Try our new research platform with insights from 80,000+ expert users
Business Development Manager at a outsourcing company with 11-50 employees
Real User
Top 5
Oct 30, 2025
Has improved end-user security and provided centralized control over device access
Pros and Cons
  • "Check Point Harmony Endpoint provides greater security as it is impacting positively and has reduced incidents and saved many malicious threats since implementation."
  • "The agent's size is very heavy, so it could be reduced to a lighter version for Check Point Harmony Endpoint."

What is our primary use case?

Check Point Harmony Endpoint is used to manage endpoint user devices, which includes laptops, desktops, and mobile devices, to control their access and secure the end-user devices.

Check Point Harmony Endpoint provides a central management console from where security policies are applied and enforced to end-user devices as the Harmony Endpoint agent is installed on the user device. Whenever any policy like USB block or any particular category are blocked, users cannot access those resources through the internet, and all security features are enforced from Check Point Harmony Endpoint.

Multiple users are not allowed to reach particular websites or applications with Check Point Harmony Endpoint, so policies are enforced so that they cannot run particular category applications or particular URL categories, or anything from the internet. All of this is controlled from Check Point Harmony Endpoint, and proper visibility is obtained of which user accessed what and at what time, with all logging received from centralized management.

What is most valuable?

Check Point Harmony Endpoint's antivirus, anti-malware capabilities, and device control and visibility collectively provide great control and great security to the organization's compliance.

Check Point Harmony Endpoint provides greater security as it is impacting positively and has reduced incidents and saved many malicious threats since implementation.

Fewer incidents are occurring and time is being saved by using Check Point Harmony Endpoint.

What needs improvement?

The agent's size is very heavy, so it could be reduced to a lighter version for Check Point Harmony Endpoint.

For how long have I used the solution?

The reviewer has been working in the current field for more than six years.

Check Point Harmony Endpoint has been used for almost three years.

Buyer's Guide
Check Point Harmony Endpoint
January 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
880,844 professionals have used our research since 2012.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is stable.

What do I think about the scalability of the solution?

Scalability-wise, Check Point Harmony Endpoint is outstanding. As of now, scalability issues are not being faced, but if major growth happens, additional licenses would need to be purchased from Check Point.

How are customer service and support?

Check Point support is supportive and capable of troubleshooting conflicts and issues with Check Point Harmony Endpoint.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Check Point Harmony Endpoint is the only solution being used. CrowdStrike Endpoint Security was evaluated before choosing Check Point Harmony Endpoint.

How was the initial setup?

The reviewer was not part of the team that handled the setup process, pricing, or the licensing part for Check Point Harmony Endpoint.

What about the implementation team?

The organization is a partner with Check Point.

What other advice do I have?

Check Point Harmony Endpoint receives an overall rating of nine out of ten. Everything looks perfect with Check Point Harmony Endpoint, providing great security and visibility, but since the solution has space to improve, a rating of nine out of ten is given. Customer support for Check Point Harmony Endpoint also receives a rating of nine out of ten. The recommendation to others looking into using Check Point Harmony Endpoint for securing their employees' end-user devices is to consider Check Point Harmony Endpoint as one of the best security solutions available to protect security.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 30, 2025
Flag as inappropriate
PeerSpot user
Adjunct Professor, Cybersecurity at a university with 1-10 employees
Real User
Top 5
Dec 30, 2024
Offers protection against threats with data safeguarding and reliable AI-based prevention
Pros and Cons
  • "It features strong AI-based threat prevention and security management, making it a solid choice for end users."
  • "Check Point Antivirus is valuable due to its autonomous threat prevention system, which is consistently up-to-date and highly reliable with excellent performance at scale."
  • "Check Point should improve on their patch management by releasing patches more frequently, such as on a weekly basis, to stay ahead of potential vulnerabilities."
  • "Check Point should improve on their patch management by releasing patches more frequently, such as on a weekly basis, to stay ahead of potential vulnerabilities."

What is our primary use case?

I use Check Point Antivirus primarily to protect against threats, risks, and attacks. It helps guard against phishing attacks, website attacks, and potential data breaches.

How has it helped my organization?

Check Point Antivirus has been very helpful in maintaining system security, protecting against attacks, and ensuring data and information are safeguarded against vulnerabilities.

What is most valuable?

Check Point Antivirus is valuable due to its autonomous threat prevention system, which is consistently up-to-date and highly reliable with excellent performance at scale. 

It features strong AI-based threat prevention and security management, making it a solid choice for end users. The SmartConsole is automatically updated with the latest patches and fixes, ensuring ongoing protection against evolving threats.

What needs improvement?

Check Point should improve on their patch management by releasing patches more frequently, such as on a weekly basis, to stay ahead of potential vulnerabilities.

For how long have I used the solution?

I have been working with Check Point Antivirus for less than a year.

What do I think about the stability of the solution?

Check Point Antivirus is consistently stable with no outages reported.

What do I think about the scalability of the solution?

The solution is highly scalable, with proactive features that help guard against data breaches and vulnerabilities, ensuring comprehensive protection.

How are customer service and support?

Check Point offers excellent customer service and technical support. They responded promptly to an issue with annual renewal and resolved it quickly.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, I used Panda, Microsoft Defender, Kaspersky, and Bitdefender. I switched to Check Point Antivirus based on positive online reviews.

How was the initial setup?

The initial setup for Check Point Antivirus was rated nine out of ten for ease. It was straightforward, as the solution is similar to plug-and-play IT solutions.

What about the implementation team?

For deployment, three people were required. However, for maintenance, only one person is necessary.

What was our ROI?

Check Point Antivirus provides robust protection against malware and viruses, preventing data loss and safeguarding important information.

What's my experience with pricing, setup cost, and licensing?

I pay ninety dollars annually for Check Point Antivirus, which is reasonably priced.

Which other solutions did I evaluate?

I evaluated alternatives by reviewing different antivirus products before choosing Check Point Antivirus.

What other advice do I have?

I would advise new users to give Check Point Antivirus a try, as it is a stable and reliable solution. It provides excellent threat prevention and cybersecurity features, ensuring confidentiality, integrity, and availability.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
January 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
880,844 professionals have used our research since 2012.
Jitendra_Sharma - PeerSpot reviewer
Network Security Engineer at a tech services company with 51-200 employees
Real User
Top 5
Jun 15, 2025
Security measures protect systems and save time
Pros and Cons
  • "Check Point Antivirus has positively impacted our organization by protecting our systems and computers, saving time, costs, and preventing data loss."
  • "The pricing for Check Point Antivirus is a bit higher compared to other vendors or standalone antivirus options, and my request to the company is to consider reducing the licensing costs."

What is our primary use case?

My main use case for Check Point Antivirus is to use it as an antivirus to protect our computers and systems.

We are focused on preventing malware and trojans with Check Point Antivirus, which helps us protect from viruses and other malicious attacks, although I do not have a specific situation to share.

What is most valuable?

Check Point Antivirus offers comprehensive security features, including real-time scanning based on signature-based detections, behavioral analysis, an anti-malware engine, machine learning, and sandboxing, which collectively protect our systems and computers effectively.

I find the most valuable features of Check Point Antivirus to be behavioral analysis and real-time scanning, as they collectively work to protect our systems.

Check Point Antivirus has positively impacted our organization by protecting our systems and computers, saving time, costs, and preventing data loss.

What needs improvement?

While I do not have any specific feature-related suggestions for improvement, I think reducing costs and providing as much technical information as possible would help users feel more comfortable installing and configuring the product.

Improvements could involve enhancing support documentation to make the installation and configuration processes easier for users.

For how long have I used the solution?

I have been using Check Point Antivirus for a few months since we started using this antivirus.

What was my experience with deployment of the solution?

Deploying Check Point Antivirus in our environment is not so hard. I logged into the management portal, downloaded the client provided by the antivirus, installed it on a few systems manually, and saw all systems on the management control panel.

My experience with the configuration process is quite easy; I did not encounter any significant challenges.

What do I think about the stability of the solution?

As of now, Check Point Antivirus is stable; I have not experienced any crashes or downtime.

What do I think about the scalability of the solution?

We have purchased a limited number of licenses, but Check Point Antivirus can handle growth if our organization expands or adds more devices.

How are customer service and support?

Customer support for Check Point Antivirus is really good; we haven't needed to contact them for technical support, but I found them helpful for licensing issues.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is my first time using Check Point Antivirus.

How was the initial setup?

The initial setup with Check Point Antivirus was easy and straightforward.

What's my experience with pricing, setup cost, and licensing?

The pricing for Check Point Antivirus is a bit higher compared to other vendors or standalone antivirus options, and my request to the company is to consider reducing the licensing costs.

Which other solutions did I evaluate?

We did evaluate other options, specifically Sophos Endpoint Security, before ultimately deciding to choose Check Point Antivirus.

What other advice do I have?

Check Point Antivirus is deployed on-premises in our organization, but we manage it from the cloud using a central platform to oversee all systems.

I work for an IT SI company that deals with various tech products, including servers like Netapp and Nutanix, and firewalls such as Check Point, FortiGate, Sophos, and Cisco, along with using Check Point Antivirus and Sophos Endpoint Security.

I request not to receive calls from representatives; I prefer communication via email.

Check Point Antivirus is a comprehensive antivirus that covers all aspects, including real-time scanning, signature-based detection, behavioral analysis, machine learning, and sandboxing integrations.

I rate Check Point Antivirus a 10 out of 10 because it is a comprehensive antivirus that covers all aspects of security.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Jun 15, 2025
Flag as inappropriate
PeerSpot user
PeerSpot user
Manager, Information Technology Cyber At Edeltech O & M at a retailer with 51-200 employees
Real User
Top 5Leaderboard
Feb 26, 2025
Audit log limitations require attention while login tracking enhances security
Pros and Cons
  • "I use Check Point Harmony Endpoint because it is an easy solution to implement and a good solution overall."
  • "One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days."

What is our primary use case?

I use Check Point Harmony Endpoint because it is an easy solution to implement and a good solution overall. It effectively does its work for me.

What is most valuable?

Harmony Endpoint has a geo policy that allows me to see where users log in from, enabling me to analyze if someone tries to access an account from another location. It offers a good false positive rate and provides protection across all platforms of 365.

What needs improvement?

One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days.

For how long have I used the solution?

With Harmony Endpoint, I have three years of experience. With Harmony Email and Collaboration, I have five years of experience.

What was my experience with deployment of the solution?

Deployment was easy and took less than a day, as it is a SaaS solution that partners with Check Point.

What do I think about the stability of the solution?

The stability of the tool is high, as I have not experienced any downtime.

What do I think about the scalability of the solution?

It possesses high scalability because it is a SaaS solution from the cloud, allowing expansion as needed.

How are customer service and support?

Although I have not contacted technical support recently, in the beginning, there were some issues that had to be addressed. Despite this, their support was helpful enough for me to give them a seven out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Previously, my company used a Titan solution for email and collaboration. We switched to Check Point due to better pricing and additional protection on platforms like OneDrive, Teams, and all 365 platforms.

How was the initial setup?

The initial setup was straightforward and completed within a day, which I would rate as an eight out of ten.

What about the implementation team?

As a SaaS solution, it was implemented with Check Point's partner.

What was our ROI?

There has been a good return on investment. The product is affordable and provides excellent coverage and protection across multiple platforms.

What's my experience with pricing, setup cost, and licensing?

The price for Check Point Harmony Endpoint is good considering the services it offers. It is not expensive and provides comprehensive coverage.

What other advice do I have?

I recommend Check Point Harmony Endpoint to others if they need it. It depends on the infrastructure, yet it still provides good protection. Overall, I would rate the solution a five out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
SiddhanthSomkuwar - PeerSpot reviewer
Penetration Tester at a outsourcing company with 11-50 employees
Real User
Top 5
Oct 29, 2025
Has improved device security and reduced administrator time through centralized control
Pros and Cons
  • "The best features Check Point Harmony Endpoint offers include outstanding visibility and user's control over the endpoint devices."
  • "Check Point Harmony Endpoint can be improved because sometimes the agent feels heavy, causing slowness in our PC, so that can be improved."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is managing the endpoint devices whether it is like a desktop or. A quick specific example of using Check Point Harmony Endpoint is that any user can connect a USB to their endpoint devices and can access any files or share any files through other users, and now we have defined the policy so they are protected from any malicious threats, and we are getting centralized visibility.

What is most valuable?

The best features Check Point Harmony Endpoint offers include outstanding visibility and user's control over the endpoint devices. The visibility and control features of Check Point Harmony Endpoint help my organization by allowing us to push a centralized policy through a central management console, and we are getting full visibility from the individual device's health and security relations, so all this information we are getting in a centralized console.

What needs improvement?

Check Point Harmony Endpoint can be improved because sometimes the agent feels heavy, causing slowness in our PC, so that can be improved.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for more than three years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is stable.

What do I think about the scalability of the solution?

The scalability of Check Point Harmony Endpoint is excellent.

How are customer service and support?

The customer support for Check Point Harmony Endpoint is excellent.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We are using the same solution and did not previously use a different one before Check Point Harmony Endpoint.

What was our ROI?

I can say I have seen a return on investment with Check Point Harmony Endpoint in terms of money saved.

What other advice do I have?

Check Point Harmony Endpoint has positively impacted my organization because previously, we were not getting alerted due to malicious files or threats. The positive outcomes I've seen from Check Point Harmony Endpoint include improved overall condition of security and saving our time. Specifically, I have noticed our administrator's time is spending less time on managing the endpoint devices. I would rate Check Point Harmony Endpoint nine out of ten. I gave it a nine because of the heavy endpoint agent. For anyone looking for a solution in endpoint security, they can consider Check Point Harmony Endpoint as an excellent security solution currently present in our security room.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 29, 2025
Flag as inappropriate
PeerSpot user
IT Support at a security firm with 51-200 employees
Real User
Top 5
Nov 10, 2025
Real-time prevention and remote remediation have reduced incidents and increased response speed
Pros and Cons
  • "Since deploying Check Point Harmony Endpoint, I have seen a clear reduction in security incidents, such as phishing and malware infections."
  • "One area that could be improved about Check Point Harmony Endpoint is the user interface for policy management. It is functional, but not very intuitive, especially when trying to set granular rules or exceptions."

What is our primary use case?

I mainly use Check Point Harmony Endpoint to protect our user devices, laptops, and desktops from malware, phishing, and ransomware. It serves as our front line defense for remote workers and every employee. For example, when the sales department needs to connect at different sites, I need to protect these devices, especially when they access sensitive data outside the corporate network.

How has it helped my organization?

Since deploying Check Point Harmony Endpoint, I have seen a clear reduction in security incidents, such as phishing and malware infections. The real-time prevention and behavioral analysis have helped us catch threats early, often before users even notice anything suspicious.

I have noticed both a reduction in the number of incidents and a decrease in response times since using Check Point Harmony Endpoint.

What is most valuable?

One thing I have found especially useful about Check Point Harmony Endpoint is its remote remediation capability. If a device is compromised or flagged for suspicious behavior, we can isolate it from the network instantly, even if the user is working from home. That kind of control used to be impossible without physical access.

The best feature Check Point Harmony Endpoint offers is the real-time threat prevention. What I appreciate most about the real-time threat prevention in Check Point Harmony Endpoint is the speed.

One feature that stands out in Check Point Harmony Endpoint is the anti-ransomware capability. Check Point Harmony Endpoint does not just block ransomware; it also creates automatic file backups before encryption attempts. Recovery is much easier and less painful if something slips through.

What needs improvement?

One area that could be improved about Check Point Harmony Endpoint is the user interface for policy management. It is functional, but not very intuitive, especially when trying to set granular rules or exceptions. A more streamlined user interface would help reduce setup time and errors.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for four or five years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is very stable in my experience.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint has perfect scalability.

How are customer service and support?

The customer support for Check Point Harmony Endpoint is great.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup process for Check Point Harmony Endpoint is very easy for the company when I need to deploy it.

What was our ROI?

I have seen a return on investment from using Check Point Harmony Endpoint, particularly in terms of the time saved in the support department.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Check Point Harmony Endpoint is great.

What other advice do I have?

Check Point Harmony Endpoint is a great opportunity for securing your devices within and outside the company. My overall rating for Check Point Harmony Endpoint is nine because it delivers strong, reliable protection without disrupting user productivity, along with real-time threat prevention, remote remediation, and a lightweight agent.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 10, 2025
Flag as inappropriate
PeerSpot user
reviewer2751291 - PeerSpot reviewer
Operations Engineer at a media company with 51-200 employees
Real User
Top 5
Sep 4, 2025
Solid Protection Against Diverse Threats Reduces Incidents
Pros and Cons
  • "Check Point Harmony Endpoint has positively impacted our organization by helping to reduce incidents by catching threats early before users even noticed them, which saved us time and lowered risk across the board."
  • "Check Point Harmony Endpoint's setup is a little bit complex at first, and the console can feel overwhelming until you get used to it."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is that it gives us solid protection against malware, phishing, and ransomware, and I really appreciate the layered security approach and how it ties everything together in one cloud-based platform. It has been reliable for day-to-day use.

What is most valuable?

The best features that Check Point Harmony Endpoint offers help us to reduce incidents by catching threats early, which is highly effective. It gives us a wide view regarding the assets that we have and how exposed they are.

Check Point Harmony Endpoint has positively impacted our organization by helping to reduce incidents by catching threats early before users even noticed them, which saved us time and lowered risk across the board.

What needs improvement?

Check Point Harmony Endpoint's setup is a little bit complex at first, and the console can feel overwhelming until you get used to it. It can be heavy on the system resources, especially on older machines.

Principally regarding the system performance, Check Point Harmony Endpoint impacts us significantly, and addressing this issue would make a substantial difference.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for almost three years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is stable and we can improve our scalability significantly with it.

How are customer service and support?

My experience with customer support for Check Point Harmony Endpoint was excellent. I have opened several cases and they were handled very efficiently and quickly. I would rate it as exceptional.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I previously used ESET before Check Point Harmony Endpoint, but we decided to switch to Check Point Harmony Endpoint.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Check Point Harmony Endpoint was positive. The price was good, the setup cost was reasonable, and the licensing was appropriate.

The pricing and setup cost felt reasonable compared with other solutions, and the price-performance ratio fit well with our company.

What other advice do I have?

My advice for others looking into using Check Point Harmony Endpoint is that it is good software that effectively protects your company from malware, ransomware, and phishing. It excels in these areas, and you would feel secure using it in your company.

I rate Check Point Harmony Endpoint a nine out of ten because it needs improvement regarding system resource usage.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner, Reseller
Last updated: Sep 4, 2025
Flag as inappropriate
PeerSpot user
Cloud Support at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Oct 27, 2025
Has improved threat detection and incident response with automated remediation and detailed endpoint visibility
Pros and Cons
  • "An incredibly helpful feature we use day-to-day is the automated remediation and rollback capability in Check Point Harmony Endpoint, as if a file is flagged as malicious or if ransomware activity is detected, the system can automatically isolate an endpoint and rollback changes to restore it to a safe state, and that's saved us from having to manually clean up or re-image devices after an incident."
  • "One way Check Point Harmony Endpoint can be improved is through extended audit log retention, as one commonly cited limitation is the short retention period for audit logs, currently capped at around 14 days in some configurations, and extending that window would help security teams conduct deeper forensic investigations and meet compliance requirements more easily."

What is our primary use case?

Our main use case for Check Point Harmony Endpoint is to protect the employees' devices, especially laptops or mobile endpoints, from malware, phishing, or ransomware, and we use it to block malicious downloads or suspicious websites, monitoring endpoint activity for signals of compromise or unusual behavior, and enforce the prevention policies.

In the past, I used Check Point Harmony Endpoint when one employee opened a malicious URL and experienced a problem with their computer, which required escalating the case with support.

I use Check Point Harmony Endpoint for monitoring suspicious activities in different devices.

What is most valuable?

The best features Check Point Harmony Endpoint offers include advanced threat prevention, as it combines endpoint protection platform, endpoint detection and response (EDR), and extended detection and response (XDR) in a single agent.

The endpoint detection and response (EDR) and extended detection and response (XDR) capability in Check Point Harmony Endpoint have made a meaningful difference for our team, as with EDR, we get detailed visibility into endpoint activity, such as process behavior, file access, and network connections, which has helped us quickly identify suspicious patterns, such as lateral movements or privilege escalation, and respond before damage occurs.

An incredibly helpful feature we use day-to-day is the automated remediation and rollback capability in Check Point Harmony Endpoint, as if a file is flagged as malicious or if ransomware activity is detected, the system can automatically isolate an endpoint and rollback changes to restore it to a safe state, and that's saved us from having to manually clean up or re-image devices after an incident.

With integrated EDR and XDR capabilities, Check Point Harmony Endpoint allows our security team to investigate and respond to threats much faster, as we've gone from hours of manual log review to minutes with automated alerts and contextual insights.

What needs improvement?

One way Check Point Harmony Endpoint can be improved is through extended audit log retention, as one commonly cited limitation is the short retention period for audit logs, currently capped at around 14 days in some configurations, and extending that window would help security teams conduct deeper forensic investigations and meet compliance requirements more easily.

What other advice do I have?

Check Point Harmony Endpoint's documentation is not intuitive.

Check Point Harmony Endpoint is a great agent for security in different devices, and that's the advice I would give to others looking into using it.

Check Point Harmony Endpoint has saved us over 70% time.

I rate Check Point Harmony Endpoint 8 out of 10.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 27, 2025
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.