We use the product for endpoint protection against viruses, malware and ransomware technologies.
Offers good protection against malware, but the price could be better
Pros and Cons
- "The solution has all the standard features you would expect for endpoint protection."
- "Installation is straightforward, it took our IT department 20 minutes."
- "The price of the product could be more friendly."
- "I would recommend Microsoft Defender for Endpoint over this solution."
What is our primary use case?
What is most valuable?
The solution has all the standard features you would expect for endpoint protection.
What needs improvement?
The price of the product could be more friendly.
For how long have I used the solution?
I have been using the solution for one year now.
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,311 professionals have used our research since 2012.
What do I think about the stability of the solution?
We have had no problems with stability so far.
What do I think about the scalability of the solution?
The solution isn't very scalable, it's a PC, and it's all endpoint.
Currently, there are 2000 users of this product in my company. This number can change in the future due to company growth. Next year, each employee at the company will have a notebook and each notebook will have this software installed in it. If the headcount increases, the license will increase accordingly.
Which solution did I use previously and why did I switch?
We previously used McAfee for endpoint protection, it was a corporate decision to switch. This could have been due to a cost or technology issue.
How was the initial setup?
Installation is straightforward, it took our IT department 20 minutes.
The product has very fast deployment, as we roll out the product in batches. These batches can vary between one and hundreds. This number depends on how the team schedules the roll-out, as each roll-out is customized to match the bandwidth requirements.
What about the implementation team?
We used an in-house team to implement the solution.
What's my experience with pricing, setup cost, and licensing?
We implement this solution with a yearly subscription and there are no extra costs.
What other advice do I have?
I would recommend Microsoft Defender for Endpoint over this solution.
I would rate this solution a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Technology Security Consultant at Sify Technologies
Easy to set up and implement with good functionality
Pros and Cons
- "The product is stable."
- "The product has been stable and reliable."
- "Legacy VPNs and digital footprints should be minimized."
- "Mobile users are reluctant to actually use the solution."
What is our primary use case?
The major use was to provide protection to the mobile workforce. It gives elaborated insight about what is happening, what kind of particular applications we have installed, and what particular application they are using, and protecting them from online phishing, and random virus attacks also.
What is most valuable?
The functionality is quite good. It can run well on mobile devices.
You can also create profiles for individual mobile devices.
It is easy to set up and implement.
The product is stable.
It's very scalable.
What needs improvement?
Mobile users are reluctant to actually use the solution.
Check Point should focus on providing more compliant solutions, such as compliant for cloud-specific solutions. The digital footprint can be minimized, and then the Legacy VPNs can also be streamlined. As of now, most of the connectivity partners use Legacy VPNs to connect to their DC or their service partners. Legacy VPNs and digital footprints should be minimized.
For how long have I used the solution?
I've been dealing with the solution for a couple of months at this point. My first project was last September and then I did another last December.
What do I think about the stability of the solution?
The product has been stable and reliable. There are no bugs or glitches and it doesn't crash or freeze.
They've been delivering solutions for 15 to 20 years and I can attest to, over the last ten years, never run into any issues in terms of stability.
What do I think about the scalability of the solution?
The solution is very scalable. If a company needs to expand, it can do so - especially if a company is using a cloud-based deployment.
So far, we have delivered two projects to clients.
How are customer service and support?
Technical support is good. We are satisfied with the level of support on offer.
Which solution did I use previously and why did I switch?
I've also worked with CrowdStrike, which I also like very much.
How was the initial setup?
The initial setup is straightforward. You simply need to deploy the agents onto mobile devices. The enrollment process would happen on the device.
It's very flexible in that it can be a hybrid. It supports on-premises and cloud devices.
In terms of the size of the team a company would need to deploy and maintain the solution, it all depends on the timelines that you have. A single guy, if everything is being managed, a single guy can deploy at least 50 to 100 Harmony Endpoint agents in a day. And if things are not going well, it may require more people.
What's my experience with pricing, setup cost, and licensing?
We have different products in our portfolio and they all have their own specific costs. They also vary according to size and parameters.
What other advice do I have?
The solution is automatically updated and therefore we're always using the most updated product.
I'd recommend the solution to others. They're one of the leading security solutions providers in the world.
I'd rate the solution eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,311 professionals have used our research since 2012.
CISO at a financial services firm with 51-200 employees
Well priced, simple to set up and easy to layer in with other products
Pros and Cons
- "It's a scalable product as it is a cloud offering."
- "Overall, it's a good tool, it's doing a good job for what it is designed for, it is easy to set up, the solution is stable, it's a scalable product as it is a cloud offering, you can layer in this solution with others, and the product offers good pricing."
- "Specifically, there are gaps when it comes to security."
- "Specifically, there are gaps when it comes to security."
What is our primary use case?
The solution is primarily used to protect us. It's a tool that we have installed on all the users from sales.
What is most valuable?
Overall, it's a good tool. It's doing a good job for what it is designed for.
It is easy to set up.
The solution is stable.
It's a scalable product as it is a cloud offering.
You can layer in this solution with others. I like layering myself with various technologies, depending on the environment we're working in.
The product offers good pricing.
What needs improvement?
Everything can always be improved. Specifically, there are gaps when it comes to security.
For how long have I used the solution?
I've been using the solution for a couple of years now.
What do I think about the stability of the solution?
If you go by the recommended version, yes, it's stable.
What do I think about the scalability of the solution?
The cloud offering is scalable.
We have about two hundred or more users on the solution.
Which solution did I use previously and why did I switch?
We're also using Sophos.
How was the initial setup?
The solution is very straightforward to set up. It's not overly complex or difficult.
To set it up from the server-side, the deployment takes a couple of hours. To set it up from the user side, it's a couple of minutes.
What's my experience with pricing, setup cost, and licensing?
The product is reasonably priced. It's not overly expensive.
Which other solutions did I evaluate?
Currently, we're looking at CrowdStrike. We have not yet bought it. We're currently talking about options. I'm already set with a good partner on it and just discussing right now, discussing what is best suited as a product, rather than pricing.
What other advice do I have?
I am a customer and an end-user.
I'm not sure which version we are using currently, however, it is visible in the portal. The solution is a software as a service.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Systems Engineer at HarborTech Mobility
Good file scanning, stops malicious files, and detects/blocks malware
Pros and Cons
- "Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters."
- "If you are looking for a good antivirus, Check Point Antivirus is more than good, you will be surprised how excellent it is in all its aspects."
- "I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics."
- "I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics."
What is our primary use case?
The Check Point Antivirus offers our company a high level of security. It helps us to filter outgoing URLs with possible malevolent threats. Also, this great solution secures endpoints efficiently so that connections, applications, websites, and software.
The Check Point Antivirus uses real-time anti-virus protection and protection based on Threat Cloud anomalies. It's very useful.
I like that the antivirus hardly affects the performance of our security gateways, thus offering additional security almost without penalty.
How has it helped my organization?
Check Point Antivirus really is a great solution. It helps us to improve our company. First, it offers a high-security level. It helps me filter out outgoing URLs with potential malicious threats. Second, Check Point Antivirus is very easy to configure and enables me to take measurements under any threat quickly. Thanks to its constant updates in real-time, it is always up to date with possible new threats, so it is very effective at detecting all kinds of instructions, malware, or viruses.
Also, Check Point Antivirus allows me to keep all my computers protected against any potential cyber threat. It gives me the capability to detect and block malware threats by using virus signatures in real-time.
What is most valuable?
If you need a good antivirus, Check Point Antivirus is more than great.
Check Point Anti-Virus has many positive characteristics. First, Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters. Second, Like the other Check Point blades, the visibility and logging of events are remarkable.
One of the features that I love the most about this large software is that It allows me to stop incoming malicious files, and stop users from accessing malicious software-infested sites. Also, it gives me the opportunity to get very comprehensive reports where we can collect summaries of infections and trends to provide greater visibility of threats, which is absolutely fantastic.
What needs improvement?
Until now, I've found no negative features sufficiently important to complain about. In general terms, the software works perfectly. One time, I had a little issue, however, the technical support staff resolved it almost immediately.
I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics.
I like that activating Check Point antivirus hardly affects the performance of our security gateways, thus providing additional security almost without penalty.
For how long have I used the solution?
We are started using Check Point Antivirus in 2016. This great solution allows us to avoid malware traffic before reaching end users.
Check Point Antivirus is also really easy to set up. In just one click in the Smart Console, you can set up the policy and you're ready to go. Check Point Antivirus has a number of positive features that make it stand out through other means such as software.
Which solution did I use previously and why did I switch?
We use just Check Point Antivirus. We found everything we want in this great solution. It helps us to improve and secure our network. Also, Checkpoint Antivirus does excellent environmental protection work in many ways.
What's my experience with pricing, setup cost, and licensing?
I have just one piece of advice: if you can lower the price for this solution so that more companies can use this great solution and protect their environment, that would be ideal.
Which other solutions did I evaluate?
We just work with Check Point Antivirus until now and we found that this solution is the best.
What other advice do I have?
If you are looking for a good antivirus, Check Point Antivirus is more than good, you will be surprised how excellent it is in all its aspects.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Brand Manager at Corporation Sekiura S.A.C.E.I.
Excellent anti-ransomware, anti-bot and anti-exploit features
Pros and Cons
- "It has improved the detection of malware."
- "At the moment we are very satisfied and confident with Check Point."
- "Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle."
- "Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle."
What is our primary use case?
The first use case is to detect malware as well as advanced threat protection for known, unknown, and zero-day malware, sandbox emulation and extraction, and enhanced by automated endpoint forensics analysis.
Zero-day attacks are a risk for the company which seemed very important to us, plus the sandbox in the cloud. We have a cloud console that is easy to use and easy to monitor.
The details of our environment are Harmony Endpoint Advanced for 100 on-premise users with cloud managment console, and support for one year.
How has it helped my organization?
It has improved the detection of malware. We are very satisfied with the friendly and easy-to-monitor console. We chose the advanced version as it seemed very important to have advanced threat protection for known, unknown, and zero-day malware plus sandbox emulation and extraction, enhanced by automated endpoint forensics analysis.
At the moment we are very satisfied and confident with Check Point.
What is most valuable?
All of these features quoted below are valuable for us, as the set of solutions is what makes the solution really valuable.
- Endpoint Threat Prevention features
- Web Protection (malicious sites/URL Filtering)
- Anti-Ransomware
- Anti-Bot
- Anti-Exploit
- NGAV
- Anti-Virus
- Forensic collection and automated reports
- Threat Hunting
- Sandbox Emulation and Extraction (CDR)
- Endpoint Access Control Features
- Endpoint Firewall
- Application Control
- Port Protection
- Endpoint Compliance
- Remote Access VPN
If we had to choose one, we really like the EDR included.
What needs improvement?
The Check Point Harmony Endpoint is a very complete solution. Even in the most basic version, it already includes EDR, which today is very important and something that all endpoint solutions should consider having from the most basic versions. We would like to have one more step and that's to give and have full-disk encryption.
Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle. We could have it with Check Point Endpoint, mobile, cloud, or firewall. An all-in-one console would be great.
For how long have I used the solution?
I've been using the solution for six months.
What do I think about the stability of the solution?
The stability has been positive.
What do I think about the scalability of the solution?
The scalability has been positive.
How are customer service and support?
We did not have any problems. We got good solution training
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not previously use the solution.
What about the implementation team?
We had a positive experience with the implementation via a vendor.
What was our ROI?
Our ROI has been positive.
What's my experience with pricing, setup cost, and licensing?
If you need the on-premise management console, you have to pay an additional cost. It's not much, however, it's good to ask for a quote.
Which other solutions did I evaluate?
We also looked into Sophos.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. The company want to keep anonymity.
IT Security Manager at a manufacturing company with 1,001-5,000 employees
Great threat emulation and threat extraction features with helpful forensics
Pros and Cons
- "The forensics allows us to search retrospectively for an URL or file opened by users, for example, when you need to quickly check who else has clicked on a phishing link."
- "The most valuable features are threat emulation and threat extraction, and despite some false positives, it gives quite good security for file downloading."
- "Unfortunately, the web (cloud) management system and log search performance are quite bad."
- "Unfortunately, the web (cloud) management system and log search performance are quite bad."
What is our primary use case?
We use Harmony on every PC to add additional protection primarily to file downloads. We use it alongside our classic AV solution (non-Check Point). Every file is scanned via Threat Emulation (virtual sandboxing) and Threat Extraction (sanitizing files by removal of active content).
The anti-phishing module scans every new web form, that the user is trying to enter data in. Based on visual similarities to known sign-in websites (like Microsoft Azure's) it blocks the phishing ones that are similar.
The forensics module allows us to retrospectively search for a wide number of events on all PCs (for example for now-known malicious URLs or files)
How has it helped my organization?
Harmony mainly filled the gap in e-mail security, allowing us to check what the user has clicked (and blocks it when needed).
It also has a nice phishing form detection blocking users from entering their credentials on many real-life phishing websites.
The forensic log search (as described above) allows us to quickly do a retrospective search for a file or URL that we found malicious.
The features come in handy during Covid-related extended remote work times, when we were able to provide better security to our employees working off-premises.
What is most valuable?
The most valuable features are threat emulation and threat extraction. Despite some false positives, it gives quite good security for file downloading.
Phishing form detection based on on-site similarity (not only on URL) has at least 50% efficiency in real-life examples that passed our antispam systems (and most of the false negatives are pretty general forms, which are not so convincing to the user).
The forensics allows us to search retrospectively for an URL or file opened by users, for example, when you need to quickly check who else has clicked on a phishing link.
What needs improvement?
Unfortunately, the web (cloud) management system and log search performance are quite bad. Sometimes it takes longer to perform simple tasks and scrolling the results of the log is annoying due to frequent refreshes.
The exception management was always the Achilles' heel of Check Point products. It was a bit improved in Harmony, still, you can't for example exclude a site from anti-phishing form checks (which could take a few secs) while not excluding it from attachment scanning.
The forensics module still doesn't allow for HTTPS URLs entered by users. You are limited to DNS search or IP lookup. This doesn't make sense from a technical standpoint as the URLs are passing Harmony checks so they are known to the solution.
Anti-phishing cannot scan a form located inside an HTML e-mail attachment (which is a common practice in real-life attacks).
For how long have I used the solution?
I've used the solution for one year.
What do I think about the scalability of the solution?
Cloud management performance is sometimes quite bad for day-to-day tasks, although it is not related to the number of endpoints.
How was the initial setup?
If you limit browser extension via GPO, there might be conflicts with Harmony's that generally overwrites your config in some modes (per user vs per device enforcement).
What's my experience with pricing, setup cost, and licensing?
Pricing isn't cheap, especially if you want to extend forensic log retention period from default one week.
What other advice do I have?
It's still being actively developed and still needs some improvement.
In general, it's quite good now regarding security and might get even better.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Project Manager at Junta de Andalucia
Enables us to centralize all the security software used in a console and avoid ransomware
Pros and Cons
- "The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers."
- "Check Point SandBlast Agent allows us to centralize all the security software used in a console and avoid, mainly, ransomware in the company."
- "SandBlast Agent had moments in which it had a high load, we escalated it to the CheckPoint support that helped us to stabilize it. We had a problem with the parameterization of the solution. Once corrected by following the CheckPoint instructions, everything worked normally again."
- "SandBlast Agent had moments in which it had a high load, we escalated it to the CheckPoint support that helped us to stabilize it."
What is our primary use case?
We were looking for a solution as complete as possible to replace the existing antivirus and, if possible, integrate it with other products that we have, such as the CheckPoint firewall.
We decided to use the Check Point SandBlast agent to prevent ransomware on users' computers.
We subsequently expanded the scope of the solution to detect malicious activity on our network.
It is a very complete product but you have to know how to parameterize it well to avoid high CPU consumption.
It is also missed that it does not have a client for Linux.
How has it helped my organization?
Check Point SandBlast Agent allows us to centralize all the security software used in a console and avoid, mainly, ransomware in the company.
Many of our users have laptops to carry out teleworking, with this tool we can secure their web browsing, and in the event of suffering some type of attack, the computer is notified by SandBlast Agent and provides information about it and the security actions carried out. It even allows you to restore files modified during the attack.
You also have the option of performing a forensic analysis of the infected computer by providing a lot of information.
What is most valuable?
What we liked the most about the product, apart from detecting any attempted attack, is the graphical interface.
The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers.
We also highly value the anti-ransomware functionality, which creates a copy of the files on the computers and in case of infection by ransomware is able to restore them to a date when the computer was not infected.
What needs improvement?
It is a very complete product but you have to know how to parameterize it well to avoid high CPU consumption.
SandBlast Agent had moments in which it had a high load, we escalated it to the CheckPoint support that helped us to stabilize it. We had a problem with the parameterization of the solution. Once corrected by following the CheckPoint instructions, everything worked normally again.
It is also missed that it does not have a Linux client since some administrators use this type of operating system.
For how long have I used the solution?
I have been using SandBlast for over 1 year now.
What do I think about the stability of the solution?
It is a very mature product that provides great stability in service.
What do I think about the scalability of the solution?
It is a very mature product with good performance. Currently we have not needed to use its scalability.
How are customer service and support?
Our experience with customer service and support is very good, the support is totally professional and responds quickly.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we used third-party antivirus software and switched to Check Point SandBlast Agent for its ease of integration with other Check Point products and to improve protection against ransomware.
How was the initial setup?
Initial setup is easy, policies and user groups are defined and then applied. Then we adjusted the policies until we got what we needed.
What about the implementation team?
We implemented it with an internal team and when we had doubts, we consulted the manufacturer's support with a totally satisfactory result due to their great experience.
What was our ROI?
Currently we have not quantified our ROI but we have avoided the loss of information on user computers due to viruses, ransomware, ...
What's my experience with pricing, setup cost, and licensing?
The cost of the solution is similar to other products on the market.
Which other solutions did I evaluate?
We have been evaluating other products, such as Bitdefender and Broadcom (Symantec Enterprise).
What other advice do I have?
It is a very complete product but you have to know how to parameterize it well to avoid high CPU consumption.
It is also missed that it has no client for linux.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Manager at a renewables & environment company with 51-200 employees
Great cloud management and reporting with on easy pane of glass
Pros and Cons
- "The rollout and management of devices were very simple."
- "There is one pane of glass to all end points, events, and incidents which is providing our team with a clear picture of the environment."
- "The web filter service could be improved."
- "The web filter service could be improved."
What is our primary use case?
We wanted to consolidate a several-point solution to one endpoint. With so many new cyber threats and having a growing environment, what we had in place had too many gaps or grey areas between solutions and vendors.
Also, with a rapid transition to hybrid working, we needed to reconsider our end point protection. Having used Check Point NGFW for five years, it seemed like a good fit. Also, the experience and long term position of Check Point in the security market gave us good confidence. This mature position in the market also helped with finding several resellers and experience.
How has it helped my organization?
There is one pane of glass to all end points, events, and incidents which is providing our team with a clear picture of the environment. We have already experienced several items that previously just got lost in the greyness of a multi-solution environment.
The rollout and management of devices were very simple. It allowed for a rollout of 200+ devices - all remote - in just a couple of weeks. Having cloud-based management also really helped get started, as, within the day, we had a POC running and just started to grow from there.
What is most valuable?
Cloud management and reporting are great. The management interface is very simple and easy to navigate. Just getting a logon to start is very helpful. The Check Point support at this stage was great. While it was very simple and intuitive, having someone talk over the defaults provided recommendations that helped us jump forward very easily.
Again, the cloud management service has a several inbuilt default reports which are easy to customize and provide more visibility than we have had previously with several solutions.
What needs improvement?
The web filter service could be improved. It would be great to have a self-service user request for sites. An administrator would still need to approve, however.
The block screen could have a nicer screen or allow it to be customized.
The list of exceptions for URLs could be improved with a separate screen for a large list of exceptions. Having the same exception list for mobile and endpoints would be great.
We are hoping to transition to the SOC based service. Think this is still new; we're looking forward to get more information and test.
For how long have I used the solution?
We just transitioned to Check Point Harmony, and have been running it now for six weeks.
What do I think about the stability of the solution?
Stability seems very strong, however, it's early days.
What do I think about the scalability of the solution?
Scalability seems very strong, however, it is early days.
How are customer service and support?
We don't know yet.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
The move to hybrids has been working well during Covid.
How was the initial setup?
The initial setup was not complex.
What about the implementation team?
We did both - we implemented through a vendor and in-house.
What was our ROI?
The product offers a great lower cost than previous solutions.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to talk to your Check Point partners or find a good one.
Which other solutions did I evaluate?
We spent a long time reviewing the marketplace and comparison sites however, we did not test anything.
What other advice do I have?
I am very positive in terms of the solution and Check Point in general.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Cortex XDR by Palo Alto Networks
SentinelOne Singularity Complete
Fortinet FortiEDR
HP Wolf Security
Huntress Managed EDR
Elastic Security
Microsoft Defender XDR
Trellix Endpoint Security Platform
WatchGuard Firebox
TrendAI Vision One
Fortinet FortiClient
Symantec Endpoint Security
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
















