No more typing reviews! Try our Samantha, our new voice AI agent.
Sr. VP of Creative & Development at a non-tech company with 51-200 employees
Real User
Top 5
Dec 26, 2025
Advanced protection has prevented phishing and ransomware while saving investigation time
Pros and Cons
  • "Check Point Harmony Endpoint has positively impacted our organization by both improving efficiency and reducing incidents."
  • "I think Check Point Harmony Endpoint could be improved, as the documentation is not intuitive."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is to protect devices across the organization with consistent security controls, helping us prevent malware, ransomware, or phishing attacks by applying advanced threat prevention directly on laptops or desktops.

A specific example of how I have used Check Point Harmony Endpoint to protect devices is when it blocked a ransomware attack on a remote employee's laptop. The user had clicked on what looked like a legitimate invoice attachment, but the endpoint agent immediately detected the malicious behavior and isolated the file before it could encrypt anything.

Check Point Harmony Endpoint really helped our team during a wave of phishing emails that tried to trick users into entering credentials on a fake login page. Even though some employees clicked the link, Check Point Harmony Endpoint blocked the malicious site from loading and prevented any data from being exposed.

How has it helped my organization?

yes

What is most valuable?

The best feature Check Point Harmony Endpoint offers is the advanced threat prevention, as it blocks malware, ransomware, phishing, and zero-day attacks using Check Point ThreatCloud AI intelligence.

The advanced threat prevention feature has made a big difference for us by reducing both the number and severity of incidents. Before, our team had to spend a lot of time manually investigating suspicious files or links.

Check Point Harmony Endpoint has positively impacted our organization by both improving efficiency and reducing incidents. With advanced threat prevention running directly on devices, we have seen a noticeable drop in malware and phishing cases reaching users.

What needs improvement?

I think Check Point Harmony Endpoint could be improved, as the documentation is not intuitive.

The documentation could be clearer when people need to deploy for the first time or for advanced configurations.

Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
895,151 professionals have used our research since 2012.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for around six years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is very stable.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint is very scalable. All SaaS solutions are very scalable.

How are customer service and support?

The customer support for Check Point Harmony Endpoint is excellent.

I would rate the customer support for Check Point Harmony Endpoint a 10.

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

How was the initial setup?

I purchased Check Point Harmony Endpoint through the Azure Marketplace, and it was a great experience.

What about the implementation team?

My company does not have a business relationship with this vendor other than being a customer.

What was our ROI?

I have seen a return on investment with Check Point Harmony Endpoint, and for me, it is time saved.

Security incidents have dropped by roughly 20 to 30%, especially around phishing and malware attempts, because the system blocks most threats before they reach users. On the efficiency side, our team now spends far less time chasing false positives or manually correlating logs.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Check Point Harmony Endpoint is that the pricing is normal.

Which other solutions did I evaluate?

Before choosing Check Point Harmony Endpoint, I did not evaluate other options.

What other advice do I have?

My advice to others looking into using Check Point Harmony Endpoint is that it is an excellent solution for laptops or endpoints. It is excellent and centralized, and it is a modern solution for security. I would rate this product a 10.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Dec 26, 2025
Flag as inappropriate
PeerSpot user
Jitendra_Sharma - PeerSpot reviewer
Network Security Engineer at Binary Global Ltd
Real User
Top 5
Jun 21, 2025
Centralized management enhances security and reporting efficiency
Pros and Cons
  • "Security has improved after we started using Check Point Harmony Endpoint, and we can manage all the systems and machines through a centralized portal called Check Point Infinity portal."
  • "Sometimes the Check Point Harmony Endpoint performance slows down when we use scanning and update sessions."

What is our primary use case?

Statistics wise, it is currently difficult for me to provide specific details, but each prevented malware infection saves costs in cleanup, downtime, productivity loss, and reduced data breaches and compliance violation penalties.

At this moment, I am not able to remember any specific use cases that provide reasons.

We are testing Check Point Harmony Endpoint on a few testing group systems. I cannot provide any specific use cases at this moment, but once the trial period is over, we will definitely use it with our users, which is almost 500 users, and then I will be able to mention exact use cases.

What is most valuable?

The best part of Check Point Harmony Endpoint is that it is delivered as software agents deployed to endpoints and connected to centralized security analytics and management control for desktops, laptops, and server systems.

Security has improved after we started using Check Point Harmony Endpoint, and we can manage all the systems and machines through a centralized portal called Check Point Infinity portal. Through these portals, we can push the agents to the end machines as well as servers, and we can also manage and control these systems.

We can find all kinds of reports related to endpoints, such as information about different operating systems on the internal network, issued systems, malware-infected systems, and problematic systems through Anti-Malware in a centralized single plane.

What needs improvement?

Check Point Harmony Endpoint can be improved performance-wise.

Sometimes the Check Point Harmony Endpoint performance slows down when we use scanning and update sessions. During these activities, the performance impact on endpoints decreases. This aspect can be improved.

For how long have I used the solution?

We have been using Check Point Harmony Endpoint for a few months as our Endpoint Security solution. We are currently using it as a test on a group of testing machines, approximately 10 to 15 machines.

How are customer service and support?

Customer support was good. We haven't reached out to the customer support portal specifically for issues, but we are also using Check Point firewall for our gateway security.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We had other solutions in mind before using Check Point Harmony Endpoint. We were considering Sophos Endpoint Security.

What was our ROI?

Statistics wise, it is currently difficult for me to provide exact figures, but each prevented malware infection saves costs in cleanup, downtime, productivity loss, and reduced data breaches and compliance violation penalties. The return on investment and the benefit over a period of time is high.

It saves costs in terms of cleanup, downtime, and productivity issues. It reduces the possibilities of data breaches and helps us reduce compliance violation penalties. These are the main return on investment points that can be mentioned.

What other advice do I have?

My advice would be to take the time to carefully plan and test your policy configuration on a small test group first, before full deployment, as I have done in my network. On a scale of 1-10, I rate Check Point Harmony Endpoint a 10 out of 10.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
895,151 professionals have used our research since 2012.
Senior Solution Consultant at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
May 16, 2025
Provides top-tier security leading to reduced incident duration and improved compliance
Pros and Cons
  • "Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features."
  • "The integration challenges with Check Point Harmony Endpoint involve needing support with other third-party applications that I wish it worked with more seamlessly."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is that we use it as an EDR solution for all our endpoints.

My team uses Check Point Harmony Endpoint primarily as an EDR solution focused on threat detection and incident response.

What is most valuable?

Check Point provides zero-day protection, which helps us significantly with our security regarding our main use case.

Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features.

The AI-powered threat prevention in Check Point Harmony Endpoint helps us to detect and prevent sophisticated attacks, and its scalability means it can be deployed across various devices and environments, helping us daily.

Check Point Harmony Endpoint has positively impacted our organization by providing shorter incidents and better compliance.

Our incident response has increased by 5 to 10%, which showcases specifics on how much the incident duration has decreased and how compliance has improved.

What needs improvement?

Check Point Harmony Endpoint could be improved by integrating with multiple other security solutions.

The integration challenges with Check Point Harmony Endpoint involve needing support with other third-party applications that I wish it worked with more seamlessly.

That is my main concern regarding needed improvements to Check Point Harmony Endpoint.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for almost three years.

How are customer service and support?

The customer support for Check Point Harmony Endpoint is good.

I would rate the customer support for Check Point Harmony Endpoint an eight on a scale of 1 to 10.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Broadcom earlier before Check Point Harmony Endpoint and switched because it is a better solution than Broadcom.

How was the initial setup?

The initial setup with Check Point Harmony Endpoint was straightforward.

What was our ROI?

I have seen a return on investment as fewer employees are required to manage the solution.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup costs, and licensing has been all good with Check Point Harmony Endpoint.

Which other solutions did I evaluate?

Before choosing Check Point Harmony Endpoint, I evaluated other options, which included Palo Alto and SentinelOne.

What other advice do I have?

Check Point Harmony Endpoint is stable.

Check Point Harmony Endpoint's scalability is very good.

My advice to others looking into using Check Point Harmony Endpoint is to go for it; it is the best solution.

I give Check Point Harmony Endpoint a rating of nine out of ten because I am getting good compliance and fewer incident responses.

I do not have any additional thoughts about Check Point Harmony Endpoint as of now.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Engineer Cyber Security at a computer software company with 201-500 employees
Real User
Top 5Leaderboard
Sep 19, 2025
Has improved threat detection and accelerated incident response across all endpoints
Pros and Cons
  • "After using Check Point Harmony Endpoint, we saw a 40% reduction in security incidents, especially phishing and malware attacks, and the response times to threats improved by around 30%, thanks to the faster alerts and automation."
  • "Some users have reported high resource consumption, leading to performance issues on devices with limited hardware capability."

What is our primary use case?

The main use case for Check Point Harmony Endpoint is to protect my device from virus, malware, and online threats. I use it mostly for keeping my computer secure while browsing and working.

One time I was downloading a file that had malware hidden inside, so Check Point Harmony Endpoint detected and blocked the threat before it could harm my device and kept my data safe.

What is most valuable?

The best feature of Check Point Harmony Endpoint is threat prevention, providing comprehensive protection against ransomware, phishing, and malware through advanced EDR, XDR capability. Additionally, the second standout feature is the unified management console, which offers a single interface for managing policy and alerts across the workplace, simplifying the security operation.

The unified management console has significantly streamlined our security operation by consolidating policy management, threat monitoring, and incident response into a single interface. We have reduced the complexity of managing multiple security tools, and this integration has led to fast detection and remediation of threats, allowing our IT team to respond more effectively and maintaining a consistent security posture across all endpoints.

Since implementing Check Point Harmony Endpoint, our organization has experienced significant improvement in cyber security. The solution's centralized management has streamlined our security operation, allowing our IT team to efficiently monitor and respond to the threats across all endpoints.

After using Check Point Harmony Endpoint, we saw a 40% reduction in security incidents, especially phishing and malware attacks. Also, the response times to threats improved by around 30%, thanks to the faster alerts and automation.

What needs improvement?

There are areas where Check Point Harmony Endpoint could improve to enhance our experience, such as performance optimization. Some users have reported high resource consumption, leading to performance issues on devices with limited hardware capability. Simplifying policy management is another area, as the current policy management system can be complex, and simplifying it could make configuration more intuitive. Better integration with third-party applications and tools could also streamline workflow and reduce capability challenges.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for the last one year.

How are customer service and support?

They provide a positive experience. Some users have reported prompt and helpful support, particularly during critical incidents.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup was manageable and the license options offer flexibility to scale as needed.

What was our ROI?

We have seen a clear return on investment since deploying Check Point Harmony Endpoint. We have reduced security incidents by 35%, which saves us time and money on incident response, allowing our IT team to focus more on strategic tasks instead of constant firefighting.

What's my experience with pricing, setup cost, and licensing?

The pricing and the license for Check Point Harmony Endpoint are reasonable and competitive.

What other advice do I have?

My advice is to take advantage of the unified management console to simplify security operations, whether it is on-prem, cloud, or hybrid, for best performance. Also, keeping your software up to date regularly helps benefit from the latest protection features.

On a scale of one to ten, I rate Check Point Harmony Endpoint a nine out of ten.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Sep 19, 2025
Flag as inappropriate
PeerSpot user
Senior Security Consultant at SecurView
Real User
Top 5Leaderboard
May 15, 2025
Proactive threat prevention strengthens security for remote and hybrid environments
Pros and Cons
  • "Check Point Harmony Endpoint has positively impacted our organization by significantly improving our security posture, especially for remote and hybrid users."
  • "While using Check Point Harmony Endpoint, I find that the initial deployment can be a bit complex, especially for large or distributed environments, requiring proper planning and familiarity with the Check Point ecosystem."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is to secure laptops and desktops across our organization, including remote endpoints, providing layered defense against malware, zero-day attacks, phishing, and data loss, making it a critical part of our endpoint security stack.

How has it helped my organization?

Check Point Harmony Endpoint has positively impacted our organization by significantly improving our security posture, especially for remote and hybrid users, with approximately 400 out of our 500 members working from home, leading to almost 90% of security being handled by this product. It helps protect endpoints from advanced threats through behavioral analysis, real-time threat protection, and simplified endpoint management through the cloud-based console. The solution has also improved compliance and risk management to ensure endpoints meet security standards even outside the corporate network.

What is most valuable?

Check Point Harmony Endpoint offers robust protection against malware, ransomware, and phishing attacks, and I particularly appreciate its behavioral analysis and anti-ransomware capabilities, with the central management console being integrative and making policy management easy across devices.

My advice for others looking into using Check Point Harmony Endpoint is to allocate time for proper configuration and policy tuning during the initial steps and to take advantage of Check Point's documentation and support resources. This will be helpful during integration or initiation of the setup, especially if they already have other Check Point devices, which would enhance their security posture and streamline management.

What needs improvement?

While using Check Point Harmony Endpoint, I find that the initial deployment can be a bit complex, especially for large or distributed environments, requiring proper planning and familiarity with the Check Point ecosystem. There can be occasional false positives that need to be manually reviewed and whitelisted.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for almost one or two years.

What was my experience with deployment of the solution?

From my perspective as a user, it was moderately easy but not overly complicated to deploy Check Point Harmony Endpoint in our environment.

My experience with the configuration process of Check Point Harmony Endpoint was easy.

What do I think about the stability of the solution?

In my experience, Check Point Harmony Endpoint is absolutely stable.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint scales well and meets the growing needs of our organization.

How are customer service and support?

My experience with Check Point Harmony Endpoint's customer support has been positive. I had an issue while installing the agent on a device and would rate their support four out of five.

Which solution did I use previously and why did I switch?

We use AWS as our cloud provider because Check Point's cloud-based management is managed on AWS infrastructure in various regions for our customers.

How was the initial setup?

The initial setup with Check Point Harmony Endpoint for my team was straightforward.

What was our ROI?

I have indeed seen a return on investment from Check Point Harmony Endpoint, as it has been really helpful. The earlier EDR devices we used were more time-consuming, and deploying that particular agent on all devices took time, but the centralized management console has significantly reduced both time consumption and the extra manual efforts required.

Which other solutions did I evaluate?

Before choosing Check Point Harmony Endpoint, I evaluated other options, specifically CrowdStrike.

What other advice do I have?

For protecting remote endpoints using Check Point Harmony Endpoint, I deploy security policies that ensure protection for users even when they are outside the corporate network, such as working from home or on public Wi-Fi. This includes cloud-based management where policy updates are pushed via Infinity Portal allowing centralized management for remote devices, implementing antivirus and anti-malware components with real-time scanning and cloud-based signature updates, alongside policies that block or control the copy-paste or upload of sensitive data to unmanaged networks.

I haven't performed any type of integration with other AWS services, as my role is as a user observing the monitoring perspective of the alerts and analyzing incidents on the console itself.

On a scale of 1-10, I rate Check Point Harmony Endpoint a 9.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Ankush Kondewar - PeerSpot reviewer
Senior Technical Support Executive at DigitalTrack Solutions Pvt Ltd
Real User
Top 5Leaderboard
Oct 29, 2025
Has improved threat prevention with centralized policy control and USB data protection
Pros and Cons
  • "The best features that Check Point Harmony Endpoint offers are the central management and its ThreatCloud intelligence that provides good protection from threats and real-time updates on new threat attacks worldwide."
  • "One thing I can suggest for Check Point Harmony Endpoint is that the endpoint agent is very heavy, and sometimes it feels like due to the heavy endpoint size, our PC is slow, so that can be improved."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is for threat prevention and also protecting from ransomware attacks.

How has it helped my organization?

Check Point Harmony Endpoint has positively impacted my organization because, with the help of this solution, we are able to control the devices. With the feature to prevent data loss, no one can connect any device and transfer any data. For example, we have disabled USB, so when the USB drive is connected, the user cannot transfer or copy any documents or files. It also provides full disk encryption, so if any device is lost or the drive is stolen, no one can decrypt them and take data.

What is most valuable?

Check Point Harmony Endpoint provides multiple key features against threats, like the threat emulation and anti-ransomware mechanism. It can also do forensic and root cause analysis of the attack, and we can control the usages of the device, like connecting to the USB drive.

The best features that Check Point Harmony Endpoint offers are the central management and its ThreatCloud intelligence that provides good protection from threats and real-time updates on new threat attacks worldwide. We have the ZTNA.

With the help of central management in Check Point Harmony Endpoint, there is a single console from where we can enforce any security policies in the network, which really simplifies our work while creating endpoint security policies or monitoring or reporting.

What needs improvement?

One thing I can suggest for Check Point Harmony Endpoint is that the endpoint agent is very heavy, and sometimes it feels like due to the heavy endpoint size, our PC is slow, so that can be improved.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for more than three years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is stable in my experience.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint's scalability can handle some extent of growth, but for major growth, then we have to purchase more licenses from them.

How are customer service and support?

The customer support for Check Point Harmony Endpoint is very supportive and good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

From the start, we have been using Check Point Harmony Endpoint and did not use a different solution before.

What was our ROI?

I can say we have seen a return on investment with Check Point Harmony Endpoint because we are getting good security from this solution, which saves us time.

Which other solutions did I evaluate?

Before choosing Check Point Harmony Endpoint, we had evaluated CrowdStrike.

What other advice do I have?

On a scale of 1 to 10, I would rate Check Point Harmony Endpoint an eight. I chose eight out of ten because, as I said, due to the heavy agent file on the device, it feels like it is being slow, which is why I've chosen eight out of ten.

If others are looking for an endpoint security solution, they can consider Check Point Harmony Endpoint as one of the outstanding solutions for security. We are a partner of Check Point Harmony Endpoint. The review rating for Check Point Harmony Endpoint is 8 out of 10.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 29, 2025
Flag as inappropriate
PeerSpot user
IT at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Dec 31, 2025
Real-Time Blocking Stops Phishing and Speeds Incident Response
Pros and Cons
  • "The real-time threat detection in Check Point Harmony Endpoint helped us catch a ransomware attack early; a user downloaded a file from a spoofed site, and Check Point Harmony Endpoint immediately flagged it, quarantined the file, and alerted our support team, preventing the malware from spreading and saving us from a large downtime."
  • "Creating tailored reports for different departments or compliance needs in Check Point Harmony Endpoint takes extra effort."

What is our primary use case?

Check Point Harmony Endpoint is mainly used to protect laptops from malware, phishing, and ransomware. It serves as a frontline defense for remote workers and ensures secure access to corporate resources.

One of our users clicked a link in a phishing email to log in, and Check Point Harmony Endpoint instantly flagged the site as malicious and blocked access, alerting our support team. It was a very quick response that prevented credential theft and a potential breach.

Check Point Harmony Endpoint is also used to control USB access and enforce encryption on devices, which is a common requirement.

How has it helped my organization?

Check Point Harmony Endpoint has positively impacted our organization.

A significant positive impact on our organization is that I win more time for other support tasks because Check Point Harmony Endpoint protects more easily than support agents can.

We track some key metrics since we deployed Check Point Harmony Endpoint, and it reduced incidents and saved time for our security team.

What is most valuable?

The best feature Check Point Harmony Endpoint offers is ransomware rollback. If an attack slips through, Check Point Harmony Endpoint can roll back affected files to a safe state, minimizing damage.

The real-time threat detection in Check Point Harmony Endpoint helped us catch a ransomware attack early. A user downloaded a file from a spoofed site, and Check Point Harmony Endpoint immediately flagged it, quarantined the file, and alerted our support team. The quick action prevented the malware from spreading and saved us from a large downtime.

Check Point Harmony Endpoint is a very centralized tool, and the reporting is really well done.

What needs improvement?

Creating tailored reports for different departments or compliance needs in Check Point Harmony Endpoint takes extra effort. More flexible templates or drag-and-drop options would be a great addition for better report checking.

Better integration with third-party tools would be beneficial. It works, but sometimes it takes extra effort to connect with the platforms used daily for Check Point Harmony Endpoint. Support is helpful, but responds only in English.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for around two years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is really stable.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint is very scalable and definitely meets our needs.

How are customer service and support?

Customer support for Check Point Harmony Endpoint is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Microsoft Endpoint Security in the past.

I switched from Microsoft Endpoint Security to Check Point Harmony Endpoint because I think that Check Point is better than Microsoft.

What was our ROI?

In my case with Check Point Harmony Endpoint, the time saved for our employees represents the return on investment.

What's my experience with pricing, setup cost, and licensing?

Pricing and licensing for Check Point Harmony Endpoint were fair, but not exactly budget-friendly. The setup cost was manageable, though it depends on how many endpoints you are protecting. Licensing is flexible, but if you are a smaller team or not using all the features, it can feel as though you are paying for more than you need.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Check Point Harmony Endpoint.

What other advice do I have?

For others looking into using Check Point Harmony Endpoint, I would advise starting by clearly defining your security needs and the type of devices you want to protect. Check Point Harmony Endpoint offers a lot of features, but it is most effective when tailored to your environment. I would rate Check Point Harmony Endpoint as an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Dec 31, 2025
Flag as inappropriate
PeerSpot user
D Alvarado - PeerSpot reviewer
IT Cloud Learder at a security firm with 51-200 employees
Real User
Top 5
Nov 13, 2025
Has significantly reduced ransomware incidents and improved threat response times
Pros and Cons
  • "Since we started using it, we've seen fewer security incidents, faster response times, and better protection against ransomware."
  • "While the platform is powerful, the user interface of Check Point Harmony Endpoint could be more intuitive for non-technical users."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is to protect employee devices from malware, ransomware, and phishing attacks. It's another feature I need to use, around the different features in Check Point, and I search for complete protection with Check Point.

What is most valuable?

The best feature of Check Point Harmony Endpoint is the ransomware protection in this case.

What makes the ransomware protection stand out is how fast and accurate ransomware detection is. It blocks threats in real time before they spread, and the automated response makes it easy to contain incidents without manual efforts.

Check Point Harmony Endpoint has had a strong positive impact on my organization. Since we started using it, we've seen fewer security incidents, faster response times, and better protection against ransomware. Our response times to threats have improved by at least 50% compared to before. Manual investigation and containment could take hours, but now, automated alerts and remediation let us act within minutes. For example, a recent malware attempt was blocked and isolated in under five minutes without needing manual intervention.

The reporting feature in Check Point Harmony Endpoint is great as it is necessary for normative governance and audits. Harmony Endpoint integrates well with other existing security tools, such as the SIEM in Azure, specifically Azure Sentinel.

What needs improvement?

Check Point Harmony Endpoint could improve with more flexible pricing options, faster updates, and better threat intelligence. Better documentation and more intuitive UI tweaks would also help streamline deployment and daily management.

While the platform is powerful, the user interface of Check Point Harmony Endpoint could be more intuitive for non-technical users. Sometimes it takes extra clicks to find key settings or reports, and while support is responsive, faster resolution time would help during urgent incidents.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for around three years.

What other advice do I have?

Check Point Harmony Endpoint gives us peace of mind. It's reliably effective and fits well into our security strategy.

I prefer Check Point as my provider and do not have any advice for others looking into using Check Point Harmony Endpoint.

I do not have any advice for others who are considering using Check Point Harmony Endpoint.

On a scale of one to ten, I rate Check Point Harmony Endpoint an eight.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 13, 2025
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2026
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.