The business challenges that led my company to purchase and implement Netskope CASB were to make sure that whatever data resides in the cloud is secured from the malware perspective, and it's also secured from the data leakage perspective. So that's why we went with Netskope.
Senior Security Analyst at Gruve.ai
Cloud security is significantly improved by malware detection and data classification, while deployment process is streamlined
Pros and Cons
- "I would definitely recommend Netskope CASB to other organizations because it is easy to deploy, easy to use, and it covers most of what we need, so if anyone is looking for a CASB solution, I definitely recommend Netskope."
What is our primary use case?
I work for a finance company, and my role there is cloud security engineer.
What is most valuable?
The specific features of Netskope CASB that I find particularly valuable include the malware detection engine, the DLP engine, and the cloud discovery engine, which are the three main components that I use pretty extensively.
The three components I mentioned help my company maintain security and compliance in the cloud, particularly the DLP part, because if we are PCI compliant or any other compliance, it's going to flag if the file that is being uploaded is violating the compliance, helping us maintain compliance.
In terms of improving the security posture of our cloud environment, Netskope CASB does a good job in identifying malware and the DLP part is excellent because it's able to look at the file and classify the data accurately, so it effectively identifies sensitive data.
What needs improvement?
There is always room for improvement in Netskope CASB, particularly their UI, which could be more user-friendly.
For how long have I used the solution?
I have been using Netskope CASB for close to about three years.
Buyer's Guide
Check Point Harmony Endpoint
August 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,483 professionals have used our research since 2012.
How was the initial setup?
The implementation process of Netskope CASB was pretty straightforward, and we actually did it pretty quickly; within a week, we were able to roll it out to the entire organization, so it didn't take much time.
What about the implementation team?
During implementation, we did get some professional service support from the Netskope team, who provided some training and configuration support, but the bulk of it we did ourselves.
Which other solutions did I evaluate?
Before choosing Netskope CASB, we did a POC with about three vendors, specifically McAfee, Symantec, and Netskope.
The key factors that led us to choose Netskope CASB over those other options were ease of deployment, pricing, and also the ease of use of the Netskope platform, which seemed pretty straightforward.
What other advice do I have?
My experience with Netskope CASB has been quite positive and informative.
My company has roughly around 10,000 employees.
Now that I have been using Netskope CASB for about three years, the biggest benefits I've experienced include knowing what kind of files are getting uploaded to the cloud, seeing what kind of malware is being blocked, and understanding what kind of policies are being violated, which has given us a clear picture of what is happening in the cloud.
I would definitely recommend Netskope CASB to other organizations because it is easy to deploy, easy to use, and it covers most of what we need, so if anyone is looking for a CASB solution, I definitely recommend Netskope.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 23, 2025
Flag as inappropriate
Network Cyber Security Specialist at a tech services company with 51-200 employees
Improved security visibility through comprehensive feature set
Pros and Cons
- "The best features Check Point Harmony Endpoint offers include fantastic forensic visibility along with a broad feature set that covers anti-malware, UBA, anti-phishing, and host-based firewalls, all centralized and easy to use through a cloud tenant."
- "I think Check Point Harmony Endpoint could be improved as I dislike the management interface because it's not intuitive, it lacks real-time reporting without configuring smart events, and it made administration less efficient."
What is our primary use case?
My main use case for Check Point Harmony Endpoint is that we wanted to have an EDR client that could run on our servers to act as an EDR.
I do not have anything else to add about my use case or why I needed it.
What is most valuable?
The best features Check Point Harmony Endpoint offers include fantastic forensic visibility along with a broad feature set that covers anti-malware, UBA, anti-phishing, and host-based firewalls, all centralized and easy to use through a cloud tenant.
The forensic visibility is valuable for my work because when an incident happens, it's very easy to see the forensic details and find out if it's a false positive or something that needs to be acted on.
Check Point Harmony Endpoint has impacted my organization positively by improving our security posture, but in the end, it didn't make the cut in the POC, so we went with another vendor.
During the time we used Check Point Harmony Endpoint, it improved our security posture, as we definitely got the visibility that we wanted, and it integrated well into the SIEM, so we got all the logs that we wanted.
What needs improvement?
I think Check Point Harmony Endpoint could be improved as I dislike the management interface because it's not intuitive, it lacks real-time reporting without configuring smart events, and it made administration less efficient.
The management interface felt unintuitive primarily due to the layout and navigation; you had to click around many different windows to find what you were looking for, and to resolve an incident, you needed to enter many windows.
I do not have anything else to add about the needed improvements or anything else that could make it easier for admins.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint during a POC that lasted one month.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is stable, and it ended up being very stable with no downtime at all.
What do I think about the scalability of the solution?
The scalability of Check Point Harmony Endpoint is very easy; it was deployed with GPOs and Ansible towards Linux servers, so it was very easy and scalable.
Which solution did I use previously and why did I switch?
I previously used a different solution, which was CrowdStrike; we switched because it won the POC.
What was our ROI?
I have not seen a return on investment during my time with it, as it didn't make the cut in the POC.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for Check Point Harmony Endpoint was that it ended up being expensive to license, but the licensing itself was very straightforward.
Which other solutions did I evaluate?
Before choosing Check Point Harmony Endpoint, I evaluated other options including CrowdStrike and Defender for Servers.
What other advice do I have?
My advice to others looking into using Check Point Harmony Endpoint is to definitely pay for tuning by Check Point professional services to get assistance with setting up correctly from the first time. On a scale of 1-10, I rate Check Point Harmony Endpoint an 8.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Aug 22, 2025
Flag as inappropriateBuyer's Guide
Check Point Harmony Endpoint
August 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,483 professionals have used our research since 2012.
Senior Network Engineer at a healthcare company with 10,001+ employees
Operational efficiency improves with robust threat protection and real-time intelligence
What is our primary use case?
My main use case for Check Point Antivirus is securing my company from viruses, and Check Point Antivirus is deployed across more than 500 endpoints to protect sensitive client data and meet regulatory compliance.
I use Check Point Antivirus primarily for virus protection in our day-to-day operations.
What is most valuable?
The best features Check Point Antivirus offers are ThreatCloud Intelligence, zero-day protection, and the anti-ransomware engine.
These features stand out because ThreatCloud Intelligence leverages real-time global threat data to detect and block emerging threats quickly.
Check Point Antivirus has positively impacted our organization by enhancing our security posture and operational efficiency.
The operational efficiency provided by Check Point Antivirus helps my team work more effectively through centralized management and automated threat response, which saves time for our IT team.
What needs improvement?
Check Point Antivirus could be improved by lowering resource usage and simplifying the deployment process.
The resource usage can sometimes highly utilize CPU and memory, which impacts the user experience on older or low-spec devices, and the deployment process could be simpler for our needs.
For how long have I used the solution?
I have been using Check Point Antivirus for five years.
What was my experience with deployment of the solution?
Check Point Antivirus could be improved by lowering resource usage and simplifying the deployment process.
The resource usage can sometimes highly utilize CPU and memory, which impacts the user experience on older or low-spec devices, and the deployment process could be simpler for our needs.
What do I think about the stability of the solution?
Check Point Antivirus is stable.
What do I think about the scalability of the solution?
The scalability of Check Point Antivirus is highly scalable.
How are customer service and support?
The customer support for Check Point Antivirus is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not previously use a different solution before Check Point Antivirus.
How was the initial setup?
I don't have much information about the pricing, setup cost, and licensing for Check Point Antivirus.
What about the implementation team?
I did not evaluate other options before choosing Check Point Antivirus as there were no other solutions considered.
What was our ROI?
I have seen a return on investment from using Check Point Antivirus. It delivers solid ROI by reducing breach risk and improving endpoint visibility and control.
What's my experience with pricing, setup cost, and licensing?
I don't have much information about the pricing, setup cost, and licensing for Check Point Antivirus.
Which other solutions did I evaluate?
I did not evaluate other options before choosing Check Point Antivirus as there were no other solutions considered.
What other advice do I have?
My full name is Mohammad Talib, and I work as a Senior Network Engineer at Abbott Laboratories.
I have been working in my current field for 15 years.
I found this interview to be lengthy.
On a scale of 1-10, I rate Check Point Antivirus an 8.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jul 27, 2025
Flag as inappropriateSenior Network Engineer at a healthcare company with 10,001+ employees
Comprehensive protection reduces incidents through threat prevention
What is our primary use case?
My main use case for Check Point Harmony Endpoint is as a cybersecurity solution.
A specific example of how I use it in my daily work is that it helped me to enhance security, protect endpoints from advanced threats, and offer strong malware prevention, data protection, and secure remote access.
How has it helped my organization?
Check Point Harmony Endpoint positively impacts my organization by reducing incidents.
It reduced incidents by preventing malware and minimizing security events.
What is most valuable?
The best features Check Point Harmony Endpoint offers include strong security capabilities.
The security capabilities that stand out to me include robust threat prevention, malware protection, and integrated firewall features, which I find valuable.
Another feature I find helpful is the ease of use.
What needs improvement?
I think Check Point Harmony Endpoint could be improved by reducing false positives.
Sometimes false positives occur, but I do not have more to add about the needed improvements.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for two years.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is stable.
What do I think about the scalability of the solution?
Check Point Harmony Endpoint's scalability is good.
How are customer service and support?
The customer support for Check Point Harmony Endpoint is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not previously use a different solution before Check Point Harmony Endpoint.
What was our ROI?
Since using Check Point Harmony Endpoint, I have seen a return on investment as it reduced the incidents and the work related to these incidents, improving our time protection.
What's my experience with pricing, setup cost, and licensing?
I do not have much information about the pricing, setup cost, and licensing for Check Point Harmony Endpoint.
Which other solutions did I evaluate?
I did not evaluate other options before choosing Check Point Harmony Endpoint.
What other advice do I have?
I recommend Check Point Harmony Endpoint because it has comprehensive protection, user-friendly management, and is scalable for growth.
I am Mohammad Talib, a Senior Network Engineer at Abbott Laboratories. I have been working in my current field for 15 years.
I rate Check Point Harmony Endpoint an eight out of ten because there are always cons.
My company does not have a business relationship with this vendor other than being a customer. I was offered a gift card or incentive for this review.
I found this interview very long and think it could be changed for the future.
Which deployment model are you using for this solution?
On-premises and in a private cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jul 27, 2025
Flag as inappropriateTechnical Director at Geekz Information Technology
Well-designed for security needs and has built-in features
Pros and Cons
- "Stability is good, and the product is well-designed for security needs."
- "Endpoint protection is valuable. Stability is good, and the product is well-designed for security needs."
- "Support needs improvement."
- "Support needs improvement. Currently, support is primarily via email, which leads to longer response times."
What is our primary use case?
We work with Check Point Harmony Endpoint as partners, providing deployment services, particularly for small to medium enterprises (SMEs). We work with both small and large companies.
What is most valuable?
Endpoint protection is valuable. Stability is good, and the product is well-designed for security needs. It is scalable and offers multiple features, which justify its pricing for enterprise customers. Since security is a major concern, we do not worry about the pricing as the product has features built-in.
What needs improvement?
Support needs improvement. Currently, support is primarily via email, which leads to longer response times. Fine-tuning for applications and better support from Harmony would be helpful, especially once the environment is hardened. Better technical support would enhance the product's competitiveness.
For how long have I used the solution?
We have been working with Check Point Harmony Endpoint for almost five years.
What do I think about the stability of the solution?
Stability is fine, and the product performs well in terms of security. It is considered well and good.
What do I think about the scalability of the solution?
Check Point Harmony Endpoint is scalable, suitable for both small and large companies.
How are customer service and support?
Support service needs improvement. Only email support is available, leading to delays in getting assistance.
How would you rate customer service and support?
Negative
How was the initial setup?
Implementation is straightforward for smaller environments, however, requires significant fine-tuning for larger clients.
What about the implementation team?
We only handle deployment and do not deal with pricing, which is taken care of by another department.
What's my experience with pricing, setup cost, and licensing?
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability. It is suitable for enterprises but can be challenging to position for small to medium customers.
What other advice do I have?
We recommend Check Point Harmony Endpoint; however, support needs enhancement. With improved support, it could outperform competitors. Rating based on the alone featureset is nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Advanced threat protection and reduced incidents improve efficiency and security
What is our primary use case?
My main use case for Check Point Harmony Endpoint is to use it as an EDR in our endpoint solution, endpoints.
Check Point Harmony Endpoint helps us with advanced threat protection, malware, and everything that can raise security concerns with the endpoint.
I don't have anything else to add about my main use case or how it fits into my overall security strategy.
What is most valuable?
In my opinion, the best features Check Point Harmony Endpoint offers are advanced threat protection, ransomware protection, phishing and malware prevention, centralized management, and generative AI protection. All these features stand out for me.
The centralized management and AI protection of Check Point Harmony Endpoint help us to easily deploy all the endpoints, new endpoints, centrally monitor them, policy enforcement, and everything. It has increased our efficiency.
Check Point Harmony Endpoint has positively impacted my organization by reducing incidents.
Since implementing Check Point Harmony Endpoint, my incidents have reduced by around 15 to 20%.
What needs improvement?
I hope the agent size of Check Point Harmony Endpoint could be reduced for improvement.
The agent size has affected my experience by causing some performance issues with old machines where RAM was less than 8GB.
I don't want to add more about the needed improvements or anything else that could make my experience better.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for almost two years.
What do I think about the scalability of the solution?
The scalability of Check Point Harmony Endpoint is rated as eight out of ten.
How are customer service and support?
The customer support is rated as nine out of ten.
I would rate the customer support on a scale of 1 to 10 as nine.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used Broadcom because it was an age-old solution and we don't use it anymore.
What was our ROI?
I have seen a return on investment with time saved because we don't get too many incidents now.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is satisfactory.
Which other solutions did I evaluate?
Before choosing Check Point Harmony Endpoint, I did not evaluate other options.
What other advice do I have?
My advice to others looking into using Check Point Harmony Endpoint is to go for it.
I choose nine instead of another rating because if the agent size was less, I would have given 10.
My company does not have a business relationship with this vendor other than being a customer.
I was not offered a gift card or incentive for this review.
I rate Check Point Harmony Endpoint a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jul 3, 2025
Flag as inappropriateBusiness Developer Manager at PROCOM
Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering
Pros and Cons
- "The level of security and visibility they provide is great and it is very easy to configure and maintain."
- "We would also like the application control module to be further developed in future versions to include applications commonly used or maintained by Check Point in order to be able to configure blocking policies more quickly."
What is our primary use case?
We use it for the complete protection of more than 5,000 devices of our company and our customers.
We have Harmony Endpoint (Advanced) managed from the Check Point Cloud, mostly for Microsoft Windows 7, 8, and 10 devices, as well as Windows Servers (mostly 2012 and 2019). We also have a few protected Linux desktops and server devices.
As for the protections enabled, we have mainly Threat Prevention (including Antimalware, Antibot, Anti-ransomware, EDR, and Threat Emulation/sandboxing); Firewall, application control, compliance, and port protection modules deployed.
How has it helped my organization?
We used to use other security solutions (Windows Defender and Kaspersky), however, we had security incidents that affected us (viruses and ransomware) and they were very difficult to identify or when we did identify them it was already a long time after the incident occurred and we did not know the cause and therefore affected the operability of our company considerably.
Since we made the decision to move to Check Point Harmony we have had greater visibility of everything that happens on our devices and take a preventive approach rather than a reactive strategy, in addition to being more confident that we have Check Point protecting us.
What is most valuable?
The characteristics that we find most valuable are its anti-ransomware protection, zero-day phishing protection, web browsing filtering, and vulnerability and patch management. The level of security and visibility they provide is great and it is very easy to configure and maintain. We have almost no false positives.
A feature that we really like is the ease of management and administration that Check Point offers us, in addition to including the management server in its cloud and the predefined dashboards and reports.
What needs improvement?
We would love to have more endpoint hardware and software inventory, as well as tools to perform troubleshooting directly on the endpoint remotely.
A further point of improvement would be to be able to optimize the consumption of resources on the device.
We would also like the application control module to be further developed in future versions to include applications commonly used or maintained by Check Point in order to be able to configure blocking policies more quickly.
For how long have I used the solution?
We have been using this product for more than three years.
What do I think about the stability of the solution?
We have not had any problems with stability so far. It has left us with a good impression.
What do I think about the scalability of the solution?
The scalability of cloud management is excellent.
How are customer service and support?
On the few times we have required support, it has taken us some time to resolve the issues completely, however, in the end, it was accomplished.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We changed solutions since what we had was not effective against the attacks we see today; besides, the visibility was very low and the management was very complicated.
How was the initial setup?
The initial deployment was simple and the solution gave us several tools to do so.
What about the implementation team?
We deployed via an in-house team.
What was our ROI?
In three years, the expected ROI was achieved.
What's my experience with pricing, setup cost, and licensing?
The management of the solution is very simple and the deployment tools are diverse, which greatly reduces the workload. Licensing is also quite simple with three main options and some add-ons.
It is licensed per device (whether it is a desktop, laptop, server, etc.), and the price is very attractive and competitive.
Which other solutions did I evaluate?
We evaluated other options including Cisco AMP and Fortinet EDR.
What other advice do I have?
I'd recommend users to be careful with low-resource devices as the solution has several security modules that can affect the performance of these devices. In our case, we had some old machines where we grouped them and created a more optimized policy for these legacy devices.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. We are a Check Point customer and partner.
Enterprise Network Engineer at a outsourcing company with 201-500 employees
Improved data protection and threat detection boosts user endpoint security
What is our primary use case?
Our main use case for Check Point Harmony Endpoint is for posture for the user endpoints. When I say posture for user endpoints, it includes both compliance and threat detection. Compliance ensures that before users connect to network resources, whether within the organization on the switches or outside via VPN, the endpoint client must verify whether the posture is acceptable, ensuring that antivirus is running in the background without threats, and making sure that the device is secure.
How has it helped my organization?
Check Point Harmony Endpoint has positively impacted my organization primarily in the protection context.
It has helped significantly on the protection side, considering that we no longer face issues where data is lost because someone put it on a USB drive, whether they took the device home or elsewhere. We no longer encounter situations where information leaks from users inside, effectively closing off one of the threat edges.
What is most valuable?
The best features that Check Point Harmony Endpoint offers, unlike traditional endpoint solutions, focus specifically on detection and remediation even before the device has to go to the firewall. We manage it through the Infinity Portal, which helps us with the fatigue of logging into different windows.
The automated detection, which is EDR, detects any threats potentially moving from the user endpoint onto the network and possibly to the data center. Another critical feature is data protection to prevent someone from easily extracting information from the user laptop by plugging in a stray hard drive or USB.
The automated detection and EDR in Check Point Harmony Endpoint reduce administrative overhead. The agent comes with pre-installed settings to detect different threats on the endpoint. In most other solutions, you must start from scratch, which takes considerable time and troubleshooting. With Check Point Harmony Endpoint, you're basically fine-tuning because the templates are already running, and you just adjust them to fit your organizational preferences.
What needs improvement?
There are some pain points with automated rules in Check Point Harmony Endpoint. In the initial stages, you sometimes have to do fine-tuning because you get false positives, resulting in users being unable to connect. However, those issues are eventually fixed.
The pricing is a bit expensive, making it harder to maintain the licenses, and the initial setup takes a learning curve since it needs to fit into the Check Point environment and integrate with other systems.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for three years.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is stable.
What do I think about the scalability of the solution?
The scalability of Check Point Harmony Endpoint is satisfactory.
How are customer service and support?
I have interacted with Check Point Harmony Endpoint's customer support, and my experience was good.
The customer support for Check Point Harmony Endpoint deserves a rating of 10.
How would you rate customer service and support?
Positive
How was the initial setup?
My experience with pricing, setup cost, and licensing was good, primarily because of the support provided.
What was our ROI?
I have seen a return on investment from using Check Point Harmony Endpoint in terms of fewer security incidents, and the previous issue of data leaking from user devices has completely disappeared.
Which other solutions did I evaluate?
I did not evaluate other options before choosing Check Point Harmony Endpoint.
What other advice do I have?
I would encourage others looking into using Check Point Harmony Endpoint to invest in it. Protecting an organization solely with a firewall is challenging, especially in a hybrid work environment where working via VPN has become common. Therefore, investing in Check Point Harmony Endpoint ensures that the threat landscape on the user side is fully covered and protected. On a scale of 1-10, I rate Check Point Harmony Endpoint a 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jul 31, 2025
Flag as inappropriate
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
Microsoft Defender XDR
Cortex XDR by Palo Alto Networks
HP Wolf Security
Fortinet FortiClient
Elastic Security
WatchGuard Firebox
Trellix Endpoint Security Platform
Symantec Endpoint Security
Huntress Managed EDR
Trend Vision One
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?