Try our new research platform with insights from 80,000+ expert users
reviewer1954029 - PeerSpot reviewer
Head of Security and Operational Risk at a financial services firm with 51-200 employees
User
Sep 4, 2022
Great real-time click protection, web filtering, and compatability
Pros and Cons
  • "We are able to manage all our endpoints from a single cloud console."
  • "It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products."

What is our primary use case?

As a financial company, we use the solution to provide security to our CDE environment and compliance with all PCI requirements. This tool enables us to provide security to the endpoints and also, to comply with local and foreign regulations regarding platform security.

We use this solution to protect all our endpoints, including personal computers and mobile phones. 

We have deployed the solution in Windows, Linux servers, workstations, and mobile phones. 

We also use the web filter capabilities both on mobile phones and on corporate computers.  

How has it helped my organization?

We now have so many capabilities we did not have before, as follows:

  • We are able to manage all our endpoints from a single cloud console
  • We don't need adicional on-premise servers to run this solution
  • The time that the endpoint refresh and identify new policies is very short. It takes seconds and this is a great value for us to fight emerging threats
  • We are now able to protect web browsing in all web browsers and also we don't need additional policies to block browsers in private browsing
  • The integratión with our SIEM solution was very smooth and the solution provides valuable information for security analysis

What is most valuable?

The most valuable aspects include:

  • Web Filtering. This feature is easy to manage, and it applies new policies in seconds. 
  • Real-time Click Protection. It protects the user from phishing attacks in real time. 
  • Compatibility with Windows, Linux, Android, and Mac. We don't need additional solution to protect all our endpoint. 
  • Cloud Management. This feature allows us to reduce our operating burden and also improve our TCO.

We now have the ability to block a compromised machine from the network.

We now have the ability to block in near real-time IOC.

What needs improvement?

It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products. 

It would also be great to include FIM capabilities for the Endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products.

It would be great if we could have additional DLP capabilities to identify personal information or any kind of information to comply with regulations that require information protection. 

Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.

For how long have I used the solution?

I have been using the solution for about three months.

What do I think about the stability of the solution?

We haven't had any problems or downtime since we acquired the solution. It is stable.

What do I think about the scalability of the solution?

The solution is scalable. It is quite simple to add new endpoints to the solution or add additional features, all with zero downtime. 

How are customer service and support?

Customer support and channel support are also always willing to help. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have been using McAfee Endpoint protection for about ten years. We were missing so many features and needed additional tools and effort to protect our endpoint. 

How was the initial setup?

It took a few minutes to deploy the whole solution.

What about the implementation team?

It was through a vendor. They were experts on the product.

What's my experience with pricing, setup cost, and licensing?

The costs depend on the company size. In my case, I was able to have all the features, including email protection, remote access, mobile protection, and endpoint protection, for a great price. 

Which other solutions did I evaluate?

I evaluated Trend Micro and McAfee.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at a tech services company with 51-200 employees
Real User
Top 20
Aug 28, 2022
Good security features and excellent protection from malware and ransomware
Pros and Cons
  • "One of the characteristics of this antivirus that is valuable is the detection of ransomware."
  • "We'd like them to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident."

What is our primary use case?

We had an absence of an antivirus utility that would give us protection inside and outside the organization. This tool integrated into several Check Point solutions helped us remedy this need. Starting from there, we have been applying this feature to meet the need and keep our users safe and secure. 

This solution is consistently implemented as part of the organization's endpoint security solution, combining global threat intelligence and next-generation advanced threat prevention engines. 

How has it helped my organization?

The endpoint security features are great. You not only have a solution that manages your computer but also protects you from malware, ransomware, and also from any other virus. You can do so from wherever you are and connect your computer to the internet. This feature learns well and is supported by global threat intelligence and zero-day threat prevention engines and many of the new generation. 

For us, it is important to have solutions that always protect and innovate the security of users and above all security and protection in real time. 

What is most valuable?

One of the characteristics of this antivirus that is valuable is the detection of ransomware. I can detect viruses that have done the most damage in recent years. I can protect users from damages and total or partial loss of information. We're being well protected. This protection feeds on databases that are constantly updated, giving greater security. It is worth using, and having in our organization is one of the products that will make the difference during an attack and will safeguard the security of the equipment.

What needs improvement?

I would like to see, in the future, this virus emulation feature deployed to endpoint security where it sends the virus found in sandboxing and emulates the attack, notifying administrators via a portal so that they can find out and learn from the attack that they are having.  

Another point to consider is the ability to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the scalability of the solution?

It is easy to configure and is not very invasive with users, which makes it very practical to use.

What's my experience with pricing, setup cost, and licensing?

Their service in Spanish is something that we need. We've had a bad taste based on this part of the service. We need more attention to our language. 

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.
reviewer1805079 - PeerSpot reviewer
Network Engineer at a maritime company with 501-1,000 employees
User
Jul 10, 2022
Good signature-based protection, great sandbox feature, and offers continuous scanning
Pros and Cons
  • "Regular email alerts are beneficial."
  • "The technical support could be improved."

What is our primary use case?

We use the solution for an additional layer of protection for our servers and internal network traffic to the internet. We deployed Check Point firewalls on our perimeter.

We have two security gateway and one security management server which is running R81 gaia OS.

We turned on the antivirus blade on the firewall to protect our network from malware threats. In order to be able to block threats before they reach our network, we also activated HTTPS inspection.

Check Point Antivirus continuously scans each and every file before reaching the destination.

How has it helped my organization?

Check Point Antivirus has continuously scan each and every file before reaching our network. This feature gives full security confidence to feel safe from malware and ransomware attacks. The activation of the antivirus is easy.

Check Point antivirus is performs very well. To track out data leaks and safeguard our company's services implementing this Check Point service is essential.

Regular email alerts are beneficial. It gives us a complete picture of virus/malware, etc, where it is blocked when the user tries to access things.

What is most valuable?

Our environment is well-protected by Check Point Antivirus in many ways. We use web filtering to restrict and defend when users access the internet

The sandbox feature is good. Any contaminated computer would be immediately disconnected from the network. The smart event gives the administrator a high-level security view of the enterprise.

It also helps us to block malicious file downloads and access to infected sites from our network. Moreover, the signature-based detection works well.

 Overall, this system performs a superb job of safeguarding us.

What needs improvement?

The next-generation firewall receives an additional layer of security. I don't currently dislike the product in any way. By restricting files based on hash or signature at the perimeter level, any antivirus solution placed on an endpoint works with less effort.

The technical support could be improved.

Check Point should launch a free online training portal to assist many people in becoming skilled in Check Point services. Also, they should offer some sort of certificate discount promotion.

For how long have I used the solution?

I've used the solution for more than two years.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
JamesYa - PeerSpot reviewer
Senior Solutions Architect at a computer software company with 501-1,000 employees
Real User
Jun 16, 2022
Offers good protection against malware, but the price could be better
Pros and Cons
  • "The solution has all the standard features you would expect for endpoint protection."
  • "The price of the product could be more friendly."

What is our primary use case?

We use the product for endpoint protection against viruses, malware and ransomware technologies.

What is most valuable?

The solution has all the standard features you would expect for endpoint protection.

What needs improvement?

The price of the product could be more friendly. 

For how long have I used the solution?

I have been using the solution for one year now. 

What do I think about the stability of the solution?

We have had no problems with stability so far. 

What do I think about the scalability of the solution?

The solution isn't very scalable, it's a PC, and it's all endpoint. 

Currently, there are 2000 users of this product in my company. This number can change in the future due to company growth. Next year, each employee at the company will have a notebook and each notebook will have this software installed in it. If the headcount increases, the license will increase accordingly.

Which solution did I use previously and why did I switch?

We previously used McAfee for endpoint protection, it was a corporate decision to switch. This could have been due to a cost or technology issue. 

How was the initial setup?

Installation is straightforward, it took our IT department 20 minutes. 

The product has very fast deployment, as we roll out the product in batches. These batches can vary between one and hundreds. This number depends on how the team schedules the roll-out, as each roll-out is customized to match the bandwidth requirements.

What about the implementation team?

We used an in-house team to implement the solution. 

What's my experience with pricing, setup cost, and licensing?

We implement this solution with a yearly subscription and there are no extra costs. 

What other advice do I have?

I would recommend Microsoft Defender for Endpoint over this solution. 

I would rate this solution a seven out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Sandeep Sehrawat - PeerSpot reviewer
Information Technology Security Consultant at a computer software company with 1,001-5,000 employees
Real User
Jun 13, 2022
Easy to set up and implement with good functionality
Pros and Cons
  • "The product is stable."
  • "Legacy VPNs and digital footprints should be minimized."

What is our primary use case?

The major use was to provide protection to the mobile workforce. It gives elaborated insight about what is happening, what kind of particular applications we have installed, and what particular application they are using, and protecting them from online phishing, and random virus attacks also.

What is most valuable?

The functionality is quite good. It can run well on mobile devices. 

You can also create profiles for individual mobile devices. 

It is easy to set up and implement. 

The product is stable.

It's very scalable. 

What needs improvement?

Mobile users are reluctant to actually use the solution. 

Check Point should focus on providing more compliant solutions, such as compliant for cloud-specific solutions. The digital footprint can be minimized, and then the Legacy VPNs can also be streamlined. As of now, most of the connectivity partners use Legacy VPNs to connect to their DC or their service partners. Legacy VPNs and digital footprints should be minimized.

For how long have I used the solution?

I've been dealing with the solution for a couple of months at this point. My first project was last September and then I did another last December.

What do I think about the stability of the solution?

The product has been stable and reliable. There are no bugs or glitches and it doesn't crash or freeze. 

They've been delivering solutions for 15 to 20 years and I can attest to, over the last ten years, never run into any issues in terms of stability.

What do I think about the scalability of the solution?

The solution is very scalable. If a company needs to expand, it can do so - especially if a company is using a cloud-based deployment. 

So far, we have delivered two projects to clients. 

How are customer service and support?

Technical support is good. We are satisfied with the level of support on offer. 

Which solution did I use previously and why did I switch?

I've also worked with CrowdStrike, which I also like very much. 

How was the initial setup?

The initial setup is straightforward. You simply need to deploy the agents onto mobile devices. The enrollment process would happen on the device. 

It's very flexible in that it can be a hybrid. It supports on-premises and cloud devices. 

In terms of the size of the team a company would need to deploy and maintain the solution, it all depends on the timelines that you have. A single guy, if everything is being managed, a single guy can deploy at least 50 to 100 Harmony Endpoint agents in a day. And if things are not going well, it may require more people.

What's my experience with pricing, setup cost, and licensing?

We have different products in our portfolio and they all have their own specific costs. They also vary according to size and parameters.

What other advice do I have?

The solution is automatically updated and therefore we're always using the most updated product.

I'd recommend the solution to others. They're one of the leading security solutions providers in the world.

I'd rate the solution eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
PeerSpot user
reviewer1835919 - PeerSpot reviewer
CISO at a financial services firm with 51-200 employees
Real User
May 26, 2022
Well priced, simple to set up and easy to layer in with other products
Pros and Cons
  • "It's a scalable product as it is a cloud offering."
  • "Specifically, there are gaps when it comes to security."

What is our primary use case?

The solution is primarily used to protect us. It's a tool that we have installed on all the users from sales.

What is most valuable?

Overall, it's a good tool. It's doing a good job for what it is designed for.

It is easy to set up.

The solution is stable.

It's a scalable product as it is a cloud offering.

You can layer in this solution with others. I like layering myself with various technologies, depending on the environment we're working in.

The product offers good pricing.

What needs improvement?

Everything can always be improved. Specifically, there are gaps when it comes to security.

For how long have I used the solution?

I've been using the solution for a couple of years now.

What do I think about the stability of the solution?

If you go by the recommended version, yes, it's stable.

What do I think about the scalability of the solution?

The cloud offering is scalable. 

We have about two hundred or more users on the solution. 

Which solution did I use previously and why did I switch?

We're also using Sophos.

How was the initial setup?

The solution is very straightforward to set up. It's not overly complex or difficult. 

To set it up from the server-side, the deployment takes a couple of hours. To set it up from the user side, it's a couple of minutes.

What's my experience with pricing, setup cost, and licensing?

The product is reasonably priced. It's not overly expensive. 

Which other solutions did I evaluate?

Currently, we're looking at CrowdStrike. We have not yet bought it. We're currently talking about options. I'm already set with a good partner on it and just discussing right now, discussing what is best suited as a product, rather than pricing.

What other advice do I have?

I am a customer and an end-user.

I'm not sure which version we are using currently, however, it is visible in the portal. The solution is a software as a service. 

I'd rate the solution nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1853787 - PeerSpot reviewer
Systems Engineer at a tech services company with 11-50 employees
User
May 25, 2022
Good file scanning, stops malicious files, and detects/blocks malware
Pros and Cons
  • "Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters."
  • "I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics."

What is our primary use case?

The Check Point Antivirus offers our company a high level of security. It helps us to filter outgoing URLs with possible malevolent threats. Also, this great solution secures endpoints efficiently so that connections, applications, websites, and software.

The Check Point Antivirus uses real-time anti-virus protection and protection based on Threat Cloud anomalies. It's very useful.

I like that the antivirus hardly affects the performance of our security gateways, thus offering additional security almost without penalty.

How has it helped my organization?

Check Point Antivirus really is a great solution. It helps us to improve our company. First, it offers a high-security level. It helps me filter out outgoing URLs with potential malicious threats. Second, Check Point Antivirus is very easy to configure and enables me to take measurements under any threat quickly. Thanks to its constant updates in real-time, it is always up to date with possible new threats, so it is very effective at detecting all kinds of instructions, malware, or viruses.

Also, Check Point Antivirus allows me to keep all my computers protected against any potential cyber threat. It gives me the capability to detect and block malware threats by using virus signatures in real-time.

What is most valuable?

If you need a good antivirus, Check Point Antivirus is more than great. 

Check Point Anti-Virus has many positive characteristics. First, Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters. Second, Like the other Check Point blades, the visibility and logging of events are remarkable.

One of the features that I love the most about this large software is that It allows me to stop incoming malicious files, and stop users from accessing malicious software-infested sites. Also, it gives me the opportunity to get very comprehensive reports where we can collect summaries of infections and trends to provide greater visibility of threats, which is absolutely fantastic.

What needs improvement?

Until now, I've found no negative features sufficiently important to complain about. In general terms, the software works perfectly. One time, I had a little issue, however, the technical support staff resolved it almost immediately.

I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics.

I like that activating Check Point antivirus hardly affects the performance of our security gateways, thus providing additional security almost without penalty.

For how long have I used the solution?

We are started using Check Point Antivirus in 2016. This great solution allows us to avoid malware traffic before reaching end users.

Check Point Antivirus is also really easy to set up. In just one click in the Smart Console, you can set up the policy and you're ready to go. Check Point Antivirus has a number of positive features that make it stand out through other means such as software.

Which solution did I use previously and why did I switch?

We use just Check Point Antivirus. We found everything we want in this great solution. It helps us to improve and secure our network. Also, Checkpoint Antivirus does excellent environmental protection work in many ways.

What's my experience with pricing, setup cost, and licensing?

I have just one piece of advice: if you can lower the price for this solution so that more companies can use this great solution and protect their environment, that would be ideal.  

Which other solutions did I evaluate?

We just work with Check Point Antivirus until now and we found that this solution is the best.

What other advice do I have?

If you are looking for a good antivirus, Check Point Antivirus is more than good, you will be surprised how excellent it is in all its aspects.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1853499 - PeerSpot reviewer
IT Security Manager at a manufacturing company with 1,001-5,000 employees
User
May 10, 2022
Great threat emulation and threat extraction features with helpful forensics
Pros and Cons
  • "The forensics allows us to search retrospectively for an URL or file opened by users, for example, when you need to quickly check who else has clicked on a phishing link."
  • "Unfortunately, the web (cloud) management system and log search performance are quite bad."

What is our primary use case?

We use Harmony on every PC to add additional protection primarily to file downloads. We use it alongside our classic AV solution (non-Check Point). Every file is scanned via Threat Emulation (virtual sandboxing) and Threat Extraction (sanitizing files by removal of active content).

The anti-phishing module scans every new web form, that the user is trying to enter data in. Based on visual similarities to known sign-in websites (like Microsoft Azure's) it blocks the phishing ones that are similar.

The forensics module allows us to retrospectively search for a wide number of events on all PCs (for example for now-known malicious URLs or files)

How has it helped my organization?

Harmony mainly filled the gap in e-mail security, allowing us to check what the user has clicked (and blocks it when needed).

It also has a nice phishing form detection blocking users from entering their credentials on many real-life phishing websites.

The forensic log search (as described above) allows us to quickly do a retrospective search for a file or URL that we found malicious.

The features come in handy during Covid-related extended remote work times, when we were able to provide better security to our employees working off-premises.

What is most valuable?

The most valuable features are threat emulation and threat extraction. Despite some false positives, it gives quite good security for file downloading.

Phishing form detection based on on-site similarity (not only on URL) has at least 50% efficiency in real-life examples that passed our antispam systems (and most of the false negatives are pretty general forms, which are not so convincing to the user).

The forensics allows us to search retrospectively for an URL or file opened by users, for example, when you need to quickly check who else has clicked on a phishing link.

What needs improvement?

Unfortunately, the web (cloud) management system and log search performance are quite bad. Sometimes it takes longer to perform simple tasks and scrolling the results of the log is annoying due to frequent refreshes.

The exception management was always the Achilles' heel of Check Point products. It was a bit improved in Harmony, still, you can't for example exclude a site from anti-phishing form checks (which could take a few secs) while not excluding it from attachment scanning.

The forensics module still doesn't allow for HTTPS URLs entered by users. You are limited to DNS search or IP lookup. This doesn't make sense from a technical standpoint as the URLs are passing Harmony checks so they are known to the solution.

Anti-phishing cannot scan a form located inside an HTML e-mail attachment (which is a common practice in real-life attacks).

For how long have I used the solution?

I've used the solution for one year.

What do I think about the scalability of the solution?

Cloud management performance is sometimes quite bad for day-to-day tasks, although it is not related to the number of endpoints.

How was the initial setup?

If you limit browser extension via GPO, there might be conflicts with Harmony's that generally overwrites your config in some modes (per user vs per device enforcement).

What's my experience with pricing, setup cost, and licensing?

Pricing isn't cheap, especially if you want to extend forensic log retention period from default one week.

What other advice do I have?

It's still being actively developed and still needs some improvement.

In general, it's quite good now regarding security and might get even better.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.