Try our new research platform with insights from 80,000+ expert users
Rakesh Jadhav - PeerSpot reviewer
Sr. Technical Consultant - Presales at Ivalue Infosolution
User
Top 20
Easy to set up with helpful support and great flexibility
Pros and Cons
  • "It has extended OS support to ensure your legacy endpoints also have zero-day protection."
  • "They need to focus on more scalability (as much as possible) so that the solution can run across all supported OS."

What is our primary use case?

This solution can provide you with robust endpoint security and has the ability to give deep-level forensics because of EDR capability. 

The solution can offer you value-added features with the EPP-EDR platform to ensure complaint and posture management, category-based web access, disk encryption, password protection, and DLP over endpoint channels.

The primary key use cases for Check Point are:

1. Single console across multiple Check Point solutions using the Infinity Portal

2. Flexible deployment architecture

3. OS support

4. Rich threat intel to mitigate known/unknown attacks

5. Flexibility to bundle multiple value-added additional modules/features with the EPP platform

How has it helped my organization?

By using Harmony, you can provide 100 % security to the endpoints along with compliance and management features. This has a flexible deployment method. 

It has extended OS support to ensure your legacy endpoints also have zero-day protection. 

Using add-ons such as posture management, organizations can manage OS-level vulnerability and get rid of unwanted beaches. 

Check Point Harmony also protects you from web-based attacks along with category-based restrictions to ensure the end user gets the required access. 

What is most valuable?

Integration of the Check Point Threat intel cloud with the EPP-EDR platform, which is enhancing and providing efficient DB for threat hunting and preventing zero-day using an anti-exploit platform. 

Apart from the EPP and EDR capability, Check Point Harmony can integrate using API with 3rd party vendors; Azure AD integration makes the whole deployment and management easy for the administrator.

Multiple endpoint protection packages are available for organizations. Also, it is an MSSP-compatible platform.

What needs improvement?

With Check Point, you will get your all required value-added features as per your requirements. That said, they need to focus on more scalability (as much as possible) so that the solution can run across all supported OS. 

There are legacy OS concerns. It would be really helpful for them if legacy OS support could be extended up to Windows XP. 

Aside from that, Check Point Harmony will be a suitable option for any type of organization.

Buyer's Guide
Check Point Harmony Endpoint
August 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,483 professionals have used our research since 2012.

For how long have I used the solution?

I have been closely working on this solution in my organization over the last year. 

What do I think about the stability of the solution?

Using rich threat intel and robust endpoint security, the solution ensures protection against known and unknown attacks.

What do I think about the scalability of the solution?

The solution offers a flexible deployment and easy management through a consolidated console. 

How are customer service and support?

Support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously I worked with Cylance AV. Considering all value-added features along with the robust endpoint solution and threat intel, Check Point Harmony is the better choice. 

How was the initial setup?

The initial setup is very simple.

What about the implementation team?

We handled the implementation in-house.

What was our ROI?


What's my experience with pricing, setup cost, and licensing?

The pricing is really competitive when you consider other known vendors in the market.

Which other solutions did I evaluate?

We explored some traditional solutions as well.

What other advice do I have?

Check Point Harmony is feature-rich and robust, with great endpoint detection and response capabilities to ensure deep forensic understanding across incidents. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Independent Information Technology and Services Professional at a non-profit with 1-10 employees
Real User
Top 5
Antivirus with excellent performance, detailed reporting, and robust scanning features
Pros and Cons
  • "The Antivirus engine's performance has been excellent."
  • "More applications should be supported."

What is our primary use case?

We use the antivirus for FTP email scanning, attachment scanning, FTP download, HTTP download, and HTTPS download with SSL and inspection. It is also used in conjunction with the firewall gateway and security gateway.

What is most valuable?

The most valuable features include scanning, sandbox features, and antivirus reporting. The Antivirus engine's performance has been excellent.

What needs improvement?

More applications should be supported. For example, the ability to detect viruses or scan attachments within applications like Skype or similar applications could be improved.

For how long have I used the solution?

We have been using the solution for 15 years.

How are customer service and support?

The customer service and support are rated highly. The overall rating for support was 9.5 out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Symantec and ESET before switching to Check Point Antivirus. We switched due to its detection capabilities and the high reputation of Check Point for preventing breaches and antivirus protection. Symantec's performance had issues with heavy CPU and memory usage.

How was the initial setup?

The initial setup could be rated as seven or eight out of ten. For those with experience on the Check Point platform, it's easy to set up. 

However, for new administrators, the setup can be confusing because it uses a separate part of the panel and offers an option for legacy setup, which opens the old Check Point Smart dashboard.

What about the implementation team?

One person handled the deployment in-house.

What's my experience with pricing, setup cost, and licensing?

On a scale of one to ten for pricing, with ten being the most expensive and one being the cheapest, Check Point Antivirus is rated as one, making it the most affordable among antivirus products.

Which other solutions did I evaluate?

We used and evaluated Symantec, ESET, Fortinet, Cisco, and Palo Alto before switching to Check Point Antivirus.

What other advice do I have?

I would definitely recommend Check Point Antivirus to others. The product is very effective and performs well without causing any significant hit on CPU or memory.

I'd rate the solution nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
August 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
866,483 professionals have used our research since 2012.
IT Manager at Bolger Brothers Inc.
Real User
Manages to capture more spam with a smaller footprint
Pros and Cons
  • "This comprehensive approach can safeguard your organization from a wider range of threats, including ransomware, malware, phishing attacks, and zero-day exploits."
  • "I would like to see a better UI for admin functions."

What is our primary use case?

We use Check Point to manage email security in our O365 environment.  Our previous solution was unable to remove all of the email spam we had. Check Point integrates with Office 365 to provide advanced threat protection for email. It uses techniques like anti-virus, URL filtering, and threat emulation to stop known and unknown threats. It also offers goes beyond email security. It protects all aspects of Office 365 collaboration tools like SharePoint, OneDrive, and Teams. It can prevent data loss, enforce policy compliance, and block phishing attacks.

How has it helped my organization?

It manages to capture more spam with a smaller footprint. It has a single agent and management console to streamline security administration. This can save IT staff time and resources compared to managing multiple security products. The endpoint combines Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR) capabilities. 

This comprehensive approach can safeguard your organization from a wider range of threats, including ransomware, malware, phishing attacks, and zero-day exploits.

What is most valuable?

Ease of setup and ability to hook into O365 directly without MX record changes. Check Point offers advanced threat prevention capabilities, including SandBlast Network Threat Emulation and Threat Extraction. These features can identify and stop even unknown threats by simulating real-world attacks in a safe environment. Check Point solutions are designed to scale to meet the needs of large organizations. They can handle high volumes of traffic without compromising performance. Check Point integrates with a wide range of third-party security solutions. This allows you to create a comprehensive security ecosystem that meets your specific needs.

What needs improvement?

I would like to see a better UI for admin functions. While CheckPoint offers threat prevention through SandBlast, some users feel even deeper integration of Machine Learning (ML) could enhance threat detection and improve automation. This could involve automating security responses and offering threat prediction capabilities. As organizations increasingly move to the cloud, Check Point could further strengthen its cloud-native security offerings. This might involve expanding support for various cloud platforms and offering more granular security controls within those environments.

For how long have I used the solution?

I have used Check Point Harmony Endpoint for six months.

What do I think about the stability of the solution?

We haven't had issues or outages so far. 

What do I think about the scalability of the solution?

It seems to be able to scale to any size company. 

How are customer service and support?

Their support has been very positive. It's easy to use. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Sophos was our previous vendor, we found their coverage lacking.

How was the initial setup?

The setup was straightforward, it's hands-on config. 

What about the implementation team?

CDW was our MSP. 

What was our ROI?

We expect to see ROI in 12-16 months. 

What's my experience with pricing, setup cost, and licensing?

My advice would be to state terms upfront and always ask to haggle down.

Which other solutions did I evaluate?

We looked at Fortinet, Palo Alto, Crowdstrike, etc. 

What other advice do I have?

Make sure to review your solutions every couple years as technology changes. 

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Paulo F - PeerSpot reviewer
Business Development Manager at Wondercom
User
Top 10
Granular and resilient with many robust features
Pros and Cons
  • "The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets."
  • "Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries."

What is our primary use case?

In the intricate web of digital landscapes, my primary use of Check Point Endpoint Security is a guardian for my organization's digital footprint. This robust solution stands as a vigilant sentinel, meticulously securing each endpoint against the relentless tide of cyber threats. 

Its dynamic threat prevention capabilities, seamlessly integrated into our environment, create an impervious shield against malware, ransomware, and other malicious actors. 

With an intuitive interface and real-time monitoring, it not only defends but also empowers, allowing me to traverse the digital domain with confidence. 

In this narrative of cyber resilience, Check Point Endpoint Security is not just a tool; it ensures that every endpoint under its watch remains secure in our interconnected digital ecosystem.

How has it helped my organization?

The integration of Check Point Endpoint Security has been a transformative force within my organization. 

As we embraced this robust solution, a paradigm shift occurred – a palpable enhancement in our digital resilience. The advanced threat prevention mechanisms woven into the fabric of Check Point have acted as an impenetrable shield, thwarting malicious intruders and fortifying the security posture of every endpoint. 

This newfound defense has not only safeguarded our sensitive data but has also instilled a sense of confidence among our team members, enabling them to navigate the digital realm without fear.

What is most valuable?

Check Point Endpoint Security has proven to be a beacon of resilience, with its multifaceted features illuminating our defense strategy. The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets. 

The granular control over endpoint activities empowers us to tailor security policies, ensuring a bespoke approach that aligns with our unique operational needs. The intuitive dashboard and centralized management streamline our security operations, enhancing efficiency and providing a comprehensive overview of our digital landscape. 

Notably, the seamless integration with other security components orchestrates a harmonious defense orchestra, fostering collaboration and maximizing the synergy of our security infrastructure. 

In this narrative of fortified cybersecurity, it's the amalgamation of these features that makes Check Point Endpoint Security an invaluable guardian, fortifying our digital realm against the relentless march of cyber threats.

What needs improvement?

A robust threat intelligence integration could elevate proactive defense, offering real-time insights to anticipate and thwart emerging threats more effectively. 

Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries. 

Streamlined incident response tools within the platform would empower security teams to react swiftly and decisively in the face of potential breaches. Integration with emerging technologies, such as artificial intelligence and machine learning, could usher in a new era of adaptive and self-learning security protocols. 

Furthermore, a user-friendly interface for custom reporting and analytics would empower organizations to derive actionable insights from security data. In this ongoing narrative of cybersecurity evolution, the inclusion of these features in the next release would undoubtedly fortify Check Point Endpoint Security as an even more comprehensive and dynamic guardian in the ever-expanding digital frontier.

For how long have I used the solution?

I've used the solution for more than three years.

What do I think about the stability of the solution?

The solution is very stable.

What do I think about the scalability of the solution?

The scalability is very good.

How are customer service and support?

The technical support is excellent.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used to use Kaspersky, and we switched for security reasons.

How was the initial setup?

The initial setup was straightforward; it was easy.

What about the implementation team?

We handled the setup in-house.

What's my experience with pricing, setup cost, and licensing?

Its price is competitive.

Which other solutions did I evaluate?

We also evaluated Trend Micro.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner integrator
PeerSpot user
Mohan Janarthanan - PeerSpot reviewer
Assosiate Vice President at Novac Technology Solutions
Real User
Top 5
Offers good reporting functionality and zero-phishing feature
Pros and Cons
  • "We can map the MITRE attack framework along with the Cyber Kill Chain completely."
  • "The only drawback is the integration process."

What is our primary use case?

I use it for end point protection, and I am also using full disk encryption Harmony both solutions are adopted. 

What is most valuable?

One of the advantages is the reporting functionality. For example, if some critical data is available on a laptop and the laptop gets stolen - I can remotely wipe it immediately. Because, at the end of the day, apart from the device, the data is important.

So, the zero-phishing feature of Harmony Endpoint, the one I have used, was very good.

Those features are very good. Then, zero-day protection is also very important to us.

We can map the MITRE attack framework along with the Cyber Kill Chain completely.

Sandboxing is a great functionality.

What needs improvement?

The only drawback is the integration process. For example, I want to integrate with my source platform. It took some time. That's the only concern regarding the integrations.

Check Point Harmony Endpoint doesn't have any XDR kind of solution. DLP functionality and all are not yet there.

And then, the performance also sometimes gets deep. CPU utilization could be further optimized. 

For how long have I used the solution?

I have been using it for one year. 

What do I think about the stability of the solution?

I faced some issues with stability. Stability was good compared to other endpoint protection. The only thing is that in the Zero Phishing future, which I like a lot, we can see when people are entering password content and other things. Phishing is important.

What do I think about the scalability of the solution?

Since it's a SaaS platform, we can upgrade only a license. We can get it.

Which solution did I use previously and why did I switch?

I have experience with SentinelOne. SentinelOne has a feature; for example, if a ransomware attack happened and a particular file was affected, we can retrieve it. If some known files got corrupted, we can roll back the file to the last known good configuration. We can do that. 

But this particular feature is not there in Check Point Endpoint. And then, importantly, USB blocking on Linux machines is not currently available in Check Point Endpoint. It supports only the scanning part, but I don't think it is supporting USB blocking and device blocking.

DLP functionality and all, they are not yet there.

How was the initial setup?

The installation is very easy. It takes around 20 minutes only. 

It requires maintenance. There are a couple of people who handle more than 4,000 endpoints. So if there are more, then I can publish them. That is a one-time activity. After that, only one person can monitor. The SOC analyst is only one guy. The person who manages the endpoint completely, email as well as the endpoint, both.

What was our ROI?

We have seen ROI. Time was saved. Since it's manual, we need to pay a lot to our team. The time-saving was very good. We can establish connectivity on each agent within 20 minutes.

What's my experience with pricing, setup cost, and licensing?

The pricing is okay. It is in the enterprise range. It is not middle range. It is not so costly, but it is an enterprise.

What other advice do I have?

Overall, I would rate it a nine out of ten. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Afeez Adeyemo - PeerSpot reviewer
Technical Sales / Presales at Routelink Integrated Systems
Reseller
Top 5Leaderboard
A stable tool to secure endpoint devices and manage all devices from a centralized portal
Pros and Cons
  • "It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution."
  • "Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors."

What is our primary use case?

I use Check Point Harmony Endpoint in my company to secure the endpoint devices, including computers, servers, and every single endpoint in the environment.

How has it helped my organization?

Check Point Harmony Endpoint offers customers enterprise-level security for all their devices, including servers, laptops, and desktops. The IT personnel can ensure that with the product, all of the devices in an environment are protected with Check Point's enterprise-based solution. The customers who buy the product need not worry about their devices being exposed to threats. In fact, if you check the reports for Check Point in Gartner Magic Quadrant, you will see that the reports are all related to Check Point's endpoint security solutions. Customers try to get information on the value they can derive, along with the other potential prospects in the market, before trying to get or onboard Check Point Harmony Endpoint in their environment.

For IT personnel, Check Point Harmony Endpoint is easy to manage since they don't need to have any expert in order to deploy or monitor devices with the help of the product, and it also allows you to try out different actions on different devices. Whenever there is an attack on any device, Check Point Harmony Endpoint has the capability to isolate the affected device from the environment. Suppose there is an attack on one computer. In that case, the security of the other computers operating in the same environment is compromised, so Check Point Harmony Endpoint isolated the affected computer and notified the required department in the company to look into it while allowing for the other computers to work properly. The product offers good value to the companies that deploy it in their environment.

What is most valuable?

I would have to describe what I feel is valuable in Check Point as a whole. Check Point provides users with a central point from where they can manage all the devices across a workplace. Whether users use Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, they don't have to log into different portals or solutions since they can manage everything from one central point. I like the fact that products from Check Point are very easy to deploy. Even if a user has 1,000 endpoints in an environment, Check Point can take care of the deployment in minutes. Check Point Harmony Endpoint is a very easy solution to deploy and requires very little maintenance or technical expertise.

What needs improvement?

I would like to see improvements in Check Point Harmony Endpoint in general because some people use it since it is available at a competitive price. Due to the competitive pricing strategy of Check Point Harmony Endpoint, it is not considered to be a good product, like Fortinet, Palo Alto, or F5. Check Point Harmony Endpoint needs to consider that people should feel that Check Point doesn't compromise on quality even though the price at which Harmony Endpoint is offered is good. People who claim that Check Point Harmony Endpoint is a cheap product don't necessarily mean that it is not a good solution. Fortinet is a very expensive product that offers good value to its customers. If Check Point can work on the value proposition it offers to customers and make them understand that even though the solution is affordable, it is not a bad solution compared to its competitors, then it would be fantastic. The potential customers can opt for Check Point products, considering that they are offered good products at the cheapest price in its categories. It is important for Check Point to ensure that people don't have a wrong perception about the products it has launched in the market.

I don't think there are any features I would like to include, and the tool offers updates when compared with the products from competitors, which I think is a good way to do it. The only challenge is that for many organizations where there is an MDM solution in the environment and an endpoint security tool, my company needs to educate such organizations to convey the message that endpoint and MDM solutions are different products for different purposes, so they are not the same. If Check Point Harmony Endpoint can incorporate MDM into the solution, it can be a fantastic enhancement. Customers need not buy endpoint and MDM solutions if both are made available together in Check Point Harmony Endpoint. My company will have to put extra effort into educating the customers and making them understand the two different solutions. MDM is used to manage your mobile devices, and Check Point Harmony Endpoint is the security for your endpoints.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for over three years.

What do I think about the stability of the solution?

It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution.

What do I think about the scalability of the solution?

It is a very scalable solution.

How are customer service and support?

My company had to contact Check Point's technical team for the installations that my company carried out when we had to deal with around 40 devices that had firewalls from Check Point, which had reached the end of life. For Check Point Harmony Endpoint, my company never had any reason to contact Check Point's technical team.

Which solution did I use previously and why did I switch?

Starting with the pros, I would say that Check Point Harmony Endpoint provides value for money. After purchasing Check Point Harmony Endpoint, you need to consider the fact that the cost you pay for the solution and the value you derive from the product is very proportional. When it comes to Check Point Harmony Endpoint, I can say that a user does not pay high prices for a poor solution. A user pays a decent fee for a very good product. I think the first pro is that the value you get from the solution is made available at a very competitive price. The product is seamless and easy to use. With the centralized portal, a user can manage all Check Point products, including Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, from a single point, which is also a fantastic pro for Check Point. Regarding the cons of the solution, I would say that it stems from people's perception of the solution since they feel that an affordable product may not be good enough. There is a need to work around people's wrong perception of Check Point products. Still, I don't know if such a negative perception is something that is widespread across the globe or whether it is exclusive to Nigeria or the markets in Africa. Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors.

How was the initial setup?

The product's initial setup phase was straightforward. The product's deployment was done in minutes, so it didn't take long, as there was no need to do any special configurations. There was no need for the people involved in the deployment to have any special skills. The deployment process was seamless and straightforward. The product's deployment was never an issue. The IT department need not worry too much about whether they need to learn new skills to manage the product as it is easy to use and deploy and a product that can be used seamlessly. The product's deployment takes around 30 to 40 minutes.

I work with the solution's SaaS version.

What other advice do I have?

I don't think Check Point Harmony Endpoint is difficult to maintain. I think there is a possibility of scheduling your updates in Check Point Harmony Endpoint, even if you want it to happen outside your working hours, like somewhere between eight o'clock in the evening and midnight. I don't think maintenance is stressful because it can be scheduled outside of working hours.

I would recommend others to use the product since the deployment process is seamless, so you don't need any specialized skills to use the portal provided by Check Point to monitor your devices. There are no specialized skills required to support or maintain the solution. It is also very easy to implement the product. You can keep a tab using the centralized portal offered by the product. In general, the product makes the life of the IT department easier since you need not worry about a lot of the technical stuff related to the solution.

From my point of view, I need to put in extra effort to convince my company's customers to use the solution. In terms of the features and the product's ability to deliver the promised value to its customers, especially when compared to other solutions in the market, I rate the overall product an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
Sitti Ridzma Salahuddin - PeerSpot reviewer
System Engineer at Trends and Technologies, Inc
Reseller
Top 5
Useful for prevention and detection, and supports Windows 7
Pros and Cons
  • "The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read."
  • "Check Point Harmony Endpoint's GUI is old. It needs to have a modern dashboard for logging activities. Compared to other products, the solution is slow in terms of deep scanning."

What is our primary use case?

We use the solution in hospitals. 

What is most valuable?

The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read. 

What needs improvement?

Check Point Harmony Endpoint's GUI is old. It needs to have a modern dashboard for logging activities. Compared to other products, the solution is slow in terms of deep scanning. 

For how long have I used the solution?

I have been working with the product for three months. 

What do I think about the stability of the solution?

I rate the solution's stability an eight-point five out of ten.

What do I think about the scalability of the solution?

The tool has many modules and is scalable. I rate it an eight-point five out of ten. 

How was the initial setup?

I rate the tool's deployment ease an eight out of ten. The process takes less than a day. In our case, however, it required at least three hours because we were doing a demo for Windows 7. We also needed to update the endpoint, which involved some installation requirements.

What's my experience with pricing, setup cost, and licensing?

I rate the solution's pricing a five out of ten. It costs around ₱2,200 per endpoint. 

What other advice do I have?

Our customers are mostly medium enterprises. You need to be patient with the scanning. The solution will help you with prevention and detection. I rate the overall product a nine out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Rahul Kamble. - PeerSpot reviewer
Business Director at One Networks
Reseller
Top 5
A comprehensive endpoint protection tool that is highly stable
Pros and Cons
  • "Stability-wise, I rate the solution a ten out of ten."
  • "Check Point offers solutions with only a few features for our company's customers' sites."

What is our primary use case?

My company tried Check Point Harmony Endpoint with multiple clients, but unfortunately, we could not get many clients to use the product. Currently, my company has limited clients, like ten to fifteen customers who use Check Point Harmony Endpoint.

What is most valuable?

The valuable features of Check Point Harmony Endpoint stem from the fact that it serves as a comprehensive endpoint protection product that provides users with a fast solution and complete endpoint protection while serving as a tool that offers the fastest recovery for endpoints. The tool efficiently detects, protects, and corrects vulnerabilities and patches.

What needs improvement?

Check Point offers solutions with only a few features for our company's customers' sites. My company hasn't found any bugs or didn't find the solution to be complex. Features like zero phishing, sandboxing, threat emulation and extractions, malware detection, and EDR solution capabilities need to be included in the product. My company expects more granular EDR functionalities in Check Point Harmony Endpoint.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for six months. My company has a partnership with Check Point Harmony Endpoint.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a nine out of ten.

Check Point Harmony Endpoint is a solution used by the company's clients who operate small and medium-sized businesses.

How are customer service and support?

I rate the technical support an eight and a half out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

I rate the product's initial setup phase a nine out of ten.

The solution is deployed on an on-premises model.

The solution can be deployed within two hours.

During the deployment process of Check Point Harmony Endpoint, my company needs to install the initial client and select an agent from the settings on Windows Server, after which we need to push the solution to the client. Installing the initial client isn't something that is very easy. With all the features like signature-based detection, threat emulations, and sandboxing, users may need to be involved in the creation of a signature group.

What's my experience with pricing, setup cost, and licensing?

Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years.

What other advice do I have?

Check Point Harmony Endpoint is a well-known solution among cybersecurity companies. With Check Point Harmony Endpoint, if my company gets good profit margins along with good opportunities, then we can penetrate into the market to sell it. My company expects support from Check Point, though we don't deal in many of its solutions.

I rate the overall tool a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: August 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.