Kaspersky is suitable for small and medium-sized businesses (SMB), while Harmony is for enterprise segments. There are different requirements for enterprises versus SMBs. At an SMB, one administrator handles the firewall, network, and endpoints. You have more specialization in an enterprise. So at a larger scale, where you have a 5,000 or 10,000 users use case, Harmony helps pinpoint where security is lacking on a particular machine.
Director at esupport Solutions Pvt ltd
The sandboxing feature is really good
Pros and Cons
- "Harmony's endpoint sandboxing is really good."
- "Harmony is better than Crowd Strike or any other similar solution in that class."
- "Check Point Harmony is definitely pricier compared to other endpoints."
- "Check Point Harmony is definitely pricier compared to other endpoints."
What is our primary use case?
What is most valuable?
Harmony's endpoint sandboxing is really good.
What do I think about the scalability of the solution?
I haven't had any difficulty deploying Harmony for up to 5,000 users.
How are customer service and support?
Check Point support is really good.
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,311 professionals have used our research since 2012.
How was the initial setup?
Harmony is very easy to deploy.
What's my experience with pricing, setup cost, and licensing?
Check Point Harmony is definitely pricier compared to other endpoints.
What other advice do I have?
I rate Check Point Harmony 10 out of 10. It's a unique product. It's the best in this class. I feel that Harmony is better than Crowd Strike or any other similar solution in that class. However, I would like to see more competitive pricing and better training for partners.
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
CISO, CIO, AVP at CIANS ANALYTICS PVT. LTD
Good encryption feature and scalable but needs to be more accurate
Pros and Cons
- "Cost-wise it's cheaper than other options."
- "Cost-wise it's cheaper than other options."
- "It gives you an alert for malicious sites, which, after searching on the Google database, don't come out to be the same."
- "In my case, I had pretty much faced disaster after implementation that I would not suggest anybody go with the product."
What is our primary use case?
We primarily use the solution for anti-malware. We installed it on around 300 systems. Since we required some application to safeguard ourselves in this situation of work from home, so we were evaluating Antimalware products.
After some research, we finalized Check Point and took a demo. The product seems fine as per our scenario and fits current conditions. We were evaluating it for work-from-home situations. it had a multifeatured tool that helps in safeguarding the current digital attack vector for organizations of all types.
How has it helped my organization?
It helps in safeguarding our infra from malicious attacks. However, initially, we faced lots of challenges while implementation as the vendor who was implementing it made blunders, which resulted in chaos for the organization.
Our team worked almost 24/7 for 3 to 4 weeks to resolve the issues. We haven't requested the encryption feature, yet they implemented it. Our laptops were already encrypted, so it started decryption and re-encryption, which was a nightmare for us. We are still facing a few challenges for which we couldn't find any reason for the issues we've since found that were not there before installation.
What is most valuable?
We found all features valuable - other than the encryption since we were already using that feature. Since we required some application to safeguard ourselves in this work from home situation. We were evaluating anti-malware products specifically.
There can be scenarios where this encryption feature will be applicable and fruitful if it is implemented with proper planning and organized with respect to a particular organization. There have to be proper requirements gathering and a plan to work effectively.
What needs improvement?
There are improvements required in terms of accuracy. It gives you an alert for malicious sites, which, after searching on the Google database, don't come out to be the same.
There can be scenarios where specific planning will be required before even giving thought to implementing it into an organization - be it small, medium, or large. Everything needs to be organized with respect to each particular organization. There has to be proper requirement gathering and a plan for the SOW to work accordingly.
I would suggest that the Check Point team always allocates an SME to all the vendors before implementation as it will improve the first impression. In my case, I had pretty much faced disaster after implementation that I would not suggest anybody go with the product.
The product needs to improve the security infra.
For how long have I used the solution?
I've been using the solution for three months.
What do I think about the stability of the solution?
In terms of stability, I would rate it at a five out of ten. There were issues like once a version was installed and was not working properly, even the checkpoint team couldn't uninstall it and as a result, we had to format the system. few cases were reported for software installed but was not visible in the control panel.
What do I think about the scalability of the solution?
The scalability is good.
What was our ROI?
Our ROI has been neutral.
What's my experience with pricing, setup cost, and licensing?
Cost-wise it's cheaper than other options.
Which other solutions did I evaluate?
We did evaluate another solution. However, I can't reveal the name.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. SIG Informatics
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,311 professionals have used our research since 2012.
Assistant Manager at CIANS ANALYTICS PVT. LTD
A good antivirus with excellent email alerts but needs better technical support
Pros and Cons
- "We like the sandbox feature."
- "If we talk about ROI, then the solution is good, as we are getting a sandbox feature in it plus the VPN licenses if we have the Check Point firewall."
- "Technical support could be better."
- "When starting, we faced many issues. It was due to a partner mistake, however. The partner gave us the wrong setup which caused laptops to crash and it lowered the efficiency."
What is our primary use case?
We primarily use the solution as an antivirus. We want to protect our systems from malware and viruses.
We are still doing work from home and we are not sure how long this will last. Before Check Point Harmony software, we depended on Windows Defender Antivirus, but we realized that it was not so good. We wanted some good AV so that users who are working on a VPN would have an antivirus installed on their system.
Also, we wanted a sandbox feature so that, if any machine got infected, we can automatically isolate it from the network.
How has it helped my organization?
When starting, we faced many issues. It was due to a partner mistake, however. The partner gave us the wrong setup which caused laptops to crash and it lowered the efficiency. We escalated to our Check Point sales account manager. He immediately set us up with some other partner and tried to resolve the issue. He found the root cause, but still, we needed to format the system. It has been more than 3 months, and now the user's system is working fine.
We always receive alert emails from Check Point regarding malware or virus status, which is helpful.
What is most valuable?
We like the sandbox feature. If any machine got infected, it would get automatically isolated from the network. As such, we haven't faced any issues. We like that we have an option to isolate.
The alert email from Check Point is also very valuable. If any machine didn't get a scan or has a virus due to visiting various websites on a browser, it automatically sends us an email to warn us. Accordingly, we can take action on that particular machine.
Overall, the antivirus is good.
What needs improvement?
Technical support could be better. When we register a complaint, we need to register it via the portal only, which is atime consuming.
When we register the complaint, it says there's a minimum of four hours of turnaround time which is high. It should be a minimum of 60 minutes.
The GUI of Harmony is very slow to upload. I'm not sure if it is due to the internet, but still, at times, we found that when we click on any tab, it takes a minimum of five seconds to get it open.
All other things are okay from our end.
One feature we want to add is an EDR/XDR into this antivirus module.
For how long have I used the solution?
I've been using the solution for 4 months.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
I found the solution to be okay. I'm not sure how others are providing the support as we haven't checked that.
How are customer service and technical support?
Technical support is good.
Which solution did I use previously and why did I switch?
No, we haven't used any other antivirus. It was by default in Windows.
How was the initial setup?
The initial setup was okay.
What about the implementation team?
We implement it through a vendor.
I would rate their level of service at a 2 out of 5 where 1 is lowest and 5 is best.
What was our ROI?
If we talk about ROI, then the solution is good, as we are getting a sandbox feature in it plus the VPN licenses if we have the Check Point firewall.
What's my experience with pricing, setup cost, and licensing?
The setup is okay depending on the partner and what the relationship is with you and your partner. The pricing is okay.
Which other solutions did I evaluate?
Yes, we have evaluated other options. For example, we've evaluated Sophos.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sr. Manager at Incedo Inc.
Good security with a useful single dashboard and centralized management capabilities
Pros and Cons
- "Forensic Analysis provides a complete analysis of threats via detailed reports."
- "After introducing Harmony Endpoint we have seen the incident levels going down to close to zero."
- "Support's service and the response times can be improved. The triaging of the tickets takes a long time and the tickets are only resolved with escalations."
- "Support's service and the response times can be improved. The triaging of the tickets takes a long time and the tickets are only resolved with escalations."
What is our primary use case?
We primarily use it for end-to-end security for endpoints and the co-relation of events from one single console. We have been able to protect our endpoints with Harmony. The user experience is also good and there is not too much to be done with respect to the endpoint changes (the best part). Features like Threat Emulation/Threat Extraction, Antibot, Anti- Exploit, Anti Ransomware protection, UBA, Zero-day Phishing protection, Behavioral Guard, Encryption, VPN, and compliance makes it more powerful and helpful to our security team in order to protect the environment.
How has it helped my organization?
Our organization's overall security posture has improved with Harmony Endpoint protection. This has helped to secure against all modern age threats and risks that came in during the pandemic.
During the pandemic, the users, for example, have been forced to work from home and that's been forcing the IT to do overtime to protect the endpoints. After introducing Harmany Endpoint we have seen the incident levels going down to close to zero.
The single dashboard provides complete visibility over endpoint security and the administration can view the actionable tasks to follow up easily without searching across multiple reports/consoles.
What is most valuable?
All of the available features are good (for example Threat Emulation/Threat Extraction, Antibot, Anti-Exploit, Anti-Ransomware protection, UBA, Zero-day Phishing protection, Behavioral Guard, Encryption, VPN, and compliance), however, the one I have thought to be very valuable is the Ransomware Protection Feature which has been used widely during the pandemic. It protects as well as saves original file copies to prevent data loss.
Forensic Analysis provides a complete analysis of threats via detailed reports. The threat prevention, which includes a detailed threat landscape is very good.
The VPN connectivity and compliance check are also very good features.
What needs improvement?
Support's service and the response times can be improved. The triaging of the tickets takes a long time and the tickets are only resolved with escalations.
With respect to the product, we feel Endpoint vulnerability management is one of the modules that is missing and it is something that is required. Adding this will strengthen the product and help in taking proactive steps towards protecting the environment.
DLP Module & Patching are required from an endpoint perspective. It would be good to add those in an upcoming release/version.
For how long have I used the solution?
I've used the solution for more than 6 months.
What do I think about the scalability of the solution?
We have deployed it on the cloud which helps it to be scalable and cost-effective.
Which solution did I use previously and why did I switch?
We were using multiple solutions to protect the environment in the past. These include solutions such as McAfee, Websence DLP, encryption, etc. however, now it is all happening with this one tool and console
How was the initial setup?
Easy to set up and start using.
A single administrator can manage the complete solution. It's easy to deploy and does not require any additional effort. We're able to have multiple solutions within a single solution.
What about the implementation team?
We implemented the product with the help of our OEM and our in-house team. There were no major challenges during implementation or even in day-to-day operations.
What's my experience with pricing, setup cost, and licensing?
Harmony Endpoint, in terms of the deployment, integration, and setup, costs less than other solutions.
Which other solutions did I evaluate?
Yes, we evaluated other products as well, however, with respect to feature price and integration availability, we selected this product.
What other advice do I have?
Harmony Endpoint is a good product and scalable with business growth.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Head of IT Operations at Puerta de Hierro Hospitals
Great for remote workers with excellent endpoint agents and easy communication with the console
Pros and Cons
- "The communication with the console is very dynamic and remote, without the need to return to the computer locally."
- "With the sandblast tool, coverage is made on the equipment that we provide (laptops) and employees can carry out their activities from home."
- "There needs to be compatibility with the most recent versions of the various operating systems."
- "There needs to be compatibility with the most recent versions of the various operating systems."
What is our primary use case?
The main option for which this solution is used is to have all the peripheral equipment protected - avoiding risks due to malware and viruses. The solution can be managed by device, with filtering and analysis of the information of all collaborators available there.
It's used to analyze emails from key users and for content filtering rules. It does not allow dangerous downloads, which protects the work of the organization outside the main network. It gives tools to the collaborators to make the work outside the installations (home office) easy.
How has it helped my organization?
With COVID affecting the world, a solution was needed that could be able to provide security at workstations outside of the organization itself. With the sandblast tool, coverage is made on the equipment that we provide (laptops) and employees can carry out their activities from home. The tool has provided us with security to ensure that the computers are protected while also providing information analysis. It offers easy control and implementation of content filtering rules. Thus, you have control of all the organization's teams outside and within the operational network.
What is most valuable?
The endpoint agents, which can be installed in one go, are great. The communication with the console is very dynamic and remote, without the need to return to the computer locally.
From the administration console, we can generate content filtering rules and labels, as well as run an analysis of emails and downloads that the collaborator does to fulfill their functions. Informing the administrator of threats by mail gives us the facility to detect real-time vulnerabilities in order to continue fulfilling the objective of safeguarding the information of the organization.
What needs improvement?
There needs to be compatibility with the most recent versions of the various operating systems. They need to be up-to-date with the signatures of new viruses and the latest ramsonware. With the encompassing of all its solutions in one platform, there should be artificial intelligence for specific analysis to thus be able to anticipate and detect unique risks to the organization.
To be able to count on the administration console on any device and online cloud would be ideal. We would like there to be no need to install clients as executables.
For how long have I used the solution?
I've been using the solution for one year.
What do I think about the scalability of the solution?
We like the idea of continuing to implement more solutions offered by Harmony.
How are customer service and technical support?
Technical support is good. They comply when we need support or have product questions.
Which solution did I use previously and why did I switch?
No, Sandblast was chosen as the first option.
What's my experience with pricing, setup cost, and licensing?
The solution meets our business needs.
Which other solutions did I evaluate?
We did look at Fortinet solutions.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Great value for money, easy to deploy, and is great at detecting threats
Pros and Cons
- "One of the strengths of Harmony is its power to detect threats and keep us safe."
- "By using the Check Point Harmony Endpoint tool we have improved our network visibility, have extensive control of our network and our users, and, above all, have a level of security against cyber attacks that we did not have before."
- "I still don't have a clear opinion of the possible improvements that the tool may need. There are still functionalities that I have not been able to try completely and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
- "I still don't have a clear opinion of the possible improvements that the tool may need."
What is our primary use case?
In my organization, we have deployed the Harmony Endpoint Check Point tool with the idea of being able to secure the deployed part of our mobile corporate devices in order to start the security processes at the point as close to the user as possible.
Using its ease of deployment capacity and its power in detecting malware or insecure elements, this tool provides us with the peace of mind we were looking for in an environment of several thousand terminals deployed on the network in many places and environments.
How has it helped my organization?
By using the Check Point Harmony Endpoint tool we have improved our network visibility, have extensive control of our network and our users, and, above all, have a level of security against cyber attacks that we did not have before.
Now, we are able to detect and avoid security breaks. We can better understand the use that our users make of the devices, and, most importantly, we can apply security policies that keep our users safe as well as the organization's own systems and data. The personal information of our users is also secure.
What is most valuable?
Right away, we noticed when using Check Point's Harmony Endpoint tool, was the ease of deployment. In our case, it was deployed without too many difficulties, considering the deployment involved several tens of thousands of devices.
Once deployed, the dashboard and all the inventory information that we had been able to obtain and that we did not know about before proved to be very interesting.
One of the strengths of Harmony is its power to detect threats and keep us safe. Also the ability to apply policies specifically to users or groups is very useful.
What needs improvement?
I still don't have a clear opinion of the possible improvements that the tool may need. There are still functionalities that I have not been able to try completely and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point.
Something that is very important to me is the remediation or recovery capabilities after an attack. From what I have seen so far, this tool maintains the quality line of Check Point products and is always ahead of the needs of the market.
For how long have I used the solution?
I've used the solution for seven months.
Which solution did I use previously and why did I switch?
This was the first endpoint tool we use in my organization. We didn't use anything previously.
What's my experience with pricing, setup cost, and licensing?
The only thing I don't like about the solution is the time to pay for the licenses. That said, I really believe that it is a fair price according to the quality of the product offered.
Which other solutions did I evaluate?
We also looked at Panda Security Adaptive Defense, Cisco Secure Endpoint, ESET Endpoint Security, and Microsoft Defender for Endpoint.
What other advice do I have?
After analyzing and comparing other solutions, we determine that Harmony has the best value for money.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Geography and History Teacher at a comms service provider with 10,001+ employees
Easy to use, reasonably priced, and reliable
Pros and Cons
- "It has a great ability to detect threats and keep us safe."
- "By using the Check Point Harmony Endpoint tool we have achieved great visibility, extensive control of our network and our users, and, above all, a level of security against cyber attacks that's more effective than what we had before."
- "There are still functionalities that I have not been able to fully test and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
- "There are still functionalities that I have not been able to fully test and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
What is our primary use case?
In my organization, we have selected the Harmony Endpoint tool after an analysis of the market. We wanted to be able to secure the deployed part of our mobile corporate devices in order to start the security processes at the point closest to the user possible. Thanks to its ease of deployment and its power in detecting malware or insecure elements, this tool provides us with the peace of mind we were looking for in an environment of several thousand terminals deployed on the network in very different environments.
How has it helped my organization?
By using the Check Point Harmony Endpoint tool we have achieved great visibility, extensive control of our network and our users, and, above all, a level of security against cyber attacks that's more effective than what we had before. Now, we can detect and avoid security incidents and we can better understand the use that our users make of the devices, and, most importantly, we can apply security policies that keep us safe - not only on the organization's own systems but also within the data. The personal information of our users is also very much protected.
What is most valuable?
When starting to use Check Point's Harmony Endpoint tool, the first thing that strikes us is its great ease of deployment. In our case, it has been a deployment without too many incidents considering that we are talking about a deployment in the tens of thousands of devices. Once deployed, the dashboard and all the inventory information that we have been able to obtain and that we did not know before are very interesting. Of course, one of the key points of Harmony is its great ability to detect threats and keep us safe.
What needs improvement?
After using Harmony for six months, I still don't have a clear vision of the possible improvements that the tool may need. There are still functionalities that I have not been able to fully test and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point. What is very important, in my opinion, is the remediation or recovery capabilities after an attack. From what I have seen so far, this tool aligns with the quality of Check Point products and the evolution it has is correct and logical. Check Point is always ahead of the needs of the market.
For how long have I used the solution?
I've been using the solution for 6 months.
Which solution did I use previously and why did I switch?
No, it is the first tool of this type that we deployed in my organization.
What's my experience with pricing, setup cost, and licensing?
I would advise all organizations to deploy tools of this type for the security they need. As for Harmony, I recommend it 100% for its ease of use, reliability, and reasonable price.
Which other solutions did I evaluate?
Yes, Microsoft Defender for Endpoint and Cisco Secure Endpoint were evaluated.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Assitant Manager - IT Support at a outsourcing company with 1,001-5,000 employees
Great for securing endpoints with good anti-malware and port protection
Pros and Cons
- "It's great for securing our endpoints from any external attacks."
- "It's great for securing our endpoints from any external attacks."
- "Tech Support must be better."
- "Tech Support must be better."
What is our primary use case?
We use it for multiple purposes. It's for securing the endpoints. We have about 200 endpoints added to this solution and being maintained. Its server is cloud-based and here our in-house IT team takes care of the installation and configuration on endpoints. We are required to secure our endpoint from any external attacks. It's also well controlled so that only required access is to be given to end-users. Whether it's about blocking unwanted websites or port blocking, we use the solution to manage everything.
What is most valuable?
The anti-malware and port protection, etc., are good. We have about 200 endpoints on this solution being maintained. We like that its server is cloud-based and that our in-house IT team can handle the installation and configuration on endpoints. It's great for securing our endpoints from any external attacks. We can control access to end-users.
What needs improvement?
Tech Support must be better. Whenever we log a case for any issue it takes too much time to get it sorted. There should be escalation by default. If the case is not being sorted quickly, it must get internally escalated to the team who are experts and they should be empowered to jump in to get the issue fixed. Many times, we have to be on it for weeks to come to a proper resolution.
Website blocking and endpoint levels are still a challenge and there needs to be a more sophisticated solution. We are looking forward to having this product work more efficiently.
For how long have I used the solution?
We have been using Harmony Endpoint for over six Months.
How are customer service and technical support?
Tech Support needs improvement.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Cortex XDR by Palo Alto Networks
SentinelOne Singularity Complete
Fortinet FortiEDR
HP Wolf Security
Huntress Managed EDR
Elastic Security
Microsoft Defender XDR
Trellix Endpoint Security Platform
WatchGuard Firebox
TrendAI Vision One
Fortinet FortiClient
Symantec Endpoint Security
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?















