Try our new research platform with insights from 80,000+ expert users
Bala_Krishna - PeerSpot reviewer
Director at a computer software company with 11-50 employees
Real User
Top 5
Apr 16, 2019
Prevents malware from entering via the internet or USB drives
Pros and Cons
  • "The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature."
  • "The remote deployment with Check Point Endpoint Security requires improvement. We have to depend on some of their deployment tools. I would like a system endpoint protection management tool or a remote deployment tool."

What is our primary use case?

We are an international systems integrator company for Check Point Endpoint Security software solutions.

How has it helped my organization?

It's easy to deploy Check Point. If you try to download files or if you try to access any website, Endpoint will secure the activity. The malware will not be permitted to enter from the internet or USB drives. 

What is most valuable?

The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature.

What needs improvement?

The remote deployment with Check Point Endpoint Security requires improvement. We have to depend on some of their deployment tools. 

I would like a dependable system endpoint protection management tool or remote deployment tool. The deployment on the remote client needs some type of tool to implement it.

Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

The stability of Check Point Endpoint Security is quite good. One single install is enough. You can forget about it. Then it just takes care of scanning and updates. 

The beauty of Check Point Endpoint Security is the forensics. The forensics are very complicated too and it is easy to understand if some malware has entered into your PC. 

With Check Point forensics, they provide a pictorial diagram in the materials when malware is downloaded, when it is activated, when it is trying to contend with it, and when it is quarantined. 

Across the entire Check Point Endpoint Security software package, the network reports are really good.

What do I think about the scalability of the solution?

For maintenance, one or two employees is more than enough. We have about 30 users total in our company.

How are customer service and support?

The technical support from Check Point is really awesome. They initiate a call once they find a result. From the charts, alerts, and reports, you can reach out to support. 

If you share your phone number, they will call. Check Point provides us with really great support. Unless the issue is resolved, they will not disconnect the phone.

Which solution did I use previously and why did I switch?

We also used Symantec and some of their anti-malware products. Once we tested Check Point, we realized that it's a lot better. 

How was the initial setup?

The initial setup of Check Point Endpoint Security was very easy. What we found was that they redesigned the entire UI, now called Infinity. Infinity is the new platform they evolved.

The Infinity platform gives us good results and is easy to manage. The entire process is straightforward. The deployment did not take much time, maybe close to three hours.

What's my experience with pricing, setup cost, and licensing?

With Check Point Endpoint Security, you can go with the Suite license or you can go with the individual Blade license. I recommend the Full Suite license.  

Check Point Endpoint Security is not 100% compatible with Kaspersky and Symantec products. You can go only with Endpoint, i.e. you cannot mix with a competitor's solution.

It could be a good solution because they have multiple ways to handle the licensing model. If someone requires an encryption license, it is extra and not included in the base license. If you have any intellectual property, then the financial investment will be worth it. 

If you compare Check Point Endpoint Security to Kaspersky, Kaspersky has two types of suites. One is the Select plan and one is the Advanced plan. If you go with their Advanced plan, then that will collect all of the web confidence reports, many of which vary. 

Check Point Endpoint Security is easier for the administrator compared to Kaspersky, in terms of alerts and reporting. The admin receives regular reports and each report says how many total Windows versions are there, how many Office instances there are, etc.

Each product will have a unique set of advantages and different backgrounds, but when it comes to security, we are happy to go with Check Point Endpoint Security.

Which other solutions did I evaluate?

We also looked at Kaspersky. 

What other advice do I have?

The anti-malware we found very good on Check Point Endpoint Security. Mainly we observe the overall deployment and then maintenance is easy. It is only one click and you can deploy everything.

Whoever wants their data secure, and they want to have peace of mind, make sure to go with the anti-malware capabilities on the SandBlast Agent. 

We consider Check Point Endpoint Security to be one of the best systems for SAP. 

The zero-day anti-exploit solutions should be there with Check Point Endpoint Security. Because of the budget, people keep the software, but my advice is that it is also a must-have software. You should have SandBlast Agent along with the anti-malware capabilities installed. 

I would rate it a ten out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller.
PeerSpot user
Operations Director at a tech services company with 1-10 employees
Reseller
Mar 24, 2019
End-user management facilities are good, and there are innovations in every version
Pros and Cons
  • "The end-user facilities for managing the tool are good."
  • "Areas that have room for improvement are the scope of the product and, while I think the support is good, they can improve support as well."

What is our primary use case?

We use it to help clients solve their security problems.

How has it helped my organization?

It helps clients have a better view of the risks. It also helps increase staff productivity by more than 50 percent, in my estimate.

What is most valuable?

The most valuable features are the innovations that they release in every version. The end-user facilities for managing the tool are also good.

What needs improvement?

I'm not sure what they are thinking about in terms of additional features at the moment, but I hope that they'll maintain focus on the tool to enhance the solution. 

Areas that have room for improvement are the scope of the product and, while I think the support is good, they can improve support as well.

What do I think about the scalability of the solution?

It has a good level of scalability. They expand the solution with new and helpful features.

How are customer service and technical support?

Technical support provides good solutions. They are available and respond quickly. They are knowledgeable.

Which solution did I use previously and why did I switch?

Each scenario is different depending on the client's requirements or the regulations they need to follow or what they need to cover around risks.

How was the initial setup?

The initial setup is easy, but because we are resellers we are trained in setting it up.

What's my experience with pricing, setup cost, and licensing?

In addition to the standard licensing fees, there is a cost for support.

Which other solutions did I evaluate?

We have more than 70 products related to security solutions and we are resellers of many of them.

What other advice do I have?

Consider the solution as one of your options because it's one of the top tools.

I rate this solution at nine out of ten because it covers what it needs to cover. As always, there is room to improve, but I think it's a good product.

Disclosure: My company has a business relationship with this vendor other than being a customer. Resller.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.
Lead547e - PeerSpot reviewer
Lead at a financial services firm with 10,001+ employees
Real User
Mar 19, 2019
It provides remote access for the staff, but we have experienced some sales issues
Pros and Cons
  • "It provides remote access for the staff and increases their productivity."
  • "A couple of times, we experienced some sales issues."

What is our primary use case?

The primary use case is VPN.

How has it helped my organization?

It provides remote access for the staff and increases their productivity.

What is most valuable?

  • Certificate management
  • VPN

How are customer service and technical support?

A couple of times, we experienced some sales issues.

The technical support is good.

How was the initial setup?

The initial setup was moderately complex. We had to wait for it to do a few runs, back and forth, until it was solid.

What about the implementation team?

We did the deployment in-house.

What was our ROI?

We have seen a measurable decrease in the hang times of the detector responses by five percent.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1039464 - PeerSpot reviewer
Network Administrator at a healthcare company with 1,001-5,000 employees
Real User
Mar 17, 2019
Administratively, it's easy to control
Pros and Cons
  • "Administratively, it's easy to control."
  • "The security is its most valuable feature."
  • "Off the top of my head, I can't think of a way it has improved my organization."

What is our primary use case?

We have it on our endpoints.

How has it helped my organization?

Off the top of my head, I can't think of a way it has improved my organization.

What is most valuable?

The security is its most valuable feature.

Administratively, it's easy to control.

What do I think about the stability of the solution?

The stability of the solution is good.

How was the initial setup?

The initial setup was pretty straightforward.

What about the implementation team?

We used a consultant, and he was awesome.

What was our ROI?

We have not yet seen ROI.

Which other solutions did I evaluate?

The company had this solution. I got put in charge of it, so it was already in place. I decided to keep it.

What other advice do I have?

From the administrative side, it is easy to manipulate and control, and that makes it great.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
NetworkAc063 - PeerSpot reviewer
Network Architect at a manufacturing company with 1,001-5,000 employees
Real User
Mar 5, 2019
Gives us a forensics backbone into when something happens on a machine. It can let us know what happened and where it came from.
Pros and Cons
  • "Its ease of use is the most valuable feature. We had existing endpoints and it was an easy upgrade process. The interface board is also easy to use."
  • "There was a learning curve for our general population of employees (the user)."

What is our primary use case?

We were looking to upgrade our protection to our endpoints, giving us more of a forensics backbone into when something happens on a machine. The product can let us know what happened, where it came from, etc. Our primary use case is for more insight into what is happening.

How has it helped my organization?

We have a lot of mobile users who work on their laptops from home. Sometimes people travel, they'll go away and connect to hotel or airport WiFis. We had an instance where somebody connected to what they thought was free public WiFi, and it actually infected the machine. SandBlast was able to catch it, stop it, and change the files back. We then got a forensics report to determine what happened with it.

What is most valuable?

Its ease of use is the most valuable feature. The interface board is also easy to use.

We had existing endpoints, and it was an easy upgrade process.  

What needs improvement?

There was a learning curve for our general population of employees (the user). 

What do I think about the stability of the solution?

SandBlast's stability has been great. Once we had it implemented, I have had no problems with it.

What do I think about the scalability of the solution?

We're a small company, so I don't have a lot of scale to discuss about it. We're less than 100 employees. 

How are customer service and technical support?

I haven't had any problems with tech support for SandBlast. We have a good relationship with our vendor. Whenever we have any questions, they are able to get things answered for us or escalated quickly. There is minimal turnaround, as the tech support has been knowledgeable.

How was the initial setup?

The initial setup was pretty straightforward since it was essentially an upgrade on the technology that we were already trialing. Getting to the next level took minimal effort. 

What about the implementation team?

We did the integration with Tenea, who is a vendor that we have work with for a while now. 

What other advice do I have?

I would rate it an eight out of ten. I like product. 

I was not part of the decision-making process. I was just tasked with deploying the solution.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Owner at a tech services company with 1-10 employees
Real User
Feb 27, 2019
Offers the most secure and surefire way to tackle ransomware
Pros and Cons
  • "Its ability to rollback anti-ransomware once an attack has started is the most valuable feature."
  • "It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects."

What is our primary use case?

My primary use of this solution is to supplement my existing antivirus and enable/enhance my anti-ransomware capabilities.

What is most valuable?

Its ability to rollback anti-ransomware once an attack has started is the most valuable feature. 

What needs improvement?

It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects.

What do I think about the stability of the solution?

It's very stable. It is a production-grade solution.

What do I think about the scalability of the solution?

It scales well. However, it lacks deployment functionality because other vendors, like Symantec and McAfee, are building that into their tools. 

How are customer service and technical support?

On a scale from one to ten, I would rate their technical support as a nine. 

Which solution did I use previously and why did I switch?

We previously used Symantec Endpoint. Our reason for switching is because Check Point offers the most secure and surefire way to tackle ransomware.

I was part of the decision-making process.

How was the initial setup?

The initial setup was not straightforward. There is content available on the Check Point support site (on the Internet). This enabled us to deploy it out successfully.

What about the implementation team?

We implemented it internally. 

Which other solutions did I evaluate?

We did not consider any other vendors during the evaluation process.

What other advice do I have?

Don't think about getting the product. Just do it.

I would rate it a ten out of ten. No other product on the market is able to rollback a ransomware attack once it has started.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
PeerSpot user
it_user8688 - PeerSpot reviewer
IT Administrator at a healthcare company with 1,001-5,000 employees
Real User
Aug 22, 2013
When we have reached out to support, they have been quick to respond

We use Checkpoint here, and are currently in the process of planning a major from the standalone client to the full console version.

They had some issues in the past with the OS X and Windows versions not being in sync, but with the latest release E80 release, the clients are identical.

There are still a few gaps, such as not supporting Fusion drives, but overall, things have been great.

Deployment has been simple: We create a composer package that pushes the installer and our installation profile onto the client, and then call a script to run through the pkg installer. It has worked flawlessly for us.

As far as management goes, the reason we are moving to the console version is to have better reporting. Currently, the encryption files are written to a File share, and that is all the logging we get. We use the JSS' EA to get a more up to date picture, but with the Console version, it allows for more "real-time" updates (1-2 minutes).

The stability has been great for us. We have found a few iMacs that shipped to us with bad blocks/sectors that were not picked up by any of our HD diagnostics.

When we have reached out to support, they have been quick to respond. Like I said above, I definitely suggest the web chat as the best option.

Reliability has been pretty good. We saw an uptick in "black screens" that leave the machines in an un-bootable state, but that is more due to the fact that these drives have been encrypted for 4-5 years, and are used 24/7.

As far as performance goes, we have noticed that with Checkpoint we are getting about a 1-2% performance hit over FileVault, but nothing that has cause major issues.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user5520 - PeerSpot reviewer
Network Manager at a manufacturing company with 501-1,000 employees
Vendor
Apr 1, 2013
Works well unless you need to upgrade then compatibility issues may arise.

Valuable Features:

Endpoint security is a client-server managed network protection program. It blocks unauthorized software, malware, virus etc from entering the network and each client machine. Can be set up company specific to block specific file extensions or other devices from accessing the network. It provides updates based on server settings, can perform one network scan daily and can be set up to scan per client machine setting. Any machine that has the software installed on the network is protected by the endpoint security. Logs are created per client and machine settings.

Room for Improvement:

Endpoint security programs can be a bit pricey, but you are receiving basically the same type of protection from each software program. To upgrade from one version to the next can get very costly providing what type of equipment you are running the program on. I did not find that endpoint security was very compatible during the upgrade. I ended up spending a lot more money than budgeted due to compatible issues.

Other Advice:

All in all, endpoint security does the basics of blocking unauthorized software, malware, virus, etc. It is client/server based software. Works good unless you need to upgrade then compatibility issues may arise. Would recommend for any user. Runs behind the scenes, and the scans are designed to run without effecting a user ability to work on their pc.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.