Try our new research platform with insights from 80,000+ expert users
Paulo F - PeerSpot reviewer
Business Development Manager at a tech services company with 501-1,000 employees
User
Nov 15, 2023
Granular and resilient with many robust features
Pros and Cons
  • "The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets."
  • "Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries."

What is our primary use case?

In the intricate web of digital landscapes, my primary use of Check Point Endpoint Security is a guardian for my organization's digital footprint. This robust solution stands as a vigilant sentinel, meticulously securing each endpoint against the relentless tide of cyber threats. 

Its dynamic threat prevention capabilities, seamlessly integrated into our environment, create an impervious shield against malware, ransomware, and other malicious actors. 

With an intuitive interface and real-time monitoring, it not only defends but also empowers, allowing me to traverse the digital domain with confidence. 

In this narrative of cyber resilience, Check Point Endpoint Security is not just a tool; it ensures that every endpoint under its watch remains secure in our interconnected digital ecosystem.

How has it helped my organization?

The integration of Check Point Endpoint Security has been a transformative force within my organization. 

As we embraced this robust solution, a paradigm shift occurred – a palpable enhancement in our digital resilience. The advanced threat prevention mechanisms woven into the fabric of Check Point have acted as an impenetrable shield, thwarting malicious intruders and fortifying the security posture of every endpoint. 

This newfound defense has not only safeguarded our sensitive data but has also instilled a sense of confidence among our team members, enabling them to navigate the digital realm without fear.

What is most valuable?

Check Point Endpoint Security has proven to be a beacon of resilience, with its multifaceted features illuminating our defense strategy. The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets. 

The granular control over endpoint activities empowers us to tailor security policies, ensuring a bespoke approach that aligns with our unique operational needs. The intuitive dashboard and centralized management streamline our security operations, enhancing efficiency and providing a comprehensive overview of our digital landscape. 

Notably, the seamless integration with other security components orchestrates a harmonious defense orchestra, fostering collaboration and maximizing the synergy of our security infrastructure. 

In this narrative of fortified cybersecurity, it's the amalgamation of these features that makes Check Point Endpoint Security an invaluable guardian, fortifying our digital realm against the relentless march of cyber threats.

What needs improvement?

A robust threat intelligence integration could elevate proactive defense, offering real-time insights to anticipate and thwart emerging threats more effectively. 

Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries. 

Streamlined incident response tools within the platform would empower security teams to react swiftly and decisively in the face of potential breaches. Integration with emerging technologies, such as artificial intelligence and machine learning, could usher in a new era of adaptive and self-learning security protocols. 

Furthermore, a user-friendly interface for custom reporting and analytics would empower organizations to derive actionable insights from security data. In this ongoing narrative of cybersecurity evolution, the inclusion of these features in the next release would undoubtedly fortify Check Point Endpoint Security as an even more comprehensive and dynamic guardian in the ever-expanding digital frontier.

Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for more than three years.

What do I think about the stability of the solution?

The solution is very stable.

What do I think about the scalability of the solution?

The scalability is very good.

How are customer service and support?

The technical support is excellent.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used to use Kaspersky, and we switched for security reasons.

How was the initial setup?

The initial setup was straightforward; it was easy.

What about the implementation team?

We handled the setup in-house.

What's my experience with pricing, setup cost, and licensing?

Its price is competitive.

Which other solutions did I evaluate?

We also evaluated Trend Micro.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner integrator
PeerSpot user
Rakesh Jadhav - PeerSpot reviewer
Sr. Technical Consultant - Presales at a tech services company with 501-1,000 employees
User
Nov 6, 2023
Easy to set up with helpful support and great flexibility
Pros and Cons
  • "It has extended OS support to ensure your legacy endpoints also have zero-day protection."
  • "They need to focus on more scalability (as much as possible) so that the solution can run across all supported OS."

What is our primary use case?

This solution can provide you with robust endpoint security and has the ability to give deep-level forensics because of EDR capability. 

The solution can offer you value-added features with the EPP-EDR platform to ensure complaint and posture management, category-based web access, disk encryption, password protection, and DLP over endpoint channels.

The primary key use cases for Check Point are:

1. Single console across multiple Check Point solutions using the Infinity Portal

2. Flexible deployment architecture

3. OS support

4. Rich threat intel to mitigate known/unknown attacks

5. Flexibility to bundle multiple value-added additional modules/features with the EPP platform

How has it helped my organization?

By using Harmony, you can provide 100 % security to the endpoints along with compliance and management features. This has a flexible deployment method. 

It has extended OS support to ensure your legacy endpoints also have zero-day protection. 

Using add-ons such as posture management, organizations can manage OS-level vulnerability and get rid of unwanted beaches. 

Check Point Harmony also protects you from web-based attacks along with category-based restrictions to ensure the end user gets the required access. 

What is most valuable?

Integration of the Check Point Threat intel cloud with the EPP-EDR platform, which is enhancing and providing efficient DB for threat hunting and preventing zero-day using an anti-exploit platform. 

Apart from the EPP and EDR capability, Check Point Harmony can integrate using API with 3rd party vendors; Azure AD integration makes the whole deployment and management easy for the administrator.

Multiple endpoint protection packages are available for organizations. Also, it is an MSSP-compatible platform.

What needs improvement?

With Check Point, you will get your all required value-added features as per your requirements. That said, they need to focus on more scalability (as much as possible) so that the solution can run across all supported OS. 

There are legacy OS concerns. It would be really helpful for them if legacy OS support could be extended up to Windows XP. 

Aside from that, Check Point Harmony will be a suitable option for any type of organization.

For how long have I used the solution?

I have been closely working on this solution in my organization over the last year. 

What do I think about the stability of the solution?

Using rich threat intel and robust endpoint security, the solution ensures protection against known and unknown attacks.

What do I think about the scalability of the solution?

The solution offers a flexible deployment and easy management through a consolidated console. 

How are customer service and support?

Support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously I worked with Cylance AV. Considering all value-added features along with the robust endpoint solution and threat intel, Check Point Harmony is the better choice. 

How was the initial setup?

The initial setup is very simple.

What about the implementation team?

We handled the implementation in-house.

What was our ROI?


What's my experience with pricing, setup cost, and licensing?

The pricing is really competitive when you consider other known vendors in the market.

Which other solutions did I evaluate?

We explored some traditional solutions as well.

What other advice do I have?

Check Point Harmony is feature-rich and robust, with great endpoint detection and response capabilities to ensure deep forensic understanding across incidents. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.
Independent Information Technology and Services Professional at a non-profit with 1-10 employees
Real User
Top 5
Sep 29, 2024
Antivirus with excellent performance, detailed reporting, and robust scanning features
Pros and Cons
  • "The Antivirus engine's performance has been excellent."
  • "More applications should be supported."

What is our primary use case?

We use the antivirus for FTP email scanning, attachment scanning, FTP download, HTTP download, and HTTPS download with SSL and inspection. It is also used in conjunction with the firewall gateway and security gateway.

What is most valuable?

The most valuable features include scanning, sandbox features, and antivirus reporting. The Antivirus engine's performance has been excellent.

What needs improvement?

More applications should be supported. For example, the ability to detect viruses or scan attachments within applications like Skype or similar applications could be improved.

For how long have I used the solution?

We have been using the solution for 15 years.

How are customer service and support?

The customer service and support are rated highly. The overall rating for support was 9.5 out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Symantec and ESET before switching to Check Point Antivirus. We switched due to its detection capabilities and the high reputation of Check Point for preventing breaches and antivirus protection. Symantec's performance had issues with heavy CPU and memory usage.

How was the initial setup?

The initial setup could be rated as seven or eight out of ten. For those with experience on the Check Point platform, it's easy to set up. 

However, for new administrators, the setup can be confusing because it uses a separate part of the panel and offers an option for legacy setup, which opens the old Check Point Smart dashboard.

What about the implementation team?

One person handled the deployment in-house.

What's my experience with pricing, setup cost, and licensing?

On a scale of one to ten for pricing, with ten being the most expensive and one being the cheapest, Check Point Antivirus is rated as one, making it the most affordable among antivirus products.

Which other solutions did I evaluate?

We used and evaluated Symantec, ESET, Fortinet, Cisco, and Palo Alto before switching to Check Point Antivirus.

What other advice do I have?

I would definitely recommend Check Point Antivirus to others. The product is very effective and performs well without causing any significant hit on CPU or memory.

I'd rate the solution nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Presales Engineer at a security firm with 11-50 employees
Real User
Top 5Leaderboard
Apr 15, 2024
A cloud solution for antivirus, device encryption and URL filtering
Pros and Cons
  • "The solution offers multiple features in one solution, along with data detection."
  • "Check Point should provide some technical sessions on antivirus solutions."

What is our primary use case?

We use the solution for antivirus, device encryption, file encryption, and URL filtering.

What is most valuable?

The solution offers multiple features in one solution, along with data detection.

What needs improvement?

The agent side should be less. It impacts customers' asset performance because it will be more complex for the customers.

For how long have I used the solution?

I have been using Check Point Antivirus for 6-8 months.

What do I think about the stability of the solution?

Check Point should provide some technical sessions on antivirus solutions. Then, it would be helpful to reach more customers in India.

I rate the solution’s stability a seven out of ten.

What do I think about the scalability of the solution?

The solution is scalable. We have a few customers using this solution.

How are customer service and support?

It is quite difficult to get a response from OEM. We are facing issues with all products except for email security, with the support team of the Check Point.

How was the initial setup?

The initial setup is complex, depending on the number of assets. It takes less than half an hour for a single asset. We should set up everything after deploying and testing it. Symantec takes five to ten minutes after deploying to test everything. We use manual deployment.

What was our ROI?

The solution is helpful for a particular budget. We are getting the best solution that will cover all your parameters.

What's my experience with pricing, setup cost, and licensing?

The product’s pricing is moderate.

What other advice do I have?

Every feature provided by the antivirus software is good compared to other solutions. Sandboxing is helpful for customers while downloading and detecting malicious software.

1-2 persons are required for deployment, whereas the maintenance and monitoring need a team of three to five members.

I will recommend the solution. It's a very good solution compared to other antivirus capability servers. The sandboxing technology is helpful.

We have not integrated it with any other tool set. We integrated a Check Point to get the logs or connect the data.

Overall, I rate the solution an 8 out of 10.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
PeerSpot user
Complaints analysis/investigation at a healthcare company with 10,001+ employees
Real User
Feb 2, 2023
Great features, helps with blocking unauthorized access, and protects data
Pros and Cons
  • "With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access."
  • "We'd like to see better integration with other security tools."

What is our primary use case?

Check Point Antivirus helps us to protect our networks and systems against computer threats such as viruses, spyware, malware, and online attacks. It helped us greatly improve the security perimeter with its advanced features, such as intrusion prevention, threat detection, and access control, which help to protect sensitive data and company information. It's helped us shrink all the security gaps and is an excellent tool for protecting all the endpoints of an organization. If the company must be audited, it helps a lot to meet many of the compliance requirements.

How has it helped my organization?

Check Point Antivirus helped us to improve in several ways. It offers advanced features such as data protection. With it, we were able to protect sensitive and confidential company data from online threats and external attacks. 

We also achieved intrusion prevention using intrusion detection to prevent attacks on the company network. 

With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access.

With its various features, we can enable business continuity with adequate protection while minimizing risks in operations.

What is most valuable?

Some of the Check Point Antivirus features that users may find valuable include:

The firewall helps provide protection to block unauthorized access to the network.

Intrusion prevention prevents attacks on the company network and helps companies to comply with regulatory requirements related to data protection.

It has a wide range of features that help make this tool one of the best on the market.

What needs improvement?

As with any tool, improvements can be made. Some improvements that would be useful include:

  • An updated user interface to improve it to make it easier to use.
  • Integration with other security tools. We'd like to see better integration with other security tools.
  • They should incorporate artificial intelligence and machine learning 
  • Performance could be better to reduce the impact on system resources as it consumes a lot of resources from some endpoints.

For how long have I used the solution?

The solution was implemented approximately five years ago.

What do I think about the stability of the solution?

The tool was designed to be highly stable with regular software updates and proactive monitoring.

What do I think about the scalability of the solution?

It is a highly scalable tool that has centralized management, automatic updates, and load-balancing capabilities. 

How are customer service and support?

They must improve support and customer service by improving response times and their SLA.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, we only used an antivirus on the devices. After migrating our platform to the cloud, we needed a more robust tool and chose Check Point. 

How was the initial setup?

The installation of the product is complex if you do not have any previous knowledge. Once that learning curve is overcome, the administration and configuration become easy.

What about the implementation team?

The implementation was done in conjunction with an engineer from the provider and the IT department.

What was our ROI?

It is always good to generate an implementation plan for the acquisition and company requirements to make the best purchase decision and to gain a quick return.

What's my experience with pricing, setup cost, and licensing?

The price and licenses will depend on the features and functions that need to be implemented, as well as the number of devices needed. It is easy to install, however, you must have prior knowledge of the product.

Which other solutions did I evaluate?

We evaluated several solutions on the market that met the characteristics and requirements that we needed. Some were:

What other advice do I have?

It is always important to do a cost analysis and check requirements before making a decision.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
SANDRA SUAREZ - PeerSpot reviewer
CEO at a tech services company with 1-10 employees
Reseller
Top 20
Jul 24, 2024
Provides encryption for operating systems and protection against malware
Pros and Cons
  • "It provides encryption for operating systems and protects browsers against malware."
  • "The endpoint might consume excessive resources from the machine, which can impact its performance."

What is most valuable?

It provides encryption for operating systems and protects browsers against malware, benefiting both new and old customers.

What needs improvement?

When using Check Point Harmony Endpoint, performance issues may occur, although not necessarily a ransomware attack. The endpoint might consume excessive resources from the machine, which can impact its performance.

For how long have I used the solution?

We have partnered with Check Point Harmony Endpoint.

What do I think about the scalability of the solution?

We have 25 endpoints using this solution.

How are customer service and support?

Email support works fine, but it needs to be on the phone.

How would you rate customer service and support?

Positive

How was the initial setup?

The deployment is not complex if you have to manage it. The installation can be done directly if the customer has a good knowledge of Microsoft systems. However, we have to install it manually, which can be difficult, especially when replacing all the old agents.

If the customer doesn't have an IP directory, we only put one person in it. We are deploying up to 1500 endpoints with only one person, maybe in two weeks. If the customer doesn't have an active directory and has 100-200 endpoints to install, we normally have to use three security engineers.

I rate the initial setup a nine out of ten, where one is difficult and ten is easy.

What was our ROI?

We have a particular case where today's endpoint provides complete security against ransomware. It runs effectively from work. It is about eighty to ninety percent effective.

What's my experience with pricing, setup cost, and licensing?

The pricing is high because we lost several customers to Trend Micro and Symantec. Latin America and Columbia particularly have high prices. It was probably fifty percent more.

What other advice do I have?

As a partner, Check Point provides us with the best protection. We can also arrange a demo or discussion to showcase the protection features and advantages to our customers.

Overall, I rate the solution an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Ajenthan Aiyathurai - PeerSpot reviewer
Manager - IT at a manufacturing company with 501-1,000 employees
Real User
Top 5Leaderboard
Jun 2, 2024
Good monitoring and visibility with compliance capabilities
Pros and Cons
  • "It is easy to install from the cloud."
  • "Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats."

What is our primary use case?

We use this solution for our desktops, laptops, servers, and selective mobile devices. It offers real-time protection against malware and other malicious threats is superb. 

Our previously used antivirus has not been able to identify certain threats. Check Point Harmony did it. That is a key highlight of this product. Check Point Harmony Endpoint includes a firewall component that allows us to enforce network security policies at the endpoint level, including application control, network segmentation, VPN enforcement, etc.

How has it helped my organization?

We can now see the performance of the computers. Previously, we used some other applications where we could see the CPU percentage go increasingly high. Compared to that, this solution is good. 

Check Point Harmony Endpoint helps us ensure endpoint compliance with security policies and regulatory requirements by enforcing configuration settings. 

Moreover, It provides visibility into endpoint activities and enables security teams to detect, investigate, and respond to security incidents in real-time. So business progress never gets disturbed. 

What is most valuable?

It monitors endpoint behavior in real-time to identify and block suspicious activities indicative of malware or malicious behavior. This proactive approach helps us a lot. 

It employs sandboxing technology to execute suspicious files in a controlled environment and analyze their behavior. This allows it to identify and block malware that may evade traditional detection methods by remaining dormant or obfuscated. 

More importantly, it is easy to install from the cloud. 

What needs improvement?

Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats. 

Enhancements in compliance management and reporting capabilities could help organizations meet regulatory requirements more effectively and streamline audit processes. 

Continuously updating and enriching threat intelligence feeds and research capabilities can improve threat detection and prevention accuracy and effectiveness.

For how long have I used the solution?

I've used the solution for over a year.

What do I think about the stability of the solution?

Check Point is a well established cybersecurity vendor with a long history of developing and maintaining security solutions. Harmony Endpoint benefits from this experience and is built on a solid foundation of technology and best practices. That i believe. 

What do I think about the scalability of the solution?

The centralized management console enables efficient management of endpoint security across the entire organization, irrespective of its size. Administrators can easily configure policies, deploy updates, and monitor endpoint activities from a single interface, streamlining management at scale.

How are customer service and support?

Customer service should be improved. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Check Point Harmony has fould a suspicious file that the previous application did not discover (that file was in the system for a period as alogic bomps).

How was the initial setup?

The initial setup was straightforward and easy.

What about the implementation team?

We handled the setup in-house.

What was our ROI?

We've noted ROI in Risk Reduction and have noted:

  • Productivity gains
  • Compliance cost reduction
  • Operational efficiency
  • Security consolidation
  • Incident response cost reduction

What's my experience with pricing, setup cost, and licensing?

Compared to other service providers, the price is a bit high. That said, it is worth the price. 

Which other solutions did I evaluate?

We did evaluate McAfee and Norton. 

What other advice do I have?

The solution is good, hence I'm more concerned about the pricing. It would be good if that can be been reduced. 

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Head of IT at a tech services company with 11-50 employees
Real User
Top 5Leaderboard
Apr 10, 2024
A professional and enterprise grade product that secure networks and offers peace of mind
Pros and Cons
  • "Check Point Antivirus ensures our organization's security posture by ensuring that everyone accessing the internet does so securely. It performs packet inspection, enabling all security blades to monitor and filter traffic constantly. This includes URL filtering to prevent access to unwanted sites and to protect against any attempts to compromise our network."
  • "The product should improve its pricing."

What is our primary use case?

The solution helps to protect our networks. 

What is most valuable?

Check Point Antivirus ensures our organization's security posture by ensuring that everyone accessing the internet does so securely. It performs packet inspection, enabling all security blades to monitor and filter traffic constantly. This includes URL filtering to prevent access to unwanted sites and to protect against any attempts to compromise our network.

The product streamlines security operations in our IT environment through its single configuration point, making it easy to configure all available blades. Monitoring, extracting logs from, and integrating with our Active Directory are also easy.

All of the features work in tandem for effective malware prevention.
We are quite satisfied with Check Point Antivirus, as it offers leading-edge features that other companies may not have. Despite the higher price, we carefully selected the product based on its feature set.

The sandbox technology is very useful. It operates offline in the cloud and facilitates easy replication. The tool works with our Ubiquiti switches and Active Directory.

What needs improvement?

The product should improve its pricing. 

What do I think about the stability of the solution?

We have stress-tested the tool. We've pushed a lot of requests to it, and it seems to be working fine.

What do I think about the scalability of the solution?

I think we will reach a limit once we get more traffic. But we don't expect that to happen on our current network. However, we would have to move to the next version regarding scalability. They have different tiers in their models with different performance levels. So we pitch in regards to current plus fifty percent. If we exceed that, we must go to the next level and buy the next product. My company has 150-200 users. I operate this with a team of two people. One is a primary, and the other is a secondary. It's extensively used, and we're always configuring and tuning it.

How are customer service and support?

We're paying for premium support, but it's worth its weight in gold because they are very quick. They understand things easily and come back to you with solutions very quickly. They reply quickly and know their stuff, which makes them easy to work with. They help us when we have problems and ensure they understand what we need.

How was the initial setup?

The setup of Check Point Antivirus can be straightforward or complex, depending on your familiarity with the product. Once you're familiar with it, the interface is easy to configure.

The deployment process was quick for us. We configured it using configuration files. We completed the configuration within four days, including a trial version over one weekend and production the following weekend.

What about the implementation team?

We relied on our in-house expertise for the deployment. However, the support provided by Check Point Antivirus was outstanding.

What was our ROI?

The return on investment is positive. Check Point Antivirus is not only securing our network but also simplifying management and facilitating changes.

What other advice do I have?

I rate the overall product a nine out of ten. My advice is that you get what you pay for. While it may cost more, Check Point Antivirus offers a fully mature, professional-grade product. This means you can trust that it's doing its job of securing our network. With Check Point Antivirus, you have peace of mind knowing that if something goes wrong, support is available.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.