch?
I previously used Symantec and McAfee depending on the requirements at the time. There's not much difference between all the solutions in this area. It comes down to how manageable they are and how frequently false positives exist in that environment and whether they slow down the transactions or the processing of the machine.
How was the initial setup?
The initial setup is fairly straightforward, deployment takes a few minutes. It's just a matter of setting up the server, your policies, and pushing out the agents.
What was our ROI?
Our ROI has been from an operational perspective. If you're not fighting with a product every day, it saves you time and money.
What's my experience with pricing, setup cost, and licensing?
Licensing costs are usually paid annually or every three years. This is not a particularly expensive solution.
What other advice do I have?
I rate this solution eight out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
August 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,649 professionals have used our research since 2012.
Check Point Antivirus its a great solution, easy installation.
Pros and Cons
- "It generates enough visibility in terms of what happens on our equipment."
- "We would like to see better guides in the future with more concrete examples of the best practices."
What is our primary use case?
The implementation was really easy. We were able to activate the antivirus blade and install it on the computers we required. In this way, we were able to provide security for malware protection - all represented by Check Point Security Management.
It was required to expand or have the license to use the antivirus security utility. A point that cost us at the beginning was implementing the licenses in the management server however, once up and running, it was easy.
It is an old brand that has all the anti-malware protection, signatures, and revisions to avoid vulnerabilities.
How has it helped my organization?
Our organization teams used a Microsoft-based antivirus. However, we already had Check Point gateways in use. We wanted to unify the protection more, and we tried the use of Check Point Antivirus. We really have no complaints. It offers good anti-malware protection and ransomware, among other modern threat protection features. The installation of the equipment was easy, and we achieved the main objective of unifying the protected environment.
We currently use Check Point Management R81, which is one of the most complete versions.
What is most valuable?
The logs and monitoring are valuable features. It generates enough visibility in terms of what happens on our equipment.
The sandboxing validates some files that have threat qualities.
We like this security tool.
What needs improvement?
Check Point is one of the best security brands according to the Gartner quadrant. However, it needs improvement in some areas.
We would like to see better guides in the future with more concrete examples of the best practices.
The support is somewhat complicated. Sometimes they take a long time to solve problems. The language barrier is an issue for Spanish-speaking people.
Support hours are generally contrary to the hours in Latin America. They could expand the support more and have more trained and effective technical personnel to help customers.
For how long have I used the solution?
For at least eight months, we have used this solution, which greatly facilitates our security. It is an antivirus implemented through Check Point Gateway R81.
Which solution did I use previously and why did I switch?
Previously, we used a Microsoft Antivirus. It's not bad. However, we wanted a tool integrated with our Check Point technologies, and therefore, we validated the options to make the required changes.
What's my experience with pricing, setup cost, and licensing?
It is important to assess and verify the costs of Check Point technologies with an expert vendor to help determine the technology and tool that can meet the specific business needs of each company.
The documentation is outdated. However, if it is validated well, it is possible to obtain what is required for the implementations.
Which other solutions did I evaluate?
At the level of antivirus, we looked at Sophos and McAfee. However, the implementation most adopted in our environment was Check Point. We are convinced that it was the best option.
What other advice do I have?
The product is an easy-to-implement and centralized antivirus solution. I recommend it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Its a nice administrative portal, In Infinity centralize and easy
Pros and Cons
- "We love the reports and monitoring they provide."
- "Infinity Portal sometimes requires more performance."
What is our primary use case?
Check Point Harmony Mobile was provided through an installed agent which has very light protection against malware and ransomware, among others.
In our country, many ransomware threats have been generated at the country level, for which it was worrying that we had kidnapping or encryption of our data. At the management level, the request was given to provide additional security to protect us. The tool has been very good.
We tested this Check Point tool to assess the performance of our endpoints, and shield them safely while increasing the protection of our platforms.
How has it helped my organization?
Our company wanted to provide an additional layer of security for our endpoints. We already manage Check Point with different tools, We have done very well with them and we have validated how Check Point Harmony Endpoint works to protect our endpoint equipment. So far, it works quite well.
We have seen the reports of attempted attacks and we have been able to provide a solution to these vulnerabilities. There is less malware in our infrastructure.
Its characteristics are quite good.
What is most valuable?
The characteristic that most attracts our attention is the administration portal. It doesn't require a management server since its licensing and management are through the Check Point Infinity Portal. It is very intuitive and easy to implement.
The way in which the agent is installed on the computers is very easy, it does not consume almost any performance of the server or final computers, in this way there is no need to worry about increasing resources to be able to protect them with Check Point Harmony Endpoint.
We love the reports and monitoring they provide. It helps us quickly see what vulnerabilities we have on our endpoints.
What needs improvement?
We have few disadvantages or improvement points. However, the Infinity Portal sometimes requires more performance. It is a small detail. However, it could be improved.
On the other hand, it is also essential that the manufacturer improves the public documentation so that users can better understand how it can be implemented with best practices.
Finally, at the support level, we believe that Check Point can improve. Sometimes the answers are provided at dawn, which makes it more challenging to solve.
For how long have I used the solution?
The solution is a very good security tool. It was used this year at a test level and everything works very well.
Which solution did I use previously and why did I switch?
Previously we only had or used Microsoft's antivirus or endpoint, however, we had all non-centralized security. Through this tool, we can centralize everything in the Infinity Check Point Portal.
What's my experience with pricing, setup cost, and licensing?
Licensing is per endpoint, which is why we think is good. The cost is competitive, and its features are very good.
Which other solutions did I evaluate?
We validated several manufacturers, however, we did not want to have separate solutions. It seems to us a better option to have only Check Point.
What other advice do I have?
I recommend this security tool, it is always important to test the tool at the test level to decide if it is what you are looking for.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Administrative Assistant at Tecapro
Great security, reliability, and offers a centralized administration of unified services
Pros and Cons
- "Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard."
- "I would like to see is this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses."
What is our primary use case?
We had to protect our equipment inside and outside the perimeter network, regardless of where we were. Due to this need, we came to use Check Point Harmony Endpoint, which was extremely easy to deploy from the moment we logged in to the website.
This solution is very user-friendly. After the Check Point tenant is created, it allows us to download the application for iOS or Windows, and it is only a matter of installing it so that the teams can start reporting to the Harmony Endpoint cloud.
How has it helped my organization?
It came to provide us with security, reliability, and a centralized administration of unified services. It works regardless of whether you work on Mac or Windows systems, which are among the equipment we have in our organization. Today, our equipment is very diverse. However, we have managed to protect everyone with this solution. Check Point Harmony Endpoint provides support within the new organizational disruption trend of teleworking. With it, we manage to protect and manage all teams from a centralized policy.
What is most valuable?
Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard. We are achieving uniform work that is easy to manage if any changes are necessary. Being able to give us an inventory of the equipment and the health status of everything from a single place has been great. This solution has become a great ally for the prevention of threats and security problems caused by viruses such as ransomware, and we are protected against threats, which is of great value.
What needs improvement?
I would like to see this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses. We'd like to be able to integrate several products and services into one to be more efficient and user-friendly within the infrastructure.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Administrative Assistant at Tecapro
Good prevention and detection with helpful analytics
Pros and Cons
- "Its most valuable feature is the integration of analytics with the cloud."
- "I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available."
What is our primary use case?
Today, with our current organizational needs, we find great complexities when it comes to protecting each of our users inside and outside of the network. As a result, we came to use solutions that had not been deployed yet, and one of them is the integration that Check Point has in its range of solutions, such as the Blade and what we know today as the Check Point Antivirus. Thanks to this solution, we are protected.
How has it helped my organization?
The Antivirus is part of the added value we are getting from Check Point. It's offering greater prevention and detection of attacks. The solution adds value to our organization since it is protecting us and integrates analytics with the Check Point cloud. We're getting great computing power and analysis behind the security.
What is most valuable?
Its most valuable feature is the integration of analytics with the cloud. We like that we can detect zero-day incidents, problems, or virus attacks inside or outside the organization. It's one of the most complex and integrated antivirus solutions. The value of analysis in real-time every time we are having an attack, vulnerability, or security breach is very helpful. Today, we want to have integrated solutions and quick solutions that will protect us mainly with new attacks and solutions that protect us from the hijacking of our data (ransomware).
What needs improvement?
I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available. We want the solution to help us achieve 360-degree security across all work teams.
For how long have I used the solution?
I've used the solution for about two years.
What do I think about the stability of the solution?
The solution is really simple. It is not difficult to configure, and it is very stable for me, from my experience.
What do I think about the scalability of the solution?
Due to its deployment, it is integrated within our network, and it is a quick and easy solution to scale or modify.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at Fujairah Port
Good signature-based protection, great sandbox feature, and offers continuous scanning
Pros and Cons
- "Regular email alerts are beneficial."
- "The technical support could be improved."
What is our primary use case?
We use the solution for an additional layer of protection for our servers and internal network traffic to the internet. We deployed Check Point firewalls on our perimeter.
We have two security gateway and one security management server which is running R81 gaia OS.
We turned on the antivirus blade on the firewall to protect our network from malware threats. In order to be able to block threats before they reach our network, we also activated HTTPS inspection.
Check Point Antivirus continuously scans each and every file before reaching the destination.
How has it helped my organization?
Check Point Antivirus has continuously scan each and every file before reaching our network. This feature gives full security confidence to feel safe from malware and ransomware attacks. The activation of the antivirus is easy.
Check Point antivirus is performs very well. To track out data leaks and safeguard our company's services implementing this Check Point service is essential.
Regular email alerts are beneficial. It gives us a complete picture of virus/malware, etc, where it is blocked when the user tries to access things.
What is most valuable?
Our environment is well-protected by Check Point Antivirus in many ways. We use web filtering to restrict and defend when users access the internet
The sandbox feature is good. Any contaminated computer would be immediately disconnected from the network. The smart event gives the administrator a high-level security view of the enterprise.
It also helps us to block malicious file downloads and access to infected sites from our network. Moreover, the signature-based detection works well.
Overall, this system performs a superb job of safeguarding us.
What needs improvement?
The next-generation firewall receives an additional layer of security. I don't currently dislike the product in any way. By restricting files based on hash or signature at the perimeter level, any antivirus solution placed on an endpoint works with less effort.
The technical support could be improved.
Check Point should launch a free online training portal to assist many people in becoming skilled in Check Point services. Also, they should offer some sort of certificate discount promotion.
For how long have I used the solution?
I've used the solution for more than two years.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Offers good protection against malware, but the price could be better
Pros and Cons
- "The solution has all the standard features you would expect for endpoint protection."
- "The price of the product could be more friendly."
What is our primary use case?
We use the product for endpoint protection against viruses, malware and ransomware technologies.
What is most valuable?
The solution has all the standard features you would expect for endpoint protection.
What needs improvement?
The price of the product could be more friendly.
For how long have I used the solution?
I have been using the solution for one year now.
What do I think about the stability of the solution?
We have had no problems with stability so far.
What do I think about the scalability of the solution?
The solution isn't very scalable, it's a PC, and it's all endpoint.
Currently, there are 2000 users of this product in my company. This number can change in the future due to company growth. Next year, each employee at the company will have a notebook and each notebook will have this software installed in it. If the headcount increases, the license will increase accordingly.
Which solution did I use previously and why did I switch?
We previously used McAfee for endpoint protection, it was a corporate decision to switch. This could have been due to a cost or technology issue.
How was the initial setup?
Installation is straightforward, it took our IT department 20 minutes.
The product has very fast deployment, as we roll out the product in batches. These batches can vary between one and hundreds. This number depends on how the team schedules the roll-out, as each roll-out is customized to match the bandwidth requirements.
What about the implementation team?
We used an in-house team to implement the solution.
What's my experience with pricing, setup cost, and licensing?
We implement this solution with a yearly subscription and there are no extra costs.
What other advice do I have?
I would recommend Microsoft Defender for Endpoint over this solution.
I would rate this solution a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
Microsoft Defender XDR
Cortex XDR by Palo Alto Networks
HP Wolf Security
Fortinet FortiClient
Elastic Security
WatchGuard Firebox
Trellix Endpoint Security Platform
Symantec Endpoint Security
Huntress Managed EDR
Kaspersky Endpoint Security for Business
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?