No more typing reviews! Try our Samantha, our new voice AI agent.
Technical Specialist at Softcell Technologies Limited
Real User
Top 5Leaderboard
May 13, 2025
Endpoint protection greatly improves security measures and reduces successful attacks
Pros and Cons
  • "Since implementing Check Point Harmony Endpoint, I have noticed a positive impact on our organization as we receive multiple detections of attack activities in the log section, showing how the solution protects our network."
  • "In terms of improvement, the Endpoint Agent can be more lightweight so that older machines and laptops can easily handle its consumption, which would enhance the overall performance in our environment."

What is our primary use case?

The main use case for Check Point Harmony Endpoint in our organization is to use it with the Check Point NGX Firewall for a unified threat prevention strategy, with approximately around 2000 users and multiple endpoints across multiple branches, ensuring safety from advanced protection against malware, phishing, ransomware, and zero-day attacks. Our environment includes both Windows and macOS, with central management done via cloud hosted Infinity Portal to protect our endpoints.

How has it helped my organization?

Since implementing Check Point Harmony Endpoint, I have noticed a positive impact on our organization as we receive multiple detections of attack activities in the log section, showing how the solution protects our network. This allows users to stay focused on their work without disruption from attacks, ultimately saving time and enhancing productivity.

What is most valuable?

The best features of Check Point Harmony Endpoint that stand out are anti-ransomware and threat emulation, which are crucial for protecting and blocking unwanted malicious threats and ransomware before they can execute anything on the user's system, along with Zero Phishing Protection, real-time URL filtering, and an anti-phishing mechanism that has greatly reduced the number of successful phishing attacks on our users' systems.

Centralized management via Infinity Portal is user-friendly and allows central policy management, while the detailed telemetry of forensic insights helps the SOC team identify attack vectors and understand what executes on the system during malicious content attempts, making it overall effective in protecting endpoints in various aspects.

The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.

What needs improvement?

In terms of improvement, the Endpoint Agent can be more lightweight so that older machines and laptops can easily handle its consumption, which would enhance the overall performance in our environment.

Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
895,151 professionals have used our research since 2012.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for more than one and a half years.

What do I think about the stability of the solution?

In my experience, Check Point Harmony Endpoint is stable and works well.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint is easily scalable in accordance with the license type based on user or device-based metrics, allowing us to add more users or endpoints for protection as our organization grows without any issues.

How are customer service and support?

The customer support for Check Point Harmony Endpoint is quite good; they are ready to help us, although there can be delays in response sometimes.

Which solution did I use previously and why did I switch?

I have not previously used a different solution before Check Point Harmony Endpoint.

How was the initial setup?

The initial setup of Check Point Harmony Endpoint is straightforward and easy to implement; you just need a good understanding of how it works and how to implement it effectively.

What was our ROI?

I have seen a return on investment with Check Point Harmony Endpoint, as it has saved money and time due to the minimum disruption of production hours, which allows users to focus on their main tasks and desired targets, avoiding downtime and contributing to business growth.

Which other solutions did I evaluate?

Before choosing Check Point Harmony Endpoint, I evaluated other options such as Trellix, which is also good, but since we already have Check Point in our environment, it made sense to stick with an ecosystem that works well for us.

What other advice do I have?

I find that pricing is competitive compared to others, and if you already have Check Point in your environment, having invested in the Check Point ecosystem makes it easier to work with.

I recommend others looking into using Check Point Harmony Endpoint to conduct a POC to evaluate the product in their environment, test it on a few systems, and check if their use cases and expectations are met before making a decision.

On a scale of 1 to 10, I would rate the customer support a nine.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2701569 - PeerSpot reviewer
Enterprise Network Engineer at a outsourcing company with 201-500 employees
Real User
Top 5Leaderboard
Jul 31, 2025
Improved data protection and threat detection boosts user endpoint security
Pros and Cons
  • "Check Point Harmony Endpoint has positively impacted my organization primarily in the protection context as we no longer face issues where data is lost because someone put it on a USB drive or encounter situations where information leaks from users inside, effectively closing off one of the threat edges."

    What is our primary use case?

    Our main use case for Check Point Harmony Endpoint is for posture for the user endpoints. When I say posture for user endpoints, it includes both compliance and threat detection. Compliance ensures that before users connect to network resources, whether within the organization on the switches or outside via VPN, the endpoint client must verify whether the posture is acceptable, ensuring that antivirus is running in the background without threats, and making sure that the device is secure.

    How has it helped my organization?

    Check Point Harmony Endpoint has positively impacted my organization primarily in the protection context.

    It has helped significantly on the protection side, considering that we no longer face issues where data is lost because someone put it on a USB drive, whether they took the device home or elsewhere. We no longer encounter situations where information leaks from users inside, effectively closing off one of the threat edges.

    What is most valuable?

    The best features that Check Point Harmony Endpoint offers, unlike traditional endpoint solutions, focus specifically on detection and remediation even before the device has to go to the firewall. We manage it through the Infinity Portal, which helps us with the fatigue of logging into different windows.

    The automated detection, which is EDR, detects any threats potentially moving from the user endpoint onto the network and possibly to the data center. Another critical feature is data protection to prevent someone from easily extracting information from the user laptop by plugging in a stray hard drive or USB.

    The automated detection and EDR in Check Point Harmony Endpoint reduce administrative overhead. The agent comes with pre-installed settings to detect different threats on the endpoint. In most other solutions, you must start from scratch, which takes considerable time and troubleshooting. With Check Point Harmony Endpoint, you're basically fine-tuning because the templates are already running, and you just adjust them to fit your organizational preferences.

    What needs improvement?

    There are some pain points with automated rules in Check Point Harmony Endpoint. In the initial stages, you sometimes have to do fine-tuning because you get false positives, resulting in users being unable to connect. However, those issues are eventually fixed.

    The pricing is a bit expensive, making it harder to maintain the licenses, and the initial setup takes a learning curve since it needs to fit into the Check Point environment and integrate with other systems.

    For how long have I used the solution?

    I have been using Check Point Harmony Endpoint for three years.

    What do I think about the stability of the solution?

    Check Point Harmony Endpoint is stable.

    What do I think about the scalability of the solution?

    The scalability of Check Point Harmony Endpoint is satisfactory.

    How are customer service and support?

    I have interacted with Check Point Harmony Endpoint's customer support, and my experience was good.

    The customer support for Check Point Harmony Endpoint deserves a rating of 10.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    My experience with pricing, setup cost, and licensing was good, primarily because of the support provided.

    What was our ROI?

    I have seen a return on investment from using Check Point Harmony Endpoint in terms of fewer security incidents, and the previous issue of data leaking from user devices has completely disappeared.

    Which other solutions did I evaluate?

    I did not evaluate other options before choosing Check Point Harmony Endpoint.

    What other advice do I have?

    I would encourage others looking into using Check Point Harmony Endpoint to invest in it. Protecting an organization solely with a firewall is challenging, especially in a hybrid work environment where working via VPN has become common. Therefore, investing in Check Point Harmony Endpoint ensures that the threat landscape on the user side is fully covered and protected. On a scale of 1-10, I rate Check Point Harmony Endpoint a 10.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Check Point Harmony Endpoint
    May 2026
    Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
    895,151 professionals have used our research since 2012.
    Abnet Tsegaye Belay - PeerSpot reviewer
    Cybersecurity Engineer at a tech services company with 11-50 employees
    Real User
    Top 5Leaderboard
    Oct 23, 2025
    Check Point Antivirus
    Pros and Cons
    • "Checkpoint antivirus blade has improved our customers security postures by enhancing their malware detection, reduced risk of cyber attacks and also by stopping threats before they reach users by scanning files at the network gateway."
    • "Inspecting HTTPS traffic requires enabling HTTPS inspection and threat emulation, which can be resource intensive, resulting in performance impact on legitimate traffic also."

    What is our primary use case?

    Since we are resellers of checkpoint products, We deployed  checkpoint antivirus blade to our customers as a gatewaye-level malware prevention that will stop threats before they reach users by scanning files at the network level, and also most of our customers are on the banking industry. so these financial institutions need to block malware that could compromise transactions and customer information, thanks to checkpoint antivirus blade that is incorporated in checkpoint firewall blades, we just made it possible to our customers.

    How has it helped my organization?

    Checkpoint antivirus blade has improved our customers security postures by enhancing theirr malware detection, reduced risk of cyber attacks and also by stoping threats before they reach users by scanning files at the network gateway. Additionally checkpoint antivirus blade is keeping our customers from different known and unknown threats by its real-time security intelligence from checkpoint theartcloud.

    What is most valuable?

    it's gateway-level malware prevention. This feature is valuable for our customer because it stops threats before they reach users by scanning incoming files at the network gateway. And also it can work with alongside with Check Point Anti-Bot Software Blade for comprehensive security. Above aove all and the intersting one is like it can be manged centrally from single, user-friendly console. Addisionally it has low false positive rate, and effective threat mitigation. As a whole our customers are happy about this solution with these mention features.

    What needs improvement?

    By default the antivirus blade monitors SMTP and HTTP traffic, but inspecting HTTPS traffic requires enabling HTTPS inspection and threat emulation, which can be resource intensive. Because decrpting traffics can be resouce intensive, which results performance impact on legitmate traffics also. And also our customers have a some complain about it pricing because compared to other vendors antivirus solutions checkpoint is considered costly. Other than these the solution is a must to have in your envirinemnt.

    For how long have I used the solution?

    For almost more than 2 years, I worked on checkpoint products that resell and implement chech

    Which solution did I use previously and why did I switch?

    no 

    What about the implementation team?

    we deployed it by our in-house team

    Which other solutions did I evaluate?

    Yes Fortinet, Paloalto and other vendors

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
    Last updated: Oct 23, 2025
    Flag as inappropriate
    PeerSpot user
    Adjunct Professor, Cybersecurity at University of the People
    Real User
    Top 10
    Dec 30, 2024
    Offers protection against threats with data safeguarding and reliable AI-based prevention
    Pros and Cons
    • "It features strong AI-based threat prevention and security management, making it a solid choice for end users."
    • "Check Point Antivirus is valuable due to its autonomous threat prevention system, which is consistently up-to-date and highly reliable with excellent performance at scale."
    • "Check Point should improve on their patch management by releasing patches more frequently, such as on a weekly basis, to stay ahead of potential vulnerabilities."
    • "Check Point should improve on their patch management by releasing patches more frequently, such as on a weekly basis, to stay ahead of potential vulnerabilities."

    What is our primary use case?

    I use Check Point Antivirus primarily to protect against threats, risks, and attacks. It helps guard against phishing attacks, website attacks, and potential data breaches.

    How has it helped my organization?

    Check Point Antivirus has been very helpful in maintaining system security, protecting against attacks, and ensuring data and information are safeguarded against vulnerabilities.

    What is most valuable?

    Check Point Antivirus is valuable due to its autonomous threat prevention system, which is consistently up-to-date and highly reliable with excellent performance at scale. 

    It features strong AI-based threat prevention and security management, making it a solid choice for end users. The SmartConsole is automatically updated with the latest patches and fixes, ensuring ongoing protection against evolving threats.

    What needs improvement?

    Check Point should improve on their patch management by releasing patches more frequently, such as on a weekly basis, to stay ahead of potential vulnerabilities.

    For how long have I used the solution?

    I have been working with Check Point Antivirus for less than a year.

    What do I think about the stability of the solution?

    Check Point Antivirus is consistently stable with no outages reported.

    What do I think about the scalability of the solution?

    The solution is highly scalable, with proactive features that help guard against data breaches and vulnerabilities, ensuring comprehensive protection.

    How are customer service and support?

    Check Point offers excellent customer service and technical support. They responded promptly to an issue with annual renewal and resolved it quickly.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Previously, I used Panda, Microsoft Defender, Kaspersky, and Bitdefender. I switched to Check Point Antivirus based on positive online reviews.

    How was the initial setup?

    The initial setup for Check Point Antivirus was rated nine out of ten for ease. It was straightforward, as the solution is similar to plug-and-play IT solutions.

    What about the implementation team?

    For deployment, three people were required. However, for maintenance, only one person is necessary.

    What was our ROI?

    Check Point Antivirus provides robust protection against malware and viruses, preventing data loss and safeguarding important information.

    What's my experience with pricing, setup cost, and licensing?

    I pay ninety dollars annually for Check Point Antivirus, which is reasonably priced.

    Which other solutions did I evaluate?

    I evaluated alternatives by reviewing different antivirus products before choosing Check Point Antivirus.

    What other advice do I have?

    I would advise new users to give Check Point Antivirus a try, as it is a stable and reliable solution. It provides excellent threat prevention and cybersecurity features, ensuring confidentiality, integrity, and availability.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    PeerSpot user
    Manager, Information Technology Cyber At Edeltech O & M at Ezom
    Real User
    Top 5Leaderboard
    Feb 26, 2025
    Audit log limitations require attention while login tracking enhances security
    Pros and Cons
    • "I use Check Point Harmony Endpoint because it is an easy solution to implement and a good solution overall."
    • "One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days."

    What is our primary use case?

    I use Check Point Harmony Endpoint because it is an easy solution to implement and a good solution overall. It effectively does its work for me.

    What is most valuable?

    Harmony Endpoint has a geo policy that allows me to see where users log in from, enabling me to analyze if someone tries to access an account from another location. It offers a good false positive rate and provides protection across all platforms of 365.

    What needs improvement?

    One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days.

    For how long have I used the solution?

    With Harmony Endpoint, I have three years of experience. With Harmony Email and Collaboration, I have five years of experience.

    What was my experience with deployment of the solution?

    Deployment was easy and took less than a day, as it is a SaaS solution that partners with Check Point.

    What do I think about the stability of the solution?

    The stability of the tool is high, as I have not experienced any downtime.

    What do I think about the scalability of the solution?

    It possesses high scalability because it is a SaaS solution from the cloud, allowing expansion as needed.

    How are customer service and support?

    Although I have not contacted technical support recently, in the beginning, there were some issues that had to be addressed. Despite this, their support was helpful enough for me to give them a seven out of ten.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    Previously, my company used a Titan solution for email and collaboration. We switched to Check Point due to better pricing and additional protection on platforms like OneDrive, Teams, and all 365 platforms.

    How was the initial setup?

    The initial setup was straightforward and completed within a day, which I would rate as an eight out of ten.

    What about the implementation team?

    As a SaaS solution, it was implemented with Check Point's partner.

    What was our ROI?

    There has been a good return on investment. The product is affordable and provides excellent coverage and protection across multiple platforms.

    What's my experience with pricing, setup cost, and licensing?

    The price for Check Point Harmony Endpoint is good considering the services it offers. It is not expensive and provides comprehensive coverage.

    What other advice do I have?

    I recommend Check Point Harmony Endpoint to others if they need it. It depends on the infrastructure, yet it still provides good protection. Overall, I would rate the solution a five out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Alejandro Flores. - PeerSpot reviewer
    Director de Ingenieria at Smartelecom SA de CV
    MSP
    Oct 31, 2023
    Good visibility with cloud centralized management and several layers of security
    Pros and Cons
    • "Information is easily managed and protected (which is particularly useful in lost or stolen endpoints)."
    • "If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents."

    What is our primary use case?

    The main use of this product is endpoint security, it is very useful when you are trying to centralize endpoint security management and you want an easy and fast setup, I have used this product in POCs and different size deployments with different kinds of clients. Harmony offers several layers of protection and it fits well with all the Check Point "ecosystem", (It is especially useful when you are correlating security data because it can "talk" with Check Point's XDR Solution in order to get more insights).

    How has it helped my organization?

    There are several benefits that you can get with this solution:

    1) You get centralized management of endpoints in your organization and you can be very granular in order to create endpoint security policies for different user groups. This improves overall security and visibility for IT departments.

    2) Visibility also offers improvement with purchases and making decisions.

    3) Information is easily managed and protected (which is particularly useful in lost or stolen endpoints).

    4) It can be used with an XDR system (which is very useful with SOCs).

    What is most valuable?

    The most valuable aspects include:

    1) Cloud Centralized management. This is particularly useful since you don't have to use any on-premise server, the cloud dashboard is activated without a minimum license number.

    2) Several layers of security. It is well aligned with actual threats like ransomware and zero-day attacks and offers traditional layers of security.

    3) Visibility. You have a single dashboard for all endpoint information that you need from an IT administrative perspective and in a threat incident you are properly advised.

    What needs improvement?

    There are some "weak points" that have to be mentioned, including:

    1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents.

    2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions.

    3) You need a mature security team to manage this solution in order to get the most value from it.

    For how long have I used the solution?

    I've used this product since its release.

    What do I think about the stability of the solution?

    The solution is very stable in the correct context; with its cloud nature, it is unlikely to have any downtime.

    What do I think about the scalability of the solution?

    The solution is very scalable since the console is a cloud; you only have to buy more licenses in order to grow.

    How are customer service and support?

    TAC is very useful and its dashboard is very intuitive. You can get web, mail, and telephone support.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We used several solutions, such as Symantec, ESET, and Kaspersky.

    How was the initial setup?

    The initial setup is straightforward. It is very fast due to its cloud nature.

    What about the implementation team?

    We implemented the solution with the help of a vendor team; they have good documentation and are experts.

    What was our ROI?

    The ROI is very hard to measure. It is best to take a proactive posture of protecting your assets. 

    What's my experience with pricing, setup cost, and licensing?

    It is a very good security product yet it is not the cheapest one. Licensing is very easy to understand and it includes Check Point TAC support.

    Which other solutions did I evaluate?

    We evaluated various solutions, including Symantec, ESET, Trellix, and Kaspersky.

    What other advice do I have?

    It is a very mature solution and one of the most secure that exists in the security market share.

    Which deployment model are you using for this solution?

    Private Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Sabari Das - PeerSpot reviewer
    Technical Director at Geekz Information Technology
    Real User
    Top 5
    Nov 24, 2024
    Well-designed for security needs and has built-in features
    Pros and Cons
    • "Stability is good, and the product is well-designed for security needs."
    • "Endpoint protection is valuable. Stability is good, and the product is well-designed for security needs."
    • "Support needs improvement."
    • "Support needs improvement. Currently, support is primarily via email, which leads to longer response times."

    What is our primary use case?

    We work with Check Point Harmony Endpoint as partners, providing deployment services, particularly for small to medium enterprises (SMEs). We work with both small and large companies.

    What is most valuable?

    Endpoint protection is valuable. Stability is good, and the product is well-designed for security needs. It is scalable and offers multiple features, which justify its pricing for enterprise customers. Since security is a major concern, we do not worry about the pricing as the product has features built-in.

    What needs improvement?

    Support needs improvement. Currently, support is primarily via email, which leads to longer response times. Fine-tuning for applications and better support from Harmony would be helpful, especially once the environment is hardened. Better technical support would enhance the product's competitiveness.

    For how long have I used the solution?

    We have been working with Check Point Harmony Endpoint for almost five years.

    What do I think about the stability of the solution?

    Stability is fine, and the product performs well in terms of security. It is considered well and good.

    What do I think about the scalability of the solution?

    Check Point Harmony Endpoint is scalable, suitable for both small and large companies.

    How are customer service and support?

    Support service needs improvement. Only email support is available, leading to delays in getting assistance.

    How would you rate customer service and support?

    Negative

    How was the initial setup?

    Implementation is straightforward for smaller environments, however, requires significant fine-tuning for larger clients.

    What about the implementation team?

    We only handle deployment and do not deal with pricing, which is taken care of by another department.

    What's my experience with pricing, setup cost, and licensing?

    Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability. It is suitable for enterprises but can be challenging to position for small to medium customers.

    What other advice do I have?

    We recommend Check Point Harmony Endpoint; however, support needs enhancement. With improved support, it could outperform competitors. Rating based on the alone featureset is nine out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    PeerSpot user
    IT Manager at Bolger Brothers Inc.
    Real User
    Top 20
    Jun 6, 2024
    Manages to capture more spam with a smaller footprint
    Pros and Cons
    • "This comprehensive approach can safeguard your organization from a wider range of threats, including ransomware, malware, phishing attacks, and zero-day exploits."
    • "I would like to see a better UI for admin functions."

    What is our primary use case?

    We use Check Point to manage email security in our O365 environment.  Our previous solution was unable to remove all of the email spam we had. Check Point integrates with Office 365 to provide advanced threat protection for email. It uses techniques like anti-virus, URL filtering, and threat emulation to stop known and unknown threats. It also offers goes beyond email security. It protects all aspects of Office 365 collaboration tools like SharePoint, OneDrive, and Teams. It can prevent data loss, enforce policy compliance, and block phishing attacks.

    How has it helped my organization?

    It manages to capture more spam with a smaller footprint. It has a single agent and management console to streamline security administration. This can save IT staff time and resources compared to managing multiple security products. The endpoint combines Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR) capabilities. 

    This comprehensive approach can safeguard your organization from a wider range of threats, including ransomware, malware, phishing attacks, and zero-day exploits.

    What is most valuable?

    Ease of setup and ability to hook into O365 directly without MX record changes. Check Point offers advanced threat prevention capabilities, including SandBlast Network Threat Emulation and Threat Extraction. These features can identify and stop even unknown threats by simulating real-world attacks in a safe environment. Check Point solutions are designed to scale to meet the needs of large organizations. They can handle high volumes of traffic without compromising performance. Check Point integrates with a wide range of third-party security solutions. This allows you to create a comprehensive security ecosystem that meets your specific needs.

    What needs improvement?

    I would like to see a better UI for admin functions. While CheckPoint offers threat prevention through SandBlast, some users feel even deeper integration of Machine Learning (ML) could enhance threat detection and improve automation. This could involve automating security responses and offering threat prediction capabilities. As organizations increasingly move to the cloud, Check Point could further strengthen its cloud-native security offerings. This might involve expanding support for various cloud platforms and offering more granular security controls within those environments.

    For how long have I used the solution?

    I have used Check Point Harmony Endpoint for six months.

    What do I think about the stability of the solution?

    We haven't had issues or outages so far. 

    What do I think about the scalability of the solution?

    It seems to be able to scale to any size company. 

    How are customer service and support?

    Their support has been very positive. It's easy to use. 

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Sophos was our previous vendor, we found their coverage lacking.

    How was the initial setup?

    The setup was straightforward, it's hands-on config. 

    What about the implementation team?

    CDW was our MSP. 

    What was our ROI?

    We expect to see ROI in 12-16 months. 

    What's my experience with pricing, setup cost, and licensing?

    My advice would be to state terms upfront and always ask to haggle down.

    Which other solutions did I evaluate?

    We looked at Fortinet, Palo Alto, Crowdstrike, etc. 

    What other advice do I have?

    Make sure to review your solutions every couple years as technology changes. 

    Which deployment model are you using for this solution?

    Private Cloud
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
    Updated: May 2026
    Buyer's Guide
    Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.