We use Check Point Antivirus to secure our enterprise network. It protects our data servers from malware attacks.
Senior Manager ICT & Innovations at Bangalore International Airport Limited
Comes with AI features and secures enterprise networks
Pros and Cons
- "The tool comes with an in-built AI feature, which makes file management easier. It also secures the network from viruses, malware, and phishing attacks."
- "Check Point Antivirus' performance could be faster. It needs to include app-based support to upload screenshots of issues. It needs to add timely and regular updates. The dashboards and reporting features need to offer more efficiency."
What is our primary use case?
What is most valuable?
The tool comes with an in-built AI feature, which makes file management easier. It also secures the network from viruses, malware, and phishing attacks.
What needs improvement?
Check Point Antivirus' performance could be faster. It needs to include app-based support to upload screenshots of issues. It needs to add timely and regular updates. The dashboards and reporting features need to offer more efficiency.
For how long have I used the solution?
I have been using the product for two years.
Buyer's Guide
Check Point Harmony Endpoint
August 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,649 professionals have used our research since 2012.
What do I think about the stability of the solution?
The product is stable. I rate it a nine out of ten.
What do I think about the scalability of the solution?
Check Point Antivirus is scalable. You can add the 'n' number of servers at any time. My company has 1000 users.
How are customer service and support?
The tool's tech support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The tool's deployment is easy and takes two to three hours to complete. A single person can do deployment. The tool has a SmartConsole feature, which helps to deploy it efficiently without much processing. It is easy to maintain, and one person can handle the maintenance.
What's my experience with pricing, setup cost, and licensing?
Check Point Antivirus is the most economical solution.
What other advice do I have?
The product is an AI-based solution with the latest capabilities. It offers the most secure protection. I rate it an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Network Administrator at a computer software company with 1,001-5,000 employees
Moderately priced, easy to configure, and good support
Pros and Cons
- "Check Point Antivirus is easy to configure."
- "Check Point Antivirus could be improved by having the gateway automatically run a packet capture on the traffic so that it can be easily uploaded to TAC in the event that there is a false positive or if the traffic is required for further investigation."
What is our primary use case?
Check Point Antivirus Blade is enabled on all of our HA clusters throughout the world. The primary use case for this product is to protect our end-users while working physically in the office or remotely. It monitors all traffic in and out of the organization to detect known threats such as malware. Functionality is limited without HTTPS inspection as the blade will just look at SRC/DST traffic rather than be able to do packet inspections on actual traffic. It is great that it is included in the base FW license.
How has it helped my organization?
Check Point Antivirus has improved our organization by being able to identify known threats and actively drop connections to ensure our users remain secure. It leverages the Bogus DNS endpoint from Check Point to redirect traffic destined for known threats and doesn't require a lot of admin overhead to configure or tune based on the organization's needs. An added bonus is Check Points "Threat Cloud" which all of its gateways talk to so that attacks that are detected in one customer's environment are updated and would be blocked automatically within another environment.
What is most valuable?
Check Point Antivirus is easy to configure. We enable the blade in the SMS for the gateway and that's pretty much it. You can get into the nitty gritty and fine-tune some of the settings to fit your organization better than the default settings, however, personally, I have yet to do this and it is working as expected in my organization. It is also great that this is not an add-on license and is included with the low-tier licensing which helps to reduce the overall cost to the organization while increasing the value of the product.
What needs improvement?
Check Point Antivirus could be improved by having the gateway automatically run a packet capture on the traffic so that it can be easily uploaded to TAC in the event that there is a false positive or if the traffic is required for further investigation. I have had a few times where something was detected as being a false positive and TAC requested so much information that in all honesty, was not worth my time to collect as the URL being blocked was a simple webpage that, based on my analysis, the IP was previously being used for malicious intent and was now a legitimate business however was still being blocked by the blade.
For how long have I used the solution?
I've used the solution for five years.
What do I think about the stability of the solution?
We have not had any performance issues.
What do I think about the scalability of the solution?
It is easy to scale and enable on SGs as long as they are managed by the same SMS.
How are customer service and support?
Support has improved over the years.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
No previous solution was utilized. This solution has been in place on the SGs since they were installed.
How was the initial setup?
The setup is straightforward. It is enabled from the SMS and it works.
What about the implementation team?
We managed the setup of the solution in-house.
What was our ROI?
The ROI is revealed by the fact that it protects end-users.
What's my experience with pricing, setup cost, and licensing?
Check Point in general is moderately priced compared to competitors.
Which other solutions did I evaluate?
We evaluated Palo Alto and Fortigate.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
August 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,649 professionals have used our research since 2012.
Complaints analysis/investigation at compugana
Great features, helps with blocking unauthorized access, and protects data
Pros and Cons
- "With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access."
- "We'd like to see better integration with other security tools."
What is our primary use case?
Check Point Antivirus helps us to protect our networks and systems against computer threats such as viruses, spyware, malware, and online attacks. It helped us greatly improve the security perimeter with its advanced features, such as intrusion prevention, threat detection, and access control, which help to protect sensitive data and company information. It's helped us shrink all the security gaps and is an excellent tool for protecting all the endpoints of an organization. If the company must be audited, it helps a lot to meet many of the compliance requirements.
How has it helped my organization?
Check Point Antivirus helped us to improve in several ways. It offers advanced features such as data protection. With it, we were able to protect sensitive and confidential company data from online threats and external attacks.
We also achieved intrusion prevention using intrusion detection to prevent attacks on the company network.
With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access.
With its various features, we can enable business continuity with adequate protection while minimizing risks in operations.
What is most valuable?
Some of the Check Point Antivirus features that users may find valuable include:
The firewall helps provide protection to block unauthorized access to the network.
Intrusion prevention prevents attacks on the company network and helps companies to comply with regulatory requirements related to data protection.
It has a wide range of features that help make this tool one of the best on the market.
What needs improvement?
As with any tool, improvements can be made. Some improvements that would be useful include:
- An updated user interface to improve it to make it easier to use.
- Integration with other security tools. We'd like to see better integration with other security tools.
- They should incorporate artificial intelligence and machine learning
- Performance could be better to reduce the impact on system resources as it consumes a lot of resources from some endpoints.
For how long have I used the solution?
The solution was implemented approximately five years ago.
What do I think about the stability of the solution?
The tool was designed to be highly stable with regular software updates and proactive monitoring.
What do I think about the scalability of the solution?
It is a highly scalable tool that has centralized management, automatic updates, and load-balancing capabilities.
How are customer service and support?
They must improve support and customer service by improving response times and their SLA.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we only used an antivirus on the devices. After migrating our platform to the cloud, we needed a more robust tool and chose Check Point.
How was the initial setup?
The installation of the product is complex if you do not have any previous knowledge. Once that learning curve is overcome, the administration and configuration become easy.
What about the implementation team?
The implementation was done in conjunction with an engineer from the provider and the IT department.
What was our ROI?
It is always good to generate an implementation plan for the acquisition and company requirements to make the best purchase decision and to gain a quick return.
What's my experience with pricing, setup cost, and licensing?
The price and licenses will depend on the features and functions that need to be implemented, as well as the number of devices needed. It is easy to install, however, you must have prior knowledge of the product.
Which other solutions did I evaluate?
We evaluated several solutions on the market that met the characteristics and requirements that we needed. Some were:
- McAfee Endpoint Security
- Trend Micro OfficeScan
- Sophos Endpoint Protection
What other advice do I have?
It is always important to do a cost analysis and check requirements before making a decision.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Manager at IRMA Anand
Great real-time endpoint detection, has high malware catch rates, and offers good protection overall
Pros and Cons
- "They have a better endpoint catchment rate due to their reliability."
- "A certain reduction in the annual subscription pricing could help many startup organizations like ours."
What is our primary use case?
Check Point Antivirus has proven to be a savior. It helps in protecting our computers and other e-devices at endpoints from malicious ransomware, etc.
It actively eliminates malware and protects the system from any potential damage.
It is well-performing antivirus software that is absolutely different from traditional threat-combating antivirus tools.
Conventional antivirus software is often not upgraded enough to fight advanced threats. Check Point Antivirus's performance efficiency is quite good and is highly recommended by peers.
How has it helped my organization?
Check Point Antivirus is an advanced antivirus software with high-performance efficiency and is continuously improvising its features and version to have better security enhancements at the end.
They have a better endpoint catchment rate due to their reliability. It comes quite highly recommended. Everyone recommends it.
Our organization used to spend a lot on data and system security. The cost of security was increasingly becoming relatively high and unmanageable. Our peers recommended trying the Check Point Solution, which felt great after using it. It is worth having this security software for businesses!
What is most valuable?
The high malware catchment rate is great and really commendable. The software is equipped with scanning all kinds of sources, email servers, and cloud servers for their endpoint threat and immediately diffuses and eliminates the threat source and threat points. It helps us to improve security scanning and also leads to endpoint management throughout.
The software provides advanced security features like signature-based malware detection, which is widely used by organizations for scanning their code management and securing their code system end to end.
The other features, like real-time endpoint detection, help us with 24/7 scanning and monitoring of the system for ransomware, and can immediately remove them permanently.
What needs improvement?
Everything is just great about the software. That said, a certain reduction in the annual subscription pricing could help many startup organizations like ours. Small, marginal, and medium enterprises could also use a reduced subscription model so as not to pose much burden on budgets.
Also, the cybersecurity trend is quite dynamic and changes every now and then. It would be really great if continuous upgrades and orientation and training on upgrades could be proactively arranged and organized by concerned officials from time to time.
For how long have I used the solution?
It's been one year now since I've been using the solution.
What do I think about the stability of the solution?
It is a very stable software.
What do I think about the scalability of the solution?
The solution is scalable.
How are customer service and support?
Technical support is great.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We started using Check Point. An earlier in-house-based local solution was used as an antivirus before that.
How was the initial setup?
The initial setup is easy and straightforward.
What about the implementation team?
We implemented the solution through the vendor only.
What was our ROI?
The ROI looks promising.
What's my experience with pricing, setup cost, and licensing?
The setup cost is significantly lower for Check Point Antivirus. Its pricing is low compared to the majority of the competitors. Licensing is smooth and easy.
Which other solutions did I evaluate?
We evaluated McAfee, Trend Security, etc., before finalizing the usage of Check Point Antivirus.
What other advice do I have?
It's a must-have security solution for all businesses and professionals as it is an advanced security solution with enough capabilities to improve cybersecurity enhancement for businesses.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CEO / direktor at S3Next
Great sandboxing and phishing protection with the ability to expand
Pros and Cons
- "The product improved the overall security of our organization with the features like sandboxing and phishing prevention."
- "We need a higher maximum file size in the sandboxing feature."
What is our primary use case?
We were searching for a next-generation antivirus solution, and this was the best choice on the market.
We have 25 users who work from home and the office.
All computers have Windows Professional version 10 or 11 installed.
We implemented a policy in which every client (either PC or mobile) has to have the Endpoint protection software installed with all the available blades.
Our company's cyber security monitoring process includes centralized product monitoring.
How has it helped my organization?
The product improved the overall security of our organization with the features like sandboxing and phishing prevention.
We have centralized monitoring of the security of the clients even if they are not connected to our VPN network.
The e-mail and office solution is a great add-on to our existing Office 365 protection on our company's e-mails.
I also have to mention that we did not have our mobile devices protected before the implementation of Harmony mobile. That was really the next step in securing our company's overall IT security.
What is most valuable?
The sandboxing is good. We didn't have any file ransomware attacks since implementation.
The phishing protection works. It prevented a lot of nasty situations with fake websites.
Using this solution in e-mail and Office, we recognized how many man-in-the-middle attacks have been started to get some credential information from our employees.
In mobile, we didn't realize before how much harm can be done from the mobile devices in the network.
It replaced the ESET solutions we used before in our company.
What needs improvement?
We need a higher maximum file size in the sandboxing feature.
Maybe the exceptions could be made much more understandable and easy to use.
There should be an option added to temporarily disable the protection of all or some blades for testing reasons.
The email and Office solution could have some options for exceptions, for example: don't scan e-mails sent to the local PDF scanner e-mail address.
Maybe an option to auto-upgrade the client version to the next stable release of the client software would be nice.
For how long have I used the solution?
We have been using this solution for more then two years.
What do I think about the stability of the solution?
We didn't have any stability issues. We always use the stable releases of the client software.
What do I think about the scalability of the solution?
The solution offers very good scalability.
How are customer service and support?
So far, support is very good. I recommend them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used ESET, which was not satisfying.
How was the initial setup?
It was straightforward.
What about the implementation team?
We implemented through a local implementor.
What was our ROI?
The protection it gives to the clients is priceless.
What's my experience with pricing, setup cost, and licensing?
Get in contact with your local Check Point solution provider to give you an offer regarding the implementation.
Which other solutions did I evaluate?
We evalute the Fortinet solution.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cyber Security Engineer at a tech services company with 11-50 employees
Deployment shows significant improvement in security posture with manageable learning curve
Pros and Cons
- "Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks."
- "Check Point Harmony Endpoint poses a steep learning curve and has high resource consumption, requiring high-performance PCs on our endpoint site."
What is our primary use case?
We are using Check Point Harmony Endpoint as an all-in-one solution. The agent acts for both ADR and XDR, allowing it to be installed on personal computers or desktops. This helps protect our company's data and network assets from being attacked by threats or ransomware.
How has it helped my organization?
After deploying Check Point Harmony Endpoint, there has been a significant change in our company's security posture. Check Point Harmony Endpoint has shielded us from potential threats, especially ransomware.
What is most valuable?
One of the best features of Check Point Harmony Endpoint is the portal, along with real-time threat detection and existing threat management.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyberattacks. This has given us added security and peace of mind as we feel protected against ransomware threats.
Harmony can detect and display threats. It helps prevent us from clicking on threats. Any cyber attackers that attack our hosts won't get any vulnerable information. It's shielding us from ransomware.
What needs improvement?
Check Point Harmony Endpoint poses a steep learning curve and has high resource consumption, requiring high-performance PCs on our endpoint site.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for almost eight months.
Which solution did I use previously and why did I switch?
We did not use another solution before Check Point Harmony Endpoint. Check Point Harmony Endpoint is our first time trying an endpoint solution.
How was the initial setup?
At first, I found the initial setup challenging; however, after about a week, it became straightforward. It was the first time I deployed an endpoint solution, and over time, the setup process became easy and manageable.
The deployment process was smooth, even though there was a learning curve initially. It became manageable over time. It's easy to deploy on-premises and on the cloud. We're just using the cloud.
The configuration process gets easier over time. The first time you configure it, it's hard.
What was our ROI?
The licensing process for Check Point Harmony Endpoint is very easy.
What's my experience with pricing, setup cost, and licensing?
We purchased Check Point directly from Check Point. We are partners. We didn't purchase it from the AWS marketplace.
What other advice do I have?
I would rate the overall solution a five out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 4, 2025
Flag as inappropriateManager - IT at NVCL Group
Good monitoring and visibility with compliance capabilities
Pros and Cons
- "It is easy to install from the cloud."
- "Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats."
What is our primary use case?
We use this solution for our desktops, laptops, servers, and selective mobile devices. It offers real-time protection against malware and other malicious threats is superb.
Our previously used antivirus has not been able to identify certain threats. Check Point Harmony did it. That is a key highlight of this product. Check Point Harmony Endpoint includes a firewall component that allows us to enforce network security policies at the endpoint level, including application control, network segmentation, VPN enforcement, etc.
How has it helped my organization?
We can now see the performance of the computers. Previously, we used some other applications where we could see the CPU percentage go increasingly high. Compared to that, this solution is good.
Check Point Harmony Endpoint helps us ensure endpoint compliance with security policies and regulatory requirements by enforcing configuration settings.
Moreover, It provides visibility into endpoint activities and enables security teams to detect, investigate, and respond to security incidents in real-time. So business progress never gets disturbed.
What is most valuable?
It monitors endpoint behavior in real-time to identify and block suspicious activities indicative of malware or malicious behavior. This proactive approach helps us a lot.
It employs sandboxing technology to execute suspicious files in a controlled environment and analyze their behavior. This allows it to identify and block malware that may evade traditional detection methods by remaining dormant or obfuscated.
More importantly, it is easy to install from the cloud.
What needs improvement?
Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats.
Enhancements in compliance management and reporting capabilities could help organizations meet regulatory requirements more effectively and streamline audit processes.
Continuously updating and enriching threat intelligence feeds and research capabilities can improve threat detection and prevention accuracy and effectiveness.
For how long have I used the solution?
I've used the solution for over a year.
What do I think about the stability of the solution?
Check Point is a well established cybersecurity vendor with a long history of developing and maintaining security solutions. Harmony Endpoint benefits from this experience and is built on a solid foundation of technology and best practices. That i believe.
What do I think about the scalability of the solution?
The centralized management console enables efficient management of endpoint security across the entire organization, irrespective of its size. Administrators can easily configure policies, deploy updates, and monitor endpoint activities from a single interface, streamlining management at scale.
How are customer service and support?
Customer service should be improved.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Check Point Harmony has fould a suspicious file that the previous application did not discover (that file was in the system for a period as alogic bomps).
How was the initial setup?
The initial setup was straightforward and easy.
What about the implementation team?
We handled the setup in-house.
What was our ROI?
We've noted ROI in Risk Reduction and have noted:
- Productivity gains
- Compliance cost reduction
- Operational efficiency
- Security consolidation
- Incident response cost reduction
What's my experience with pricing, setup cost, and licensing?
Compared to other service providers, the price is a bit high. That said, it is worth the price.
Which other solutions did I evaluate?
We did evaluate McAfee and Norton.
What other advice do I have?
The solution is good, hence I'm more concerned about the pricing. It would be good if that can be been reduced.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Head of IT at RD Tech
A professional and enterprise grade product that secure networks and offers peace of mind
Pros and Cons
- "Check Point Antivirus ensures our organization's security posture by ensuring that everyone accessing the internet does so securely. It performs packet inspection, enabling all security blades to monitor and filter traffic constantly. This includes URL filtering to prevent access to unwanted sites and to protect against any attempts to compromise our network."
- "The product should improve its pricing."
What is our primary use case?
The solution helps to protect our networks.
What is most valuable?
Check Point Antivirus ensures our organization's security posture by ensuring that everyone accessing the internet does so securely. It performs packet inspection, enabling all security blades to monitor and filter traffic constantly. This includes URL filtering to prevent access to unwanted sites and to protect against any attempts to compromise our network.
The product streamlines security operations in our IT environment through its single configuration point, making it easy to configure all available blades. Monitoring, extracting logs from, and integrating with our Active Directory are also easy.
All of the features work in tandem for effective malware prevention.
We are quite satisfied with Check Point Antivirus, as it offers leading-edge features that other companies may not have. Despite the higher price, we carefully selected the product based on its feature set.
The sandbox technology is very useful. It operates offline in the cloud and facilitates easy replication. The tool works with our Ubiquiti switches and Active Directory.
What needs improvement?
The product should improve its pricing.
What do I think about the stability of the solution?
We have stress-tested the tool. We've pushed a lot of requests to it, and it seems to be working fine.
What do I think about the scalability of the solution?
I think we will reach a limit once we get more traffic. But we don't expect that to happen on our current network. However, we would have to move to the next version regarding scalability. They have different tiers in their models with different performance levels. So we pitch in regards to current plus fifty percent. If we exceed that, we must go to the next level and buy the next product. My company has 150-200 users. I operate this with a team of two people. One is a primary, and the other is a secondary. It's extensively used, and we're always configuring and tuning it.
How are customer service and support?
We're paying for premium support, but it's worth its weight in gold because they are very quick. They understand things easily and come back to you with solutions very quickly. They reply quickly and know their stuff, which makes them easy to work with. They help us when we have problems and ensure they understand what we need.
How was the initial setup?
The setup of Check Point Antivirus can be straightforward or complex, depending on your familiarity with the product. Once you're familiar with it, the interface is easy to configure.
The deployment process was quick for us. We configured it using configuration files. We completed the configuration within four days, including a trial version over one weekend and production the following weekend.
What about the implementation team?
We relied on our in-house expertise for the deployment. However, the support provided by Check Point Antivirus was outstanding.
What was our ROI?
The return on investment is positive. Check Point Antivirus is not only securing our network but also simplifying management and facilitating changes.
What other advice do I have?
I rate the overall product a nine out of ten. My advice is that you get what you pay for. While it may cost more, Check Point Antivirus offers a fully mature, professional-grade product. This means you can trust that it's doing its job of securing our network. With Check Point Antivirus, you have peace of mind knowing that if something goes wrong, support is available.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
Microsoft Defender XDR
Cortex XDR by Palo Alto Networks
HP Wolf Security
Fortinet FortiClient
Elastic Security
WatchGuard Firebox
Trellix Endpoint Security Platform
Symantec Endpoint Security
Huntress Managed EDR
Kaspersky Endpoint Security for Business
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?