Check Point Harmony Endpoint Valuable Features
The best feature Check Point Harmony Endpoint offers in my experience is its XDR, which has significantly helped us with investigations. Whenever we have alerts or incidents, Check Point's XDR feature speeds up our investigation by correlating data related to an alert and presenting it to us. As an administrator, it is beneficial because all the data is available in the Check Point Infinity dashboard to view different information and determine whether the raised alert is a true positive or false positive.
Check Point Harmony Endpoint has positively impacted our organization, and the ROI has been great. With this solution, we are now confident that our endpoints are protected, and we receive alerts if any malicious activity occurs. Apart from insights, Check Point has a prevention-first approach, focusing on both detection and prevention, which brings us peace of mind.
View full review »One of the best features that Check Point Harmony Endpoint offers is its ability to stop attacks before they can cause damage in our environment, and it has integrated Threat Emulation, which is sandboxing, and Threat Extraction technology that neutralizes threats embedded in documents or email attachments.
Before using Check Point Harmony Endpoint, we had sent many emails containing ransomware content that our teams did not easily detect, but after deploying this product, Check Point Harmony Endpoint prevents such emails from entering our email system because it detects the email attachment type and sanitizes the attached documents before they get to us.
Since I started using Check Point Harmony Endpoint, about 95% of our emails are now secured because of this product.
Check Point Harmony Endpoint has positively impacted our organization by reducing incidents and improving our security posture because we received many emails attached with malware, and after deploying this product, we are protected from such emails.
There has been a reduction in the number of incidents and time spent responding to threats since implementing Check Point Harmony Endpoint, with 95% of incidents reduced now.
View full review »The best part of Check Point Harmony Endpoint is that it is delivered as software agents deployed to endpoints and connected to centralized security analytics and management control for desktops, laptops, and server systems.
Security has improved after we started using Check Point Harmony Endpoint, and we can manage all the systems and machines through a centralized portal called Check Point Infinity portal. Through these portals, we can push the agents to the end machines as well as servers, and we can also manage and control these systems.
We can find all kinds of reports related to endpoints, such as information about different operating systems on the internal network, issued systems, malware-infected systems, and problematic systems through Anti-Malware in a centralized single plane.
View full review »Buyer's Guide
Check Point Harmony Endpoint
September 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,676 professionals have used our research since 2012.
IZ
Idrees Zargar
Senior Solution Consultant at a tech services company with 51-200 employees
Check Point provides zero-day protection, which helps us significantly with our security regarding our main use case.
Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features.
The AI-powered threat prevention in Check Point Harmony Endpoint helps us to detect and prevent sophisticated attacks, and its scalability means it can be deployed across various devices and environments, helping us daily.
Check Point Harmony Endpoint has positively impacted our organization by providing shorter incidents and better compliance.
Our incident response has increased by 5 to 10%, which showcases specifics on how much the incident duration has decreased and how compliance has improved.
View full review »MW
Mayur Wadekar
Technical Specialist at Softcell Technologies Limited
The best features of Check Point Harmony Endpoint that stand out are anti-ransomware and threat emulation, which are crucial for protecting and blocking unwanted malicious threats and ransomware before they can execute anything on the user's system, along with Zero Phishing Protection, real-time URL filtering, and an anti-phishing mechanism that has greatly reduced the number of successful phishing attacks on our users' systems.
Centralized management via Infinity Portal is user-friendly and allows central policy management, while the detailed telemetry of forensic insights helps the SOC team identify attack vectors and understand what executes on the system during malicious content attempts, making it overall effective in protecting endpoints in various aspects.
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
View full review »NS
Naresh Sonawane
Senior Security Analyst at SecurView Systems Pvt Ltd
Check Point Harmony Endpoint offers robust protection against malware, ransomware, and phishing attacks, and I particularly appreciate its behavioral analysis and anti-ransomware capabilities, with the central management console being integrative and making policy management easy across devices.
My advice for others looking into using Check Point Harmony Endpoint is to allocate time for proper configuration and policy tuning during the initial steps and to take advantage of Check Point's documentation and support resources. This will be helpful during integration or initiation of the setup, especially if they already have other Check Point devices, which would enhance their security posture and streamline management.
View full review »The best features Check Point Harmony Endpoint offers are its comprehensive and proactive approach; these features stand out because it's very lightweight and has very good anti-ransomware protection.
Check Point Harmony Endpoint has positively impacted my organization by enhancing business process agility and user protection, resulting in more operational efficiency.
View full review »BO
Bayo Omoyiola
Adjunct Professor, Cybersecurity at University of the People
Check Point Antivirus is valuable due to its autonomous threat prevention system, which is consistently up-to-date and highly reliable with excellent performance at scale.
It features strong AI-based threat prevention and security management, making it a solid choice for end users. The SmartConsole is automatically updated with the latest patches and fixes, ensuring ongoing protection against evolving threats.
View full review »
Check Point Antivirus offers comprehensive security features, including real-time scanning based on signature-based detections, behavioral analysis, an anti-malware engine, machine learning, and sandboxing, which collectively protect our systems and computers effectively.
I find the most valuable features of Check Point Antivirus to be behavioral analysis and real-time scanning, as they collectively work to protect our systems.
Check Point Antivirus has positively impacted our organization by protecting our systems and computers, saving time, costs, and preventing data loss.
View full review »IF
Itamar Fenesh
Manager, Information Technology Cyber At Edeltech O & M at Ezom
Harmony Endpoint has a geo policy that allows me to see where users log in from, enabling me to analyze if someone tries to access an account from another location. It offers a good false positive rate and provides protection across all platforms of 365.
View full review »
The most valuable aspects include:
1) Cloud Centralized management. This is particularly useful since you don't have to use any on-premise server, the cloud dashboard is activated without a minimum license number.
2) Several layers of security. It is well aligned with actual threats like ransomware and zero-day attacks and offers traditional layers of security.
3) Visibility. You have a single dashboard for all endpoint information that you need from an IT administrative perspective and in a threat incident you are properly advised.
View full review »The best features that Check Point Harmony Endpoint offers help us to reduce incidents by catching threats early, which is highly effective. It gives us a wide view regarding the assets that we have and how exposed they are.
Check Point Harmony Endpoint has positively impacted our organization by helping to reduce incidents by catching threats early before users even noticed them, which saved us time and lowered risk across the board.
View full review »The best features Check Point Harmony Endpoint offers include fantastic forensic visibility along with a broad feature set that covers anti-malware, UBA, anti-phishing, and host-based firewalls, all centralized and easy to use through a cloud tenant.
The forensic visibility is valuable for my work because when an incident happens, it's very easy to see the forensic details and find out if it's a false positive or something that needs to be acted on.
Check Point Harmony Endpoint has impacted my organization positively by improving our security posture, but in the end, it didn't make the cut in the POC, so we went with another vendor.
During the time we used Check Point Harmony Endpoint, it improved our security posture, as we definitely got the visibility that we wanted, and it integrated well into the SIEM, so we got all the logs that we wanted.
View full review »MT
Mohammad Taleb
Senior Network Engineer at a healthcare company with 10,001+ employees
The best features Check Point Antivirus offers are ThreatCloud Intelligence, zero-day protection, and the anti-ransomware engine.
These features stand out because ThreatCloud Intelligence leverages real-time global threat data to detect and block emerging threats quickly.
Check Point Antivirus has positively impacted our organization by enhancing our security posture and operational efficiency.
The operational efficiency provided by Check Point Antivirus helps my team work more effectively through centralized management and automated threat response, which saves time for our IT team.
View full review »MT
Mohammad Taleb
Senior Network Engineer at a healthcare company with 10,001+ employees
The best features Check Point Harmony Endpoint offers include strong security capabilities.
The security capabilities that stand out to me include robust threat prevention, malware protection, and integrated firewall features, which I find valuable.
Another feature I find helpful is the ease of use.
View full review »Endpoint protection is valuable. Stability is good, and the product is well-designed for security needs. It is scalable and offers multiple features, which justify its pricing for enterprise customers. Since security is a major concern, we do not worry about the pricing as the product has features built-in.
View full review »RG
Raj-Gupta
Account Manager at a tech services company with 51-200 employees
In my opinion, the best features Check Point Harmony Endpoint offers are advanced threat protection, ransomware protection, phishing and malware prevention, centralized management, and generative AI protection. All these features stand out for me.
The centralized management and AI protection of Check Point Harmony Endpoint help us to easily deploy all the endpoints, new endpoints, centrally monitor them, policy enforcement, and everything. It has increased our efficiency.
Check Point Harmony Endpoint has positively impacted my organization by reducing incidents.
Since implementing Check Point Harmony Endpoint, my incidents have reduced by around 15 to 20%.
View full review »The characteristics that we find most valuable are its anti-ransomware protection, zero-day phishing protection, web browsing filtering, and vulnerability and patch management. The level of security and visibility they provide is great and it is very easy to configure and maintain. We have almost no false positives.
A feature that we really like is the ease of management and administration that Check Point offers us, in addition to including the management server in its cloud and the predefined dashboards and reports.
View full review »The best features that Check Point Harmony Endpoint offers, unlike traditional endpoint solutions, focus specifically on detection and remediation even before the device has to go to the firewall. We manage it through the Infinity Portal, which helps us with the fatigue of logging into different windows.
The automated detection, which is EDR, detects any threats potentially moving from the user endpoint onto the network and possibly to the data center. Another critical feature is data protection to prevent someone from easily extracting information from the user laptop by plugging in a stray hard drive or USB.
The automated detection and EDR in Check Point Harmony Endpoint reduce administrative overhead. The agent comes with pre-installed settings to detect different threats on the endpoint. In most other solutions, you must start from scratch, which takes considerable time and troubleshooting. With Check Point Harmony Endpoint, you're basically fine-tuning because the templates are already running, and you just adjust them to fit your organizational preferences.
View full review »Integration of the Check Point Threat intel cloud with the EPP-EDR platform, which is enhancing and providing efficient DB for threat hunting and preventing zero-day using an anti-exploit platform.
Apart from the EPP and EDR capability, Check Point Harmony can integrate using API with 3rd party vendors; Azure AD integration makes the whole deployment and management easy for the administrator.
Multiple endpoint protection packages are available for organizations. Also, it is an MSSP-compatible platform.
View full review »MD
Miguel De Bique
Independent Information Technology and Services Professional at a non-profit with 1-10 employees
The most valuable features include scanning, sandbox features, and antivirus reporting. The Antivirus engine's performance has been excellent.
View full review »SC
Shawn Campbell
IT Manager at Bolger Brothers Inc.
Ease of setup and ability to hook into O365 directly without MX record changes. Check Point offers advanced threat prevention capabilities, including SandBlast Network Threat Emulation and Threat Extraction. These features can identify and stop even unknown threats by simulating real-world attacks in a safe environment. Check Point solutions are designed to scale to meet the needs of large organizations. They can handle high volumes of traffic without compromising performance. Check Point integrates with a wide range of third-party security solutions. This allows you to create a comprehensive security ecosystem that meets your specific needs.
View full review »Check Point Endpoint Security has proven to be a beacon of resilience, with its multifaceted features illuminating our defense strategy. The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets.
The granular control over endpoint activities empowers us to tailor security policies, ensuring a bespoke approach that aligns with our unique operational needs. The intuitive dashboard and centralized management streamline our security operations, enhancing efficiency and providing a comprehensive overview of our digital landscape.
Notably, the seamless integration with other security components orchestrates a harmonious defense orchestra, fostering collaboration and maximizing the synergy of our security infrastructure.
In this narrative of fortified cybersecurity, it's the amalgamation of these features that makes Check Point Endpoint Security an invaluable guardian, fortifying our digital realm against the relentless march of cyber threats.
View full review »One of the advantages is the reporting functionality. For example, if some critical data is available on a laptop and the laptop gets stolen - I can remotely wipe it immediately. Because, at the end of the day, apart from the device, the data is important.
So, the zero-phishing feature of Harmony Endpoint, the one I have used, was very good.
Those features are very good. Then, zero-day protection is also very important to us.
We can map the MITRE attack framework along with the Cyber Kill Chain completely.
Sandboxing is a great functionality.
View full review »I would have to describe what I feel is valuable in Check Point as a whole. Check Point provides users with a central point from where they can manage all the devices across a workplace. Whether users use Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, they don't have to log into different portals or solutions since they can manage everything from one central point. I like the fact that products from Check Point are very easy to deploy. Even if a user has 1,000 endpoints in an environment, Check Point can take care of the deployment in minutes. Check Point Harmony Endpoint is a very easy solution to deploy and requires very little maintenance or technical expertise.
The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read.
View full review »The valuable features of Check Point Harmony Endpoint stem from the fact that it serves as a comprehensive endpoint protection product that provides users with a fast solution and complete endpoint protection while serving as a tool that offers the fastest recovery for endpoints. The tool efficiently detects, protects, and corrects vulnerabilities and patches.
View full review »This tool has a very secure and efficient centralized management. This helped us to be able to have multiple devices and systems in a centralized control panel and to be able to track them. This is very valuable for administration and supervision.
Another characteristic is the number of detailed reports and analyses of all the incidents that occur in our network.
The compliance with regulations capabilities with, for example, HIPAA and GDRP, has also helped us a lot since we constantly have internal and external audits, and it has helped us a lot to comply with the requirements we have.
View full review »We have found the combination of vulnerability scanning, rating, and remediation most valuable in the platform and the feature is vital to our everyday security hardening.
We can effectively target vulnerabilities with suggested fixes and automate patches where relevant.
There is a constant flow of newly added features and improved functionality is regularly made available by the Check Point team.
Customer communication around zero days and other emerging threats is a great addition to the service.
View full review »Check Point Antivirus has numerous features which are quite remarkable and have a greater impact on improving the performance of the business some of the features are.
Check Point Antivirus software is highly customizable in nature due to which its acceptability by the majority of the organizations like small medium and large enterprises is huge.
Check Point Antivirus is a cost-effective security solution for businesses and that's why its acceptability by various other fields and organizations is humongous.
Check Point Antivirus has a large number of good peer feedback in the public domain due to which the confidence and trust and transparency are high for this partner.
The software is quite compatible and extremely stable in any kind of IT environment.
This software is easy to integrate and deploy in any IT environment.
We are very much impressed by the business team and the tech team at Check Point who are day and night giving their best and proving their excellence in coming up with extremely viable and innovative security solutions for us.
View full review »The solution offers a high malware catchment rate and increased speed, and the performance outcome efficiency is commendable.
It is a highly cost-effective antivirus software in the market compared to its competitors in the market.
The stability of the software is great and highly compatible as well.
Real-time and proactive detection of any malware or ransomware in the system means issues can be removed ASAP.
It has zero-day attack protection.
The product offers complete protection of the system from hijackers, and no phishing activity is allowed under any circumstance. It is high-grade protection with strict system security.
View full review »The advanced intelligence is embedded in the software for ransomware and threat attack detection on systems and servers.
Its prevention of threat attacks and managing of the system security is in a unified manner with complete control covered by the authorization team without any security breach.
It is one of the fastest malware prevention software with advanced upgrades to have 360-degree threat detection and system remediation.
The quickest response time and quick turnaround time help curb the attack in the best possible manner without much harm to the system and servers.
View full review »CM
Chan Mf
Works at CSIT
The product is quite easy to configure and can be deployed in under half an hour.
It has a centralised management console, single panel to triage, escalate, mitigate and respond.
The agent is lightweight on the endpoints and operates seamlessly in the background with minimal impact on the performance of the endpoints.
It has features like firewalling, removable device control, VPN, app control, DLP, file sandboxing, ransomware protection. which can be turned on or off per endpoint, groups, employees.
View full review » I think the overall product is good. There is an in-built EDR in the tool, which is good because it gives users visibility into the threats coming into the environment.
The standout features are primarily EDR and MDR. These functionalities are crucial because they specifically target the most common attack vectors, such as email phishing and downloading unknown software. EDR provides a solution for monitoring and responding to these threats effectively. Additionally, MDR ensures round-the-clock monitoring by skilled personnel from Check Point's team. They promptly alert us to any significant events, allowing us to take necessary actions swiftly.
Among the features offered by Check Point Antivirus, the real-time scanning and automatic updates stand out as the most valuable. Real-time scanning ensures that threats are detected as soon as they appear, minimizing the potential damage they can cause. Automatic updates, on the other hand, keep our antivirus protection up-to-date with the latest threat intelligence and security patches. These features combine to offer a proactive and effective defense against a constantly evolving threat landscape.
View full review »Real-time scanning is a valuable asset for our organization. Real-time scanning and behavioral analysis have ensured that both our proprietary manufacturing processes and sensitive data remain secure, preventing potential breaches that could disrupt operations or lead to intellectual property theft. The centralized management of security policies across all endpoints has streamlined our IT operations, allowing our IT team to efficiently monitor and respond to security incidents from a single dashboard
View full review »BK
Babu Kp
Technical Support at Hitachi Systems, Ltd.
Our customers are satisfied with the Harmony environment. The remote support is good. If the users forget their passwords, the remote support helps them reset the password. It is a good feature. We only need an internet connection for it.
View full review »The most valuable features of the solution are web protection and threat prevention.
The most valuable features of the solution stem from the EDR functionalities it provides to users, as it does its work properly.
View full review »I loved almost all the features.
The zero-day threat prevention is excellent. It gives us more confidence to have automated protection from unknown threats.
It helps to secure our browsing. It can check if something is a genuine page or not. It also masks when we browse or enter our banking user ID and password. This gives us assurance that we are in a green and safe zone.
View full review »Some of the most valuable features from Check Point include:
1. Its ability to run real-time scans in the background and detect all the malware and viruses while taking action to clean the system from the threat.
2. On-premise centralized management, so the client can do signature updates locally and save the internet bandwidth.
3. The reporting feature where we can see and monitor what happened on our client computers. For example, which client has out-of-date signatures, which client is infected by what virus, et cetera.
View full review »The most valuable feature of Check Point antivirus is that it scans every file type for malware and viruses.
Also, it gets regular updates of newly found threat signatures which keeps it updated.
View full review »SK
SaiKiran
Presales Engineer at Vincacyber
The solution offers multiple features in one solution, along with data detection.
View full review »The tool comes with an in-built AI feature, which makes file management easier. It also secures the network from viruses, malware, and phishing attacks.
View full review »Check Point Antivirus is easy to configure. We enable the blade in the SMS for the gateway and that's pretty much it. You can get into the nitty gritty and fine-tune some of the settings to fit your organization better than the default settings, however, personally, I have yet to do this and it is working as expected in my organization. It is also great that this is not an add-on license and is included with the low-tier licensing which helps to reduce the overall cost to the organization while increasing the value of the product.
View full review »AS
Ana Salguero
Complaints analysis/investigation at compugana
Some of the Check Point Antivirus features that users may find valuable include:
The firewall helps provide protection to block unauthorized access to the network.
Intrusion prevention prevents attacks on the company network and helps companies to comply with regulatory requirements related to data protection.
It has a wide range of features that help make this tool one of the best on the market.
View full review »The high malware catchment rate is great and really commendable. The software is equipped with scanning all kinds of sources, email servers, and cloud servers for their endpoint threat and immediately diffuses and eliminates the threat source and threat points. It helps us to improve security scanning and also leads to endpoint management throughout.
The software provides advanced security features like signature-based malware detection, which is widely used by organizations for scanning their code management and securing their code system end to end.
The other features, like real-time endpoint detection, help us with 24/7 scanning and monitoring of the system for ransomware, and can immediately remove them permanently.
View full review »The sandboxing is good. We didn't have any file ransomware attacks since implementation.
The phishing protection works. It prevented a lot of nasty situations with fake websites.
Using this solution in e-mail and Office, we recognized how many man-in-the-middle attacks have been started to get some credential information from our employees.
In mobile, we didn't realize before how much harm can be done from the mobile devices in the network.
It replaced the ESET solutions we used before in our company.
View full review »AB
Abnet Tsegaye Belay
Cyber Security Engineer at a tech services company with 11-50 employees
One of the best features of Check Point Harmony Endpoint is the portal, along with real-time threat detection and existing threat management.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyberattacks. This has given us added security and peace of mind as we feel protected against ransomware threats.
Harmony can detect and display threats. It helps prevent us from clicking on threats. Any cyber attackers that attack our hosts won't get any vulnerable information. It's shielding us from ransomware.
View full review »It provides encryption for operating systems and protects browsers against malware, benefiting both new and old customers.
View full review »It monitors endpoint behavior in real-time to identify and block suspicious activities indicative of malware or malicious behavior. This proactive approach helps us a lot.
It employs sandboxing technology to execute suspicious files in a controlled environment and analyze their behavior. This allows it to identify and block malware that may evade traditional detection methods by remaining dormant or obfuscated.
More importantly, it is easy to install from the cloud.
View full review »SK
Saranjit Kainth
Head of IT at RD Tech
Check Point Antivirus ensures our organization's security posture by ensuring that everyone accessing the internet does so securely. It performs packet inspection, enabling all security blades to monitor and filter traffic constantly. This includes URL filtering to prevent access to unwanted sites and to protect against any attempts to compromise our network.
The product streamlines security operations in our IT environment through its single configuration point, making it easy to configure all available blades. Monitoring, extracting logs from, and integrating with our Active Directory are also easy.
All of the features work in tandem for effective malware prevention.
We are quite satisfied with Check Point Antivirus, as it offers leading-edge features that other companies may not have. Despite the higher price, we carefully selected the product based on its feature set.
The sandbox technology is very useful. It operates offline in the cloud and facilitates easy replication. The tool works with our Ubiquiti switches and Active Directory.
View full review »The most valuable aspects of the solution are the real-time endpoint analysis and blocking mechanism, the detection of malware and threats is the best use of this technology.
As we have the stability of this product and best practices solution is applied to the infrastructure as endpoints have a clear view of the statistics and performance.
Also, we have monitored the server level where it's been protected from the outside world. The CPU, memory, and hard disk consumption and compromisation are good.
The dashboard has also been user-friendly and easy to understand.
View full review »The most valuable is encryption.
View full review »Check Point Harmony Endpoint has one of the most user-friendly dashboards I've seen.
View full review »The most important benefit of this solution is having a single agent for security purposes.
Its stability during any heavy performance activity is excellent.
It has improved the overall security of our organizational digital well-being and made things and monitoring processes a lot easier and more straightforward.
Integration with third-party servers and data endpoints and 24/7 background security checks are very useful for us and has been very instrumental phenomena in keeping things simple and secure for us.
It has the ability to configure with any type of system and operating environment, which is great and makes it a more useful product for multiple purposes.
View full review »Check Point Antivirus has highly productive and extensive support and features. It runs system checkups and looks for threats and malware - including phishing attempts.
Check Point Antivirus is productive as a security management software application for my system. The console is great.
Check Point Antivirus provides full-scale security for my information and data and I can perform my activities feeling completely protected.
View full review »The speedy catchment rate of endpoints and malware is exceptionally good and act as a precursor for organizations in order to deploy this antivirus and secure the system and servers in a proactive manner without any trouble.
It has an inbuilt AI system that helps in diffusing the virus in a proactive manner and protects the system from getting damaged at the worst level.
The pricing is also quite affordable for marginal organizations as well, and their improved efficiency is great. Signing and renewing of MoUs were not difficult at all. They are a good stakeholder to work with.
View full review »Threat detection and response have been a great contribution to our daily programs.
It provides daily reports on the status of the device and notifications when there are looming data threats.
It has deployed firewalls that safeguard devices from any cyber attacks that can negatively affect workflows. When working with this antivirus, it does not affect operations in any way.
Scanning files and data before sharing has reduced the chances of spreading viruses among the members.
This tool has been stable and has highly improved the security status of the applications.
View full review »The solution offers a quick deployment without any issues.
The threat catchment rate of the software is very high and quite impressive.
It is easy to integrate with all kinds of other software and hardware and works with cloud integration. We have no more tension around compatibility parameters as the software is quite stable and works efficiently across varied business environments.
It is quick and agile and, with global scanning, it scans with great speed and works flawlessly in the background of the system without interrupting the front-end work
View full review »One of the characteristics that has given us the most value when implementing the antivirus solution is being able to have a conglomerate of solutions and to be able to manage and give to the administrators something that can observe what is happening within the network. The dashboards allow us to export this information so it can be delivered to senior managers, who are often the ones in charge of making decisions at the infrastructure level in terms of security and management of our organization.
View full review »The best feature is that it can secure the equipment. It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks. It has detection management with all types of computing power used in the equipment and outside of it in the cloud to which it is connected. This comes to give us a complete solution.
View full review »Its most outstanding feature is the power to manage everything from a dashboard, a window that is in the cloud, which allows us to manage it from anywhere in the world through any browser, from anywhere. This is a feature that came to give administrators the possibility to work from home. Today many of us are remote workers who are not at the company, on-site. We are not in a single site, and yet we manage well and have the capacity and the assurance of managing everything easily, quickly, and simply.
View full review »PK
Purnambica Kolavennu
Assistant Manager at ASCI
Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users.
The Check Point Partner keeps updating its EDR system and ensures no lapses occurred during the operating time. The entire team of Check Point is quite agile and proactive in terms of their advanced product development and their reaction time to any issue or complexity is just fantastic which ensures no deep damage to the system from threats.
EDR improvement checks system security and a proactive business and tech team improves customer interaction in the greatest manner possible.
View full review »Deploying new versions of the endpoint are easy. It was a hassle before with a local management server, and now it's as easy as selecting the version you want from a drop-down menu.
The options for removing/adding blades with the click of a button from the portal are great. The built-in VPN blade makes it so easy to deploy on my endpoints if I need employee remote access to my LAN.
The installation is so easy with the simple MSI deployment packages, and I can watch the deployment process in real-time from the Cloud Portal.
View full review »The following is a list of the valuable features:
- Good price
- Best virus database
- It isolates the infected machine.
GC
GeraldChege
ICT Officer at Kenyatta National Hospital
I love the product’s flexibility. We can manage the blade without changing the protocols. It is easy to manage how the tool runs the network. The product is easy to deploy. It’s a good firewall. It supports most of our OS, such as Linux and Windows. We can use it even on mobile devices. The browser and data protection are good. The solution has good threat intelligence features.
View full review »VP
Vinod Perera
Sales Manager, Checkpoint at South Asian Technologies
The Rollback feature is valuable because ransomware attacks are very familiar nowadays, and anti-phishing and anti-ransomware blades are required by many of our customers. Other features, like prevention blades, are also okay, where you get threat extraction and evaluation. Likewise, the forensic report is also very important.
With the prevention blade, Harmony scales higher than many other solutions. Even CrowdStrike has technical problems when you're offline. But Harmony is not like that. Even if I don't have Internet connectivity, I have seen how remediation and rollback happen. All the encrypted files come to a state where it works with micro-backups.
Customers would like to have a very advanced endpoint to protect themselves from anti-phishing, especially ransomware.
View full review »It provides automatic scans to most websites to ascertain security situations and alerts the user when there are potential threats that can affect data.
The webcam protection system prevents unauthorized members from joining virtual meetings organized by employees.
The phishing protection system prevents teams from spamming across email conversation channels.
It is easy to install and learn how this platform works.
It has various location connection that enables the user to select preferred sites that are safe.
View full review »Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information.
The cloud management system provides security to hybrid information and saved files.
The customer support services are efficient and always reliable when reached for any consultation.
It supports operating systems that are deployed in computers and mobile devices.
New users familiarize themselves easily with the operation of UI since it has flexible dashboards.
The faster data processing capability saves time and costs for accomplishing given tasks.
View full review »Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease.
View full review »Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background.
Along with Check Point Antivirus, the support provides multiple updates and upgrades in quick succession. It's quick to restore the management of the database and has scheduled security system and network upgrades for risk-free work management.
Overall, Check Point Antivirus is highly productive, scalable, compatible, and easy-to-use software for data security and system management. I highly recommend this platform.
View full review »Network monitoring provides the best reports based on real-time performance, which helps our members locate any drawbacks across the workflow system.
The threat response system from the user dashboard blocks malware attacks that can affect email and the flow of information among colleagues.
Endpoint protection is fundamental in security enhancement; it's effectively protecting our devices from internet viruses.
The application investigation system enables the IT team to come up with reliable reports on the cause and prevention measures that can be adapted to prevent any future attacks.
View full review »The URL filtering and application control are very helpful since it's typically hard to block productivity loss apps/URLs on clients when abroad. Harmony made it easy to control the usage of the company resources and bandwidth.
Disk encryption is a nice feature if you don't have other systems. However, since we've already had BitLocker deployed, we saved a few dollars on this licensing type.
The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options.
View full review »The most important and useful feature is the regular updates against modern-day viruses. We have seen that new viruses and malware are introduced by hackers every day, and we need to keep ourselves a step ahead for protection against those threats.
Check Point Antivirus, with its up-to-date features, ensures that we are always ahead of the new versions of viruses and provides real-time protection. The overall features and data loss prevention makes it a valuable product in every way.
View full review »What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security.
You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution.
View full review »One of the characteristics is the detection of anti-ransomware, which helps us to protect our equipment and data against any eventuality. This solution detects and analyzes any attempt to encrypt the data. If they are encrypted, the same solution stores and restores a version of the compromised data.
Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint. Among other features, this Endpoint Behavioral Guard identifies families of malware, file-less attacks, and other generic malicious behaviors that are the most common attacks when you are in unsafe networks without a protection solution.
View full review »One of the characteristics of this antivirus that is valuable is the detection of ransomware. I can detect viruses that have done the most damage in recent years. I can protect users from damages and total or partial loss of information. We're being well protected. This protection feeds on databases that are constantly updated, giving greater security. It is worth using, and having in our organization is one of the products that will make the difference during an attack and will safeguard the security of the equipment.
View full review »The main valuable feature of Check Point is the constant updating of the EDR database in order to detect new threats.
This update system is responsible for inserting new viruses into a database so that it is easier to detect and eliminate them despite the fact that constant notifications are sent when the virus database is updated, I have no complaints about this feature as it has helped me to restrict the passage of new threats.
New viruses emerge day after day, and this EDR system helps action be taken before viruses affect the internal system.
Another of the striking functions is that Check Point monitors the online activity of each user, ensuring that they do not access websites that have a suspicious encryption code or that have an unusual certificate; this has helped us to navigate calmly and detect pages that might put our work integrity at risk.
View full review »Scalability is a huge factor.
The need for no downtime is key for us - and this solution offers that. When you have six gateways you have to patch and no one even notices, it's phenomenal.
We need to be able to keep these connections running 100% of the time. The fact that we can patch and reboot firewalls and no one even notices is a huge plus. We need to be able to keep it secure but also keep it up and running.
Having the six gateways and being able to clone them in when we need a new gateway is excellent. I love that we are able to just put a new gateway in and clone it.
View full review »The set of features is quite comprehensive.
The Endpoint security solution integrates with the Check Point firewall services, so it's a combined approach to security.
A unique feature with this product is that it will detect if the user is entering their password on a website, and then block it.
View full review »The below features are most valuable:
1) Anti-malware
2) Threat protection with signature
3) Anti-ransomware
4) Anti-phishing (support for all leading browsers)
1) Anti-malware (to detect and prevent malicious activity)
2) Threat protection with signatures to prevent the threat on the basis of a signature. Signatures are stored in the database.
SB
Sumit B.
Consultant at Cognizant
SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth.
We set up reports, which were weekly or biweekly. Then, our admins, who are mainly working with SandBlast Agent, were able to look at daily reports or even more granular reports, hourly or daily, based on their customizations.
The automated part keeps it running in the background. It only gives us notifications when there have been major attempts to breach data. We also have reports that show logs for what external, unauthorized systems tried to access the data. Through those reports, which are automated in the background, we are able to do what we want in order to keep our systems secure. We feel the automation part is pretty good with this application.
View full review »All the features that Check Point antivirus presents are very important for the implementation of network security and the most valuable part of this tool is the easy and interactive way of its configuration through SmartConsole in Check Point.
It can scan the files that our users have downloaded to check if they have a virus, which is the most important thing. IPS and Antivirus work together, which provides more flexibility and security throughout our work environment and thus be able to have a well-secured infrastructure
View full review »The product's sandboxing feature is valuable as it runs suspicious files in a virtual environment. It helps us analyze their behavior without risking the main system.
View full review »The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client. Both features offer significant advantages from different perspectives.
View full review »Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner.
The threat extraction and threat emulation have been a great benefit to give more autonomy to users.
On the other hand, it cannot be left out that it reduces the number of malicious attacks. It has helped us to properly monitor what has been happening with our network traffic and prevent individual attacks from accessing certain sites where we want to have restrictions or limitations.
View full review »The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists.
View full review »DH
DHernandez
Security IT at a tech services company with 51-200 employees
The most important characteristic of our requirements was the implementation of disk encryption. It's necessary to avoid loss or theft of the equipment and, therefore, loss of data from the equipment. It can be applied to all the equipment from the portal or segments.
Another advantage is the control of applications and access policies that can be carried out in a granular manner for different company profiles. It works very well.
It offers secure administration from Check Point Infinity Portal. It is a security center where many of the Check Point solutions are located.
View full review »DH
DHernandez
Security IT at a tech services company with 51-200 employees
We really like this antivirus security tool, included in the security management server used for our Check Point gateways. The ability to include blades is very good, it allows the centralization of security in our gateways natively.
There is also a lot of documentation to be able to use this security feature in the best way using the best practices indicated by the manufacturer, with this we guarantee the use of the tool correctly.
Finally, in our company, we like the ease of implementation.
View full review »NG
N Guzman
Support at a security firm with 51-200 employees
It is a good tool. The price is accessible. It protects against modern threats in a great way; there is a lot of confidence in Check Point.
There is quite a lot of product documentation to assist with a correct implementation.
The ease of installation is great.
We find the zero-day protection to be an extremely valuable feature of this solution.
View full review »JC
Juan Cotal.
Consultant at SOCIEDAD AXIOBASE S.A.
What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment. It has a threat prevention policy so that I can stop different types of threats from entering a workspace or environment.
View full review »The total cost of ownership has enabled the company's teams to identify any areas with security weaknesses and appropriately assign security models.
The log4j-related attacks blocking system detects any vulnerable endpoints in advance.
Identifying ransomware behaviors has upgraded the security monitoring system and put measures in place to curb such threats.
When browsing, it blocks phishing sites that may hack personal data and leak to internet cyber criminals.
The endpoint behavioral guard identifies online threats that easily prevent credential theft that may lead to funding theft.
View full review »Virus detection helps teams to be aware of any threats that can harm data and take precautions in advance.
It provides networking reports on the data security situation, which enables users to make decisions.
Performance metrics provided regularly help the IT team plan to curb any threats to company data.
It is easy to deploy the antivirus and learn how it works.
The application runs very fast and does not affect the performance speed of the device where it is installed.
Daily security analysis indicators help team members to engage any abnormality with real-time insights.
View full review »AK
AntonKosov
Security Network Engineer at АТ "Банк інвестицій та заощаджень"
The most valuable feature of Check Point Harmony Endpoint is centralized management.
View full review »The ThreatCloud is an amazing feature and helps in intelligent and proactive detection of threat attacks along with auto-remediation of the system.
The industry cloud and integration services with alert notifications are some really exciting features that helped in achieving flexible and strengthened security administration.
It addresses zero-day threats and next-gen viral threat attacks on the system and also has strengthened the security administration through a single management console.
View full review »Phishing is an issue that is affecting a lot of businesses given the huge email traffic in businesses. Sometimes the server security firewalls won't detect threats from coming into the endpoints, so email protection is definitely one of them that's helpful.
Filtering the websites that can be visited is important also as there's always a chance to come by sites that, just by clicking, will download malicious threats. Even when you are on secure sites, you will see that, with Check Point, some ads and advertising will be blocked as they could be potential viruses.
View full review »Check Point antivirus software is agile and efficient in managing spam and threat attacks on web and cloud systems. The software is extremely efficient in scanning computers and websites all the time. The software runs in the back of the system and never hampers the work at the front end.
It is highly cost-effective and saves enough manpower cost in tackling such phishing attacks on the system.
It has a customer-savvy interface and easily customizable as per client and business requirements.
Deployment is easily adjustable.
View full review »The solution is easy to use and easy to manage.
The security in regards to phishing, viruses, and so on, is very powerful.
For mobile devices, encryption is excellent.
From our point of view, Check Point is really easy to implement and really easy to manage. From the customer's point of view, the main reason was that the Check Point is the best brand, one of the best brands in our region. When they evaluate in comparison to competitors it comes out on top.
The solution is stable.
It's easy to scale as needed.
Check Point Harmony covers everything.
View full review »The Harmony Endpoint browser plugin is powerful tooling that is visibly present and doing its job.
Previous antivirus packages that we used and our customers used did not include a browser plugin. Now that users see that the endpoint really does scan everything on the browser page (such as username and password fields) they also see the added value of an antivirus package on the computer.
View full review »I found the fact of working across multiple attack vectors easy and more beneficial.
It has helped with USB to human errors to website issues to all types of threats and bot attacks.
I also found the features of provisioning a VM for some security requirements and the fact of access across SSH and remote terminals also beneficial.
Client-based access and the suite of products from SaaS API and Browser Protection are also very beneficial. It follows the ZTNA which tells that the VPN model of security would come to be obsolete in a few years with the Harmony benefit of Check Point.
View full review »KS
Kuber Shukla
Senior Security Specialist at Tech Mahindra Limited
- Host Firewall
- Application Control
- Compliance NGAV: Prevent Attacks Before They Run
- Anti-Malware
- ML based NGAV
GAV: Runtime Detection and Protection- Anti-Ransomware
- Behavioral Guard
- Anti-Bot
- Anti-Exploit
Web Protection- Zero-day Phishing site protection
- Corporate Password Reuse Protection
- URL Filtering
- Malicious site protection
Attack Investigation and Response- Forensics collection and detection
- Forensics report – incident visibility, MITRE mapping
- Automated attack chain full sterilization
- Ransomware encrypted files restoration
- Threat Hunting
Data Protection- Host Encryption
- Media encryption and port protection
Mobile Protection- iOS Protection
- Android Protection
Centralized Management- Cloud Management
- On-Prem Management
The solution allows us to reduce the attack surface via:
The management of all endpoint settings from a single portal does not need to use more than this one to set all the policies. We used the deployment of this product to push drive encryption to some of the more sensitive users of the company since we haven't had any solution to this problem.
We're also using application control to block some unwanted apps from being executed on clients, however, sometimes the management of those apps can be a little time-consuming due to newer versions being released often.
View full review »We love that we don't have to upgrade it anymore. They take care of that.
The upgrade process was nice with the new Management Station compared to the old one. I like how they have the clients already available. I didn't have to download them and upload them as I did with the old Management Station.
We're happy with the solution overall as it takes away the administrative overhead of operating it and patching it and being able to also sign in through the web browser anywhere as opposed to just having to VPN back to our work and connect to the Management Station in order to use it. We can just use the Check Point portal and just use any browser anywhere. That gives us more options, which we like.
I've noticed they're constantly updating the interface and making it easier to use, which I appreciate. When we first started using it, it was really laggy and it was really slow and it was hard to sort some of the computers and users, however, they make updates almost every time that I log in. It gets better and better every day. It has gotten better and it's not as slow as it was.
There seem to be constant improvements happening, which you can't say for everything. We don't have to upgrade to get the benefits of the improvements, either. That takes a lot off of our plate and allows us to focus on other things. We're taking the good with the bad and the bad seem to be one-offs and we're looking forward to the future.
Therefore, the most valuable feature is its ability to take the management and the administration of the product off of our plate and onto their plate. We don't have to worry about upgrading it, creating downtime, working off-hours, doing all the research and stress of seeing if it's compatible, if there are problems, letting them test it. That's nice. Previously, we would upgrade our products or patch them maybe two to four times a year, depending on if there's a security vulnerability. Each time we do something like that, it was about three to four hours of downtime. Now, that process doesn't exist.
Before, with on-premise, we had two Management Stations. One was primary, one was secondary and there were two different data centers in case one data center was down. The other one would come up and be the Management Station for all of the clients. Now, in this case, we only have one. It's in their cloud. Their cloud is in AWS. It's a great thing. It's resilient by design and it provides redundancy in a single source of administration for us. We like that too
One of the features that we find most valuable is the simplicity of the configuration through the Smart Console interface.
It is very easy to manage the Antivirus blade, even for newcomers in our technical support team, which is a key area of interest for us.
Also, the sandbox feature is very interesting as it can automatically isolate an infected machine from the network, which is valuable.
We could also talk about the real-time detection scan feature that can monitor files as they are being accessed, which allows for a quicker response time.
View full review »Harmony's endpoint sandboxing is really good.
View full review »We found all features valuable - other than the encryption since we were already using that feature. Since we required some application to safeguard ourselves in this work from home situation. We were evaluating anti-malware products specifically.
There can be scenarios where this encryption feature will be applicable and fruitful if it is implemented with proper planning and organized with respect to a particular organization. There have to be proper requirements gathering and a plan to work effectively.
View full review »We like the sandbox feature. If any machine got infected, it would get automatically isolated from the network. As such, we haven't faced any issues. We like that we have an option to isolate.
The alert email from Check Point is also very valuable. If any machine didn't get a scan or has a virus due to visiting various websites on a browser, it automatically sends us an email to warn us. Accordingly, we can take action on that particular machine.
Overall, the antivirus is good.
View full review »TM
T. BalaMuruganandhan
Sr. Manager at Incedo Inc.
All of the available features are good (for example Threat Emulation/Threat Extraction, Antibot, Anti-Exploit, Anti-Ransomware protection, UBA, Zero-day Phishing protection, Behavioral Guard, Encryption, VPN, and compliance), however, the one I have thought to be very valuable is the Ransomware Protection Feature which has been used widely during the pandemic. It protects as well as saves original file copies to prevent data loss.
Forensic Analysis provides a complete analysis of threats via detailed reports. The threat prevention, which includes a detailed threat landscape is very good.
The VPN connectivity and compliance check are also very good features.
View full review »Right away, we noticed when using Check Point's Harmony Endpoint tool, was the ease of deployment. In our case, it was deployed without too many difficulties, considering the deployment involved several tens of thousands of devices.
Once deployed, the dashboard and all the inventory information that we had been able to obtain and that we did not know about before proved to be very interesting.
One of the strengths of Harmony is its power to detect threats and keep us safe. Also the ability to apply policies specifically to users or groups is very useful.
View full review »BD
Basil-Dange
Chief Information Security Officer at Abcl
Harmony Endpoint provides complete EDPR functionality using multiple modules and features that are available with the solution. These include Compliance, Anti-Malware, Media Encryption, Port Protection, Firewall, Application Control, Full Disk Encryption, Remote access VPN, Capsule DOC, URL Filtering, Anti-Bot, Anti-Ransomware, Behaviour Guard, Forensics, Threat Emulation, and Anit-Exploit. This group of features is able to protect the endpoint from any next-generation attack. Any of the modules can be enabled or disabled based on the organization's requirements.
Harmony Endpoint is able to detect, monitor, block, and mitigate attacks on the endpoint and it builds and maintains relevant logs for later inspection. The agent sends telemetry/metadata to the centralized console for forensic purposes.
Policies for endpoints can be created based on the username or endpoint.
Integration with the Threat intel platform is helpful for blocking any attack at an early stage.
The complete solution can be hosted on-premises or SaaS on the cloud.
Remote access VPN is provided as default in the base license.
A different Policy Server can be configured and hosted at each location so that the agent does not have to reach a central location to receive policy updates. Policy servers are created using an OVF file, which can be installed on any Virtual Platform such as VMware.
It has secure communication between the Policy Server and the Management Console using Certificate/SIC communication.
The agent footprint is small on the endpoint.
It supports integration with other security solutions for sharing threat intel within an organization or over the cloud.
The anti-ransomware module is very strong; it's able to detect any ransomware attack at a very early stage.
Host-based firewall policy configuration is simple, which helps to access an endpoint if the machine is not in the organization's network.
View full review »It's pretty complete for preventing threats to endpoints. Its capabilities are great.
The solution's automated detection and response capabilities are pretty good. It really depends on how aggressive we want to be with it. We've not deployed it in the most aggressive way you can, such as shutting down everything, because we've not deployed it in a greenfield site. It has not been deployed with that in mind. It has been deployed as an add-on service. As such, we don't want to be as aggressive as some top security firms would recommend we should be.
View full review »The insight and visibility of the detection is good.
View full review »This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities. However, there's still room for improvement and the addition of more features. Nevertheless, in the broader market landscape, it's considered one of the leading products. While there might be some competition from others like Cisco, it remains a strong choice. The feature lies in mapping and providing top-notch malware protection.
View full review »
SM
SimonMartyn
Enterprise architect at Kapsch
We need ransomware protection and that's what we get. It's a very good and robust antivirus solution.
LD
Leo Diaz
Cloud Support at a tech company with 1-10 employees
The logs and monitoring are valuable features. It generates enough visibility in terms of what happens on our equipment.
The sandboxing validates some files that have threat qualities.
We like this security tool.
View full review »LD
Leo Diaz
Cloud Support at a tech company with 1-10 employees
The characteristic that most attracts our attention is the administration portal. It doesn't require a management server since its licensing and management are through the Check Point Infinity Portal. It is very intuitive and easy to implement.
The way in which the agent is installed on the computers is very easy, it does not consume almost any performance of the server or final computers, in this way there is no need to worry about increasing resources to be able to protect them with Check Point Harmony Endpoint.
We love the reports and monitoring they provide. It helps us quickly see what vulnerabilities we have on our endpoints.
View full review »Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard. We are achieving uniform work that is easy to manage if any changes are necessary. Being able to give us an inventory of the equipment and the health status of everything from a single place has been great. This solution has become a great ally for the prevention of threats and security problems caused by viruses such as ransomware, and we are protected against threats, which is of great value.
View full review »Its most valuable feature is the integration of analytics with the cloud. We like that we can detect zero-day incidents, problems, or virus attacks inside or outside the organization. It's one of the most complex and integrated antivirus solutions. The value of analysis in real-time every time we are having an attack, vulnerability, or security breach is very helpful. Today, we want to have integrated solutions and quick solutions that will protect us mainly with new attacks and solutions that protect us from the hijacking of our data (ransomware).
View full review »The most valuable aspects include:
- Web Filtering. This feature is easy to manage, and it applies new policies in seconds.
- Real-time Click Protection. It protects the user from phishing attacks in real time.
- Compatibility with Windows, Linux, Android, and Mac. We don't need additional solution to protect all our endpoint.
- Cloud Management. This feature allows us to reduce our operating burden and also improve our TCO.
We now have the ability to block a compromised machine from the network.
We now have the ability to block in near real-time IOC.
View full review »Our environment is well-protected by Check Point Antivirus in many ways. We use web filtering to restrict and defend when users access the internet
The sandbox feature is good. Any contaminated computer would be immediately disconnected from the network. The smart event gives the administrator a high-level security view of the enterprise.
It also helps us to block malicious file downloads and access to infected sites from our network. Moreover, the signature-based detection works well.
Overall, this system performs a superb job of safeguarding us.
View full review »The solution has all the standard features you would expect for endpoint protection.
View full review »The functionality is quite good. It can run well on mobile devices.
You can also create profiles for individual mobile devices.
It is easy to set up and implement.
The product is stable.
It's very scalable.
View full review »Overall, it's a good tool. It's doing a good job for what it is designed for.
It is easy to set up.
The solution is stable.
It's a scalable product as it is a cloud offering.
You can layer in this solution with others. I like layering myself with various technologies, depending on the environment we're working in.
The product offers good pricing.
View full review »If you need a good antivirus, Check Point Antivirus is more than great.
Check Point Anti-Virus has many positive characteristics. First, Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters. Second, Like the other Check Point blades, the visibility and logging of events are remarkable.
One of the features that I love the most about this large software is that It allows me to stop incoming malicious files, and stop users from accessing malicious software-infested sites. Also, it gives me the opportunity to get very comprehensive reports where we can collect summaries of infections and trends to provide greater visibility of threats, which is absolutely fantastic.
View full review »The most valuable features are threat emulation and threat extraction. Despite some false positives, it gives quite good security for file downloading.
Phishing form detection based on on-site similarity (not only on URL) has at least 50% efficiency in real-life examples that passed our antispam systems (and most of the false negatives are pretty general forms, which are not so convincing to the user).
The forensics allows us to search retrospectively for an URL or file opened by users, for example, when you need to quickly check who else has clicked on a phishing link.
View full review »It just has standard antivirus. It does what it needs to.
The solution offers good performance.
Its stability has been good.
The initial setup is easy.
View full review »JJ
José Javier Dominguez Reina
Project Manager at Junta de Andalucia
What we liked the most about the product, apart from detecting any attempted attack, is the graphical interface.
The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers.
We also highly value the anti-ransomware functionality, which creates a copy of the files on the computers and in case of infection by ransomware is able to restore them to a date when the computer was not infected.
Cloud management and reporting are great. The management interface is very simple and easy to navigate. Just getting a logon to start is very helpful. The Check Point support at this stage was great. While it was very simple and intuitive, having someone talk over the defaults provided recommendations that helped us jump forward very easily.
Again, the cloud management service has a several inbuilt default reports which are easy to customize and provide more visibility than we have had previously with several solutions.
View full review »MV
Meet Vataliya
IT Specalist at vTech Solution
The product offers advanced anti-malware and antivirus protection to protect, detect, and correct malware across multiple endpoint devices and operating systems. Proactive web security is available to ensure safe browsing on the web. Data classification and data loss prevention are there to prevent data loss and exfiltration.
SandBlast Agent defends endpoints and web browsers with a complete set of real-time advanced browser and endpoint protection technologies, including Threat
Emulation, Threat Extraction, Anti-Bot, and Zero Phishing.
The zero-day prevention is very valuable.
View full review »JA
Jorge Andrés
Presales Engineer at Data Warden
Without a doubt, the best security feature is Full Disk Encryption (FDE). In cases where the endpoint is stolen or lost, you are sure that the information will not be accessible without the access password being the correct, maintaining the confidentiality of files at all times.
In addition, if someone tries to extract the physical disk and places it as a removable disk in a PC, they will not have access to the information either, since the files are still encrypted, ensuring that this method of extracting the information does not work without the decryption key.
View full review »The anti-ransomware blade is great. It stops device encryption automatically and has caught hundreds of cases on client laptops.
One of the coolest features is that it provides an HTML report on the laptop and the endpoint console for the administrator. It will show you the forensic report of where it came from and if it spread to other systems that have the endpoint client installed.
The best thing is it never gets past the first client as it looks for bad behavior. If needed, you can open the console and allow it.
View full review »LR
LuisRodriguez1
Support Manager at Sefisa
The fact that everything is centralized is great. For example, the management is centralized on one portal in the cloud.
We like the fact that we have a lot of visibility with this solution and the protection is very good. I have seen cases where customers, get attacked by ransomware and it is very easy for Check Point to restore a file that has been compromised with ransomware. It's 100% effective.
They are developing new technologies. For example, they added SASE to their portfolio with Harmony. They also have Infinity SOC. If one of the Harmony Endpoints gets compromised, Check Point Infinity SOC is going to see it, and it's going to highlight that.
They're on the very edge of technology and are very fast with implementing new technologies.
The solution is very stable.
They have a great knowledge base that you can leverage as a user.
The product scales well.
Technical support is knowledgeable and responsive.
Every now and then, every vendor does have a vulnerability that is discovered. For example, when many vendors were using open SSL, they had to do some fixes on their software in order to fix that particular vulnerability. Check Point was the first one to fix that. It's clear that, unlike the competition, it is always keeping up with the patching of its own software.
View full review »The solution offers disk encryption, anti-malware, and BPM blades. For example, the Disc Encryption Software Blade is actually a part of this endpoint security solution. The whole thing is good for us.
The product has been proven 100% effective with us. We haven't had anything related to any threats passing to us for the past five years.
The solution is easy to use. It is self updated when there's a new version. It updates seamlessly, no matter what features you have. However, depending on what we use, there are some features that they will not apply in the clinics. We don't have the preview screen. We can customize it in a way that it doesn't disrupt our operation depending on if it is a laptop, it is a desktop.
The security is very good.
The solution is very straightforward.
The solution scales well.
We have found the stability to be very reliable.
View full review »The endpoint agents, which can be installed in one go, are great. The communication with the console is very dynamic and remote, without the need to return to the computer locally.
From the administration console, we can generate content filtering rules and labels, as well as run an analysis of emails and downloads that the collaborator does to fulfill their functions. Informing the administrator of threats by mail gives us the facility to detect real-time vulnerabilities in order to continue fulfilling the objective of safeguarding the information of the organization.
View full review »When starting to use Check Point's Harmony Endpoint tool, the first thing that strikes us is its great ease of deployment. In our case, it has been a deployment without too many incidents considering that we are talking about a deployment in the tens of thousands of devices. Once deployed, the dashboard and all the inventory information that we have been able to obtain and that we did not know before are very interesting. Of course, one of the key points of Harmony is its great ability to detect threats and keep us safe.
View full review »The anti-malware and port protection, etc., are good. We have about 200 endpoints on this solution being maintained. We like that its server is cloud-based and that our in-house IT team can handle the installation and configuration on endpoints. It's great for securing our endpoints from any external attacks. We can control access to end-users.
View full review »The features available are all good. One of the best features is the Ransomware Protection Feature. It is great and is a way to protect endpoints. It protects as well as it saves original file copies to prevent data loss.
Zero-Day Anti-phishing detects phishing sites in real-time and prevents users from any data and other losses.
Forensic Analysis provides a complete analysis of threats via detailed reports. Threat prevention with an included detailed threat landscape is very good.
The VPN connectivity and compliance check are also very good features.
View full review »For us, the most valuable feature of Check Point Antivirus is the real-time detection scan that monitors files as they are accessed. It is important because we can react quickly.
Today, malicious coders and hackers are experts at evasive tactics that shield their activities. Therefore, in today’s cybersecurity landscape, antivirus is just one of the many tools in an organization’s cybersecurity arsenal to keep the business safe.
The antivirus solution should be implemented as part of the organization’s endpoint security solution that combines global threat intelligence and advanced threat prevention engines that address zero-day and other next-generation threats.
View full review »The most useful feature so far has been having a functioning and up-to-date anti-malware scanner. This has found multiple dormant threats that have existed within the business that other anti-virus products could not detect.
In addition to this, threat extraction & threat emulation have been a big benefit to give the users more autonomy. For example, allowing them to release their own spam emails that were captured by our spam filter, knowing that the files that are released will be scanned and checked for known viruses.
The Sandblast Agent really made a difference for the organization. It integrated well with the existing Check Point environment we had in place. It was used both for threat protection and remote access VPN.
View full review »KP
Kirtikumar Patel
Network Engineer at LTTS
The most valuable feature is the Zero-day protection, which covers our on-premises users, and well as those users who are outside of our network.
With Zero-day protection, we have complied with our customer-specific policies as well.
Most of our users are working on customer-related projects and today, everybody is looking to have zero-day protection at the endpoint level, as well as to protect against unknown threats or viruses.
View full review »JA
Jane Adams
Information Technology Specialist at RBC
The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry.
OP
Oleg Pekar
Senior Network/Security Engineer at Skywind Group
- The Antivirus software blade is part of the Next Generation Threat Prevention license bundle.
- The Antivirus is able to scan files downloaded from the internet or traversing the network via Check Point Gateways/Clusters.
- The Antivirus software blade is configured via the Unified Threat Prevention policy in the Smart Console (at least for R80.10, the version we use).
- There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives.
- The updates for the blade are downloaded every two hours.
- As with the other Check Point blades, the visibility and logging of events are outstanding.
NM
mckenn
Team Lead Implementation Services/Systems Integration Engineer at Trinidad Systems Limited
One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users' machine. This is a very valuable feature of this solution.
The Zero Phishing feature is also very valuable. This feature has the ability to scan the username and password fields on a website before you enter your credentials and verify if the site is legitimate. This brilliant feature prevents the stealing of account information.
View full review »TP
TonyPegrum
Head of IT at a real estate/law firm with 11-50 employees
The biggest value we found was ease of deployment. I haven't really used it much, so I can't really comment beyond that. I haven't used it much, but it's working.
View full review »PA
CTIo67
CIO / CTO at a financial services firm with 51-200 employees
The most valuable feature is the integration with Check Point's firewalls. You can have one port, and follow the logs from both Endpoint and firewall security.
View full review »The most valuable features of Check Point are threat cloud integration, sandboxing, and behavioral analysis.
View full review »IE
Ikede-Ebhole
Cyber Security Consultant at Wirespeed
The solution provides endpoint security, ransomware protection, endpoint detection, and response. Also, cloud-based management is a good feature with an excellent catch rate.
The most valuable feature of Check Point Harmony Endpoint is it can be used for all kinds of endpoints, including mobile phones.
View full review »All of these features quoted below are valuable for us, as the set of solutions is what makes the solution really valuable.
- Endpoint Threat Prevention features
- Web Protection (malicious sites/URL Filtering)
- Anti-Ransomware
- Anti-Bot
- Anti-Exploit
- NGAV
- Anti-Virus
- Forensic collection and automated reports
- Threat Hunting
- Sandbox Emulation and Extraction (CDR)
- Endpoint Access Control Features
- Endpoint Firewall
- Application Control
- Port Protection
- Endpoint Compliance
- Remote Access VPN
If we had to choose one, we really like the EDR included.
View full review »The sandblast agent, policies implementation, and logs are quite valuable aspects of the solution.
Threat emulation and anti-exploits are great features to protect the endpoints.
The remote access VPN within the endpoint agent is quite easy to set up and use.
The Harmony portal allows us to do a single sign-on using our active directory which makes the life of admins easy.
Harmony Endpoint scans all website before opening and also scans fields on the website that protects from XSS and CSRF attacks which is really an advanced level feature.
The endpoint scanning tools are quite enhanced and detect most malicious files.
View full review »VK
VinodKumar8
Cybersecurity Architect at a computer software company with 201-500 employees
I have found the Zero phishing and IPS features the most useful in Check Point Harmony Endpoint. Additionally, threat emulation sandboxing is effective.
View full review »My customers choose Check Point Harmony Endpoint because deployment is easier and because it's cost effective and more secure.
It is also a stable and scalable solution.
View full review »AI
Angela Infante
Pre-Sales Engineer at a tech services company with 51-200 employees
The most valuable features in this solution are the EDR tool and the integration.
View full review »The most valuable feature is forensics.
View full review »The feature that we find most valuable is the easy way of configuring it via the SmartConsole on Check Point. The configuration is very straightforward and although it has some impact on the firewall CPU and memory, it doesn't impact the IPS, for example. It allows for the scanning of downloaded files from the internet. Scanning files that our users have downloaded to check if they have any virus is the most important thing. IPS and Antivirus work in conjunction. It doesn't even cross the perimeter firewall to the inside.
View full review »The most valuable features are the availability, the ease of checking current logs of blocks, and the option to update the system easily.
View full review »The sandboxing feature: I like the entire process. It's one thing for it to detect, but another thing to have a remediation plan. It actually extracts out what we need to make it a clean file.
View full review »PD
PRAPHULLA DESHPANDE
Associate Consult at Atos
Most of EDR solutions which detect malware based on AI or ML. Check Point provides the most sophisticated attack vector information by combining these two. The forensic analysis gives detail information about host compromised how exact payload was executed and bots were communicating and how it prevents them.
Anti-ransomware createS a copy of your entire disk in case any suspicious activity founded then it automatically restored all files to its last backup file date so even after the system gets compromised by ransomware still we get hope to get all data safely.
View full review »Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum.
View full review »PP
Philippe Panardie
RSSI at SDIS49
The most valuable feature is security.
Check Point integrates well with other security products.
View full review »JA
JalalAtik
Owner and CEO at A.T.I.K. Maroc
One of my favorite features is the logging. The log journal is very descriptive in what it records about the traffic. It is a good way of tracking who comes in and who goes out of your network.
JG
JaapGiliam
Owner at Giliam Network & System Solutions
The most valuable feature of this solution is the VPN.
View full review »CM
CVSNMurthy
Head of IT Director at Cosyn Limited
We used to have Fortigate, the firewall, and endpoints were only protected by an antivirus. We did not have threat management or ransomware protection. We upgraded to Check Point to get this kind of protection at the endpoint level. It covers firewall, availability, VPN, IP security, IPS, application control, URL filtering, antibot, antivirus, anti-spam, and sandblast threat emulation and extraction.
View full review »The most valuable feature of Check Point Endpoint Security is the SandBlast Agent.
View full review »The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature.
MT
MauricioTorres
Operations Director at a tech services company with 1-10 employees
The most valuable features are the innovations that they release in every version. The end-user facilities for managing the tool are also good.
View full review »- Certificate management
- VPN
The security is its most valuable feature.
Administratively, it's easy to control.
View full review »Its ease of use is the most valuable feature. The interface board is also easy to use.
We had existing endpoints, and it was an easy upgrade process.
View full review »CP
Calvin Piggott
Owner at a tech services company with 1-10 employees
Its ability to rollback anti-ransomware once an attack has started is the most valuable feature.
View full review »
Endpoint security is a client-server managed network protection program. It blocks unauthorized software, malware, virus etc from entering the network and each client machine. Can be set up company specific to block specific file extensions or other devices from accessing the network. It provides updates based on server settings, can perform one network scan daily and can be set up to scan per client machine setting. Any machine that has the software installed on the network is protected by the endpoint security. Logs are created per client and machine settings.
View full review »
Endpoint security protects networks from unauthorized programs, viruses and malware, and allows you to control the network by blocking devices that you do not want to have access to it, for example by file extensions or using the device’s ID.It also controls access and prevents theft of data by controlling access to storage devices that are portable. USB storage devices are also encrypted for security purposes.Centralized monitoring, logging and generation of reports and automatic protection of newly added computers to the network are other functions and capabilities of endpoint security.
View full review »
Check Point is easy to configure, and it detects many threats.
View full review »The traditional anti-malware engine is valuable.
View full review »Features like anti-ransomware help to identify behaviors such as file encryption or attempts, malware protection to protect from web browsing or email attachments, and patch management to deploy all patches from the vendors.
It offers complete endpoint protection for all assets.
View full review »Buyer's Guide
Check Point Harmony Endpoint
September 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,676 professionals have used our research since 2012.