Try our new research platform with insights from 80,000+ expert users
Afeez Adeyemo - PeerSpot reviewer
Technical Sales / Presales at Routelink Integrated Systems
Reseller
Top 5Leaderboard
A stable tool to secure endpoint devices and manage all devices from a centralized portal
Pros and Cons
  • "It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution."
  • "Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors."

What is our primary use case?

I use Check Point Harmony Endpoint in my company to secure the endpoint devices, including computers, servers, and every single endpoint in the environment.

How has it helped my organization?

Check Point Harmony Endpoint offers customers enterprise-level security for all their devices, including servers, laptops, and desktops. The IT personnel can ensure that with the product, all of the devices in an environment are protected with Check Point's enterprise-based solution. The customers who buy the product need not worry about their devices being exposed to threats. In fact, if you check the reports for Check Point in Gartner Magic Quadrant, you will see that the reports are all related to Check Point's endpoint security solutions. Customers try to get information on the value they can derive, along with the other potential prospects in the market, before trying to get or onboard Check Point Harmony Endpoint in their environment.

For IT personnel, Check Point Harmony Endpoint is easy to manage since they don't need to have any expert in order to deploy or monitor devices with the help of the product, and it also allows you to try out different actions on different devices. Whenever there is an attack on any device, Check Point Harmony Endpoint has the capability to isolate the affected device from the environment. Suppose there is an attack on one computer. In that case, the security of the other computers operating in the same environment is compromised, so Check Point Harmony Endpoint isolated the affected computer and notified the required department in the company to look into it while allowing for the other computers to work properly. The product offers good value to the companies that deploy it in their environment.

What is most valuable?

I would have to describe what I feel is valuable in Check Point as a whole. Check Point provides users with a central point from where they can manage all the devices across a workplace. Whether users use Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, they don't have to log into different portals or solutions since they can manage everything from one central point. I like the fact that products from Check Point are very easy to deploy. Even if a user has 1,000 endpoints in an environment, Check Point can take care of the deployment in minutes. Check Point Harmony Endpoint is a very easy solution to deploy and requires very little maintenance or technical expertise.

What needs improvement?

I would like to see improvements in Check Point Harmony Endpoint in general because some people use it since it is available at a competitive price. Due to the competitive pricing strategy of Check Point Harmony Endpoint, it is not considered to be a good product, like Fortinet, Palo Alto, or F5. Check Point Harmony Endpoint needs to consider that people should feel that Check Point doesn't compromise on quality even though the price at which Harmony Endpoint is offered is good. People who claim that Check Point Harmony Endpoint is a cheap product don't necessarily mean that it is not a good solution. Fortinet is a very expensive product that offers good value to its customers. If Check Point can work on the value proposition it offers to customers and make them understand that even though the solution is affordable, it is not a bad solution compared to its competitors, then it would be fantastic. The potential customers can opt for Check Point products, considering that they are offered good products at the cheapest price in its categories. It is important for Check Point to ensure that people don't have a wrong perception about the products it has launched in the market.

I don't think there are any features I would like to include, and the tool offers updates when compared with the products from competitors, which I think is a good way to do it. The only challenge is that for many organizations where there is an MDM solution in the environment and an endpoint security tool, my company needs to educate such organizations to convey the message that endpoint and MDM solutions are different products for different purposes, so they are not the same. If Check Point Harmony Endpoint can incorporate MDM into the solution, it can be a fantastic enhancement. Customers need not buy endpoint and MDM solutions if both are made available together in Check Point Harmony Endpoint. My company will have to put extra effort into educating the customers and making them understand the two different solutions. MDM is used to manage your mobile devices, and Check Point Harmony Endpoint is the security for your endpoints.

Buyer's Guide
Check Point Harmony Endpoint
November 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2025.
873,085 professionals have used our research since 2012.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for over three years.

What do I think about the stability of the solution?

It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution.

What do I think about the scalability of the solution?

It is a very scalable solution.

How are customer service and support?

My company had to contact Check Point's technical team for the installations that my company carried out when we had to deal with around 40 devices that had firewalls from Check Point, which had reached the end of life. For Check Point Harmony Endpoint, my company never had any reason to contact Check Point's technical team.

Which solution did I use previously and why did I switch?

Starting with the pros, I would say that Check Point Harmony Endpoint provides value for money. After purchasing Check Point Harmony Endpoint, you need to consider the fact that the cost you pay for the solution and the value you derive from the product is very proportional. When it comes to Check Point Harmony Endpoint, I can say that a user does not pay high prices for a poor solution. A user pays a decent fee for a very good product. I think the first pro is that the value you get from the solution is made available at a very competitive price. The product is seamless and easy to use. With the centralized portal, a user can manage all Check Point products, including Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, from a single point, which is also a fantastic pro for Check Point. Regarding the cons of the solution, I would say that it stems from people's perception of the solution since they feel that an affordable product may not be good enough. There is a need to work around people's wrong perception of Check Point products. Still, I don't know if such a negative perception is something that is widespread across the globe or whether it is exclusive to Nigeria or the markets in Africa. Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors.

How was the initial setup?

The product's initial setup phase was straightforward. The product's deployment was done in minutes, so it didn't take long, as there was no need to do any special configurations. There was no need for the people involved in the deployment to have any special skills. The deployment process was seamless and straightforward. The product's deployment was never an issue. The IT department need not worry too much about whether they need to learn new skills to manage the product as it is easy to use and deploy and a product that can be used seamlessly. The product's deployment takes around 30 to 40 minutes.

I work with the solution's SaaS version.

What other advice do I have?

I don't think Check Point Harmony Endpoint is difficult to maintain. I think there is a possibility of scheduling your updates in Check Point Harmony Endpoint, even if you want it to happen outside your working hours, like somewhere between eight o'clock in the evening and midnight. I don't think maintenance is stressful because it can be scheduled outside of working hours.

I would recommend others to use the product since the deployment process is seamless, so you don't need any specialized skills to use the portal provided by Check Point to monitor your devices. There are no specialized skills required to support or maintain the solution. It is also very easy to implement the product. You can keep a tab using the centralized portal offered by the product. In general, the product makes the life of the IT department easier since you need not worry about a lot of the technical stuff related to the solution.

From my point of view, I need to put in extra effort to convince my company's customers to use the solution. In terms of the features and the product's ability to deliver the promised value to its customers, especially when compared to other solutions in the market, I rate the overall product an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
reviewer4572384 - PeerSpot reviewer
Business Developer Manager at PROCOM
User
Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering
Pros and Cons
  • "The level of security and visibility they provide is great and it is very easy to configure and maintain."
  • "We would also like the application control module to be further developed in future versions to include applications commonly used or maintained by Check Point in order to be able to configure blocking policies more quickly."

What is our primary use case?

We use it for the complete protection of more than 5,000 devices of our company and our customers. 

We have Harmony Endpoint (Advanced) managed from the Check Point Cloud, mostly for Microsoft Windows 7, 8, and 10 devices, as well as Windows Servers (mostly 2012 and 2019). We also have a few protected Linux desktops and server devices. 

As for the protections enabled, we have mainly Threat Prevention (including Antimalware, Antibot, Anti-ransomware, EDR, and Threat Emulation/sandboxing); Firewall, application control, compliance, and port protection modules deployed.

How has it helped my organization?

We used to use other security solutions (Windows Defender and Kaspersky), however, we had security incidents that affected us (viruses and ransomware) and they were very difficult to identify or when we did identify them it was already a long time after the incident occurred and we did not know the cause and therefore affected the operability of our company considerably. 

Since we made the decision to move to Check Point Harmony we have had greater visibility of everything that happens on our devices and take a preventive approach rather than a reactive strategy, in addition to being more confident that we have Check Point protecting us.

What is most valuable?

The characteristics that we find most valuable are its anti-ransomware protection, zero-day phishing protection, web browsing filtering, and vulnerability and patch management. The level of security and visibility they provide is great and it is very easy to configure and maintain. We have almost no false positives. 

A feature that we really like is the ease of management and administration that Check Point offers us, in addition to including the management server in its cloud and the predefined dashboards and reports.

What needs improvement?

We would love to have more endpoint hardware and software inventory, as well as tools to perform troubleshooting directly on the endpoint remotely. 

A further point of improvement would be to be able to optimize the consumption of resources on the device. 

We would also like the application control module to be further developed in future versions to include applications commonly used or maintained by Check Point in order to be able to configure blocking policies more quickly.

For how long have I used the solution?

We have been using this product for more than three years.

What do I think about the stability of the solution?

We have not had any problems with stability so far. It has left us with a good impression.

What do I think about the scalability of the solution?

The scalability of cloud management is excellent.

How are customer service and support?

On the few times we have required support, it has taken us some time to resolve the issues completely, however, in the end, it was accomplished.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We changed solutions since what we had was not effective against the attacks we see today; besides, the visibility was very low and the management was very complicated.

How was the initial setup?

The initial deployment was simple and the solution gave us several tools to do so.

What about the implementation team?

We deployed via an in-house team.

What was our ROI?

In three years, the expected ROI was achieved.

What's my experience with pricing, setup cost, and licensing?

The management of the solution is very simple and the deployment tools are diverse, which greatly reduces the workload. Licensing is also quite simple with three main options and some add-ons. 

It is licensed per device (whether it is a desktop, laptop, server, etc.), and the price is very attractive and competitive.

Which other solutions did I evaluate?

We evaluated other options including Cisco AMP and Fortinet EDR.

What other advice do I have?

I'd recommend users to be careful with low-resource devices as the solution has several security modules that can affect the performance of these devices. In our case, we had some old machines where we grouped them and created a more optimized policy for these legacy devices.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. We are a Check Point customer and partner.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
November 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2025.
873,085 professionals have used our research since 2012.
Sitti Ridzma Salahuddin - PeerSpot reviewer
System Engineer at Trends and Technologies, Inc
Reseller
Top 5
Useful for prevention and detection, and supports Windows 7
Pros and Cons
  • "The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read."
  • "Check Point Harmony Endpoint's GUI is old. It needs to have a modern dashboard for logging activities. Compared to other products, the solution is slow in terms of deep scanning."

What is our primary use case?

We use the solution in hospitals. 

What is most valuable?

The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read. 

What needs improvement?

Check Point Harmony Endpoint's GUI is old. It needs to have a modern dashboard for logging activities. Compared to other products, the solution is slow in terms of deep scanning. 

For how long have I used the solution?

I have been working with the product for three months. 

What do I think about the stability of the solution?

I rate the solution's stability an eight-point five out of ten.

What do I think about the scalability of the solution?

The tool has many modules and is scalable. I rate it an eight-point five out of ten. 

How was the initial setup?

I rate the tool's deployment ease an eight out of ten. The process takes less than a day. In our case, however, it required at least three hours because we were doing a demo for Windows 7. We also needed to update the endpoint, which involved some installation requirements.

What's my experience with pricing, setup cost, and licensing?

I rate the solution's pricing a five out of ten. It costs around ₱2,200 per endpoint. 

What other advice do I have?

Our customers are mostly medium enterprises. You need to be patient with the scanning. The solution will help you with prevention and detection. I rate the overall product a nine out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Rahul Kamble. - PeerSpot reviewer
Business Director at One Networks
Reseller
Top 5
A comprehensive endpoint protection tool that is highly stable
Pros and Cons
  • "Stability-wise, I rate the solution a ten out of ten."
  • "Check Point offers solutions with only a few features for our company's customers' sites."

What is our primary use case?

My company tried Check Point Harmony Endpoint with multiple clients, but unfortunately, we could not get many clients to use the product. Currently, my company has limited clients, like ten to fifteen customers who use Check Point Harmony Endpoint.

What is most valuable?

The valuable features of Check Point Harmony Endpoint stem from the fact that it serves as a comprehensive endpoint protection product that provides users with a fast solution and complete endpoint protection while serving as a tool that offers the fastest recovery for endpoints. The tool efficiently detects, protects, and corrects vulnerabilities and patches.

What needs improvement?

Check Point offers solutions with only a few features for our company's customers' sites. My company hasn't found any bugs or didn't find the solution to be complex. Features like zero phishing, sandboxing, threat emulation and extractions, malware detection, and EDR solution capabilities need to be included in the product. My company expects more granular EDR functionalities in Check Point Harmony Endpoint.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for six months. My company has a partnership with Check Point Harmony Endpoint.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a nine out of ten.

Check Point Harmony Endpoint is a solution used by the company's clients who operate small and medium-sized businesses.

How are customer service and support?

I rate the technical support an eight and a half out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

I rate the product's initial setup phase a nine out of ten.

The solution is deployed on an on-premises model.

The solution can be deployed within two hours.

During the deployment process of Check Point Harmony Endpoint, my company needs to install the initial client and select an agent from the settings on Windows Server, after which we need to push the solution to the client. Installing the initial client isn't something that is very easy. With all the features like signature-based detection, threat emulations, and sandboxing, users may need to be involved in the creation of a signature group.

What's my experience with pricing, setup cost, and licensing?

Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years.

What other advice do I have?

Check Point Harmony Endpoint is a well-known solution among cybersecurity companies. With Check Point Harmony Endpoint, if my company gets good profit margins along with good opportunities, then we can penetrate into the market to sell it. My company expects support from Check Point, though we don't deal in many of its solutions.

I rate the overall tool a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Anuj V - PeerSpot reviewer
Manager-BIU at Bajaj Markets
User
Compatible, cost-effective, and highly customizable
Pros and Cons
  • "Check Point Antivirus is a cost-effective security solution for businesses and that's why its acceptability by various other fields and organizations is humongous."
  • "Check Point services and antivirus solutions can improve their customer offerings by offering various discounts in their subscription model and they can also reconsider their pricing model as well."

What is our primary use case?

Check Point Antivirus is a one-stop solution for businesses and professionals. It is one of the most advanced security solution software which helps businesses to secure their IT system and the installed software and hardware through antivirus protection riches one of the best and most affordable in the current item market. 

It is one of the most stable software which is globally acceptable and has numerous capabilities and multifarious features and parameters which help businesses to secure their system inside out. 

This antivirus is easily deployed and is integrated into any kind of system within a very short span of time. This antivirus software is quite compatible with various dashboards and other electronic platforms and goes well in securing the installed system in the best possible manner.

How has it helped my organization?

Check Point Antivirus has improved the security experience of our ecosystem. Due to this software, now of our workforce is more confident and carefree about any kind of threat entry into the IT system. 

This antivirus software has amazing capabilities to fight any kind of malware and ransomware in the IT system. 

This antivirus software has numerous features which result in wider acceptability and huge capabilities in diffusing threat attempts and hacking attempts.

Check Point Antivirus is a quite stable software in the market right now as this is one of the most mature and highly customizable security solutions for businesses. 

We have been widely impressed by these amazing security features and notifications which help us to have better security compliance in place and also to have up to 100% security protection from any kind of threats and endpoints.

What is most valuable?

Check Point Antivirus has numerous features which are quite remarkable and have a greater impact on improving the performance of the business some of the features are.

Check Point Antivirus software is highly customizable in nature due to which its acceptability by the majority of the organizations like small medium and large enterprises is huge.

Check Point Antivirus is a cost-effective security solution for businesses and that's why its acceptability by various other fields and organizations is humongous.

Check Point Antivirus has a large number of good peer feedback in the public domain due to which the confidence and trust and transparency are high for this partner.

The software is quite compatible and extremely stable in any kind of IT environment.

This software is easy to integrate and deploy in any IT environment.

We are very much impressed by the business team and the tech team at Check Point who are day and night giving their best and proving their excellence in coming up with extremely viable and innovative security solutions for us.

What needs improvement?

There is a huge scope for improvement for any good product in the market.

Check Point services and antivirus solutions can improve their customer offerings by offering various discounts in their subscription model and they can also reconsider their pricing model as well. If certain cost reductions can happen and can take place, then it is going to be ultimately very good for medium enterprises like us.

Also, we are requesting the customer service and the business team of Check Point to have more and more features and improved packages to increase the customer experience.

We would be grateful to the entire Check Point team if we could get some discounts and also some extended trial periods. 

For how long have I used the solution?

I've used the solution for over two years.

What do I think about the stability of the solution?

The solution has high stability.

What do I think about the scalability of the solution?

The solution has good scalability.

How are customer service and support?

Technical support has been great so far.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a lot of other security solutions earlier. Some of them were Trend Micros Security and McAfee as well as other enterprise security solutions from Splunk.

We realized that these solutions are not very suitable for us as we need dynamic security services since our product is highly customizable and these security solutions are not fitting into the mainstream business. Due to this, we switched ourselves to Check Point and to date, we have had an exceptional experience with this partner as they are quite customizable in nature.

How was the initial setup?

The initial setup is easy and straightforward.

What about the implementation team?

We implemented the solution through a vendor.

What was our ROI?

The ROI is great.

What's my experience with pricing, setup cost, and licensing?

The solution is easy with streamlined costing. Licensing is easy and renewal is seamless.

Which other solutions did I evaluate?

Yes we evaluated a lot of options before switching to Check Point, including:

  • McAfee 
  • Splunk 
  • Kaspersky
  • Trend Micro 

What other advice do I have?

This is good to go security software for any kind of business today.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Shyam Lal Navatiya - PeerSpot reviewer
Senior Consultant at EY India
User
Cost-effective with real-time and proactive detection
Pros and Cons
  • "It has zero-day attack protection."
  • "While features are really good and promising to use and implement, a certain level of improvement is required in terms of software deployment across different business environments."

What is our primary use case?

Check Point Antivirus is the best antivirus tool in the market currently. 

The malware and ransomware catchment rate of the software is just exceptional and worth recognizing and recommending to peers. We have been using the tool for quite some time now and must say that it's quite reliable and highly dependable. It ensures no malware or virus should make any kind of entry into the system and enables a virus-proof environment all over.

The performance efficiency is great and reduced expenses have literally attracted a lot of small and marginal organizations to adopt this software in the first place.

How has it helped my organization?

Check Point Antivirus has significantly improved the outcome and performance output of my organization. It is extremely usable across different business environments and quite compatible with all kinds of portals and dashboards. 

It is highly flexible and easy to integrate, with no lags or slip-ups at all. Now, all our verticals are sharing details and working across any kind of unprotected network environment without any tension. We have 100% all-around protection, which is covered by Check Point Antivirus. We'd highly recommend it to all. 

What is most valuable?

The solution offers a high malware catchment rate and increased speed, and the performance outcome efficiency is commendable.

It is a highly cost-effective antivirus software in the market compared to its competitors in the market.

The stability of the software is great and highly compatible as well.

Real-time and proactive detection of any malware or ransomware in the system means issues can be removed ASAP.

It has zero-day attack protection.

The product offers complete protection of the system from hijackers, and no phishing activity is allowed under any circumstance. It is high-grade protection with strict system security.

What needs improvement?

While features are really good and promising to use and implement, a certain level of improvement is required in terms of software deployment across different business environments. It is highly advisable to create multiple child logins to operate the running of the software across multiple interfaces in one go without any trouble. Also, it is advised to incorporate the features like round-the-clock, 24/7/365 scanning of the system in the background without disturbing the routine front-end work. This ensures no lapses or threat entry into the system at all.

For how long have I used the solution?

I've used the solution for over a year now.

What do I think about the stability of the solution?

The product is quite stable.

What do I think about the scalability of the solution?

The solution is highly scalable.

How are customer service and support?

Technical support has been great so far.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution. We started with a trial version of Check Point. 

How was the initial setup?

The initial setup is straightforward and easy.

What about the implementation team?

We implemented the solution through the vendor team.

What was our ROI?

The ROI has been good.

What's my experience with pricing, setup cost, and licensing?

The setup is easy and uncomplicated and the annual renewal is quite a smooth process. It's amazingly easy to deploy. Licensing is done in one click without any hassle at all. It was an amazing experience.

Which other solutions did I evaluate?

We looked into Trend Micro, Wipro, etc.

What other advice do I have?

I'd advise others to try the solution today and improve the security system of your organization.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
IT at a tech services company with 51-200 employees
Real User
Top 5
Has blocked phishing threats in real time and reduced incident response time significantly
Pros and Cons
  • "The real-time threat detection in Check Point Harmony Endpoint helped us catch a ransomware attack early; a user downloaded a file from a spoofed site, and Check Point Harmony Endpoint immediately flagged it, quarantined the file, and alerted our support team, preventing the malware from spreading and saving us from a large downtime."
  • "Creating tailored reports for different departments or compliance needs in Check Point Harmony Endpoint takes extra effort."

What is our primary use case?

Check Point Harmony Endpoint is mainly used to protect laptops from malware, phishing, and ransomware. It serves as a frontline defense for remote workers and ensures secure access to corporate resources.

One of our users clicked a link in a phishing email to log in, and Check Point Harmony Endpoint instantly flagged the site as malicious and blocked access, alerting our support team. It was a very quick response that prevented credential theft and a potential breach.

Check Point Harmony Endpoint is also used to control USB access and enforce encryption on devices, which is a common requirement.

How has it helped my organization?

Check Point Harmony Endpoint has positively impacted our organization.

A significant positive impact on our organization is that I win more time for other support tasks because Check Point Harmony Endpoint protects more easily than support agents can.

We track some key metrics since we deployed Check Point Harmony Endpoint, and it reduced incidents and saved time for our security team.

What is most valuable?

The best feature Check Point Harmony Endpoint offers is ransomware rollback. If an attack slips through, Check Point Harmony Endpoint can roll back affected files to a safe state, minimizing damage.

The real-time threat detection in Check Point Harmony Endpoint helped us catch a ransomware attack early. A user downloaded a file from a spoofed site, and Check Point Harmony Endpoint immediately flagged it, quarantined the file, and alerted our support team. The quick action prevented the malware from spreading and saved us from a large downtime.

Check Point Harmony Endpoint is a very centralized tool, and the reporting is really well done.

What needs improvement?

Creating tailored reports for different departments or compliance needs in Check Point Harmony Endpoint takes extra effort. More flexible templates or drag-and-drop options would be a great addition for better report checking.

Better integration with third-party tools would be beneficial. It works, but sometimes it takes extra effort to connect with the platforms used daily for Check Point Harmony Endpoint. Support is helpful, but responds only in English.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for around two years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is really stable.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint is very scalable and definitely meets our needs.

How are customer service and support?

Customer support for Check Point Harmony Endpoint is great.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I used Microsoft Endpoint Security in the past.

I switched from Microsoft Endpoint Security to Check Point Harmony Endpoint because I think that Check Point is better than Microsoft.

What was our ROI?

In my case with Check Point Harmony Endpoint, the time saved for our employees represents the return on investment.

What's my experience with pricing, setup cost, and licensing?

Pricing and licensing for Check Point Harmony Endpoint were fair, but not exactly budget-friendly. The setup cost was manageable, though it depends on how many endpoints you are protecting. Licensing is flexible, but if you are a smaller team or not using all the features, it can feel as though you are paying for more than you need.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Check Point Harmony Endpoint.

What other advice do I have?

For others looking into using Check Point Harmony Endpoint, I would advise starting by clearly defining your security needs and the type of devices you want to protect. Check Point Harmony Endpoint offers a lot of features, but it is most effective when tailored to your environment. I would rate Check Point Harmony Endpoint as an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
Abnet Tsegaye Belay - PeerSpot reviewer
Cybersecurity Engineer at a tech services company with 11-50 employees
Real User
Top 5Leaderboard
Deployment shows significant improvement in security posture with manageable learning curve
Pros and Cons
  • "Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks."
  • "Check Point Harmony Endpoint poses a steep learning curve and has high resource consumption, requiring high-performance PCs on our endpoint site."

What is our primary use case?

We are using Check Point Harmony Endpoint as an all-in-one solution. The agent acts for both ADR and XDR, allowing it to be installed on personal computers or desktops. This helps protect our company's data and network assets from being attacked by threats or ransomware.

How has it helped my organization?

After deploying Check Point Harmony Endpoint, there has been a significant change in our company's security posture. Check Point Harmony Endpoint has shielded us from potential threats, especially ransomware.

What is most valuable?

One of the best features of Check Point Harmony Endpoint is the portal, along with real-time threat detection and existing threat management. 

Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyberattacks. This has given us added security and peace of mind as we feel protected against ransomware threats.

Harmony can detect and display threats. It helps prevent us from clicking on threats. Any cyber attackers that attack our hosts won't get any vulnerable information. It's shielding us from ransomware. 

What needs improvement?

Check Point Harmony Endpoint poses a steep learning curve and has high resource consumption, requiring high-performance PCs on our endpoint site.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for almost eight months.

Which solution did I use previously and why did I switch?

We did not use another solution before Check Point Harmony Endpoint. Check Point Harmony Endpoint is our first time trying an endpoint solution.

How was the initial setup?

At first, I found the initial setup challenging; however, after about a week, it became straightforward. It was the first time I deployed an endpoint solution, and over time, the setup process became easy and manageable.

The deployment process was smooth, even though there was a learning curve initially. It became manageable over time. It's easy to deploy on-premises and on the cloud. We're just using the cloud. 

The configuration process gets easier over time. The first time you configure it, it's hard. 

What was our ROI?

The licensing process for Check Point Harmony Endpoint is very easy.

What's my experience with pricing, setup cost, and licensing?

We purchased Check Point directly from Check Point. We are partners. We didn't purchase it from the AWS marketplace. 

What other advice do I have?

I would rate the overall solution a five out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.