The primary use case is VPN.
It provides remote access for the staff, but we have experienced some sales issues
Pros and Cons
- "It provides remote access for the staff and increases their productivity."
- "A couple of times, we experienced some sales issues."
What is our primary use case?
How has it helped my organization?
It provides remote access for the staff and increases their productivity.
What is most valuable?
- Certificate management
- VPN
How are customer service and support?
A couple of times, we experienced some sales issues.
The technical support is good.
Buyer's Guide
Check Point Harmony Endpoint
August 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,649 professionals have used our research since 2012.
How was the initial setup?
The initial setup was moderately complex. We had to wait for it to do a few runs, back and forth, until it was solid.
What about the implementation team?
We did the deployment in-house.
What was our ROI?
We have seen a measurable decrease in the hang times of the detector responses by five percent.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Network Administrator at a healthcare company with 1,001-5,000 employees
Administratively, it's easy to control
Pros and Cons
- "Administratively, it's easy to control."
- "The security is its most valuable feature."
- "Off the top of my head, I can't think of a way it has improved my organization."
What is our primary use case?
We have it on our endpoints.
How has it helped my organization?
Off the top of my head, I can't think of a way it has improved my organization.
What is most valuable?
The security is its most valuable feature.
Administratively, it's easy to control.
What do I think about the stability of the solution?
The stability of the solution is good.
How was the initial setup?
The initial setup was pretty straightforward.
What about the implementation team?
We used a consultant, and he was awesome.
What was our ROI?
We have not yet seen ROI.
Which other solutions did I evaluate?
The company had this solution. I got put in charge of it, so it was already in place. I decided to keep it.
What other advice do I have?
From the administrative side, it is easy to manipulate and control, and that makes it great.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
August 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,649 professionals have used our research since 2012.
Network Architect at Leprino Foods
Gives us a forensics backbone into when something happens on a machine. It can let us know what happened and where it came from.
Pros and Cons
- "Its ease of use is the most valuable feature. We had existing endpoints and it was an easy upgrade process. The interface board is also easy to use."
- "There was a learning curve for our general population of employees (the user)."
What is our primary use case?
We were looking to upgrade our protection to our endpoints, giving us more of a forensics backbone into when something happens on a machine. The product can let us know what happened, where it came from, etc. Our primary use case is for more insight into what is happening.
How has it helped my organization?
We have a lot of mobile users who work on their laptops from home. Sometimes people travel, they'll go away and connect to hotel or airport WiFis. We had an instance where somebody connected to what they thought was free public WiFi, and it actually infected the machine. SandBlast was able to catch it, stop it, and change the files back. We then got a forensics report to determine what happened with it.
What is most valuable?
Its ease of use is the most valuable feature. The interface board is also easy to use.
We had existing endpoints, and it was an easy upgrade process.
What needs improvement?
There was a learning curve for our general population of employees (the user).
What do I think about the stability of the solution?
SandBlast's stability has been great. Once we had it implemented, I have had no problems with it.
What do I think about the scalability of the solution?
We're a small company, so I don't have a lot of scale to discuss about it. We're less than 100 employees.
How are customer service and technical support?
I haven't had any problems with tech support for SandBlast. We have a good relationship with our vendor. Whenever we have any questions, they are able to get things answered for us or escalated quickly. There is minimal turnaround, as the tech support has been knowledgeable.
How was the initial setup?
The initial setup was pretty straightforward since it was essentially an upgrade on the technology that we were already trialing. Getting to the next level took minimal effort.
What about the implementation team?
We did the integration with Tenea, who is a vendor that we have work with for a while now.
What other advice do I have?
I would rate it an eight out of ten. I like product.
I was not part of the decision-making process. I was just tasked with deploying the solution.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Owner at a tech services company with 1-10 employees
Offers the most secure and surefire way to tackle ransomware
Pros and Cons
- "Its ability to rollback anti-ransomware once an attack has started is the most valuable feature."
- "It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects."
What is our primary use case?
My primary use of this solution is to supplement my existing antivirus and enable/enhance my anti-ransomware capabilities.
What is most valuable?
Its ability to rollback anti-ransomware once an attack has started is the most valuable feature.
What needs improvement?
It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects.
What do I think about the stability of the solution?
It's very stable. It is a production-grade solution.
What do I think about the scalability of the solution?
It scales well. However, it lacks deployment functionality because other vendors, like Symantec and McAfee, are building that into their tools.
How are customer service and technical support?
On a scale from one to ten, I would rate their technical support as a nine.
Which solution did I use previously and why did I switch?
We previously used Symantec Endpoint. Our reason for switching is because Check Point offers the most secure and surefire way to tackle ransomware.
I was part of the decision-making process.
How was the initial setup?
The initial setup was not straightforward. There is content available on the Check Point support site (on the Internet). This enabled us to deploy it out successfully.
What about the implementation team?
We implemented it internally.
Which other solutions did I evaluate?
We did not consider any other vendors during the evaluation process.
What other advice do I have?
Don't think about getting the product. Just do it.
I would rate it a ten out of ten. No other product on the market is able to rollback a ransomware attack once it has started.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
IT Administrator at a healthcare company with 1,001-5,000 employees
When we have reached out to support, they have been quick to respond
We use Checkpoint here, and are currently in the process of planning a major from the standalone client to the full console version.
They had some issues in the past with the OS X and Windows versions not being in sync, but with the latest release E80 release, the clients are identical.
There are still a few gaps, such as not supporting Fusion drives, but overall, things have been great.
Deployment has been simple: We create a composer package that pushes the installer and our installation profile onto the client, and then call a script to run through the pkg installer. It has worked flawlessly for us.
As far as management goes, the reason we are moving to the console version is to have better reporting. Currently, the encryption files are written to a File share, and that is all the logging we get. We use the JSS' EA to get a more up to date picture, but with the Console version, it allows for more "real-time" updates (1-2 minutes).
The stability has been great for us. We have found a few iMacs that shipped to us with bad blocks/sectors that were not picked up by any of our HD diagnostics.
When we have reached out to support, they have been quick to respond. Like I said above, I definitely suggest the web chat as the best option.
Reliability has been pretty good. We saw an uptick in "black screens" that leave the machines in an un-bootable state, but that is more due to the fact that these drives have been encrypted for 4-5 years, and are used 24/7.
As far as performance goes, we have noticed that with Checkpoint we are getting about a 1-2% performance hit over FileVault, but nothing that has cause major issues.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Manager at a manufacturing company with 501-1,000 employees
Works well unless you need to upgrade then compatibility issues may arise.
Valuable Features:
Endpoint security is a client-server managed network protection program. It blocks unauthorized software, malware, virus etc from entering the network and each client machine. Can be set up company specific to block specific file extensions or other devices from accessing the network. It provides updates based on server settings, can perform one network scan daily and can be set up to scan per client machine setting. Any machine that has the software installed on the network is protected by the endpoint security. Logs are created per client and machine settings.
Room for Improvement:
Endpoint security programs can be a bit pricey, but you are receiving basically the same type of protection from each software program. To upgrade from one version to the next can get very costly providing what type of equipment you are running the program on. I did not find that endpoint security was very compatible during the upgrade. I ended up spending a lot more money than budgeted due to compatible issues.
Other Advice:
All in all, endpoint security does the basics of blocking unauthorized software, malware, virus, etc. It is client/server based software. Works good unless you need to upgrade then compatibility issues may arise. Would recommend for any user. Runs behind the scenes, and the scans are designed to run without effecting a user ability to work on their pc.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Tech Support Staff at a tech company with 51-200 employees
I would recommend endpoint security to anyone because it worked for me; no security issues with end devices for more than a year now.
Valuable Features:
Endpoint security protects networks from unauthorized programs, viruses and malware, and allows you to control the network by blocking devices that you do not want to have access to it, for example by file extensions or using the device’s ID.It also controls access and prevents theft of data by controlling access to storage devices that are portable. USB storage devices are also encrypted for security purposes.Centralized monitoring, logging and generation of reports and automatic protection of newly added computers to the network are other functions and capabilities of endpoint security.
Room for Improvement:
It took me time to learn how to configure endpoint security. Getting one for our Unix-based systems was not easy because most programs available in the market are windows-based. Implementing security on the latest endpoint devices was not easy due to compatibility issues.
Other Advice:
Endpoint security is implemented on client-server network model to ensure that end devices in the network are totally secure before having access to the network.
Endpoint security can be implemented as a firewall or an anti-virus program that can be configured to include intrusion detection properties. It is also used in cloud computing and can be hosted or used on-site. It is a very flexible and efficient form of desktop security and I have used it for a very long time.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Easy to configure and detects many threats and files containing malware
Pros and Cons
- "Check Point detects files containing malware, which some users are trying to download or access. Additionally, it can consolidate multiple emails into one."
- "The antivirus could be improved in terms of the resources it consumes, particularly regarding CPU and memory usage. We've encountered issues with some of our firewalls, leading us to turn off the antivirus feature due to its heavy resource consumption."
What is our primary use case?
We use Check Point Antivirus to protect our company's perimeter. Specifically, we implement antivirus measures solely on the perimeter firewall. This strategy safeguards the company, especially considering the files accessed by employees. Check Point Antivirus shields us from malware and viruses.
How has it helped my organization?
Check Point detects files containing malware, which some users are trying to download or access. Additionally, it can consolidate multiple emails into one.
What is most valuable?
Check Point is easy to configure, and it detects many threats.
What needs improvement?
The antivirus could be improved in terms of the resources it consumes, particularly regarding CPU and memory usage. We've encountered issues with some of our firewalls, leading us to turn off the antivirus feature due to its heavy resource consumption. Enhancing its performance would allow us to run it on smaller models without overburdening the CPU.
While it is a valuable security feature, Check Point should ensure that the hardware is properly dimensioned to support the antivirus feature, providing some margin for potential resource demands. The values provided in the specifications should be realistic and adequate to support the feature effectively on the Check Point firewall.
For how long have I used the solution?
I have been using Check Point Antivirus for ten years.
What do I think about the stability of the solution?
Sometimes, Check Point Antivirus raises connection issues even when the license is valid. Consequently, we encounter difficulties installing the antivirus on various devices. Moreover, the solution isn't always stable. Occasionally, update failures occur without apparent reason, necessitating the need to open a support case.
What do I think about the scalability of the solution?
One thousand users, including the financial, IT, and HR teams, are utilizing this solution, essentially encompassing all departments in their company, as everyone uses the internet. From our experience, it's very resource-intensive and not one of our most scalable features. As I mentioned, sometimes we encounter CPU logs on some firewalls, often related to the antivirus. Therefore, sometimes, we need to turn it off or adjust its settings.
I rate the solution's scalability as seven out of ten.
How are customer service and support?
The solution should have better support from more knowledgeable engineers when opening a case rather than starting with junior engineers and escalating after one or two weeks.
How would you rate customer service and support?
Neutral
How was the initial setup?
Once the security gateway is up and running, you simply navigate to the features section, ensure you have the appropriate license, and enable the antivirus feature. Then, you can select one of the recommended profiles. Once you've chosen the profile, you're all set.
It takes one day to deploy if you have already added the firewall.
I rate the initial setup a nine out of ten, where one is difficult, and ten is easy.
What's my experience with pricing, setup cost, and licensing?
We have the license for all the other FortiGate, which comes with the IPS and antivirus. However, you need to pay for the antivirus separately. In terms of cost, it is slightly more expensive than Fortinet.
What other advice do I have?
Check Point Antivirus has helped us protect our company's security exposure. It has already detected some files that, if successfully downloaded, could pose a significant problem.
However, it consumes a lot of resources. Enabling antivirus on the Check Point firewall is one of the most resource-intensive processes you can allow, even more so than the IPS.
We requested that antivirus be enabled on three of our firewalls because the CPU usage was consistently 90%. Testing this feature has shown that some improvements in performance should reduce resource consumption.
We enable Check Point's default recommended profile. Preset profiles are already available; we choose one to help without configuring our own.
I would recommend improving the performance to reduce resource consumption and enhance stability.
In terms of security, Check Point Antivirus is practical and improves our company's security posture.
Overall, I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
Microsoft Defender XDR
Cortex XDR by Palo Alto Networks
HP Wolf Security
Fortinet FortiClient
Elastic Security
WatchGuard Firebox
Trellix Endpoint Security Platform
Symantec Endpoint Security
Huntress Managed EDR
Kaspersky Endpoint Security for Business
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?