Try our new research platform with insights from 80,000+ expert users
You need to sign in or sign up before continuing.
Mantu Shaw - PeerSpot reviewer
Project Manager at a outsourcing company with 1,001-5,000 employees
MSP
Top 5
Easy-to-integrate product with a valuable feature for building API
Pros and Cons
  • "The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client."
  • "From an improvement perspective, the major challenge we've faced with Harmony is the support."

What is most valuable?

The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client. Both features offer significant advantages from different perspectives.

What needs improvement?

From an improvement perspective, the major challenge we've faced with Harmony is the support. While the technical features and xRail-based aspects are good, support still needs to be improved. However, this concern could be addressed effectively if they focus on improving support.

For how long have I used the solution?

We have been using Check Point Harmony Endpoint for the last three or four years.

What do I think about the scalability of the solution?

The product is scalable.

Buyer's Guide
Check Point Harmony Endpoint
June 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.

How are customer service and support?

Overall, technical support for all Check Point products has been a concern, but improvements have occurred recently. They are making significant changes, and the support is now more stable.

Which solution did I use previously and why did I switch?

Before implementing Check Point Harmony Endpoint, we used a similar solution called Trend Micro SMAX.

What other advice do I have?

Check Point Harmony Endpoint is easy to integrate with any Avaya platform. The interface is very user-friendly. In terms of promotions, the product is visible in the market.

I rate it a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Good threat extraction, reduces malicious attacks, and offers great features
Pros and Cons
  • "Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner."
  • "They should also add new functions such as threat hunting."

What is our primary use case?

The implementation of Check Point Harmony Endpoint has provided great improvements in the functioning of our organization. Therefore, we wanted to protect our courses from cyber attacks and required an end-to-end security system that could prevent/save us from cyber attacks and protect our sensitive data. 

The advantages that it presents is that you can access the systems on multiple devices, be it laptops, Mac, Windows or mobile devices and this is a great benefit. It provides reports where it brings the details of vulnerabilities.

How has it helped my organization?

Check Point Harmony Endpoint was implemented due to the fact that malware and cyber-attacks have been steadily increasing lately and we needed a tool that would prevent cyber-attacks. With Harmony Endpoint, it is possible to identify those attacks and prevent them. It has also given us the possibility to qualify all these possible attacks and thus take into account where and how they want to penetrate our network.

This implementation provided a fully functional antivirus solution that gave the company the ability to defend against almost all threats occurring inside or outside the network.

What is most valuable?

Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner.

The threat extraction and threat emulation have been a great benefit to give more autonomy to users.

On the other hand, it cannot be left out that it reduces the number of malicious attacks. It has helped us to properly monitor what has been happening with our network traffic and prevent individual attacks from accessing certain sites where we want to have restrictions or limitations.

What needs improvement?

Some problems that I have had with this and other Check Point tools in the cloud is when entering the portal since it stops responding or takes a long time to process a query and this causes delays and efficiency.

They should also add new functions such as threat hunting. 

Finally, it should be able to implement with and have a good integration and interaction with Azure in the management of vulnerabilities, and data management that between the two can be integrated 100% with Check Point Harmony Endpoint and thus be able to make good automated management.

For how long have I used the solution?

It was implemented approximately 2 years ago

What do I think about the stability of the solution?

The product is very stable. It has some problems in the cloud where the access is stuck, however, nothing has caused improper functioning.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint is an easy to scale tool.

How are customer service and support?

We have had good experiences. The cases have been successfully concluded.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Nothing was implemented that was similar to this type of tool.

How was the initial setup?

As mentioned before, the configuration of this tool is very simple and interactive.

What about the implementation team?

When the installation was done, a vendor helped us and explained how it worked.

What was our ROI?

With this tool, you can be sure of and have confidence that the investment made will protect the company's complete information.

What's my experience with pricing, setup cost, and licensing?

Check Point Harmony Endpoint is a tool that I highly recommend. Its implementation is very easy, as is its configuration.

Which other solutions did I evaluate?

Several tools were taken into account, however, Check Point was chosen as we have already used several tools and it has given us confidence and solidity.

What other advice do I have?

It is an excellent tool in the management of vulnerabilities.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
June 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Berkhan Yaman - PeerSpot reviewer
Cyber ​​Security Specialist at a tech services company with 11-50 employees
Reseller
Top 5
Has a great encapsulation system but could use better support ticketing
Pros and Cons
  • "The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists."
  • "In terms of improvement, the ticketing system could be better. It is a little tricky to try to open a case and give it to an engineer."

What is our primary use case?

Our company uses Harmony Endpoint for encryption and encapsulation. Our clients use it for data encryption.

What is most valuable?

The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists.

What needs improvement?

In terms of improvement, the ticketing system could be better.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for about three months. 

What do I think about the stability of the solution?

In terms of stability, I would rate it an eight out of ten.

What do I think about the scalability of the solution?

I would rate the scalability of the solution a solid eight out of ten. It could be slightly improved. Approximately 1000 people use Harmony Endpoint at our company. The maintenance is done once a week by a team of three engineers.

How are customer service and support?

In the Harmony series, the products are linked to each other. It is a little tricky when you try to open a case and give it to an engineer because, in our custom environment, we have to access it from their devices. For example, in Harmony Mobile, their Android or iPhone devices have to be used. All of that takes time and it would be good if Check Point could find a better solution to this and create a feature to help us collect logs for the cases. I would rate the support a six out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I'm currently working with Cisco Secure Endpoint and Palo Alto Cortex XDR. 

How was the initial setup?

We use both the cloud and on-premise solutions. The initial setup is simple and creating a profile with the agents is easy. We only create agents and direct them to versions of the agents while we integrate them with the process. It only takes about five minutes to deploy one mission.

What was our ROI?

We have seen good results with the solution. If it is used with Linux or Mac, it provides better performance.

What's my experience with pricing, setup cost, and licensing?

Check Point Harmony Endpoint is a subscription-based solution and the pricing is quite reasonable when compared to other solutions on the market. I would give it a nine out of ten in terms of affordability.

What other advice do I have?

My advice to people who are considering using Check Point Harmony Endpoint is to be careful of which version you choose while deploying the solution. You should get the recommended versions for the agents. Otherwise, there will be a lot of problems and soft ticketing. Overall, I would rate Harmony Endpoint a seven out of ten.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 20
Harmony Endpoint - modern app security in infinity portal
Pros and Cons
  • "The most important characteristic of our requirements was the implementation of disk encryption."
  • "We would like to make the documentation for more modern solutions like the Harmony family easier to find."

What is our primary use case?

Within the company, some departments, including the IT department, require their users to be connected from anywhere. In order to provide security to their teams, whether they were inside or outside the company, it was necessary to be able to implement a robust solution that would help us with access, equipment security, and reliability both for the protection of equipment information and to avoid vulnerabilities through applications to which users have access with credentials and administrator permissions.

How has it helped my organization?

This "Harmony Endpoint" tool is a modern solution from the Check Point Harmony family and has helped us improve the company's security with anti-malware protection, ransomware, among others, real-time protection, monitoring, and review of logs from the Check Point Infinity Portal. 

Thanks to these characteristics, we have gained control over the equipment to avoid data loss. For example, with the encryption of the device units, we can avoid loss of the equipment, as well as access protection and application control policies, among other options that were enabled. It's leveraged to improve security.

What is most valuable?

The most important characteristic of our requirements was the implementation of disk encryption. It's necessary to avoid loss or theft of the equipment and, therefore, loss of data from the equipment. It can be applied to all the equipment from the portal or segments.

Another advantage is the control of applications and access policies that can be carried out in a granular manner for different company profiles. It works very well.

It offers secure administration from Check Point Infinity Portal. It is a security center where many of the Check Point solutions are located.

What needs improvement?

The improvements that can be mentioned are few. The solution and its architecture are very well done.    

The Check Point Infinity Portal sometimes has some latency or performance issues that are slightly worse, affecting user management. It cannot be improved by the customer.

We would also like to make the documentation for more modern solutions like the Harmony family easier to find. That way, we can implement these solutions with the best practices recommended by the manufacturer.

For how long have I used the solution?

The solution has been used for more than two years for our portable devices with high mobility.

Which solution did I use previously and why did I switch?

Previously we used ESET at endpoints, however a site once had a ransomware attack and the solution was not able to solve the problem, so it was decided to change.

What's my experience with pricing, setup cost, and licensing?

The costs are per user. It is a good option for covering company equipment.

I recommend finding a partner that can help you with the costs for this and any other Check Point solution.

What other advice do I have?

This solution is very good and complete. I recommend it. You should try it and decide.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Its a nice administrative portal, In Infinity centralize and easy
Pros and Cons
  • "We love the reports and monitoring they provide."
  • "Infinity Portal sometimes requires more performance."

What is our primary use case?

Check Point Harmony Mobile was provided through an installed agent which has very light protection against malware and ransomware, among others. 

In our country, many ransomware threats have been generated at the country level, for which it was worrying that we had kidnapping or encryption of our data. At the management level, the request was given to provide additional security to protect us. The tool has been very good.

We tested this Check Point tool to assess the performance of our endpoints, and shield them safely while increasing the protection of our platforms.

How has it helped my organization?

Our company wanted to provide an additional layer of security for our endpoints. We already manage Check Point with different tools, We have done very well with them and we have validated how Check Point Harmony Endpoint works to protect our endpoint equipment. So far, it works quite well.

We have seen the reports of attempted attacks and we have been able to provide a solution to these vulnerabilities. There is less malware in our infrastructure.

Its characteristics are quite good.

What is most valuable?

The characteristic that most attracts our attention is the administration portal. It doesn't require a management server since its licensing and management are through the Check Point Infinity Portal. It is very intuitive and easy to implement.

The way in which the agent is installed on the computers is very easy, it does not consume almost any performance of the server or final computers, in this way there is no need to worry about increasing resources to be able to protect them with Check Point Harmony Endpoint.

We love the reports and monitoring they provide. It helps us quickly see what vulnerabilities we have on our endpoints.

What needs improvement?

We have few disadvantages or improvement points. However, the Infinity Portal sometimes requires more performance. It is a small detail. However, it could be improved.

On the other hand, it is also essential that the manufacturer improves the public documentation so that users can better understand how it can be implemented with best practices.

Finally, at the support level, we believe that Check Point can improve. Sometimes the answers are provided at dawn, which makes it more challenging to solve.

For how long have I used the solution?

The solution is a very good security tool. It was used this year at a test level and everything works very well.

Which solution did I use previously and why did I switch?

Previously we only had or used Microsoft's antivirus or endpoint, however, we had all non-centralized security. Through this tool, we can centralize everything in the Infinity Check Point Portal.

What's my experience with pricing, setup cost, and licensing?

Licensing is per endpoint, which is why we think is good. The cost is competitive, and its features are very good.

Which other solutions did I evaluate?

We validated several manufacturers, however, we did not want to have separate solutions. It seems to us a better option to have only Check Point.

What other advice do I have?

I recommend this security tool, it is always important to test the tool at the test level to decide if it is what you are looking for.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Security Network Engineer at АТ "Банк інвестицій та заощаджень"
Real User
Top 20
Useful centralized management, responsive support, but resources usage could improve
Pros and Cons
  • "The most valuable feature of Check Point Harmony Endpoint is centralized management."
  • "Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features."

What is our primary use case?

We have many clients using this solution for different use cases.

The solution can be deployed on the cloud and on-premise.

Check Point Harmony Endpoint is mainly used for protection. 

What is most valuable?

The most valuable feature of Check Point Harmony Endpoint is centralized management.

What needs improvement?

Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for approximately two years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is very stable.

What do I think about the scalability of the solution?

The scalability of the Check Point Harmony Endpoint is good. It can scale easily.

We have some clients with 10,000 users that are using this solution.

How are customer service and support?

I have opened up many tickets with the support and they have been responsive. I have not had any problems with them. They have helped whenever I faced a problem.

I rate the support from Check Point Harmony Endpoint a four out of five.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup of the Check Point Harmony Endpoint is easy. We use the main policy for the installation across the organization.

We have had some problems with connection management because if we install the initial client on the computer, we cannot stop or delete this client or install the full package afterward.

If we have a new signature technical support ticket, they add this signature to the database in three to five days which they could improve.

I rate the initial setup from Check Point Harmony Endpoint a four out of five.

Which other solutions did I evaluate?

Check Point Harmony Endpoint does not have some features that SentinelOne or CloudStrike has.

What other advice do I have?

I rate Check Point Harmony Endpoint a seven out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
reviewer1954029 - PeerSpot reviewer
Head of Security and Operational Risk at Medianet
User
Great real-time click protection, web filtering, and compatability
Pros and Cons
  • "We are able to manage all our endpoints from a single cloud console."
  • "It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products."

What is our primary use case?

As a financial company, we use the solution to provide security to our CDE environment and compliance with all PCI requirements. This tool enables us to provide security to the endpoints and also, to comply with local and foreign regulations regarding platform security.

We use this solution to protect all our endpoints, including personal computers and mobile phones. 

We have deployed the solution in Windows, Linux servers, workstations, and mobile phones. 

We also use the web filter capabilities both on mobile phones and on corporate computers.  

How has it helped my organization?

We now have so many capabilities we did not have before, as follows:

  • We are able to manage all our endpoints from a single cloud console
  • We don't need adicional on-premise servers to run this solution
  • The time that the endpoint refresh and identify new policies is very short. It takes seconds and this is a great value for us to fight emerging threats
  • We are now able to protect web browsing in all web browsers and also we don't need additional policies to block browsers in private browsing
  • The integratión with our SIEM solution was very smooth and the solution provides valuable information for security analysis

What is most valuable?

The most valuable aspects include:

  • Web Filtering. This feature is easy to manage, and it applies new policies in seconds. 
  • Real-time Click Protection. It protects the user from phishing attacks in real time. 
  • Compatibility with Windows, Linux, Android, and Mac. We don't need additional solution to protect all our endpoint. 
  • Cloud Management. This feature allows us to reduce our operating burden and also improve our TCO.

We now have the ability to block a compromised machine from the network.

We now have the ability to block in near real-time IOC.

What needs improvement?

It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products. 

It would also be great to include FIM capabilities for the Endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products.

It would be great if we could have additional DLP capabilities to identify personal information or any kind of information to comply with regulations that require information protection. 

For how long have I used the solution?

I have been using the solution for about three months.

What do I think about the stability of the solution?

We haven't had any problems or downtime since we acquired the solution. It is stable.

What do I think about the scalability of the solution?

The solution is scalable. It is quite simple to add new endpoints to the solution or add additional features, all with zero downtime. 

How are customer service and support?

Customer support and channel support are also always willing to help. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have been using McAfee Endpoint protection for about ten years. We were missing so many features and needed additional tools and effort to protect our endpoint. 

How was the initial setup?

It took a few minutes to deploy the whole solution.

What about the implementation team?

It was through a vendor. They were experts on the product.

What's my experience with pricing, setup cost, and licensing?

The costs depend on the company size. In my case, I was able to have all the features, including email protection, remote access, mobile protection, and endpoint protection, for a great price. 

Which other solutions did I evaluate?

I evaluated Trend Micro and McAfee.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
JamesYa - PeerSpot reviewer
Senior Solutions Architect at Cloud4C Services
Real User
Offers good protection against malware, but the price could be better
Pros and Cons
  • "The solution has all the standard features you would expect for endpoint protection."
  • "The price of the product could be more friendly."

What is our primary use case?

We use the product for endpoint protection against viruses, malware and ransomware technologies.

What is most valuable?

The solution has all the standard features you would expect for endpoint protection.

What needs improvement?

The price of the product could be more friendly. 

For how long have I used the solution?

I have been using the solution for one year now. 

What do I think about the stability of the solution?

We have had no problems with stability so far. 

What do I think about the scalability of the solution?

The solution isn't very scalable, it's a PC, and it's all endpoint. 

Currently, there are 2000 users of this product in my company. This number can change in the future due to company growth. Next year, each employee at the company will have a notebook and each notebook will have this software installed in it. If the headcount increases, the license will increase accordingly.

Which solution did I use previously and why did I switch?

We previously used McAfee for endpoint protection, it was a corporate decision to switch. This could have been due to a cost or technology issue. 

How was the initial setup?

Installation is straightforward, it took our IT department 20 minutes. 

The product has very fast deployment, as we roll out the product in batches. These batches can vary between one and hundreds. This number depends on how the team schedules the roll-out, as each roll-out is customized to match the bandwidth requirements.

What about the implementation team?

We used an in-house team to implement the solution. 

What's my experience with pricing, setup cost, and licensing?

We implement this solution with a yearly subscription and there are no extra costs. 

What other advice do I have?

I would recommend Microsoft Defender for Endpoint over this solution. 

I would rate this solution a seven out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.