Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint Room for Improvement

Nasseer Qureshi - PeerSpot reviewer
Pre Sales Consultant at Redington Group

I see a need for improvement especially in policy management and policy customization with Check Point Harmony Endpoint. As a new user, I find it somewhat difficult to customize and apply policies due to the various options available. I would appreciate improvement in fine-tuning those policies and integrating with other tools, such as being able to send logs from Check Point to our SIM or syslog solution.

The user interface is good, and I really appreciate it, but improvements are needed in policy customization and integration with third-party products. Additionally, I would prefer to see a mechanism to send agents directly from the console to an endpoint during installation.

View full review »
Hailemichael Yigrem - PeerSpot reviewer
Senior Cyber Security Engineer at Deliver ICT and Telecommunication Technology PLC

One challenge with Check Point Harmony Endpoint is that it has a higher cost.

View full review »
Jitendra_Sharma - PeerSpot reviewer
Network Security Engineer at Binary Global Ltd

Check Point Harmony Endpoint can be improved performance-wise.

Sometimes the Check Point Harmony Endpoint performance slows down when we use scanning and update sessions. During these activities, the performance impact on endpoints decreases. This aspect can be improved.

View full review »
Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,445 professionals have used our research since 2012.
IZ
Senior Solution Consultant at a tech services company with 51-200 employees

Check Point Harmony Endpoint could be improved by integrating with multiple other security solutions.

The integration challenges with Check Point Harmony Endpoint involve needing support with other third-party applications that I wish it worked with more seamlessly.

That is my main concern regarding needed improvements to Check Point Harmony Endpoint.

View full review »
MW
Technical Specialist at Softcell Technologies Limited

In terms of improvement, the Endpoint Agent can be more lightweight so that older machines and laptops can easily handle its consumption, which would enhance the overall performance in our environment.

View full review »
NS
Senior Security Analyst at SecurView Systems Pvt Ltd

While using Check Point Harmony Endpoint, I find that the initial deployment can be a bit complex, especially for large or distributed environments, requiring proper planning and familiarity with the Check Point ecosystem. There can be occasional false positives that need to be manually reviewed and whitelisted.

View full review »
Harshal Pachpande - PeerSpot reviewer
Security Analyst at Securview

For improvements in Check Point Harmony Endpoint, I would highlight that more granular reporting and dashboards for EDR solutions could be beneficial, as could enhanced third-party integrations for additional threat intelligence that can be integrated into the system.

View full review »
reviewer2751327 - PeerSpot reviewer
Cloud network engineer at a manufacturing company with 10,001+ employees

Check Point Harmony Endpoint can be improved as it is a bit clunky and not intuitive, especially when navigating around the more advanced settings or trying to interpret the logs, and the agent is resource intensive on some occasions.

With the advanced settings or logs, there is an overall bad experience, as there are particular settings and log types that are confusing and hard to use. More improvements are required in these areas.

View full review »
BO
Adjunct Professor, Cybersecurity at University of the People

Check Point should improve on their patch management by releasing patches more frequently, such as on a weekly basis, to stay ahead of potential vulnerabilities.

View full review »
Jitendra_Sharma - PeerSpot reviewer
Network Security Engineer at Binary Global Ltd
While I do not have any specific feature-related suggestions for improvement, I think reducing costs and providing as much technical information as possible would help users feel more comfortable installing and configuring the product.

Improvements could involve enhancing support documentation to make the installation and configuration processes easier for users.

View full review »
IF
Manager, Information Technology Cyber At Edeltech O & M at Ezom
One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days. View full review »
Alejandro Flores. - PeerSpot reviewer
Director de Ingenieria at Smartelecom SA de CV

There are some "weak points" that have to be mentioned, including:

1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents.

2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions.

3) You need a mature security team to manage this solution in order to get the most value from it.

View full review »
reviewer2751291 - PeerSpot reviewer
Operations Engineer at a media company with 51-200 employees

Check Point Harmony Endpoint's setup is a little bit complex at first, and the console can feel overwhelming until you get used to it. It can be heavy on the system resources, especially on older machines.

Principally regarding the system performance, Check Point Harmony Endpoint impacts us significantly, and addressing this issue would make a substantial difference.

View full review »
Harshal Pachpande - PeerSpot reviewer
Security Analyst at Securview
There is always room for improvement in Netskope CASB, particularly their UI, which could be more user-friendly. View full review »
reviewer2751156 - PeerSpot reviewer
Network Cyber Security Specialist at a tech services company with 51-200 employees

I think Check Point Harmony Endpoint could be improved as I dislike the management interface because it's not intuitive, it lacks real-time reporting without configuring smart events, and it made administration less efficient.

The management interface felt unintuitive primarily due to the layout and navigation; you had to click around many different windows to find what you were looking for, and to resolve an incident, you needed to enter many windows.

I do not have anything else to add about the needed improvements or anything else that could make it easier for admins.

View full review »
MT
Senior Network Engineer at a healthcare company with 10,001+ employees

Check Point Antivirus could be improved by lowering resource usage and simplifying the deployment process.

The resource usage can sometimes highly utilize CPU and memory, which impacts the user experience on older or low-spec devices, and the deployment process could be simpler for our needs.

View full review »
MT
Senior Network Engineer at a healthcare company with 10,001+ employees

I think Check Point Harmony Endpoint could be improved by reducing false positives.

Sometimes false positives occur, but I do not have more to add about the needed improvements.

View full review »
Sabari Das - PeerSpot reviewer
Technical Director at Geekz Information Technology

Support needs improvement. Currently, support is primarily via email, which leads to longer response times. Fine-tuning for applications and better support from Harmony would be helpful, especially once the environment is hardened. Better technical support would enhance the product's competitiveness.

View full review »
RG
Account Manager at a tech services company with 51-200 employees

I hope the agent size of Check Point Harmony Endpoint could be reduced for improvement.

The agent size has affected my experience by causing some performance issues with old machines where RAM was less than 8GB.

I don't want to add more about the needed improvements or anything else that could make my experience better.

View full review »
reviewer4572384 - PeerSpot reviewer
Business Developer Manager at PROCOM

We would love to have more endpoint hardware and software inventory, as well as tools to perform troubleshooting directly on the endpoint remotely. 

A further point of improvement would be to be able to optimize the consumption of resources on the device. 

We would also like the application control module to be further developed in future versions to include applications commonly used or maintained by Check Point in order to be able to configure blocking policies more quickly.

View full review »
reviewer2701569 - PeerSpot reviewer
Enterprise Network Engineer at a outsourcing company with 201-500 employees

There are some pain points with automated rules in Check Point Harmony Endpoint. In the initial stages, you sometimes have to do fine-tuning because you get false positives, resulting in users being unable to connect. However, those issues are eventually fixed.

The pricing is a bit expensive, making it harder to maintain the licenses, and the initial setup takes a learning curve since it needs to fit into the Check Point environment and integrate with other systems.

View full review »
Rakesh Jadhav - PeerSpot reviewer
Sr. Technical Consultant - Presales at Ivalue Infosolution

With Check Point, you will get your all required value-added features as per your requirements. That said, they need to focus on more scalability (as much as possible) so that the solution can run across all supported OS. 

There are legacy OS concerns. It would be really helpful for them if legacy OS support could be extended up to Windows XP. 

Aside from that, Check Point Harmony will be a suitable option for any type of organization.

View full review »
MD
Independent Information Technology and Services Professional at a non-profit with 1-10 employees

More applications should be supported. For example, the ability to detect viruses or scan attachments within applications like Skype or similar applications could be improved.

View full review »
SC
IT Manager at Bolger Brothers Inc.

I would like to see a better UI for admin functions. While CheckPoint offers threat prevention through SandBlast, some users feel even deeper integration of Machine Learning (ML) could enhance threat detection and improve automation. This could involve automating security responses and offering threat prediction capabilities. As organizations increasingly move to the cloud, Check Point could further strengthen its cloud-native security offerings. This might involve expanding support for various cloud platforms and offering more granular security controls within those environments.

View full review »
Paulo F - PeerSpot reviewer
Business Development Manager at Wondercom

A robust threat intelligence integration could elevate proactive defense, offering real-time insights to anticipate and thwart emerging threats more effectively. 

Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries. 

Streamlined incident response tools within the platform would empower security teams to react swiftly and decisively in the face of potential breaches. Integration with emerging technologies, such as artificial intelligence and machine learning, could usher in a new era of adaptive and self-learning security protocols. 

Furthermore, a user-friendly interface for custom reporting and analytics would empower organizations to derive actionable insights from security data. In this ongoing narrative of cybersecurity evolution, the inclusion of these features in the next release would undoubtedly fortify Check Point Endpoint Security as an even more comprehensive and dynamic guardian in the ever-expanding digital frontier.

View full review »
Mohan Janarthanan - PeerSpot reviewer
Assosiate Vice President at Novac Technology Solutions

The only drawback is the integration process. For example, I want to integrate with my source platform. It took some time. That's the only concern regarding the integrations.

Check Point Harmony Endpoint doesn't have any XDR kind of solution. DLP functionality and all are not yet there.

And then, the performance also sometimes gets deep. CPU utilization could be further optimized. 

View full review »
Afeez Adeyemo - PeerSpot reviewer
Technical Sales / Presales at Routelink Integrated Systems

I would like to see improvements in Check Point Harmony Endpoint in general because some people use it since it is available at a competitive price. Due to the competitive pricing strategy of Check Point Harmony Endpoint, it is not considered to be a good product, like Fortinet, Palo Alto, or F5. Check Point Harmony Endpoint needs to consider that people should feel that Check Point doesn't compromise on quality even though the price at which Harmony Endpoint is offered is good. People who claim that Check Point Harmony Endpoint is a cheap product don't necessarily mean that it is not a good solution. Fortinet is a very expensive product that offers good value to its customers. If Check Point can work on the value proposition it offers to customers and make them understand that even though the solution is affordable, it is not a bad solution compared to its competitors, then it would be fantastic. The potential customers can opt for Check Point products, considering that they are offered good products at the cheapest price in its categories. It is important for Check Point to ensure that people don't have a wrong perception about the products it has launched in the market.

I don't think there are any features I would like to include, and the tool offers updates when compared with the products from competitors, which I think is a good way to do it. The only challenge is that for many organizations where there is an MDM solution in the environment and an endpoint security tool, my company needs to educate such organizations to convey the message that endpoint and MDM solutions are different products for different purposes, so they are not the same. If Check Point Harmony Endpoint can incorporate MDM into the solution, it can be a fantastic enhancement. Customers need not buy endpoint and MDM solutions if both are made available together in Check Point Harmony Endpoint. My company will have to put extra effort into educating the customers and making them understand the two different solutions. MDM is used to manage your mobile devices, and Check Point Harmony Endpoint is the security for your endpoints.

View full review »
Sitti Ridzma Salahuddin - PeerSpot reviewer
System Engineer at Trends and Technologies, Inc

Check Point Harmony Endpoint's GUI is old. It needs to have a modern dashboard for logging activities. Compared to other products, the solution is slow in terms of deep scanning. 

View full review »
Rahul Kamble. - PeerSpot reviewer
Business Director at One Networks

Check Point offers solutions with only a few features for our company's customers' sites. My company hasn't found any bugs or didn't find the solution to be complex. Features like zero phishing, sandboxing, threat emulation and extractions, malware detection, and EDR solution capabilities need to be included in the product. My company expects more granular EDR functionalities in Check Point Harmony Endpoint.

View full review »
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

Like any service, they have some deficiencies where they must improve or add some features.

They must focus on performance and efficiency since this tool sometimes consumes many machine resources and leads to machine performance problems.

They must add more techniques for detecting threats and thus reducing false positives. 

They need to integrate with third-party devices such as SIEMs.

They could improve the interface so is more intuitive and easier to manage since it is very static.

View full review »
reviewer1822314 - PeerSpot reviewer
Head of Infrastructure and Networks at a insurance company with 51-200 employees

There are a number of features behind paywalls which can be frustrating when you are already paying a premium. 

The support is limited at times and can be quite slow, you are often directed to articles in the support center to read solutions for yourself. As a result, a lot of time has been spent reading Check Point articles on the online platform to increase knowledge around the product and further cyber security awareness in the team. It would be good to have a more direct route to remote support and demonstration.  

View full review »
Anuj V - PeerSpot reviewer
Manager-BIU at Bajaj Markets

There is a huge scope for improvement for any good product in the market.

Check Point services and antivirus solutions can improve their customer offerings by offering various discounts in their subscription model and they can also reconsider their pricing model as well. If certain cost reductions can happen and can take place, then it is going to be ultimately very good for medium enterprises like us.

Also, we are requesting the customer service and the business team of Check Point to have more and more features and improved packages to increase the customer experience.

We would be grateful to the entire Check Point team if we could get some discounts and also some extended trial periods. 

View full review »
Shyam Lal Navatiya - PeerSpot reviewer
Senior Consultant at EY India

While features are really good and promising to use and implement, a certain level of improvement is required in terms of software deployment across different business environments. It is highly advisable to create multiple child logins to operate the running of the software across multiple interfaces in one go without any trouble. Also, it is advised to incorporate the features like round-the-clock, 24/7/365 scanning of the system in the background without disturbing the routine front-end work. This ensures no lapses or threat entry into the system at all.

View full review »
Raj Kumar07 - PeerSpot reviewer
Senior Manager at Agriculture Skill Council of India (ASCI)

They can improve the customization features to the greatest extent possible and also help bring automation into system security in the most unified manner possible. 

It is still one of the most remarkable systems securing software with amazing positive rates of detecting and catching malware attacks and also preventing system and data breaches. 

All the detection of threat attacks is done in real-time with round-the-clock security features like signature-based threat detection, rootkit threat detection, and many more. Users and the tech team love them.

View full review »
CM
Works at CSIT

It should reduce CPU and memory usage. Its technical support could be more timely though it is still acceptable.

It is painful to get deep informational logs to be exported to a SIEM as Check Point requires a user to use its tooling Horizon.

At times, it repeatedly scans the same files without any effective results.

It lacks granular management and configuration.

Additionally, users may encounter challenges with the product's components not performing as anticipated, necessitating the manual addition of exclusions across various areas.

View full review »
Abdul Modi - PeerSpot reviewer
Information Technology Security Specialist at Al Muzaini Exchange Co.

The support from the vendor itself is the tool's weakness because we don't get good support from the vendor. The response from the tool's support team, which starts with L1, is something my company doesn't find helpful, especially when compared to the other solutions that we use. The support is one of the major issues with Check Point Harmony Endpoint.

Apart from the support area, everything else is good in the tool.

The tool's performance sometimes slows down the system, and I think the module itself is very heavy on the endpoints, making it an area that can be improved. In our company, we have seen Trend Micro and other solutions that have very light agents, so they do not affect the performance of the endpoints.

View full review »
JemAhmed - PeerSpot reviewer
Technical Integration Engineer at Intelligent Systems (Bulgaria)

Improvements are required in two key areas: notifications and setup simplification. Notification integration primarily relies on software, which is not commonly used by most small companies. Additionally, the setup process within the dashboard is overly complex, with numerous checkboxes and options that necessitate at least a week of training to comprehend fully. Simplifying this process through a wizard or a more intuitive interface would greatly benefit smaller companies.

View full review »
Ishant Gupta - PeerSpot reviewer
Trainee - cybersecurity engineer at Integrated Tech9labs Pvt. Ltd.

While we find Check Point Antivirus to be a powerful tool, there are areas where it could be improved. One aspect that could see enhancement is the user interface. A more user-friendly and intuitive interface would make it easier for our security team to navigate and manage the solution efficiently. Additionally, improvements in reporting capabilities would enable us to better analyze security incidents and fine-tune our defenses.

Looking ahead to the next release of Check Point Antivirus, we hope to see advanced threat analytics as a part of the package. This would enable us to proactively identify emerging threats and vulnerabilities, allowing us to stay one step ahead of potential risks. 

Furthermore, greater customization options would be valuable, as they would allow us to tailor our security measures to the specific needs of our organization. In an ever-evolving cybersecurity landscape, these features would further empower us to protect our digital assets effectively.

View full review »
Ajenthan Aiyathurai - PeerSpot reviewer
Manager - IT at NVCL Group

The management console could be made more intuitive and user-friendly, with simplified navigation and clearer visualizations of threat data and security statuses. Improve the performance impact on systems, especially for older hardware. 

Ensuring that real-time scanning does not significantly slow down user machines would enhance overall productivity. Work on reducing the rate of false positives, which can disrupt operations and lead to unnecessary administrative overhead. As an additional feature, Integrate user behavior analytics to detect unusual patterns that could indicate insider threats or compromised accounts.

View full review »
BK
Technical Support at Hitachi Systems, Ltd.

The heartbeat interval must be improved. Sometimes, when we change the policy in the console, it does not reflect in the endpoint. Sometimes, we find it difficult to change the policy. The tool lags sometimes.

When we change the user password in the Infinity Portal, the password does not sync on time. There is a one-minute heartbeat interval from the server to the console. We have a graphical UI in threat hunting in which we can see the attacks. If audit logs have a similar graphical UI, it will be easier to analyze the logs.

View full review »
Christal Tan - PeerSpot reviewer
Network and Cybersecurity Engineer at Respiro

A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings. Sometimes the product's page doesn't load at all, and sometimes it does. The position of the tabs and the other stuff on the product page needs to change a little bit.

I think the product's deployment process is much quicker in Mac devices, and it takes a bit more steps for Windows and the area, which needs a bit of improvement so that some balance is created when it comes to the steps in the deployment phase.

Considering last year, the pace at which the technical support team is progressing is a bit slow, making it an area where improvements are required.

View full review »
reviewer1625493 - PeerSpot reviewer
Chief Information Security Officer at a consultancy with 1-10 employees

The tool is not too intuitive if you want to monitor and see the results to investigate in a layer. It's not easy to investigate an incident that you find in the company. Users often face trouble when downloading files, so it is very slow in terms of how it works. The tool is not very supportive of all the versions when it comes to the part of loading hash codes, so it may support SHA-1 but not SHA-256, meaning it doesn't support all the formats. Calling the support team for the solution doesn't help.

The support team of the solution lacks etiquette. The technical team of the product told our company that we need to get Check Point products through an official vendor only. Technical support for the solution is an area with issues where improvements are needed.

View full review »
reviewer2049771 - PeerSpot reviewer
Business Manager at MN World Enterprise Private Limited

I would like to see them add features where we can use this license for mobile browsers, too - as we had a container kind of product under MDM. This can give us more confidence that when on the go, a user still has full access to our important and crucial data. They should be fearless while accessing this through our VPN tunnel. 

Mobile handsets are now used for 40% of work to send mail or forward any kind of document. Securing users on mobile will give more confidence to users and higher authorities that will sometimes need to have access outside of the office for doing their financial or confidential transactions.

View full review »
Adhi Wahyu - PeerSpot reviewer
Network Engineer at RSUP Dr. Sardjito

Some areas of improvement could be :

1. Making the user interface on the server more intuitive and user-friendly. 

2. Making it easier for the user to do tuning and configuration to the server or the client application. For example, to turn off notifications, the user should be able to do that with some clicks on the user interface instead of searching and reading about how to do it in the knowledge base first and then trying to do it.

3. Our application version is quite old, and Check Point already released a newer version for endpoint protection, which includes a cloud version. After doing some trials, we see that Check Point already made many improvements to the features and user interface.   

View full review »
Suraj Varma - PeerSpot reviewer
Network Security Engineer at Digitaltrack

As of now, there are not any lack of features. 

View full review »
SK
Presales Engineer at Vincacyber

The agent side should be less. It impacts customers' asset performance because it will be more complex for the customers.

View full review »
Nagendra Nekkala - PeerSpot reviewer
Senior Manager ICT & Innovations at Bangalore International Airport Limited

Check Point Antivirus' performance could be faster. It needs to include app-based support to upload screenshots of issues. It needs to add timely and regular updates. The dashboards and reporting features need to offer more efficiency. 

View full review »
reviewer1858884 - PeerSpot reviewer
Network Administrator at a computer software company with 1,001-5,000 employees

Check Point Antivirus could be improved by having the gateway automatically run a packet capture on the traffic so that it can be easily uploaded to TAC in the event that there is a false positive or if the traffic is required for further investigation. I have had a few times where something was detected as being a false positive and TAC requested so much information that in all honesty, was not worth my time to collect as the URL being blocked was a simple webpage that, based on my analysis, the IP was previously being used for malicious intent and was now a legitimate business however was still being blocked by the blade.

View full review »
AS
Complaints analysis/investigation at compugana

As with any tool, improvements can be made. Some improvements that would be useful include:

  • An updated user interface to improve it to make it easier to use.
  • Integration with other security tools. We'd like to see better integration with other security tools.
  • They should incorporate artificial intelligence and machine learning 
  • Performance could be better to reduce the impact on system resources as it consumes a lot of resources from some endpoints.
View full review »
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at IRMA Anand

Everything is just great about the software. That said, a certain reduction in the annual subscription pricing could help many startup organizations like ours. Small, marginal, and medium enterprises could also use a reduced subscription model so as not to pose much burden on budgets. 

Also, the cybersecurity trend is quite dynamic and changes every now and then. It would be really great if continuous upgrades and orientation and training on upgrades could be proactively arranged and organized by concerned officials from time to time.

View full review »
reviewer1958124 - PeerSpot reviewer
CEO / direktor at S3Next

We need a higher maximum file size in the sandboxing feature.

Maybe the exceptions could be made much more understandable and easy to use.

There should be an option added to temporarily disable the protection of all or some blades for testing reasons.

The email and Office solution could have some options for exceptions, for example: don't scan e-mails sent to the local PDF scanner e-mail address.

Maybe an option to auto-upgrade the client version to the next stable release of the client software would be nice.

View full review »
AB
Cyber Security Engineer at a tech services company with 11-50 employees

Check Point Harmony Endpoint poses a steep learning curve and has high resource consumption, requiring high-performance PCs on our endpoint site.

View full review »
SANDRA SUAREZ - PeerSpot reviewer
CEO at SAFEID

When using Check Point Harmony Endpoint, performance issues may occur, although not necessarily a ransomware attack. The endpoint might consume excessive resources from the machine, which can impact its performance.

View full review »
Ajenthan Aiyathurai - PeerSpot reviewer
Manager - IT at NVCL Group

Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats. 

Enhancements in compliance management and reporting capabilities could help organizations meet regulatory requirements more effectively and streamline audit processes. 

Continuously updating and enriching threat intelligence feeds and research capabilities can improve threat detection and prevention accuracy and effectiveness.

View full review »
SK
Head of IT at RD Tech

The product should improve its pricing. 

View full review »
reviewer1961277 - PeerSpot reviewer
Senior Ts Systems Integration Specialist at NTT Security

Check Point is the best in the marketplace. As the EDR [Endpoint Harmony] there is a lot of enhancement in fixing the solution. We have observed some policies are not working as expected. We have observed a few cosmetic issues as well, however, it's fine. 

Minor release should improve the stability and overall performance of the endpoint solution. Consumption of the endpoint solution should have clear visibility on day-to-day operation tasks that are being carried out also we should monitor the malicious IP address and URL for blocking the same.

View full review »
Edson  Duarte - PeerSpot reviewer
Information Technology at Banco Nacional de Investimento S.A.

We have some issues with encryption. The main issue is the red screen of death. Basically, it happened in previous versions of Check Point with encryption. When you install updates, not a specific update, but some Windows updates, the computer gets stuck. And it doesn't start. We were able to contact Check Point, and as a solution, they always say to use the latest version, but we are not happy with that solution. For us, it's not like a solution. 

Mostly, we work with the latest version. But that doesn't guarantee reliability.

It has another issue that we have at Check Point. Check Point has an antivirus with a Sandbox function. When you try to download some files, the sandbox gets confused with the sandblast. And sometimes you have to wait. 

So, there is room for improvement in terms of updates and with Sandbox and Sandblast. 

Another area of improvement is support. We faced some issues because of the language barrier. 

In future releases, I would like to see a nice feature in terms of encryption. When you want to decrypt a drive, it should be a little bit more user-friendly.

View full review »
Amber Mishra - PeerSpot reviewer
Pre-Sales Manager at DCIPHERS IT SOLUTIONS

Check Point Harmony Endpoint's agent is a bit heavy.

Check Point Harmony Endpoint should probably support more in Linux as well.

View full review »
Ryan Evans - PeerSpot reviewer
Technical Support Engineer at Hildes Technologies

Overall, my experience with the product is great, and it's a perfect endpoint solution for multiple purposes. 

The solution can be made lightweight in order to keep the systems more effective during the background operations of the scanning and security checks. 

The user interface of reporting dashboard needs to improve for a better understanding of the end users and the administrators. 

The pricing of Check Point Harmony Endpoint can also be reduced. They are quite expensive at the moment. 

View full review »
Ajenthan Aiyathurai - PeerSpot reviewer
Manager - IT at NVCL Group

The solution has a mobile monitoring system called WatchTower that you can link to a mobile. It would be great if they could add an antivirus feature so that we can monitor individual TCS activities too. Anyone willing to use this solution can certainly do so. The tool is very easy to use and the approach to security and updates is very good. Implementing policies and rules on-premises is also very user-friendly with the solution. Moreover, we can direct three to four billings together. If one ISP goes down, the second one automatically picks up. People wouldn’t even know that their internet has dropped. This kind of technology with low latency is very advantageous.

I would like to see them implement a system that would enable us to do certain things from our mobile like applying policies, opening up and blocking ports, and restricting connection. It is because IT personnel are not always around on the premises. We can instantly do these things from our mobile. 

They should also consider reducing the price so that more people will go for the solution.

View full review »
Priyanshu Kumar - PeerSpot reviewer
Information Technology Specialist at Tech Mahindra

We'd like to see some customized security roll-ups and scans for threat detection.

Check Point Antivirus provides limited iOS protection and is unusable with free VPN services, which are required for professionals.

Check Point Antivirus' major area of improvement needs to be in the
internet connection. Updates need to be made in the system and 
we need immediate access to the updated to be protected against the latest antivirus against malware and viruses.  

It does not have compatibility with the Windows XP Firewall, which needs to be fixed.

View full review »
Sunil M Naik - PeerSpot reviewer
Associate Regional Head- Southern at ASCI

I strongly feel that the extension of the trial version of the antivirus should be extended with more features included so that new users may test the software at its best. A thoroughly informed buyer can make a decision in a sound manner which creates a win-win situation for both Check Point and the client.

They need to add more and more features in the trial version and significantly reduce the pricing for the standard annual subscriptions for the benefit of all.

View full review »
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle

The automatic updates use my internet during downloads before I authorize them. 

This slows down processing power affecting the speed of operations. Integration with outdated systems is impossible. Reporting sometimes is delayed catching the user unaware of virus threats that may affect performance. 

Most features have been working effectively since I deployed this software. I have experienced very few cases of downtime. 

The customer support staff has been working 24/7/365 to ensure the system functions excellently.

View full review »
Shrinkhala Jain - PeerSpot reviewer
Project Consultant at a consultancy with 10,001+ employees

They could improve across many areas, like bringing in more customization and reducing the cost further. The price can be a restraining factor for many to adopt a new solution and leave an old option behind. 

More posting of user feedback is requested across all websites and Google so that more traction can be attained. Seeing reviews helps create more confidence with clients and partners. 

We demand more training orientation and quick upgrades in security parameters and utility features to have better exposure end to end.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

One of the features that we could use in the future, or would be something additional that we as users and network administrators would want to see, is the ability to integrate this solution with the other existing solutions, such as Harmony. We'd like to be able to manage all this from the same centralized management area that we use today for the perimeter lantern. It would thus provide a 360° integration of the features that we check regularly. 

View full review »
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana

For the future, I would like to see maybe a content-filtering emulation feature in Harmony Endpoint. It would already be cataloged in the app. It would help filter other types of characteristics that we have in our equipment, and allow us to see the ones that are also very vulnerable. We'd like to have everything integrated into a single solution that communicates with the cloud.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market.  

I would very much like to have the opportunity to see applications access at the web level and have applications from different brands and devices give simplicity to the management that we are going to need in the future.

View full review »
PK
Assistant Manager at ASCI

Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner. This will ensure more credibility and confidence in customers and helps relationships last longer. High-end wonderful experiences for clientele will result in peer recommendations, which will certainly enhance the customer base for Check Point.

Keep improving your business offerings and go for an extension of the trial version for a longer period so that everyone can be benefitted from the same.

View full review »
reviewer1957878 - PeerSpot reviewer
IT Manager at First National Bank in Philip

The Infinity Portal login is "iffy" at times. I would like to restrict it to only US traffic, however, due to the hosting in the cloud, it sometimes retrieves data from the EU and across seas. 

Also, if there was a way to simplify the SmartConsole login more, there could be an opportunity to take away some clicks to log in. Navigating back to the browser to log in through that portal site just makes for a more extended login transition. Just have the MFA capability right there on the local application and be done with it. 

View full review »
Thao Vo - PeerSpot reviewer
Cloud Solutions Architect at Practice Management of America

Improvements it should make: 

  • Need more document
  • Need faster customer support
  • The price can be better                                                                                  
View full review »
GC
ICT Officer at Kenyatta National Hospital

The network monitoring features must be improved. If my ISP says that they gave me 300 Mbps, I would like to see where the network is used the most and where we are underutilizing it. I need features to monitor the bandwidth. I want features to monitor the upload and download speeds.

View full review »
VP
Sales Manager, Checkpoint at South Asian Technologies

I have clients who use very old Windows versions, so I have a few issues when attempting to install Harmony on some of the machines. At times, even with the latest Windows versions, the machines' performance gets slower. We still don't have a clear idea of what has been happening. If you take 100 PCs, two, three, or four are still troublesome when you attempt to install Harmony.

Also, the price could come down slightly, and I am not saying by a huge gap, but slightly. Even Sri Lanka's smaller customers have to buy a minimum quantity, and with Harmony Connect, they have to buy 50 licenses at once. If they could come down to 20, 30, or something like that, I should be able to sell much more. Some customers would like to have Harmony, but they have to buy a minimum quantity of 50. That's a bit troublesome for me as a salesperson.

View full review »
reviewer2098998 - PeerSpot reviewer
Software Engineer at Mercado Libre

I am satisfied with the set features due to their competitive performance since we deployed them. 

Integration with some applications was challenging during the deployment process. 

The next release can focus more on timely upgrades to enhance computing compatibility. 

The cost is worth its functionalities and contribution towards the protection of our systems. 

The software services and functions have met the company's requirements and policies. 

There are many notifications that keep streaming in when using the antivirus, and that can be improved.

View full review »
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle

It has full performance capability to execute the given duties. 

It blocks safe URLs sometimes when there are network interruptions. 

The cost of deployment varies with the existing working conditions and the organization's size. 

The cloud networking infrastructure can be attacked if there are limited security features and poor monitoring capacity from the IT team. 

The overall performance impressed my team. Check Point Harmony Endpoint is the sure deal for enterprise security coverage and computing device control.

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

We should be able to generate client applications based on a structure and scheme that uses the power of computation of local devices to generate interaction and remote management. There needs to be more internally connected systems in order to achieve real-time effectiveness. The solution should establish communication in real-time, thereby multiplying those possibilities of interaction in a faster way when it comes to communicating against your central server. 

View full review »
Ankita  Singh - PeerSpot reviewer
Application Developer at Capegemini Consulting India Private Limited

There are no areas that Check Point Antivirus needs to work on.

Overall I didn't personally face any issues while implementing Check Point Antivirus. In comparison to alternatives present in the market Check Point Antivirus has high efficiency and a better ability to protect our devices both online and offline.

Personally, I highly recommend this platform to professionals for data security and management.

View full review »
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC

The system has comprehensive data management features that have saved us from incurring unplanned losses. 

Timely updates and suitable configurations can block malware attacks and provide effective reports on security situations. 

The setup process was complicated, however, when the customer service team came in, they provided productive guidelines that have kept the system working efficiently. 

The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis.

View full review »
reviewer1777338 - PeerSpot reviewer
Supervisor Tecnico at M.Coutinho Douro - ComÉrcio De AutomÓveis, S.A.

Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant. URL filtering should allow for time-based rules, for example, don't allow media streaming during work hours yet allow it on weekends.

The same applies to application control. When in our headquarters, we can solve this on the Check Point Firewall. However, the Harmony client does not support this type of condition, and we had to find a "middle ground" between policies and usability for our clients.

View full review »
EmmaRichardson - PeerSpot reviewer
Database Administrator at Hildes Technologies

There could be more additions to the compatible systems and applications for integration purposes. It doesn't cover some of the applications and operating systems like macOS and SAP cloud products. 

Another issue I can recall is the fake threat calls and removal of safe applications (assuming them to be viruses and malware), which is sometimes annoying. The overall product features and functions are reliable and have everything covered otherwise and I consider it to be the best antivirus solution. 

View full review »
OumarDiallo - PeerSpot reviewer
Cyber Security Engineer at AFRICAN CYBERSECURITY MARKET

An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

It is one of the best, however, with respect to its support on iOS and Android, it can improve a little more.

Something worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies.

Its guides are identical to the existing ones. These guides should be updated, and they should improve their design.

Let people try it, and it will quickly remote users. 

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

I would like to see, in the future, this virus emulation feature deployed to endpoint security where it sends the virus found in sandboxing and emulates the attack, notifying administrators via a portal so that they can find out and learn from the attack that they are having.  

Another point to consider is the ability to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident.

View full review »
Jhonjerlyn Morales - PeerSpot reviewer
CEO at JL Real Estate

One of the features that should be improved in Check Point is when it comes to obtaining reports on computer behavior. Currently, you can only have general reports of the threats removed and the behavior of the database. You cannot get separate reports of the Check Point service-linked devices. I would like to obtain separate reports for each computer, to see the behavior of the threats and be able to take action in time. 

It does not need any other function, it is a fairly complete antivirus service that helps protect business networks on time.

View full review »
reviewer1773669 - PeerSpot reviewer
Network Security Engineer at Maine Bureau Of Taxation

I don't really have any real suggestions for this to be improved. The biggest thing would be the ability to update the SMO's and gateways through Gaia instead of always completing it through the command line. As we train new people and have fewer hands that touch these firewalls, having a good understanding of how CLI works and how to install patches and remove patches from gateways using this method is dying. So, being able to do it the same way we do all the other gateways would be excellent.

View full review »
reviewer1753452 - PeerSpot reviewer
Manager of IT Security at a healthcare company with 5,001-10,000 employees

Check Point users a pattern-based security module, which is something that can be improved. Pattern-based security is not the latest architecture and it is insufficient because every day, there are approximately 380,000 new vulnerabilities and threats. Using patterns is difficult because the threats can hide.

View full review »
Anil Redekar - PeerSpot reviewer
Network and Security Engineer at a consultancy with 10,001+ employees

I would suggest that the Check Point team always allocates an SME to all the vendors before implementation. This will help when the endpoint agent cannot integrate with another product or third party. It could expand the functionalities too. In addition to security functionality, they could incorporate Mobile Device Management (MDM) functionalities such as remote device management, administration of installed applications, et cetera. 

The solution needs more alerts to warn of attacks. 

View full review »
SB
Consultant at Cognizant

It needs more documentation and better ease of deployment. For documentation, it needs more information about integrating the endpoints on SandBlast Agent mobile as well as on desktop platforms.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously. However, once the update is done, it does not present any problem and works very well. The solution has high CPU and memory consumption on the firewall. It should work on the consumption of resources since we have also detected that the same thing happens with the performance of the users' machines.

The graphical interface of the solution should also improve a little since it is a little complicated to find certain objects to be able to make a configuration, in addition the guides are outdated and sometimes they do not match the interface which is sometimes complicated to implement.

View full review »
IdoSarusi - PeerSpot reviewer
Developer at Shavit-security

The platform's malware detection capabilities could be enhanced. There is room for improvement in detecting more sophisticated and emerging threats.

Additionally, including AI-driven features that can automatically generate and optimize security policies based on the organization's specific needs and threats would be beneficial.

View full review »
Mantu Shaw - PeerSpot reviewer
Project Manager at a outsourcing company with 1,001-5,000 employees

From an improvement perspective, the major challenge we've faced with Harmony is the support. While the technical features and xRail-based aspects are good, support still needs to be improved. However, this concern could be addressed effectively if they focus on improving support.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

Some problems that I have had with this and other Check Point tools in the cloud is when entering the portal since it stops responding or takes a long time to process a query and this causes delays and efficiency.

They should also add new functions such as threat hunting. 

Finally, it should be able to implement with and have a good integration and interaction with Azure in the management of vulnerabilities, and data management that between the two can be integrated 100% with Check Point Harmony Endpoint and thus be able to make good automated management.

View full review »
Berkhan Yaman - PeerSpot reviewer
Cyber ​​Security Specialist at a tech services company with 11-50 employees

In terms of improvement, the ticketing system could be better.

View full review »
DH
Security IT at a tech services company with 51-200 employees

The improvements that can be mentioned are few. The solution and its architecture are very well done.    

The Check Point Infinity Portal sometimes has some latency or performance issues that are slightly worse, affecting user management. It cannot be improved by the customer.

We would also like to make the documentation for more modern solutions like the Harmony family easier to find. That way, we can implement these solutions with the best practices recommended by the manufacturer.

View full review »
DH
Security IT at a tech services company with 51-200 employees

Check Point Antivirus could use improvement in some areas, as almost all blades within the security management server are not the same as in gateway management.

On the other hand, the solution is expensive, they could improve costs in order to win more customers.

There are new tools that generate this protection, so this tool can become old, I would like for it not to be discontinued.    

View full review »
NG
Support at a security firm with 51-200 employees

The Check Point language for opening and solving cases is English. They could expand languages for Latin America, and it would be easier to solve problems in these areas.

Costs are only available through a Check Point partner.

The SLA is slow. The solutions provided to address problems and breakdowns are slow.

View full review »
Bala_Krishna - PeerSpot reviewer
Director at Rhinexa India Pvt Ltd.

We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's.

View full review »
JC
Consultant at SOCIEDAD AXIOBASE S.A.

What's missing in Check Point Antivirus is the EDL feature, which I want Check Point to add in the future.

View full review »
reviewer2005803 - PeerSpot reviewer
Digital Coordinator at Modis

The current performance of Check Point Harmony Endpoint has impressed all the sectors in the organization.

Configuration with some applications did not take place effectively due to setup complications. 

Interpreting the threat intelligence sensors may lead to poor data tabulation and slow performance. 

The cost of deployment and maintenance is high, and many small enterprises may not be able to afford premium subscriptions. 

The set security enhancement objectives have been achieved, and internet threats have been blocked effectively. I totally recommend this software to other organizations for reliable endpoint protection.

View full review »
reviewer2005812 - PeerSpot reviewer
Human Resources Manager at Beat

The current features are doing extremely well. That said, the system coding can be simplified to enable any user to interpret the security situation of the used device. 

I am happy with the set data models since they monitor the security situation of new sites before browsing. 

I have not observed most failures since I started using this software. 

The company can embark on timely updates to ensure the application is compatible with devices. 

Customer support comes in on time when we contact them via online chats and phone calls. 

When there are many devices, it is more costly since each device requires unique login credentials. 

The product is heavy, and it requires more space for effective operation. New users can find it difficult to set up and install due to the lack of a robust user manual.

View full review »
AK
Security Network Engineer at АТ "Банк інвестицій та заощаджень"

Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features.

View full review »
SHRINKHALA SINGH - PeerSpot reviewer
Senior Manager at Advertising Standards Council of India

The cases of false positives should substantially be reduced to the greatest extent to keep the efficiency excellent.

Competition is huge and is strongly advised to keep innovating the features and utilities so that it stands out in comparison to its competition in the market.

They need to have an extension of the trial period/trial version so that more startups and small, marginal, and medium enterprises can also be part of this without any hesitation.

View full review »
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

We've noticed that the management console has some limitations as it's managed through the browser. Despite being user-friendly it could definitely include a wider range of security measurements that can make it more customizable depending on the end-user interests. If the end-user happens to want a Linux OS it can't access the smart console as it's .exe and only supported through Windows. This means they'll have to use a virtual PC to access the .exe which just makes it a bit of a hassle for these end-users.

View full review »
Anuj V. - PeerSpot reviewer
Consultant at ANALYTICS EDGE

We'd like the solution to kindly start this service offering on SaaS and PaaS models also. It would help more and more small, marginal and large businesses to come forward and try the solution. Customer attraction and retention are the need of the hour.

It is highly advisable to receive more and more genuine feedback from users and publish it on websites as feedback traffic is extremely important to gauge business performance progress.

It is advised to have a longish trial period for business users as an extended trial period will help customers to assess their requirements in a better way and will greatly help in their buying decision.

View full review »
JurajMackovič - PeerSpot reviewer
Sales ManagerService Delivery at K_CORP

We did have some early compatibility issues, which I hope Check Point has since resolved. 

As each project varies, anything that may be missing, in terms of features, would become obvious during a POC. Check Point has pretty much everything, however, it could be better in terms of working with Mac products. However, this is typical of other solutions and Apple. 

View full review »
reviewer1853898 - PeerSpot reviewer
Engineer at Harbers ICT

It would be useful if you could also mark blocks as safe from a client. Now users always have to ask an admin to make exclusions.

In addition, it is also very desirable that there is support for Windows Server core machines.

In addition, it would also be useful if administrators could create exclusions directly from logging into the admin portal, instead of only being told where and how to add the exclusion. This will save work.

It would also perhaps be useful if you could connect from one endpoint directly to another tenant. Instead of having to roll out the endpoint again.

View full review »
reviewer1850805 - PeerSpot reviewer
Sr. Data Scientist at a tech vendor with 10,001+ employees

More development in Linux may help, however, the fact that the product could also have some more documentation as suggestions on what to do may also help.

The product may take some time to navigate at first but apart from that the log ingesting and working on getting a client installed may take some time. 

I would like to see more automation. 

Also, encryption management is not made available in all versions but if it could be extended that would be great. Sometimes it may take some slight delay, however, it's nothing too bad. 

View full review »
KS
Senior Security Specialist at Tech Mahindra Limited

The solution has limitations if it's hosted on-premise or as a SaaS. You need to plan accordingly on the model that suits the organization. On-Premise, for example, does not support threat hunting. Hosting on the cloud will have an impact on the user who is connecting to a central location for internet access as it will add infra cost. 

We also need to look over the expertise of the support executives who require more training and focus as well in this service area and if we can think over the cost of the product.

View full review »
reviewer1777338 - PeerSpot reviewer
Supervisor Tecnico at M.Coutinho Douro - ComÉrcio De AutomÓveis, S.A.

The lack of time setting for policy application, for example, from 8 am to 9 am, to have a policy applied and then from 9 am to 10 am for another one.

A more responsive UI would be nice. Sometimes, with a lot of clients (1,000) the UI is a bit sluggish.

The operation of reinstalling a machine also requires a bit of work since we have to delete the object before installing the app on a formatted operating system. It should be able to lock settings and licenses to the machine ID that never changes with an OS installation.

View full review »
reviewer1398543 - PeerSpot reviewer
Network Security Engineer at a financial services firm with 51-200 employees

It would be ideal if they had a migration tool of some sort.

There were some caveats that we encountered on the new Management Station. For example, they had some features that were not supported by older clients. There are the clients that are running on the laptops, and there are the Management Stations, and then we had one on-premise, which was older in terms of the clients that we were running. Then we had the new Management Station in the Cloud that Check Point is administering as it is a SaaS, which is a benefit.

The newer Management Station has features that it enforced on the clients that the clients weren't able to support. For example, Windows Service or Windows Subsystem Linux. Everyone in my company that uses Windows Subsystem Linux, which is about 15 or 20 people, that need it on a daily basis, were running the older clients of course, as they were migrated over the new Management Station and they weren't allowed to use that. It was being blocked automatically due to the fact that that was the new policy being enforced that was literally a tick box in the new Management Station that I didn't set. Even if I enabled WSL, it didn't matter. The older clients couldn't take advantage of the new newer Management Station telling them to use it. That was annoying trying to troubleshoot that and figure it out. tNo one at Check Point really knew that was the problem. It took a while to resolve. We finally figured out upgrading may solve the problem. When we did that, we upgraded those users, however, that created a little bit of an issue in the company, as we upgraded those users. We like to test them with a small group and make sure they're stable and make sure nothing weird happens. We were forced to upgrade them without testing first. 

One thing they still haven't improved on from the old Management Station to the new Management Station, which should totally be an improvement, is when you create a Site List for the VPN clients and you deploy it from the Management Station, you are not able to get that Site List. You have to play around with something called the Track File, which is a miserable process. You have to download the client, decrypt the Track File, edit it, then upload it again to the Management Station and download the client a second time and then test it and make sure the Track File's in the right order of sites as well, due to the fact that it's kind of random how it decides to order the Site List. The Site List is what the clients use to connect to the VPN Gateway, and if you have more than one gateway, for example, for disaster recovery, which we do, then they'll need that list.

It's something they've never improved on, which I was hoping by going to the cloud and having this whole thing recreated. Since it's more advanced I thought they'd have that ability to edit the Site List with the initial download. You should be able to just add the sites and then that's it. That kind of sucks that you can't. 

Other than that, the only other thing I could complain about was that they did this process where they did some type of certificate update on the backend of all of their staff solutions. That created downtime for our VPN clients and they didn't notify us of the certificate update. We're using the product in their cloud as opposed to their product on-premise, which seemed to be more stable in that regard. They didn't communicate that out. However, when we spoke to support after about a week, they told us there was this thing they did the past week, and that's the reason why we had that problem. Everyone that had that product had that problem. That really wasn't ideal.

View full review »
reviewer1738914 - PeerSpot reviewer
Network Operations Engineer at SFR

It may be interesting to improve this solution against zero-day attacks, as they happen very frequently and are clearly a severe threat. 

On a more practical level, the complaint opening process through technical support could be better, as it must be done through the portal only for now. 

On a financial level, prices for CP products could be improved. We know for sure that they are all high-quality products, however, sometimes it doesn't justify high prices on some products.

View full review »
reviewer1676439 - PeerSpot reviewer
CISO, CIO, AVP at CIANS ANALYTICS PVT. LTD

There are improvements required in terms of accuracy. It gives you an alert for malicious sites, which, after searching on the Google database, don't come out to be the same.

There can be scenarios where specific planning will be required before even giving thought to implementing it into an organization - be it small, medium, or large. Everything needs to be organized with respect to each particular organization. There has to be proper requirement gathering and a plan for the SOW to work accordingly. 

I would suggest that the Check Point team always allocates an SME to all the vendors before implementation as it will improve the first impression. In my case, I had pretty much faced disaster after implementation that I would not suggest anybody go with the product.

The product needs to improve the security infra.

View full review »
reviewer1678761 - PeerSpot reviewer
Assistant Manager at CIANS ANALYTICS PVT. LTD

Technical support could be better. When we register a complaint, we need to register it via the portal only, which is atime consuming.

When we register the complaint, it says there's a minimum of four hours of turnaround time which is high. It should be a minimum of 60 minutes. 

The GUI of Harmony is very slow to upload. I'm not sure if it is due to the internet, but still, at times, we found that when we click on any tab, it takes a minimum of five seconds to get it open.

All other things are okay from our end.

One feature we want to add is an EDR/XDR into this antivirus module.

View full review »
TM
Sr. Manager at Incedo Inc.

Support's service and the response times can be improved. The triaging of the tickets takes a long time and the tickets are only resolved with escalations. 

With respect to the product, we feel Endpoint vulnerability management is one of the modules that is missing and it is something that is required. Adding this will strengthen the product and help in taking proactive steps towards protecting the environment.

DLP Module & Patching are required from an endpoint perspective. It would be good to add those in an upcoming release/version.

View full review »
Daphne - PeerSpot reviewer
Project Manager at Junta de Andalucia

I still don't have a clear opinion of the possible improvements that the tool may need. There are still functionalities that I have not been able to try completely and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point. 

Something that is very important to me is the remediation or recovery capabilities after an attack. From what I have seen so far, this tool maintains the quality line of Check Point products and is always ahead of the needs of the market.

View full review »
BD
Chief Information Security Officer at Abcl

The Threat Hunting module is not available for on-premises deployment.

The user has to connect using the VPN to take Policy Server updates when the solution is hosted on-premises. This adds overhead, as the user has to connect to the corporate network to get the policy.

In the case of a hybrid setup where the Policy and Management Server is on the cloud, the Sandbox appliance has to be on-premises.

Policy configuration and deployment are complex.

The application control and URL filtering features are not very strong.

Application Control databases are generated locally and it does not provide any visibility to the admin on which applications are installed on the endpoint.

The solution is supported only on Windows and MAC and not any other platform.

View full review »
reviewer1444728 - PeerSpot reviewer
Network Technical Specialist at a manufacturing company with 10,001+ employees

We do like the product, although there are quite a few things that we're asking our Check Point account team to enhance, where we think we probably could get more features from it.

We use a couple of Check Point products, like SmartEvent, and SandBlast Agent is not really integrated into that. We haven't gotten the reports working yet. We are working with the account team and trying. As I said, it's still relatively new in terms of what we're trying to achieve. We probably should have had more Professional Services come and help us. But, from our company's point of view, especially at this time in the market, the finances are just not there. But from what I've seen so far, I don't think there's enough integration into SmartEvent. That's something that I've asked our account team to try to focus on in the next versions or as an enhancement request.

Integration and deployment are probably the weakest points, and maybe service as well, although they are still at the high end. Would we go out to market and buy this on its own? Probably not, is the honest answer. But because it is a Check Point product and the licensing comes as part of it, it gives us this time to go and prove that, when it's together with all the other products that we have from Check Point, it certainly integrates very well. Would I go and buy this just as a standalone service if we didn't have Check Point firewalls? Probably not.

View full review »
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack

As such there is nothing I can think of additional features.

The services of EDR consumption should be reduced and the support needs to be improved.

View full review »
Ido Sarusi - PeerSpot reviewer
Developer at Shavit-security

Perhaps the software could be made more resource-efficient. While many improvements come to mind, I don't have them readily available. Essentially, I aim to enhance the software's efficiency so that it places fewer demands on computer resources.

View full review »
SM
Enterprise architect at Kapsch

As with most antivirus products, the reporting and management could be improved. 

View full review »
LD
Cloud Support at a tech company with 1-10 employees

Check Point is one of the best security brands according to the Gartner quadrant. However, it needs improvement in some areas.

We would like to see better guides in the future with more concrete examples of the best practices.

The support is somewhat complicated. Sometimes they take a long time to solve problems. The language barrier is an issue for Spanish-speaking people. 

Support hours are generally contrary to the hours in Latin America. They could expand the support more and have more trained and effective technical personnel to help customers.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

We have few disadvantages or improvement points. However, the Infinity Portal sometimes requires more performance. It is a small detail. However, it could be improved.

On the other hand, it is also essential that the manufacturer improves the public documentation so that users can better understand how it can be implemented with best practices.

Finally, at the support level, we believe that Check Point can improve. Sometimes the answers are provided at dawn, which makes it more challenging to solve.

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

I would like to see this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses. We'd like to be able to integrate several products and services into one to be more efficient and user-friendly within the infrastructure. 

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available. We want the solution to help us achieve 360-degree security across all work teams. 

View full review »
reviewer1954029 - PeerSpot reviewer
Head of Security and Operational Risk at Medianet

It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products. 

It would also be great to include FIM capabilities for the Endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products.

It would be great if we could have additional DLP capabilities to identify personal information or any kind of information to comply with regulations that require information protection. 

View full review »
reviewer1805079 - PeerSpot reviewer
Network Engineer at Fujairah Port

The next-generation firewall receives an additional layer of security. I don't currently dislike the product in any way. By restricting files based on hash or signature at the perimeter level, any antivirus solution placed on an endpoint works with less effort.

The technical support could be improved.

Check Point should launch a free online training portal to assist many people in becoming skilled in Check Point services. Also, they should offer some sort of certificate discount promotion.

View full review »
JamesYa - PeerSpot reviewer
Senior Solutions Architect at Cloud4C Services

The price of the product could be more friendly. 

View full review »
Sandeep Sehrawat - PeerSpot reviewer
Information Technology Security Consultant at Sify Technologies

Mobile users are reluctant to actually use the solution. 

Check Point should focus on providing more compliant solutions, such as compliant for cloud-specific solutions. The digital footprint can be minimized, and then the Legacy VPNs can also be streamlined. As of now, most of the connectivity partners use Legacy VPNs to connect to their DC or their service partners. Legacy VPNs and digital footprints should be minimized.

View full review »
reviewer1835919 - PeerSpot reviewer
CISO at a financial services firm with 51-200 employees

Everything can always be improved. Specifically, there are gaps when it comes to security.

View full review »
reviewer1853787 - PeerSpot reviewer
Systems Engineer at HarborTech Mobility

Until now, I've found no negative features sufficiently important to complain about. In general terms, the software works perfectly. One time, I had a little issue, however, the technical support staff resolved it almost immediately.

I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics.

I like that activating Check Point antivirus hardly affects the performance of our security gateways, thus providing additional security almost without penalty.

View full review »
reviewer1853499 - PeerSpot reviewer
IT Security Manager at a manufacturing company with 1,001-5,000 employees

Unfortunately, the web (cloud) management system and log search performance are quite bad. Sometimes it takes longer to perform simple tasks and scrolling the results of the log is annoying due to frequent refreshes.

The exception management was always the Achilles' heel of Check Point products. It was a bit improved in Harmony, still, you can't for example exclude a site from anti-phishing form checks (which could take a few secs) while not excluding it from attachment scanning.

The forensics module still doesn't allow for HTTPS URLs entered by users. You are limited to DNS search or IP lookup. This doesn't make sense from a technical standpoint as the URLs are passing Harmony checks so they are known to the solution.

Anti-phishing cannot scan a form located inside an HTML e-mail attachment (which is a common practice in real-life attacks).

View full review »
JamesYa - PeerSpot reviewer
Senior Solutions Architect at Cloud4C Services

There is no real scalability.

We'd like to see a friendlier user interface.

View full review »
JJ
Project Manager at Junta de Andalucia

It is a very complete product but you have to know how to parameterize it well to avoid high CPU consumption.

SandBlast Agent had moments in which it had a high load, we escalated it to the CheckPoint support that helped us to stabilize it. We had a problem with the parameterization of the solution. Once corrected by following the CheckPoint instructions, everything worked normally again.

It is also missed that it does not have a Linux client since some administrators use this type of operating system.

View full review »
reviewer1776063 - PeerSpot reviewer
IT Manager at a renewables & environment company with 51-200 employees

The web filter service could be improved. It would be great to have a self-service user request for sites. An administrator would still need to approve, however. 

The block screen could have a nicer screen or allow it to be customized.

The list of exceptions for URLs could be improved with a separate screen for a large list of exceptions. Having the same exception list for mobile and endpoints would be great. 

We are hoping to transition to the SOC based service. Think this is still new; we're looking forward to get more information and test.

View full review »
MV
IT Specalist at vTech Solution

Personally, I'm looking forward to separating server management policies. They could improve memory consumption. Once we installed a CP agent in our system, we found that it was consuming more memory. Even a normal configuration system can be hung.

Malware detection is an add-on plan that can't be added on. It's the most important part of endpoint security. There's a forensic addon which is very important after threat hunting against attacks.

View full review »
JA
Presales Engineer at Data Warden

They could be focused on the analysis of USB devices. It has the ability to block the use of USB storage memories until it is completely scanned for any virus or threat. We need to ensure that the USB device will not be available until the scan has been completed, however, this may represent a malfunction when using other tools such as Rufus, as, by blocking access to USB drives, Harmony Endpoint will block access to these drives, thus Rufus will not be properly detecting USB drives and therefore it cannot operate properly.

View full review »
reviewer1721463 - PeerSpot reviewer
Manager, IT Infrastructure and Security at Control Southern Inc.

The product updates are a manual process for my administrator and can take several hours out of his day. I understand this is partially due to the Windows version limitations. When you do need to update the client version it is pretty easy. Usually, it's a case of the end-user not being online to accept the push of the software. That is where it can take up a few hours of my administrator's time. The administrator has to wait and email for our technicians to go to an internet available area. It is usually not a big deal, however, it can take time.

View full review »
LR
Support Manager at Sefisa

We'd like it if the solution continued to add new features. For example, what would be specifically useful to us is a feature that allows threat hunting. They may be already working on that or have something available, however, we need something robust and effective.

I'm not sure if they need to improve anything right now. They are already developing new aspects that are quite innovative. 

The only thing that our customers want, is lower prices. 

View full review »
reviewer1601424 - PeerSpot reviewer
Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees

The solution is mostly very good. The reason why I'm trying to compare it with FireEye is due to the fact that it's supposed to be a mandate by the State. We are trying to justify the fact that we don't need to change our environment. For example, if the only thing that they want is to provide reports for the State, then that's a different story. We can customize the reports based on what they're asking for. We don't need to change or want to, however, the State may require us to.

Technical support can be a bit slow at times. 

View full review »
reviewer1666413 - PeerSpot reviewer
Head of IT Operations at Puerta de Hierro Hospitals

There needs to be compatibility with the most recent versions of the various operating systems. They need to be up-to-date with the signatures of new viruses and the latest ramsonware. With the encompassing of all its solutions in one platform, there should be artificial intelligence for specific analysis to thus be able to anticipate and detect unique risks to the organization. 

To be able to count on the administration console on any device and online cloud would be ideal. We would like there to be no need to install clients as executables.

View full review »
reviewer1519446 - PeerSpot reviewer
Geography and History Teacher at a comms service provider with 10,001+ employees

After using Harmony for six months, I still don't have a clear vision of the possible improvements that the tool may need. There are still functionalities that I have not been able to fully test and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point. What is very important, in my opinion, is the remediation or recovery capabilities after an attack. From what I have seen so far, this tool aligns with the quality of Check Point products and the evolution it has is correct and logical. Check Point is always ahead of the needs of the market.

View full review »
reviewer1626762 - PeerSpot reviewer
Assitant Manager - IT Support at a outsourcing company with 1,001-5,000 employees

Tech Support must be better. Whenever we log a case for any issue it takes too much time to get it sorted. There should be escalation by default. If the case is not being sorted quickly, it must get internally escalated to the team who are experts and they should be empowered to jump in to get the issue fixed. Many times, we have to be on it for weeks to come to a proper resolution. 

Website blocking and endpoint levels are still a challenge and there needs to be a more sophisticated solution. We are looking forward to having this product work more efficiently.

View full review »
Mantu Shaw - PeerSpot reviewer
Project Manager at a outsourcing company with 1,001-5,000 employees

Endpoint vulnerability management is one of the modules I believe is missing and it is something that is required. I recommend adding this feature in an upcoming release as it will provide complete visibility of endpoint vulnerabilities. 

Endpoint Patching is another good feature that could be added and is required to mitigate vulnerabilities. 

Currently, the DLP Module is not available and it is one of the requirements from an endpoint perspective. It would be good to add in an upcoming release.

There needs to be improved integration with the on-premises/Azure AD.  

Software deployment needs to be added.

View full review »
it_user1536681 - PeerSpot reviewer
Network, Systems and Security Engineer at SOLTEL Group

It is very difficult to get ahead of what's coming in terms of new threats, however, I think that Check Point Antivirus must improve against zero-day attacks.

Today, next-gen approaches extend signature-based detection with behavioral detection, machine learning, sandboxing, and other techniques that are optimized to address threats such as malicious URLs, browser hijackers, advanced persistent threats, and phishing exploits. However, zero-day attacks keep happening quite frequently.

View full review »
reviewer1521789 - PeerSpot reviewer
Information Security Analyst at VPS Holdings Limited

The only two bug bearers of Check Point SandBlast that I have come across are as follows:

Sometimes, the Cloud Management Portal can become unresponsive or take a long time to process a query. This in turn will cause the browser to freeze, which will require closing and reopening of your browser.

The second is that getting useful "administrator" information requires digging into the policy rules via a second management agent installed on your computer. However, once installed, it is easy to navigate and use so is more of a slight inconvenience than a major issue.

View full review »
reviewer1489602 - PeerSpot reviewer
Network Security Assurance Specialist at Visa Inc.

I think some work needs to be done to improve the integration with other third-party products, namely SIEM solutions. We found it quite challenging.

We found out the hard way that the configuration was lost when we version upgraded the management console.

View full review »
KP
Network Engineer at LTTS

As of now, product-wise, we haven't found any major concern that needs to improve, although it does not support full MDM and this is something that should be there.

View full review »
JA
Information Technology Specialist at RBC

Some of the less tech-savvy users sometimes find it difficult in adjusting and learning how to use the platform.

In some areas, the user-communities that ought to help are not readily available. Perhaps in the future, the vendor ought to send a sales representative or a knowledgeable person to each buyer to assess how they are using the platform. In case of any challenges, they should help them in using the platform efficiently.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

We also had several support cases opened for software issues, but none of them were connected with the Check Point Antivirus software blade.

View full review »
NM
Team Lead Implementation Services/Systems Integration Engineer at Trinidad Systems Limited

As I understand there will be a URL filtering feature included with the browser agent in the future. This will allow URL filtering without the need for a Gateway Device. This is something I am looking forward to and would be a great addition to a list of features.

The best improvement to the product that can be made is to make it less resource-intensive so it may work effortlessly on slower systems.

The ability to push the Endpoint Client over the network without the use of 3rd party solutions would be an asset.

View full review »
JC
Novell, Microsoft, and UNIX Network Administration at GDDC

The antivirus is not as friendly as other solutions and can be improved. 

We would like to have the ability to stop and restart the service remotely, which is something that we can do easily with Symantec but have a hard time with when using Check Point.

View full review »
TP
Head of IT at a real estate/law firm with 11-50 employees

It isn't exactly the cheapest, but then it's Check Point. The price could be improved.

I'd also love to see them add full MDM support, but I appreciate that that's not the product market. If it did come in, I'd be more than happy to look at additional modules. It was probably one of the easiest products I've ever had to deploy it, but if it's not capable of doing MD, then that's going to impact its usefulness to us.

View full review »
PA
CIO / CTO at a financial services firm with 51-200 employees

The solution could improve VPN functionality and the VPN user-interface.

View full review »
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack

Performance and resource consumption should be reduced. 

Additional features should be EDR, Advanced sandboxing technology, deeper cloud integration, etc.                                                                                         

View full review »
IE
Cyber Security Consultant at Wirespeed

If you're using an endpoint that does not have sufficient resources, it would be very tough to use. Most of them will shut down, but it works well with the detection so far. The solution can reduce the impact of the endpoints.

The performance impact should be improved. Also, the tool should have the ability to search for files. It could make on-premise deployment easier. They might have blocked ports and the control makes it more difficult. They can make implementation much easier even with what they have.

View full review »
Muhammed Basheer - PeerSpot reviewer
Territory Manager at a tech services company with 501-1,000 employees

Check Point Harmony Endpoint could improve mobile device management (MDM).

View full review »
reviewer1866651 - PeerSpot reviewer
Brand Manager at Corporation Sekiura S.A.C.E.I.

The Check Point Harmony Endpoint is a very complete solution. Even in the most basic version, it already includes EDR, which today is very important and something that all endpoint solutions should consider having from the most basic versions. We would like to have one more step and that's to give and have full-disk encryption.

Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle. We could have it with Check Point Endpoint, mobile, cloud, or firewall. An all-in-one console would be great.

View full review »
reviewer1821144 - PeerSpot reviewer
IT Security Officer at a tech services company with 1,001-5,000 employees

Sometimes the portal loads slowly which should be improved. 

There should be an easy option for the administrator to turn off or disable malware protection on a specific asset or computer instead of adding a specific asset in a Disable group as that will make it easy for the admin to disable if and when required for some testing purpose. I would like this feature to be added. 

Logs searching also needs to be more quick and enhanced and more metadata should be stored in the logs for Endpoint for a better view for admins. 

View full review »
VK
Cybersecurity Architect at a computer software company with 201-500 employees

The management in Check Point Harmony Endpoint could be improved.

In a future release, the solution could add more threat intelligence features.

View full review »
reviewer1597644 - PeerSpot reviewer
Chief Technology Officer at a tech services company with 11-50 employees

Technical support needs to be improved, along with the response time. The technical team or any product team should liaise with us and help to deploy the solution to the first few customers so that we can roll out to the rest of the customers.

They need to improve the licensing process as well so that it is easier for the end user. At present, we have to wait one to two weeks to get a license, which is not productive. The process is not very smooth or convenient for the end user because Check Point Harmony Endpoint provides two login portals. One is for licensing, and the other is for management.

In the future, I would like to the management portal and the licensing portal be integrated or changed to a single sign-on because that will be good for both the panel and the user. If they can make it very convenient for deployment and monitoring, it would be good.

If we could get technical support in Singapore, then it will be helpful for our customers.

View full review »
AI
Pre-Sales Engineer at a tech services company with 51-200 employees

The solutions agent could have better performance, it is a little slow sometimes.

View full review »
reviewer1477194 - PeerSpot reviewer
Engineer at a tech services company with 51-200 employees

We cannot integrate this product with other solutions, which is something that should be improved. I believe that it is in the roadmap.

Other vendors have some non-security-related features in their endpoint protection solutions that should be implemented in this one.

View full review »
reviewer1098015 - PeerSpot reviewer
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees

Sometimes the antivirus updates fail. We don't understand why because sometimes it fails but the next time you try it goes well and the firewall always has access to the internet. We don't understand why it sometimes fails.

View full review »
reviewer1399449 - PeerSpot reviewer
Network and Security Engineer at Information Technology Company

The solution could be improved in the future with a way to provide online training to customers for free, as other providers do. Ideally, it would be not only for this solution but for all of their systems.

I found that there is no Check Point online training center and I think that is something vital for most of us as customers.

View full review »
it_user1399404 - PeerSpot reviewer
Business Analyst / Developer at a tech services company

There should be some way of managing this solution outside the organization's network, possibly with some type of remote access. For example, if I'm the admin of Check Point who manages the entire network, I would like to have access on my home device or maybe a mobile app to get reports, etc.

View full review »
PD
Associate Consult at Atos

Stability.

We know that Check Point has a very good database about threats even Check Point tries to make this EDR stable still there are some issues we were facing after upgrading or taking TAC to help its got resolved but Check Point really needs to work on metadata.

Check Point agent to Server communication many times got interrupted or cloud-managed infinity portal dashboard gives many issues while creating policy or installing uninstalling agent or packages.

Heavy load on the system gives issue which can be in a different manner.

View full review »
reviewer1375017 - PeerSpot reviewer
Senior Solution Architect at a comms service provider with 51-200 employees

I would like to see simple sandboxing for malware analysis. But, they are not the leaders in this market. I would like to see virtual tasking as a feature.

View full review »
PP
RSSI at SDIS49

The pricing can be improved.

The interface could be more user-friendly.

The initial setup and configuration should be simplified.

View full review »
JA
Owner and CEO at A.T.I.K. Maroc

I think this product is made by the market leaders. They have pretty much everything you can ask for as far as features are concerned. The pricing is high and I think it could be more competitive if it was lower. They might resolve that difference by offering even more features.

Another feature I'd like to see is a different way to handle load balancing on the firewall. Sometimes when you are using a firewall, you need another layer to properly balance your traffic. Right now that means adding more equipment, which is expensive. If Check Point could offer another option for a different way of doing load balancing, that would be a cost-savings for the client.

Another option might be offering data fusion. Sometimes you can combine the data stream. If you can and you do, you will have one stream instead of having multiple streams. That is also very cost-saving when you can fuse the data.

View full review »
JG
Owner at Giliam Network & System Solutions

I would like to see support for a policy in the appliance that will refuse to create a connection if it does not detect an active virus scanner.

Two-factor authentication is missing from this solution.

View full review »
CM
Head of IT Director at Cosyn Limited

The entire industry may move to the cloud, where we don't have to worry.

View full review »
seniorse527517 - PeerSpot reviewer
Senior Security Consultant - Checkpoint Technologies at a tech services company with 11-50 employees

One area of this product that has room for improvement is the disc encryption.

I'd like to see a patch management solution like Kaspersky has. That's the only feature that's missing.

View full review »
GC
ICT Officer at Kenyatta National Hospital

They should provide bandwidth regulation so we can monitor and regulate bandwidth.

View full review »
Bala_Krishna - PeerSpot reviewer
Director at Rhinexa India Pvt Ltd.

The remote deployment with Check Point Endpoint Security requires improvement. We have to depend on some of their deployment tools. 

I would like a dependable system endpoint protection management tool or remote deployment tool. The deployment on the remote client needs some type of tool to implement it.

View full review »
MT
Operations Director at a tech services company with 1-10 employees

I'm not sure what they are thinking about in terms of additional features at the moment, but I hope that they'll maintain focus on the tool to enhance the solution. 

Areas that have room for improvement are the scope of the product and, while I think the support is good, they can improve support as well.

View full review »
NetworkAc063 - PeerSpot reviewer
Network Architect at Leprino Foods

There was a learning curve for our general population of employees (the user). 

View full review »
CP
Owner at a tech services company with 1-10 employees

It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects.

View full review »
it_user5520 - PeerSpot reviewer
Network Manager at a manufacturing company with 501-1,000 employees
Endpoint security programs can be a bit pricey, but you are receiving basically the same type of protection from each software program. To upgrade from one version to the next can get very costly providing what type of equipment you are running the program on. I did not find that endpoint security was very compatible during the upgrade. I ended up spending a lot more money than budgeted due to compatible issues. View full review »
it_user1068 - PeerSpot reviewer
Tech Support Staff at a tech company with 51-200 employees
It took me time to learn how to configure endpoint security. Getting one for our Unix-based systems was not easy because most programs available in the market are windows-based. Implementing security on the latest endpoint devices was not easy due to compatibility issues. View full review »
reviewer1098015 - PeerSpot reviewer
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees

The antivirus could be improved in terms of the resources it consumes, particularly regarding CPU and memory usage. We've encountered issues with some of our firewalls, leading us to turn off the antivirus feature due to its heavy resource consumption. Enhancing its performance would allow us to run it on smaller models without overburdening the CPU.

While it is a valuable security feature, Check Point should ensure that the hardware is properly dimensioned to support the antivirus feature, providing some margin for potential resource demands. The values provided in the specifications should be realistic and adequate to support the feature effectively on the Check Point firewall.

View full review »
reviewer1638066 - PeerSpot reviewer
Technical Engineer at a tech services company with 11-50 employees

An additional feature I would like to see involves the VPN.

View full review »
reviewer1126782 - PeerSpot reviewer
Information Technology Security Engineer at a tech services company with 11-50 employees

There should be an indication when you assign an endpoint to be a local proxy for other endpoints. The current system doesn't clearly indicate whether the assignment was successful. I even talked to Check Point support about considering this as a feature request.

View full review »
reviewer2300304 - PeerSpot reviewer
Virtualization & Workplace Consultant at Outscope

The solution needs better reports and centralized logs. They need to take up fewer resources for consumption.

View full review »
Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,445 professionals have used our research since 2012.