We had the need for every employee to be protected inside and outside of the organization and mainly the sales areas, which often are exposed yet constantly have the greatest mobility within our organization. There were uncertainties and needs for security. We have been testing solutions that will allow us to complete this requirement. We opted for and used the Check Point Harmony Endpoint, which gave us easy administration and management of the equipment, ensuring safety in the best possible way.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Secures equipment, integrates with the cloud, and offers real-time filtering
Pros and Cons
- "It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks."
- "For the future, I would like to see maybe a content-filtering emulation feature in Harmony Endpoint."
What is our primary use case?
How has it helped my organization?
Check Point Harmony Endpoint gives our organization and us a solution that we could manage while complying with internal and external policies and regulations. It's been a great ally in the security and internal strategies of our organization. After testing and using it, we have realized that its capacity is not only to secure the devices. It also gives added value in its way of managing and allows us to have control over inventory and management of the equipment that we have.
What is most valuable?
The best feature is that it can secure the equipment. It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks. It has detection management with all types of computing power used in the equipment and outside of it in the cloud to which it is connected. This comes to give us a complete solution.
What needs improvement?
For the future, I would like to see maybe a content-filtering emulation feature in Harmony Endpoint. It would already be cataloged in the app. It would help filter other types of characteristics that we have in our equipment, and allow us to see the ones that are also very vulnerable. We'd like to have everything integrated into a single solution that communicates with the cloud.
Buyer's Guide
Check Point Harmony Endpoint
June 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for a full year.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Soporte técnico superior at Acobo
Minimally invasive, good for securing devices of remote users, and does not slow performance
Pros and Cons
- "It is minimally invasive. From a single installer, the equipment is protected and secured."
- "This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market."
What is our primary use case?
We were having several difficulties when we were presented with the design that we had to implement for the teams and personnel that had to work outside of the organization due to the pandemic.
As a result of all this and all these uncertainties, the need to secure the equipment was the reason we adopted the Harmony endpoint solution. It came to protect us inside and outside the institution. The equipment itself does not need to be connected and secured by the perimeter area of our organization.
How has it helped my organization?
We have adopted this solution in a quick, simple way. It integrated well based on these three characteristics:
1. It is minimally invasive. From a single installer, the equipment is protected and secured.
2. The solution is really not burdened with the need for computing power for the local management of the device, which will prevent the teams from slowing down.
3. It is integrated with a cloud administration which makes it easy, fast, and simple to manage each of your policies for the security of the equipment.
What is most valuable?
Its most outstanding feature is the power to manage everything from a dashboard, a window that is in the cloud, which allows us to manage it from anywhere in the world through any browser, from anywhere. This is a feature that came to give administrators the possibility to work from home. Today many of us are remote workers who are not at the company, on-site. We are not in a single site, and yet we manage well and have the capacity and the assurance of managing everything easily, quickly, and simply.
What needs improvement?
This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market.
I would very much like to have the opportunity to see applications access at the web level and have applications from different brands and devices give simplicity to the management that we are going to need in the future.
For how long have I used the solution?
I've used the solution for about two years.
What do I think about the stability of the solution?
The solution is really stable. I have had the opportunity to try it on Mac and to try it on Windows. Its functionality, filtering, and execution have been really stable.
What do I think about the scalability of the solution?
It is a fairly scalable solution that is simple to use and quick to install on the devices of each user, that is, on their computers.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
June 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
IT Manager at First National Bank in Philip
Easy to install and deploy with great threat mitigation
Pros and Cons
- "Deploying new versions of the endpoint are easy."
- "The Infinity Portal login is "iffy" at times."
What is our primary use case?
Endpoints have always been a network's weak point, as they are the main interface users use daily. A good endpoint security product must be able to be flexible in both deployments and across multiple OS versions.
Check Point Harmony Endpoint does that for us. With multiple blades that add security to these weak points, I can be assured that threats are being mitigated in real-time. Also, Harmony Endpoint works seamlessly with Check Point's new MDR product, so logging, detecting, and responding couldn't be easier.
How has it helped my organization?
With the new Harmony interface, I don't have to worry about a local endpoint management server anymore, making my deployments and updating of endpoints so much easier across the board.
I haven't had issues with anti-malware updates anymore, and I can manage my endpoints from one Infinity Cloud portal.
Being short-staffed in my department, this solution has absorbed some of the daily tasks of monitoring endpoint products to ensure they are up and running. Also, reporting services/blades that aren't running lets me use my time more freely.
What is most valuable?
Deploying new versions of the endpoint are easy. It was a hassle before with a local management server, and now it's as easy as selecting the version you want from a drop-down menu.
The options for removing/adding blades with the click of a button from the portal are great. The built-in VPN blade makes it so easy to deploy on my endpoints if I need employee remote access to my LAN.
The installation is so easy with the simple MSI deployment packages, and I can watch the deployment process in real-time from the Cloud Portal.
What needs improvement?
The Infinity Portal login is "iffy" at times. I would like to restrict it to only US traffic, however, due to the hosting in the cloud, it sometimes retrieves data from the EU and across seas.
Also, if there was a way to simplify the SmartConsole login more, there could be an opportunity to take away some clicks to log in. Navigating back to the browser to log in through that portal site just makes for a more extended login transition. Just have the MFA capability right there on the local application and be done with it.
For how long have I used the solution?
I've been using Check Point's endpoint solution for five years, however, just recently moved to the Harmony interface this summer.
What do I think about the stability of the solution?
The stability makes it easy to move up or down.
What do I think about the scalability of the solution?
The scalability makes it easy to move up or down.
How are customer service and support?
Support could be improved. I'd give them a 7/10 before COVID, and maybe a 5/10 post-COVID. If you know who to ask for, it's more an 8/10.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We did not use a different solution previously.
How was the initial setup?
The setup is straightforward. Check Point assists the whole way, so it was very easy.
What about the implementation team?
I handled the deployment in-house, myself.
What was our ROI?
I'm not sure if we have seen an ROI.
What's my experience with pricing, setup cost, and licensing?
Our rep has been great to work with concerning quotes/licensing. The setup is relatively easy, being in the cloud. A new customer could be up and running on a new Harmony install within days.
Which other solutions did I evaluate?
CrowdStrike was the main one we evaluated against this product.
What other advice do I have?
It is a great product. Check Point could work on their Technical Assistance Center (TAC) to assist customers, however, they usually get the job done in the end.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Technology Security Consultant at Sify Technologies
Easy to set up and implement with good functionality
Pros and Cons
- "The product is stable."
- "Legacy VPNs and digital footprints should be minimized."
What is our primary use case?
The major use was to provide protection to the mobile workforce. It gives elaborated insight about what is happening, what kind of particular applications we have installed, and what particular application they are using, and protecting them from online phishing, and random virus attacks also.
What is most valuable?
The functionality is quite good. It can run well on mobile devices.
You can also create profiles for individual mobile devices.
It is easy to set up and implement.
The product is stable.
It's very scalable.
What needs improvement?
Mobile users are reluctant to actually use the solution.
Check Point should focus on providing more compliant solutions, such as compliant for cloud-specific solutions. The digital footprint can be minimized, and then the Legacy VPNs can also be streamlined. As of now, most of the connectivity partners use Legacy VPNs to connect to their DC or their service partners. Legacy VPNs and digital footprints should be minimized.
For how long have I used the solution?
I've been dealing with the solution for a couple of months at this point. My first project was last September and then I did another last December.
What do I think about the stability of the solution?
The product has been stable and reliable. There are no bugs or glitches and it doesn't crash or freeze.
They've been delivering solutions for 15 to 20 years and I can attest to, over the last ten years, never run into any issues in terms of stability.
What do I think about the scalability of the solution?
The solution is very scalable. If a company needs to expand, it can do so - especially if a company is using a cloud-based deployment.
So far, we have delivered two projects to clients.
How are customer service and support?
Technical support is good. We are satisfied with the level of support on offer.
Which solution did I use previously and why did I switch?
I've also worked with CrowdStrike, which I also like very much.
How was the initial setup?
The initial setup is straightforward. You simply need to deploy the agents onto mobile devices. The enrollment process would happen on the device.
It's very flexible in that it can be a hybrid. It supports on-premises and cloud devices.
In terms of the size of the team a company would need to deploy and maintain the solution, it all depends on the timelines that you have. A single guy, if everything is being managed, a single guy can deploy at least 50 to 100 Harmony Endpoint agents in a day. And if things are not going well, it may require more people.
What's my experience with pricing, setup cost, and licensing?
We have different products in our portfolio and they all have their own specific costs. They also vary according to size and parameters.
What other advice do I have?
The solution is automatically updated and therefore we're always using the most updated product.
I'd recommend the solution to others. They're one of the leading security solutions providers in the world.
I'd rate the solution eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Sales ManagerService Delivery at K_CORP
Great security and mobile device encryption and is easy to manage
Pros and Cons
- "It's easy to scale as needed."
- "We did have some early compatibility issues, which I hope Check Point has since resolved."
What is our primary use case?
From my point of view, the use cases involved strategy and business opportunities.
What is most valuable?
The solution is easy to use and easy to manage.
The security in regards to phishing, viruses, and so on, is very powerful.
For mobile devices, encryption is excellent.
From our point of view, Check Point is really easy to implement and really easy to manage. From the customer's point of view, the main reason was that the Check Point is the best brand, one of the best brands in our region. When they evaluate in comparison to competitors it comes out on top.
The solution is stable.
It's easy to scale as needed.
Check Point Harmony covers everything.
What needs improvement?
We did have some early compatibility issues, which I hope Check Point has since resolved.
As each project varies, anything that may be missing, in terms of features, would become obvious during a POC. Check Point has pretty much everything, however, it could be better in terms of working with Mac products. However, this is typical of other solutions and Apple.
For how long have I used the solution?
I started working with the solution approximately one year ago. We implemented it primarily for the endpoints.
A large company in our area opened the discussion about endpoint security. During the discussion, we looked at Check Point products as our company at this moment was a distributor for Check Point products.
What do I think about the stability of the solution?
The solution is very stable and reliable. There are no bugs or glitches and it doesn't crash or freeze. Its performance is good.
What do I think about the scalability of the solution?
Users can scale the product very easily. If you need more parts from the products added to the running environment, you can buy some more licensing. For the administrators, it is very easy to implement as scalability is one of the strongest parts of Check Point.
How are customer service and support?
Technical support is very good from the vendor. We find that to be very important.
How would you rate customer service and support?
Positive
How was the initial setup?
I can't speak to the details around deployment or implementation as I was in pre-sales.
What about the implementation team?
We are able to implement the solution for our client. While we have four people involved in pre-sales activity, we have another team that handles the implementation.
What was our ROI?
Users can observe an ROI. We worked with the client for a very short time and therefore had no time to calculate the ROI, however, it is my understanding it is there and quite good.
What's my experience with pricing, setup cost, and licensing?
We had special licensing for a rather sizable project. The project was prepared by Check Point directly and the client had a special negotiated rate.
What other advice do I have?
My previous company was a partner of Check Point. I no longer work there.
I was involved in pre-sales activities with the client who uses the product. We're a distributor of Check Point.
I'd rate the solution nine out of ten. We had some problems with implementations during proof of concept with a particular customer with a lot of Apple products, however, it is a small number of problems.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Engineer at Digitaltrack
Offers broader visibility in the environment
Pros and Cons
- "The insight and visibility of the detection is good."
- "The services of EDR consumption should be reduced and the support needs to be improved."
What is our primary use case?
My primary use case for Check Point Harmony EDR would be to get broader visibility in the environment. For instance, a pre-detection was done by Check Point Harmony when there was an attack happening. It pre-detected and remediated immediately before it got spread in the environment. The best part is the system was not in the office network but still got detected and remediated automatically.
What is most valuable?
The insight and visibility of the detection is good.
What needs improvement?
As such there is nothing I can think of additional features.
The services of EDR consumption should be reduced and the support needs to be improved.
For how long have I used the solution?
I have using Harmony for the past two years.
What do I think about the stability of the solution?
Stability is impressive.
What do I think about the scalability of the solution?
Scalability is good.
How are customer service and support?
Support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup was straightforward.
What about the implementation team?
The implementation happened in-house team.
What's my experience with pricing, setup cost, and licensing?
The licensing and costs are good.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
ICT Officer at Kenyatta National Hospital
Flexible, supports most of the operating systems, and provides good threat intelligence features
Pros and Cons
- "The solution has good threat intelligence features."
- "The network monitoring features must be improved."
What is our primary use case?
We use the product at the perimeter. Since we do not have a branch, only one area is protected by the solution. The networks we have are in a compact area.
What is most valuable?
I love the product’s flexibility. We can manage the blade without changing the protocols. It is easy to manage how the tool runs the network. The product is easy to deploy. It’s a good firewall. It supports most of our OS, such as Linux and Windows. We can use it even on mobile devices. The browser and data protection are good. The solution has good threat intelligence features.
What needs improvement?
The network monitoring features must be improved. If my ISP says that they gave me 300 Mbps, I would like to see where the network is used the most and where we are underutilizing it. I need features to monitor the bandwidth. I want features to monitor the upload and download speeds.
For how long have I used the solution?
I have been using the solution for the last three years.
How are customer service and support?
The technical support is good. I was working on some backups of a hospital management system to the cloud. Check Point provided us with very good support.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
The pricing is very high. The tool’s cost has increased by almost 300% in two years.
What other advice do I have?
I will recommend the tool to others. Overall, I rate the solution eight and a half out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Affordable, secure, and enables easy resetting of passwords with remote support
Pros and Cons
- "The remote support is good."
- "The heartbeat interval must be improved."
What is our primary use case?
The solution is used for port protection and media encryption.
What is most valuable?
Our customers are satisfied with the Harmony environment. The remote support is good. If the users forget their passwords, the remote support helps them reset the password. It is a good feature. We only need an internet connection for it.
What needs improvement?
The heartbeat interval must be improved. Sometimes, when we change the policy in the console, it does not reflect in the endpoint. Sometimes, we find it difficult to change the policy. The tool lags sometimes.
When we change the user password in the Infinity Portal, the password does not sync on time. There is a one-minute heartbeat interval from the server to the console. We have a graphical UI in threat hunting in which we can see the attacks. If audit logs have a similar graphical UI, it will be easier to analyze the logs.
For how long have I used the solution?
I have been using the solution for seven months.
What do I think about the stability of the solution?
I rate the tool’s stability an eight out of ten.
What do I think about the scalability of the solution?
The scalability and integrity are above average. I rate the scalability an eight or nine out of ten. We have deployed the product for 500 endpoints. We have deployed it on 300 to 400 endpoint machines in other places.
How are customer service and support?
Initially, we had some issues installing the agent on the endpoint machines. We didn't know the prerequisites of the endpoint machines. We had blue screen and red screen issues. It was new for us, and we were stuck. The support was very helpful. The team identified the issue and asked us to update Windows. We had to have the recommended version of Windows for deploying the agent. Now, we do not face any issues. If we face any problems, we easily recognize the issue. We are a bit autonomous.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial deployment was very challenging because I was new to the product. Later on, I got used to it. It was very easy. I ensured everything was according to the customers’ requirements. It took hardly two weeks to deploy.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable. It is very good for security. We are focused on security. If the security is strong, we do not mind the price. The customers blindly trust the product.
Which other solutions did I evaluate?
Our customers were using Trend Micro.
What other advice do I have?
We haven’t deployed the antivirus yet. We’re trying to implement AV on Windows. Currently, AV is deployed on a Linux machine. When I implemented it, I didn't have any idea about the product. I just went through some documents. People who want to use the solution must go through the documents and understand the concepts. Overall, I rate the product a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
Microsoft Defender XDR
Cortex XDR by Palo Alto Networks
Fortinet FortiClient
Elastic Security
HP Wolf Security
Symantec Endpoint Security
Trellix Endpoint Security Platform
Kaspersky Endpoint Security for Business
Trend Vision One Endpoint Security
ESET Endpoint Protection Platform
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?