Try our new research platform with insights from 80,000+ expert users
Ishant Gupta - PeerSpot reviewer
Trainee - cybersecurity engineer at Integrated Tech9labs Pvt. Ltd.
User
Top 20
Good threat detection with real-time scanning and automatic updates
Pros and Cons
  • "It has significantly bolstered our overall cybersecurity posture."
  • "One aspect that could see enhancement is the user interface."

What is our primary use case?

In our corporate environment, the primary use case for Check Point Antivirus is to provide robust endpoint antivirus protection. 

Our organization operates within a complex digital ecosystem, and ensuring the security of our network and devices is of utmost importance. 

Check Point Antivirus serves as the frontline defense, guarding against a myriad of cyber threats that could compromise our sensitive data and operations. 

Our organization operates in a dynamic and interconnected digital landscape, and ensuring the security of our network and devices is paramount

How has it helped my organization?

Check Point has brought about tangible improvements within our organization. It has significantly bolstered our overall cybersecurity posture. 

We've witnessed a noticeable enhancement in our ability to detect and respond to threats promptly. 

This solution has reduced risks and vulnerabilities, contributing to a more secure and reliable digital environment for our company. 

However, it's worth noting that no antivirus solution is foolproof, and the effectiveness of our security measures also relies on user awareness and best practices.

What is most valuable?

Among the features offered by Check Point Antivirus, the real-time scanning and automatic updates stand out as the most valuable. Real-time scanning ensures that threats are detected as soon as they appear, minimizing the potential damage they can cause. Automatic updates, on the other hand, keep our antivirus protection up-to-date with the latest threat intelligence and security patches. These features combine to offer a proactive and effective defense against a constantly evolving threat landscape.

What needs improvement?

While we find Check Point Antivirus to be a powerful tool, there are areas where it could be improved. One aspect that could see enhancement is the user interface. A more user-friendly and intuitive interface would make it easier for our security team to navigate and manage the solution efficiently. Additionally, improvements in reporting capabilities would enable us to better analyze security incidents and fine-tune our defenses.

Looking ahead to the next release of Check Point Antivirus, we hope to see advanced threat analytics as a part of the package. This would enable us to proactively identify emerging threats and vulnerabilities, allowing us to stay one step ahead of potential risks. 

Furthermore, greater customization options would be valuable, as they would allow us to tailor our security measures to the specific needs of our organization. In an ever-evolving cybersecurity landscape, these features would further empower us to protect our digital assets effectively.

Buyer's Guide
Check Point Harmony Endpoint
August 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,649 professionals have used our research since 2012.

For how long have I used the solution?

We have been using this antivirus within our company for six to eight months now.

What do I think about the stability of the solution?

It is quite a stable product.

What do I think about the scalability of the solution?

It is a scalable product across your enterprise and secures you from threats.

How are customer service and support?

Sometimes there is a delay in customer support, however, the issue is resolved at the end.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We've used Sophos previously, however, it made our systems very slow in performance.

How was the initial setup?

The initial setup is straightforward.

What about the implementation team?

We implemented the solution with an in-house team.

What's my experience with pricing, setup cost, and licensing?

There is minimal effort needed for the setup and deployment.

Which other solutions did I evaluate?

We also evaluated Trend Micro before choosing Check Point.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Ajenthan Aiyathurai - PeerSpot reviewer
Manager - IT at NVCL Group
Real User
Top 5Leaderboard
Helps prevent infections and limit the spread of malicious software within the network
Pros and Cons
    • "The management console could be made more intuitive and user-friendly, with simplified navigation and clearer visualizations of threat data and security statuses. Improve the performance impact on systems, especially for older hardware."

    What is our primary use case?

    As a manufacturing firm, we deal with many vendors and customers via online portals and websites. Our users surf the internet a lot. Check Point Antivirus scans and blocks malware, including viruses, worms, Trojans, spyware, and ransomware. This helps prevent infections and limit the spread of malicious software within the network. It also performs real-time scanning of files and email attachments to detect and block malicious content before it reaches the end user.

    How has it helped my organization?

    Implementing Checkpoint Antivirus has significantly improved our manufacturing company’s security posture and operational efficiency. By providing robust protection against malware and other cyber threats, we have minimized the risk of production downtime caused by cyber-attacks. On the other hand, This comprehensive security solution has not only enhanced our overall cybersecurity but has also instilled greater confidence in our stakeholders, knowing that our manufacturing processes and data are well protected.

    What is most valuable?

    Real-time scanning is a valuable asset for our organization. Real-time scanning and behavioral analysis have ensured that both our proprietary manufacturing processes and sensitive data remain secure, preventing potential breaches that could disrupt operations or lead to intellectual property theft. The centralized management of security policies across all endpoints has streamlined our IT operations, allowing our IT team to efficiently monitor and respond to security incidents from a single dashboard

    What needs improvement?

    The management console could be made more intuitive and user-friendly, with simplified navigation and clearer visualizations of threat data and security statuses. Improve the performance impact on systems, especially for older hardware. 

    Ensuring that real-time scanning does not significantly slow down user machines would enhance overall productivity. Work on reducing the rate of false positives, which can disrupt operations and lead to unnecessary administrative overhead. As an additional feature, Integrate user behavior analytics to detect unusual patterns that could indicate insider threats or compromised accounts.

    For how long have I used the solution?

    I have been using Check Point Antivirus for more than two years. 

    What do I think about the stability of the solution?

    The solution consistently delivers reliable performance with minimal downtime, ensuring continuous protection without disrupting business operations.

    What do I think about the scalability of the solution?

    Check Point Antivirus has strong scalability, making it highly suitable for organizations of various sizes, including large manufacturing companies. Its centralized management console allows administrators to efficiently manage and enforce security policies across numerous endpoints.

    How are customer service and support?

    Customer Service should be improved.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Previously I was using Avast antivirus. We switched because we had many security issues. It was not meeting our requirements. 

    How was the initial setup?

    The setup is very easy.

    What about the implementation team?

    We implemented it through the vendor. I would rate the experience an eight out of 10

    What was our ROI?

    The comprehensive protection against malware, ransomware, and other cyber threats has drastically reduced the risk of costly production downtimes and data breaches, which in turn has saved the company substantial potential losses.

    What's my experience with pricing, setup cost, and licensing?

    The setup cost is low but licensing is high. It's worth the cost. 

    Which other solutions did I evaluate?

    We also looked at Kaspersky Antivirus.

    What other advice do I have?

    From what we have seen it is a reliable and dependable solution.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Check Point Harmony Endpoint
    August 2025
    Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
    865,649 professionals have used our research since 2012.
    Technical Support at Hitachi Systems, Ltd.
    Real User
    Top 5
    Affordable, secure, and enables easy resetting of passwords with remote support
    Pros and Cons
    • "The remote support is good."
    • "The heartbeat interval must be improved."

    What is our primary use case?

    The solution is used for port protection and media encryption.

    What is most valuable?

    Our customers are satisfied with the Harmony environment. The remote support is good. If the users forget their passwords, the remote support helps them reset the password. It is a good feature. We only need an internet connection for it.

    What needs improvement?

    The heartbeat interval must be improved. Sometimes, when we change the policy in the console, it does not reflect in the endpoint. Sometimes, we find it difficult to change the policy. The tool lags sometimes.

    When we change the user password in the Infinity Portal, the password does not sync on time. There is a one-minute heartbeat interval from the server to the console. We have a graphical UI in threat hunting in which we can see the attacks. If audit logs have a similar graphical UI, it will be easier to analyze the logs.

    For how long have I used the solution?

    I have been using the solution for seven months.

    What do I think about the stability of the solution?

    I rate the tool’s stability an eight out of ten.

    What do I think about the scalability of the solution?

    The scalability and integrity are above average. I rate the scalability an eight or nine out of ten. We have deployed the product for 500 endpoints. We have deployed it on 300 to 400 endpoint machines in other places.

    How are customer service and support?

    Initially, we had some issues installing the agent on the endpoint machines. We didn't know the prerequisites of the endpoint machines. We had blue screen and red screen issues. It was new for us, and we were stuck. The support was very helpful. The team identified the issue and asked us to update Windows. We had to have the recommended version of Windows for deploying the agent. Now, we do not face any issues. If we face any problems, we easily recognize the issue. We are a bit autonomous.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    The initial deployment was very challenging because I was new to the product. Later on, I got used to it. It was very easy. I ensured everything was according to the customers’ requirements. It took hardly two weeks to deploy.

    What's my experience with pricing, setup cost, and licensing?

    The pricing is reasonable. It is very good for security. We are focused on security. If the security is strong, we do not mind the price. The customers blindly trust the product.

    Which other solutions did I evaluate?

    Our customers were using Trend Micro.

    What other advice do I have?

    We haven’t deployed the antivirus yet. We’re trying to implement AV on Windows. Currently, AV is deployed on a Linux machine. When I implemented it, I didn't have any idea about the product. I just went through some documents. People who want to use the solution must go through the documents and understand the concepts. Overall, I rate the product a nine out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    PeerSpot user
    Christal Tan - PeerSpot reviewer
    Network and Cybersecurity Engineer at Respiro
    Reseller
    Top 20
    A tool that offers great functionalities in areas like web protection and threat prevention
    Pros and Cons
    • "The most valuable features of the solution are web protection and threat prevention."
    • "A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings."

    What is our primary use case?

    When it comes to Check Point Harmony Endpoint, I have not dealt with any of our company's clients yet since I am still in the discovery phase.

    What is most valuable?

    The most valuable features of the solution are web protection and threat prevention.

    What needs improvement?

    A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings. Sometimes the product's page doesn't load at all, and sometimes it does. The position of the tabs and the other stuff on the product page needs to change a little bit.

    I think the product's deployment process is much quicker in Mac devices, and it takes a bit more steps for Windows and the area, which needs a bit of improvement so that some balance is created when it comes to the steps in the deployment phase.

    Considering last year, the pace at which the technical support team is progressing is a bit slow, making it an area where improvements are required.

    For how long have I used the solution?

    I have been using Check Point Harmony Endpoint for a year. My company has a partnership with Check Point Harmony Endpoint.

    What do I think about the stability of the solution?

    Stability-wise, I rate the solution a ten out of ten.

    What do I think about the scalability of the solution?

    Scalability-wise, I rate the solution a nine out of ten.

    My company mostly caters to the needs of small companies where the solution is used.

    How are customer service and support?

    I rate the technical support an eight out of ten.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    I rate the product's initial setup phase a ten on a scale of one to ten, where one is a difficult setup phase, and ten is an easy setup process.

    The solution is deployed on the cloud.

    The solution can be deployed in around ten minutes.

    What's my experience with pricing, setup cost, and licensing?

    I recently started to look for the prices of other products in the market and found out that Check Point Harmony Endpoint is cheaper than most of the other available solutions in my country. Price-wise, the product is affordable. There are no additional costs apart from the licensing charges that are attached to the product.

    What other advice do I have?

    Check Point Harmony Endpoint is a really good endpoint security solution because it comes as a full package. With the solution, there are not many additional costs for add-on features, especially when compared to the costs of the add-ons offered by other solutions in the market.

    I rate the solution a ten out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer.
    PeerSpot user
    reviewer1625493 - PeerSpot reviewer
    Chief Information Security Officer at a consultancy with 1-10 employees
    Real User
    Top 5
    A scalable tool that offers great EDR functionalities
    Pros and Cons
    • "Scalability-wise, I rate the solution a ten out of ten."
    • "It's not easy to investigate an incident that you find in the company. Users often face trouble when downloading files, so it is very slow in terms of how it works."

    What is our primary use case?

    I work as a consultant for a company where the solution is needed as an EDR solution. After my company made comparisons between a few companies, we felt Check Point Harmony Endpoint won, considering the pricing model that it offered in the market. The company that uses the product wants to set up a big business for some local authorities with the help of the EDR functionalities provided by Check Point Harmony Endpoint, which is why Check Point is also trying to push its product into the market.

    What is most valuable?

    The most valuable features of the solution stem from the EDR functionalities it provides to users, as it does its work properly.

    What needs improvement?

    The tool is not too intuitive if you want to monitor and see the results to investigate in a layer. It's not easy to investigate an incident that you find in the company. Users often face trouble when downloading files, so it is very slow in terms of how it works. The tool is not very supportive of all the versions when it comes to the part of loading hash codes, so it may support SHA-1 but not SHA-256, meaning it doesn't support all the formats. Calling the support team for the solution doesn't help.

    The support team of the solution lacks etiquette. The technical team of the product told our company that we need to get Check Point products through an official vendor only. Technical support for the solution is an area with issues where improvements are needed.

    For how long have I used the solution?

    I have been using Check Point Harmony Endpoint for two years. I work as a consultant for a company where the solution is used.

    What do I think about the stability of the solution?

    It is not a stable solution because if users find a problem with it, they have to disable the product.

    Stability-wise, I rate the solution a six out of ten.

    What do I think about the scalability of the solution?

    It is easy to use the scalability feature of the product since users just need to acquire more licenses.

    Scalability-wise, I rate the solution a ten out of ten.

    The product is used mostly by small-sized businesses.

    How are customer service and support?

    I rate the technical support a four out of ten.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    CrowdStrike, SentinelOne, Cynet, and Fortinet FortiGate are a few of the solutions that I have worked with in the past. Among all the solutions that I have used to date, CrowdStrike is the best.

    How was the initial setup?

    I rate the product's initial setup phase a seven out of ten on a scale of one to ten. Compared to Check Point Harmony Endpoint, the deployment process of CrowdStrike was much easier.

    Compared to Check Point Harmony Endpoint, the deployment process of CrowdStrike was much easier as it could be deployed in hundreds of locations in two hours. Check Point Harmony Endpoint's deployment process takes a week to be completed. Check Point Harmony Endpoint's deployment process takes time since there are many troubles, as my company has to meet with the client to conduct certain checks, owing to which it cannot be deployed through a central management process.

    The number of people required to take care of Check Point Harmony Endpoint's deployment process depends on the organization's size. One good engineer is enough to take care of the product's deployment process. Having ten engineers without knowing the product or issue cannot help a user deal with the tool's deployment area, and it is usually the same for each product deployed in any company.


    What's my experience with pricing, setup cost, and licensing?

    I rate the product price a four on a scale of one to ten, where one is low, and ten is high.

    The problem with the product is that Check Point tries to push it to the market. FortiGate, a firewall solution I purchased for the first time around twelve years ago, was very cheap because Fortinet had to push the product into the market. Users can get it for good prices only during the beginning phase of the tool.

    Our company has to make yearly payments towards the licensing charges attached to the solution. There are no additional charges attached to the product apart from the licensing costs attached to the solution.

    What other advice do I have?

    The maintenance of the product is difficult since it is something to be done online.

    To those who plan to use the solution of the future, I would say that they get the support involved in the contract before purchasing the product.

    I rate the overall tool an eight out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    PeerSpot user
    reviewer2049771 - PeerSpot reviewer
    Business Manager at MN World Enterprise Private Limited
    User
    Good security and support with an easy implementation process
    Pros and Cons
    • "The zero-day threat prevention is excellent."
    • "I would like to see them add features where we can use this license for mobile browsers, too."

    What is our primary use case?

    I am using this product to prevent any kind of advanced threats. It keeps monitoring in the backend and does not hamper my ongoing work at all. it also secures my web browsing and has forensics access along with a sandbox to emulate and extract too. 

    Before using this product, we had tried multiple others yet were not satisfied with the performance and dashboard reports. Check Point products allow us constant filtering and protect us from any kind of threats. 

    How has it helped my organization?

    It has been used for a banking environment and helps us to secure our end computing where USB blocking and even disk encryption and so many features have been bundled together. 

    Securing our data was critical. It helps a lot and gives control to end users while they connect through the VPN. Secure VPN connectivity is important. It helps us to avoid any kind of risk when users are at home. 

    It helped us a lot during the first phase of the Covid lockdown, which revealed the benefits of this product. 

    What is most valuable?

    I loved almost all the features.

    The zero-day threat prevention is excellent. It gives us more confidence to have automated protection from unknown threats. 

    It helps to secure our browsing. It can check if something is a genuine page or not. It also masks when we browse or enter our banking user ID and password. This gives us assurance that we are in a green and safe zone. 

    What needs improvement?

    I would like to see them add features where we can use this license for mobile browsers, too - as we had a container kind of product under MDM. This can give us more confidence that when on the go, a user still has full access to our important and crucial data. They should be fearless while accessing this through our VPN tunnel. 

    Mobile handsets are now used for 40% of work to send mail or forward any kind of document. Securing users on mobile will give more confidence to users and higher authorities that will sometimes need to have access outside of the office for doing their financial or confidential transactions.

    For how long have I used the solution?

    I've used the solution for more than four years.

    What do I think about the stability of the solution?

    After using this product last fours year I've never seen a single case where any devices have been affected. Even a lost device has not been a deal breaker. We have full control on end-user clients with the help of Check Point SandBlast. 

    What do I think about the scalability of the solution?

    It is very easy to scale. There are so many testing opportunities and upgrades. The features also do not slow down the CPU. From a stability and manageability point of view, it's very impressive. 

    How are customer service and support?

    Support can help us define and create policies on each and every use case. We also have the in-house expertise to provide support and handle the initial trouble shooting. 

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We were using Symantec and Sophos. There was not 100% clarity on reports, and we had many challenges in terms of upgrading the features. 

    When we switched to Check Point, we got a single dashboard to control end clients, DLP, and email security. Their collaboration and support team is also awesome. 

    How was the initial setup?

    You can set up the policies very easily. You just post and restart your devices and everything is secure. Items can be managed under group policies. You can set up your own rules and policies easily. 

    What about the implementation team?

    Initially, we had taken advantage of Check Point expertise. Now, an in-house team can handle everything. It is manageable on our side. 

    What was our ROI?

    If you talk about ROI, it's helped us to protect our end-user devices. We've also found the performance of laptops has increased in the past one and a half years. It offers good value for money. 

    What's my experience with pricing, setup cost, and licensing?

    Securing data, peace of mind, great support, good reports, and third-party network audits have made Check Point good value for money. 

    Which other solutions did I evaluate?

    I had tried Palo Alto and Fortinet, however, we got value for money in Check Point. After a POC, we started with Check Point. 

    What other advice do I have?

    There are so many useful examples a normal office could take advantage of. It's a great product for working from home or remote users. The Check Point team is also great and has served us by helping put in place the right kinds of products. 

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Adhi Wahyu - PeerSpot reviewer
    Network Engineer at RSUP Dr. Sardjito
    Real User
    Top 10
    Great real-time scans, east central management, and helpful support
    Pros and Cons
    • "The reporting feature where we can see and monitor what happened on our client computers is useful."
    • "They need to make the user interface on the server more intuitive and user-friendly."

    What is our primary use case?

    We use Check Point on our 500 computers to protect them from viruses and malware. The network is a protected local area network with limited connectivity to the internet. Not all computers are connected to the internet; only users with the necessity to connect can access it. We also increase the protection from viruses/malware by disabling USB ports for mobile storage. With all the protection steps taken, we still see that antivirus is a must to have as standard computer protection.

    How has it helped my organization?

    With all security steps taken to protect the network, viruses and malware still appeared in the network. Check Point Harmony Endpoint (endpoint antivirus) has helped our organization by preventing further damage to the computers and the network by detecting and taking appropriate action (quarantine, clean, delete) to viruses and malware. 

    By doing this, our organization's business can maintain its operational state without any significant disturbance, and that is the most important thing to achieve.

    What is most valuable?

    Some of the most valuable features from Check Point include:

    1. Its ability to run real-time scans in the background and detect all the malware and viruses while taking action to clean the system from the threat.

    2. On-premise centralized management, so the client can do signature updates locally and save the internet bandwidth.

    3. The reporting feature where we can see and monitor what happened on our client computers. For example, which client has out-of-date signatures, which client is infected by what virus, et cetera. 

    What needs improvement?

    Some areas of improvement could be :

    1. Making the user interface on the server more intuitive and user-friendly. 

    2. Making it easier for the user to do tuning and configuration to the server or the client application. For example, to turn off notifications, the user should be able to do that with some clicks on the user interface instead of searching and reading about how to do it in the knowledge base first and then trying to do it.

    3. Our application version is quite old, and Check Point already released a newer version for endpoint protection, which includes a cloud version. After doing some trials, we see that Check Point already made many improvements to the features and user interface.   

    For how long have I used the solution?

    I've been using the solution for five years.

    What do I think about the stability of the solution?

    Tthis solution runs with good stability.

    What do I think about the scalability of the solution?

    If we deploy it on-premise, we should see the server hardware requirement first and match it with the number of clients we want to handle.

    How are customer service and support?

    Customer service gave good support when we needed it. For example, when we need support on renewing the license or when we need to upgrade the client version, they have a quick response time to deal with the problem.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We did use a different solution previously. We switched as we want to use the same brand for our NGFW and our endpoint protection.

    How was the initial setup?

    The setup was quite straightforward. We installed the server first and then made the client installer. If you have an active directory on the network, you can install it with push installation. That said, we don't have it, so we needed to install the client by accessing the client directly.

    What about the implementation team?

    We implemented the product together with the vendor and an in-house team. The vendor team has good knowledge when it comes to implementing the product.

    What's my experience with pricing, setup cost, and licensing?

    At the time we purchased it, the licensing was separated into some modules. There were antivirus modules, data protection modules, and full modules if I'm not mistaken. You should make sure that the module you choose fits your requirement. 

    Which other solutions did I evaluate?

    We evaluated the ESET antivirus.

    What other advice do I have?

    Check Point has released their new product on endpoint protection, which includes a cloud version. You could try it for free to see if this product matches your needs before purchasing it.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Presales Engineer at Vincacyber
    Real User
    Top 5Leaderboard
    A cloud solution for antivirus, device encryption and URL filtering
    Pros and Cons
    • "The solution offers multiple features in one solution, along with data detection."
    • "Check Point should provide some technical sessions on antivirus solutions."

    What is our primary use case?

    We use the solution for antivirus, device encryption, file encryption, and URL filtering.

    What is most valuable?

    The solution offers multiple features in one solution, along with data detection.

    What needs improvement?

    The agent side should be less. It impacts customers' asset performance because it will be more complex for the customers.

    For how long have I used the solution?

    I have been using Check Point Antivirus for 6-8 months.

    What do I think about the stability of the solution?

    Check Point should provide some technical sessions on antivirus solutions. Then, it would be helpful to reach more customers in India.

    I rate the solution’s stability a seven out of ten.

    What do I think about the scalability of the solution?

    The solution is scalable. We have a few customers using this solution.

    How are customer service and support?

    It is quite difficult to get a response from OEM. We are facing issues with all products except for email security, with the support team of the Check Point.

    How was the initial setup?

    The initial setup is complex, depending on the number of assets. It takes less than half an hour for a single asset. We should set up everything after deploying and testing it. Symantec takes five to ten minutes after deploying to test everything. We use manual deployment.

    What was our ROI?

    The solution is helpful for a particular budget. We are getting the best solution that will cover all your parameters.

    What's my experience with pricing, setup cost, and licensing?

    The product’s pricing is moderate.

    What other advice do I have?

    Every feature provided by the antivirus software is good compared to other solutions. Sandboxing is helpful for customers while downloading and detecting malicious software.

    1-2 persons are required for deployment, whereas the maintenance and monitoring need a team of three to five members.

    I will recommend the solution. It's a very good solution compared to other antivirus capability servers. The sandboxing technology is helpful.

    We have not integrated it with any other tool set. We integrated a Check Point to get the logs or connect the data.

    Overall, I rate the solution an 8 out of 10.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
    Updated: August 2025
    Buyer's Guide
    Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.