Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint Valuable Features

Nasseer Qureshi - PeerSpot reviewer
Pre Sales Consultant at Redington Group

The best feature Check Point Harmony Endpoint offers in my experience is its XDR, which has significantly helped us with investigations. Whenever we have alerts or incidents, Check Point's XDR feature speeds up our investigation by correlating data related to an alert and presenting it to us. As an administrator, it is beneficial because all the data is available in the Check Point Infinity dashboard to view different information and determine whether the raised alert is a true positive or false positive.

Check Point Harmony Endpoint has positively impacted our organization, and the ROI has been great. With this solution, we are now confident that our endpoints are protected, and we receive alerts if any malicious activity occurs. Apart from insights, Check Point has a prevention-first approach, focusing on both detection and prevention, which brings us peace of mind.

View full review »
Hailemichael Yigrem - PeerSpot reviewer
Senior Cyber Security Engineer at Deliver ICT and Telecommunication Technology PLC

One of the best features that Check Point Harmony Endpoint offers is its ability to stop attacks before they can cause damage in our environment, and it has integrated Threat Emulation, which is sandboxing, and Threat Extraction technology that neutralizes threats embedded in documents or email attachments.

Before using Check Point Harmony Endpoint, we had sent many emails containing ransomware content that our teams did not easily detect, but after deploying this product, Check Point Harmony Endpoint prevents such emails from entering our email system because it detects the email attachment type and sanitizes the attached documents before they get to us.

Since I started using Check Point Harmony Endpoint, about 95% of our emails are now secured because of this product.

Check Point Harmony Endpoint has positively impacted our organization by reducing incidents and improving our security posture because we received many emails attached with malware, and after deploying this product, we are protected from such emails.

There has been a reduction in the number of incidents and time spent responding to threats since implementing Check Point Harmony Endpoint, with 95% of incidents reduced now.

View full review »
Jitendra_Sharma - PeerSpot reviewer
Network Security Engineer at Binary Global Ltd

The best part of Check Point Harmony Endpoint is that it is delivered as software agents deployed to endpoints and connected to centralized security analytics and management control for desktops, laptops, and server systems.

Security has improved after we started using Check Point Harmony Endpoint, and we can manage all the systems and machines through a centralized portal called Check Point Infinity portal. Through these portals, we can push the agents to the end machines as well as servers, and we can also manage and control these systems.

We can find all kinds of reports related to endpoints, such as information about different operating systems on the internal network, issued systems, malware-infected systems, and problematic systems through Anti-Malware in a centralized single plane.

View full review »
Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,676 professionals have used our research since 2012.
IZ
Senior Solution Consultant at a tech services company with 51-200 employees

Check Point provides zero-day protection, which helps us significantly with our security regarding our main use case.

Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features.

The AI-powered threat prevention in Check Point Harmony Endpoint helps us to detect and prevent sophisticated attacks, and its scalability means it can be deployed across various devices and environments, helping us daily.

Check Point Harmony Endpoint has positively impacted our organization by providing shorter incidents and better compliance.

Our incident response has increased by 5 to 10%, which showcases specifics on how much the incident duration has decreased and how compliance has improved.

View full review »
MW
Technical Specialist at Softcell Technologies Limited

The best features of Check Point Harmony Endpoint that stand out are anti-ransomware and threat emulation, which are crucial for protecting and blocking unwanted malicious threats and ransomware before they can execute anything on the user's system, along with Zero Phishing Protection, real-time URL filtering, and an anti-phishing mechanism that has greatly reduced the number of successful phishing attacks on our users' systems.

Centralized management via Infinity Portal is user-friendly and allows central policy management, while the detailed telemetry of forensic insights helps the SOC team identify attack vectors and understand what executes on the system during malicious content attempts, making it overall effective in protecting endpoints in various aspects.

The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.

View full review »
NS
Senior Security Analyst at SecurView Systems Pvt Ltd

Check Point Harmony Endpoint offers robust protection against malware, ransomware, and phishing attacks, and I particularly appreciate its behavioral analysis and anti-ransomware capabilities, with the central management console being integrative and making policy management easy across devices.

My advice for others looking into using Check Point Harmony Endpoint is to allocate time for proper configuration and policy tuning during the initial steps and to take advantage of Check Point's documentation and support resources. This will be helpful during integration or initiation of the setup, especially if they already have other Check Point devices, which would enhance their security posture and streamline management.

View full review »
reviewer2751327 - PeerSpot reviewer
Cloud network engineer at a manufacturing company with 10,001+ employees

The best features Check Point Harmony Endpoint offers are its comprehensive and proactive approach; these features stand out because it's very lightweight and has very good anti-ransomware protection.

Check Point Harmony Endpoint has positively impacted my organization by enhancing business process agility and user protection, resulting in more operational efficiency.

View full review »
BO
Adjunct Professor, Cybersecurity at University of the People

Check Point Antivirus is valuable due to its autonomous threat prevention system, which is consistently up-to-date and highly reliable with excellent performance at scale. 

It features strong AI-based threat prevention and security management, making it a solid choice for end users. The SmartConsole is automatically updated with the latest patches and fixes, ensuring ongoing protection against evolving threats.

View full review »
Jitendra_Sharma - PeerSpot reviewer
Network Security Engineer at Binary Global Ltd
Check Point Antivirus offers comprehensive security features, including real-time scanning based on signature-based detections, behavioral analysis, an anti-malware engine, machine learning, and sandboxing, which collectively protect our systems and computers effectively.

I find the most valuable features of Check Point Antivirus to be behavioral analysis and real-time scanning, as they collectively work to protect our systems.

Check Point Antivirus has positively impacted our organization by protecting our systems and computers, saving time, costs, and preventing data loss.

View full review »
IF
Manager, Information Technology Cyber At Edeltech O & M at Ezom
Harmony Endpoint has a geo policy that allows me to see where users log in from, enabling me to analyze if someone tries to access an account from another location. It offers a good false positive rate and provides protection across all platforms of 365. View full review »
Alejandro Flores. - PeerSpot reviewer
Director de Ingenieria at Smartelecom SA de CV

The most valuable aspects include:

1) Cloud Centralized management. This is particularly useful since you don't have to use any on-premise server, the cloud dashboard is activated without a minimum license number.

2) Several layers of security. It is well aligned with actual threats like ransomware and zero-day attacks and offers traditional layers of security.

3) Visibility. You have a single dashboard for all endpoint information that you need from an IT administrative perspective and in a threat incident you are properly advised.

View full review »
reviewer2751291 - PeerSpot reviewer
Operations Engineer at a media company with 51-200 employees

The best features that Check Point Harmony Endpoint offers help us to reduce incidents by catching threats early, which is highly effective. It gives us a wide view regarding the assets that we have and how exposed they are.

Check Point Harmony Endpoint has positively impacted our organization by helping to reduce incidents by catching threats early before users even noticed them, which saved us time and lowered risk across the board.

View full review »
reviewer2751156 - PeerSpot reviewer
Network Cyber Security Specialist at a tech services company with 51-200 employees

The best features Check Point Harmony Endpoint offers include fantastic forensic visibility along with a broad feature set that covers anti-malware, UBA, anti-phishing, and host-based firewalls, all centralized and easy to use through a cloud tenant.

The forensic visibility is valuable for my work because when an incident happens, it's very easy to see the forensic details and find out if it's a false positive or something that needs to be acted on.

Check Point Harmony Endpoint has impacted my organization positively by improving our security posture, but in the end, it didn't make the cut in the POC, so we went with another vendor.

During the time we used Check Point Harmony Endpoint, it improved our security posture, as we definitely got the visibility that we wanted, and it integrated well into the SIEM, so we got all the logs that we wanted.

View full review »
MT
Senior Network Engineer at a healthcare company with 10,001+ employees

The best features Check Point Antivirus offers are ThreatCloud Intelligence, zero-day protection, and the anti-ransomware engine.

These features stand out because ThreatCloud Intelligence leverages real-time global threat data to detect and block emerging threats quickly.

Check Point Antivirus has positively impacted our organization by enhancing our security posture and operational efficiency.

The operational efficiency provided by Check Point Antivirus helps my team work more effectively through centralized management and automated threat response, which saves time for our IT team.

View full review »
MT
Senior Network Engineer at a healthcare company with 10,001+ employees

The best features Check Point Harmony Endpoint offers include strong security capabilities.

The security capabilities that stand out to me include robust threat prevention, malware protection, and integrated firewall features, which I find valuable.

Another feature I find helpful is the ease of use.

View full review »
Sabari Das - PeerSpot reviewer
Technical Director at Geekz Information Technology

Endpoint protection is valuable. Stability is good, and the product is well-designed for security needs. It is scalable and offers multiple features, which justify its pricing for enterprise customers. Since security is a major concern, we do not worry about the pricing as the product has features built-in.

View full review »
RG
Account Manager at a tech services company with 51-200 employees

In my opinion, the best features Check Point Harmony Endpoint offers are advanced threat protection, ransomware protection, phishing and malware prevention, centralized management, and generative AI protection. All these features stand out for me.

The centralized management and AI protection of Check Point Harmony Endpoint help us to easily deploy all the endpoints, new endpoints, centrally monitor them, policy enforcement, and everything. It has increased our efficiency.

Check Point Harmony Endpoint has positively impacted my organization by reducing incidents.

Since implementing Check Point Harmony Endpoint, my incidents have reduced by around 15 to 20%.

View full review »
reviewer4572384 - PeerSpot reviewer
Business Developer Manager at PROCOM

The characteristics that we find most valuable are its anti-ransomware protection, zero-day phishing protection, web browsing filtering, and vulnerability and patch management. The level of security and visibility they provide is great and it is very easy to configure and maintain. We have almost no false positives. 

A feature that we really like is the ease of management and administration that Check Point offers us, in addition to including the management server in its cloud and the predefined dashboards and reports.

View full review »
reviewer2701569 - PeerSpot reviewer
Enterprise Network Engineer at a outsourcing company with 201-500 employees

The best features that Check Point Harmony Endpoint offers, unlike traditional endpoint solutions, focus specifically on detection and remediation even before the device has to go to the firewall. We manage it through the Infinity Portal, which helps us with the fatigue of logging into different windows.

The automated detection, which is EDR, detects any threats potentially moving from the user endpoint onto the network and possibly to the data center. Another critical feature is data protection to prevent someone from easily extracting information from the user laptop by plugging in a stray hard drive or USB.

The automated detection and EDR in Check Point Harmony Endpoint reduce administrative overhead. The agent comes with pre-installed settings to detect different threats on the endpoint. In most other solutions, you must start from scratch, which takes considerable time and troubleshooting. With Check Point Harmony Endpoint, you're basically fine-tuning because the templates are already running, and you just adjust them to fit your organizational preferences.

View full review »
Rakesh Jadhav - PeerSpot reviewer
Sr. Technical Consultant - Presales at Ivalue Infosolution

Integration of the Check Point Threat intel cloud with the EPP-EDR platform, which is enhancing and providing efficient DB for threat hunting and preventing zero-day using an anti-exploit platform. 

Apart from the EPP and EDR capability, Check Point Harmony can integrate using API with 3rd party vendors; Azure AD integration makes the whole deployment and management easy for the administrator.

Multiple endpoint protection packages are available for organizations. Also, it is an MSSP-compatible platform.

View full review »
MD
Independent Information Technology and Services Professional at a non-profit with 1-10 employees

The most valuable features include scanning, sandbox features, and antivirus reporting. The Antivirus engine's performance has been excellent.

View full review »
SC
IT Manager at Bolger Brothers Inc.

Ease of setup and ability to hook into O365 directly without MX record changes. Check Point offers advanced threat prevention capabilities, including SandBlast Network Threat Emulation and Threat Extraction. These features can identify and stop even unknown threats by simulating real-world attacks in a safe environment. Check Point solutions are designed to scale to meet the needs of large organizations. They can handle high volumes of traffic without compromising performance. Check Point integrates with a wide range of third-party security solutions. This allows you to create a comprehensive security ecosystem that meets your specific needs.

View full review »
Paulo F - PeerSpot reviewer
Business Development Manager at Wondercom

Check Point Endpoint Security has proven to be a beacon of resilience, with its multifaceted features illuminating our defense strategy. The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets. 

The granular control over endpoint activities empowers us to tailor security policies, ensuring a bespoke approach that aligns with our unique operational needs. The intuitive dashboard and centralized management streamline our security operations, enhancing efficiency and providing a comprehensive overview of our digital landscape. 

Notably, the seamless integration with other security components orchestrates a harmonious defense orchestra, fostering collaboration and maximizing the synergy of our security infrastructure. 

In this narrative of fortified cybersecurity, it's the amalgamation of these features that makes Check Point Endpoint Security an invaluable guardian, fortifying our digital realm against the relentless march of cyber threats.

View full review »
Mohan Janarthanan - PeerSpot reviewer
Assosiate Vice President at Novac Technology Solutions

One of the advantages is the reporting functionality. For example, if some critical data is available on a laptop and the laptop gets stolen - I can remotely wipe it immediately. Because, at the end of the day, apart from the device, the data is important.

So, the zero-phishing feature of Harmony Endpoint, the one I have used, was very good.

Those features are very good. Then, zero-day protection is also very important to us.

We can map the MITRE attack framework along with the Cyber Kill Chain completely.

Sandboxing is a great functionality.

View full review »
Afeez Adeyemo - PeerSpot reviewer
Technical Sales / Presales at Routelink Integrated Systems

I would have to describe what I feel is valuable in Check Point as a whole. Check Point provides users with a central point from where they can manage all the devices across a workplace. Whether users use Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, they don't have to log into different portals or solutions since they can manage everything from one central point. I like the fact that products from Check Point are very easy to deploy. Even if a user has 1,000 endpoints in an environment, Check Point can take care of the deployment in minutes. Check Point Harmony Endpoint is a very easy solution to deploy and requires very little maintenance or technical expertise.

View full review »
Sitti Ridzma Salahuddin - PeerSpot reviewer
System Engineer at Trends and Technologies, Inc

The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read. 

View full review »
Rahul Kamble. - PeerSpot reviewer
Business Director at One Networks

The valuable features of Check Point Harmony Endpoint stem from the fact that it serves as a comprehensive endpoint protection product that provides users with a fast solution and complete endpoint protection while serving as a tool that offers the fastest recovery for endpoints. The tool efficiently detects, protects, and corrects vulnerabilities and patches.

View full review »
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

This tool has a very secure and efficient centralized management. This helped us to be able to have multiple devices and systems in a centralized control panel and to be able to track them. This is very valuable for administration and supervision. 

Another characteristic is the number of detailed reports and analyses of all the incidents that occur in our network. 

The compliance with regulations capabilities with, for example, HIPAA and GDRP, has also helped us a lot since we constantly have internal and external audits, and it has helped us a lot to comply with the requirements we have.

View full review »
reviewer1822314 - PeerSpot reviewer
Head of Infrastructure and Networks at a insurance company with 51-200 employees

We have found the combination of vulnerability scanning, rating, and remediation most valuable in the platform and the feature is vital to our everyday security hardening. 

We can effectively target vulnerabilities with suggested fixes and automate patches where relevant. 

There is a constant flow of newly added features and improved functionality is regularly made available by the Check Point team. 

Customer communication around zero days and other emerging threats is a great addition to the service.  

View full review »
Anuj V - PeerSpot reviewer
Manager-BIU at Bajaj Markets

Check Point Antivirus has numerous features which are quite remarkable and have a greater impact on improving the performance of the business some of the features are.

Check Point Antivirus software is highly customizable in nature due to which its acceptability by the majority of the organizations like small medium and large enterprises is huge.

Check Point Antivirus is a cost-effective security solution for businesses and that's why its acceptability by various other fields and organizations is humongous.

Check Point Antivirus has a large number of good peer feedback in the public domain due to which the confidence and trust and transparency are high for this partner.

The software is quite compatible and extremely stable in any kind of IT environment.

This software is easy to integrate and deploy in any IT environment.

We are very much impressed by the business team and the tech team at Check Point who are day and night giving their best and proving their excellence in coming up with extremely viable and innovative security solutions for us.

View full review »
Shyam Lal Navatiya - PeerSpot reviewer
Senior Consultant at EY India

The solution offers a high malware catchment rate and increased speed, and the performance outcome efficiency is commendable.

It is a highly cost-effective antivirus software in the market compared to its competitors in the market.

The stability of the software is great and highly compatible as well.

Real-time and proactive detection of any malware or ransomware in the system means issues can be removed ASAP.

It has zero-day attack protection.

The product offers complete protection of the system from hijackers, and no phishing activity is allowed under any circumstance. It is high-grade protection with strict system security.

View full review »
Raj Kumar07 - PeerSpot reviewer
Senior Manager at Agriculture Skill Council of India (ASCI)

The advanced intelligence is embedded in the software for ransomware and threat attack detection on systems and servers.

Its prevention of threat attacks and managing of the system security is in a unified manner with complete control covered by the authorization team without any security breach.

It is one of the fastest malware prevention software with advanced upgrades to have 360-degree threat detection and system remediation.

The quickest response time and quick turnaround time help curb the attack in the best possible manner without much harm to the system and servers.

View full review »
CM
Works at CSIT

The product is quite easy to configure and can be deployed in under half an hour.

It has a centralised management console, single panel to triage, escalate, mitigate and respond.

The agent is lightweight on the endpoints and operates seamlessly in the background with minimal impact on the performance of the endpoints.

It has features like firewalling, removable device control, VPN, app control, DLP, file sandboxing, ransomware protection. which can be turned on or off per endpoint, groups, employees.

View full review »
Abdul Modi - PeerSpot reviewer
Information Technology Security Specialist at Al Muzaini Exchange Co.

I think the overall product is good. There is an in-built EDR in the tool, which is good because it gives users visibility into the threats coming into the environment.

View full review »
JemAhmed - PeerSpot reviewer
Technical Integration Engineer at Intelligent Systems (Bulgaria)

The standout features are primarily EDR and MDR. These functionalities are crucial because they specifically target the most common attack vectors, such as email phishing and downloading unknown software. EDR provides a solution for monitoring and responding to these threats effectively. Additionally, MDR ensures round-the-clock monitoring by skilled personnel from Check Point's team. They promptly alert us to any significant events, allowing us to take necessary actions swiftly.

View full review »
Ishant Gupta - PeerSpot reviewer
Trainee - cybersecurity engineer at Integrated Tech9labs Pvt. Ltd.

Among the features offered by Check Point Antivirus, the real-time scanning and automatic updates stand out as the most valuable. Real-time scanning ensures that threats are detected as soon as they appear, minimizing the potential damage they can cause. Automatic updates, on the other hand, keep our antivirus protection up-to-date with the latest threat intelligence and security patches. These features combine to offer a proactive and effective defense against a constantly evolving threat landscape.

View full review »
Ajenthan Aiyathurai - PeerSpot reviewer
Manager - IT at NVCL Group

Real-time scanning is a valuable asset for our organization. Real-time scanning and behavioral analysis have ensured that both our proprietary manufacturing processes and sensitive data remain secure, preventing potential breaches that could disrupt operations or lead to intellectual property theft. The centralized management of security policies across all endpoints has streamlined our IT operations, allowing our IT team to efficiently monitor and respond to security incidents from a single dashboard

View full review »
BK
Technical Support at Hitachi Systems, Ltd.

Our customers are satisfied with the Harmony environment. The remote support is good. If the users forget their passwords, the remote support helps them reset the password. It is a good feature. We only need an internet connection for it.

View full review »
Christal Tan - PeerSpot reviewer
Network and Cybersecurity Engineer at Respiro

The most valuable features of the solution are web protection and threat prevention.

View full review »
reviewer1625493 - PeerSpot reviewer
Chief Information Security Officer at a consultancy with 1-10 employees

The most valuable features of the solution stem from the EDR functionalities it provides to users, as it does its work properly.

View full review »
reviewer2049771 - PeerSpot reviewer
Business Manager at MN World Enterprise Private Limited

I loved almost all the features.

The zero-day threat prevention is excellent. It gives us more confidence to have automated protection from unknown threats. 

It helps to secure our browsing. It can check if something is a genuine page or not. It also masks when we browse or enter our banking user ID and password. This gives us assurance that we are in a green and safe zone. 

View full review »
Adhi Wahyu - PeerSpot reviewer
Network Engineer at RSUP Dr. Sardjito

Some of the most valuable features from Check Point include:

1. Its ability to run real-time scans in the background and detect all the malware and viruses while taking action to clean the system from the threat.

2. On-premise centralized management, so the client can do signature updates locally and save the internet bandwidth.

3. The reporting feature where we can see and monitor what happened on our client computers. For example, which client has out-of-date signatures, which client is infected by what virus, et cetera. 

View full review »
Suraj Varma - PeerSpot reviewer
Network Security Engineer at Digitaltrack

The most valuable feature of Check Point antivirus is that it scans every file type for malware and viruses.     

Also, it gets regular updates of newly found threat signatures which keeps it updated. 

View full review »
SK
Presales Engineer at Vincacyber

The solution offers multiple features in one solution, along with data detection.

View full review »
Nagendra Nekkala - PeerSpot reviewer
Senior Manager ICT & Innovations at Bangalore International Airport Limited

The tool comes with an in-built AI feature, which makes file management easier. It also secures the network from viruses, malware, and phishing attacks. 

View full review »
reviewer1858884 - PeerSpot reviewer
Network Administrator at a computer software company with 1,001-5,000 employees

Check Point Antivirus is easy to configure. We enable the blade in the SMS for the gateway and that's pretty much it. You can get into the nitty gritty and fine-tune some of the settings to fit your organization better than the default settings, however, personally, I have yet to do this and it is working as expected in my organization. It is also great that this is not an add-on license and is included with the low-tier licensing which helps to reduce the overall cost to the organization while increasing the value of the product.

View full review »
AS
Complaints analysis/investigation at compugana

Some of the Check Point Antivirus features that users may find valuable include:

The firewall helps provide protection to block unauthorized access to the network.

Intrusion prevention prevents attacks on the company network and helps companies to comply with regulatory requirements related to data protection.

It has a wide range of features that help make this tool one of the best on the market.

View full review »
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at IRMA Anand

The high malware catchment rate is great and really commendable. The software is equipped with scanning all kinds of sources, email servers, and cloud servers for their endpoint threat and immediately diffuses and eliminates the threat source and threat points. It helps us to improve security scanning and also leads to endpoint management throughout. 

The software provides advanced security features like signature-based malware detection, which is widely used by organizations for scanning their code management and securing their code system end to end.

The other features, like real-time endpoint detection, help us with 24/7 scanning and monitoring of the system for ransomware, and can immediately remove them permanently. 

View full review »
reviewer1958124 - PeerSpot reviewer
CEO / direktor at S3Next

The sandboxing is good. We didn't have any file ransomware attacks since implementation.

The phishing protection works. It prevented a lot of nasty situations with fake websites.

Using this solution in e-mail and Office, we recognized how many man-in-the-middle attacks have been started to get some credential information from our employees.

In mobile, we didn't realize before how much harm can be done from the mobile devices in the network.

It replaced the ESET solutions we used before in our company.

View full review »
AB
Cyber Security Engineer at a tech services company with 11-50 employees

One of the best features of Check Point Harmony Endpoint is the portal, along with real-time threat detection and existing threat management. 

Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyberattacks. This has given us added security and peace of mind as we feel protected against ransomware threats.

Harmony can detect and display threats. It helps prevent us from clicking on threats. Any cyber attackers that attack our hosts won't get any vulnerable information. It's shielding us from ransomware. 

View full review »
SANDRA SUAREZ - PeerSpot reviewer
CEO at SAFEID

It provides encryption for operating systems and protects browsers against malware, benefiting both new and old customers.

View full review »
Ajenthan Aiyathurai - PeerSpot reviewer
Manager - IT at NVCL Group

It monitors endpoint behavior in real-time to identify and block suspicious activities indicative of malware or malicious behavior. This proactive approach helps us a lot. 

It employs sandboxing technology to execute suspicious files in a controlled environment and analyze their behavior. This allows it to identify and block malware that may evade traditional detection methods by remaining dormant or obfuscated. 

More importantly, it is easy to install from the cloud. 

View full review »
SK
Head of IT at RD Tech

Check Point Antivirus ensures our organization's security posture by ensuring that everyone accessing the internet does so securely. It performs packet inspection, enabling all security blades to monitor and filter traffic constantly. This includes URL filtering to prevent access to unwanted sites and to protect against any attempts to compromise our network.

The product streamlines security operations in our IT environment through its single configuration point, making it easy to configure all available blades. Monitoring, extracting logs from, and integrating with our Active Directory are also easy.

All of the features work in tandem for effective malware prevention.
We are quite satisfied with Check Point Antivirus, as it offers leading-edge features that other companies may not have. Despite the higher price, we carefully selected the product based on its feature set.

The sandbox technology is very useful. It operates offline in the cloud and facilitates easy replication. The tool works with our Ubiquiti switches and Active Directory.

View full review »
reviewer1961277 - PeerSpot reviewer
Senior Ts Systems Integration Specialist at NTT Security

The most valuable aspects of the solution are the real-time endpoint analysis and blocking mechanism, the detection of malware and threats is the best use of this technology. 

As we have the stability of this product and best practices solution is applied to the infrastructure as endpoints have a clear view of the statistics and performance. 

Also, we have monitored the server level where it's been protected from the outside world. The CPU, memory, and hard disk consumption and compromisation are good. 

The dashboard has also been user-friendly and easy to understand.  

View full review »
Edson  Duarte - PeerSpot reviewer
Information Technology at Banco Nacional de Investimento S.A.

The most valuable is encryption. 

View full review »
Amber Mishra - PeerSpot reviewer
Pre-Sales Manager at DCIPHERS IT SOLUTIONS

Check Point Harmony Endpoint has one of the most user-friendly dashboards I've seen.

View full review »
Ryan Evans - PeerSpot reviewer
Technical Support Engineer at Hildes Technologies

The most important benefit of this solution is having a single agent for security purposes. 

Its stability during any heavy performance activity is excellent. 

It has improved the overall security of our organizational digital well-being and made things and monitoring processes a lot easier and more straightforward.

Integration with third-party servers and data endpoints and 24/7 background security checks are very useful for us and has been very instrumental phenomena in keeping things simple and secure for us. 

It has the ability to configure with any type of system and operating environment, which is great and makes it a more useful product for multiple purposes.

View full review »
Priyanshu Kumar - PeerSpot reviewer
Information Technology Specialist at Tech Mahindra

Check Point Antivirus has highly productive and extensive support and features. It runs system checkups and looks for threats and malware - including phishing attempts.

Check Point Antivirus is productive as a security management software application for my system. The console is great. 

Check Point Antivirus provides full-scale security for my information and data and I can perform my activities feeling completely protected.

View full review »
Sunil M Naik - PeerSpot reviewer
Associate Regional Head- Southern at ASCI

The speedy catchment rate of endpoints and malware is exceptionally good and act as a precursor for organizations in order to deploy this antivirus and secure the system and servers in a proactive manner without any trouble. 

It has an inbuilt AI system that helps in diffusing the virus in a proactive manner and protects the system from getting damaged at the worst level.

The pricing is also quite affordable for marginal organizations as well, and their improved efficiency is great. Signing and renewing of MoUs were not difficult at all. They are a good stakeholder to work with.

View full review »
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle

Threat detection and response have been a great contribution to our daily programs. 

It provides daily reports on the status of the device and notifications when there are looming data threats. 

It has deployed firewalls that safeguard devices from any cyber attacks that can negatively affect workflows. When working with this antivirus, it does not affect operations in any way. 

Scanning files and data before sharing has reduced the chances of spreading viruses among the members. 

This tool has been stable and has highly improved the security status of the applications.

View full review »
Shrinkhala Jain - PeerSpot reviewer
Project Consultant at a consultancy with 10,001+ employees

The solution offers a quick deployment without any issues. 

The threat catchment rate of the software is very high and quite impressive. 

It is easy to integrate with all kinds of other software and hardware and works with cloud integration. We have no more tension around compatibility parameters as the software is quite stable and works efficiently across varied business environments. 

It is quick and agile and, with global scanning, it scans with great speed and works flawlessly in the background of the system without interrupting the front-end work

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

One of the characteristics that has given us the most value when implementing the antivirus solution is being able to have a conglomerate of solutions and to be able to manage and give to the administrators something that can observe what is happening within the network. The dashboards allow us to export this information so it can be delivered to senior managers, who are often the ones in charge of making decisions at the infrastructure level in terms of security and management of our organization. 

View full review »
Erick Chinchilla Mena - PeerSpot reviewer
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana

The best feature is that it can secure the equipment. It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks. It has detection management with all types of computing power used in the equipment and outside of it in the cloud to which it is connected. This comes to give us a complete solution.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

Its most outstanding feature is the power to manage everything from a dashboard, a window that is in the cloud, which allows us to manage it from anywhere in the world through any browser, from anywhere. This is a feature that came to give administrators the possibility to work from home. Today many of us are remote workers who are not at the company, on-site. We are not in a single site, and yet we manage well and have the capacity and the assurance of managing everything easily, quickly, and simply.

View full review »
PK
Assistant Manager at ASCI

Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users. 

The Check Point Partner keeps updating its EDR system and ensures no lapses occurred during the operating time. The entire team of Check Point is quite agile and proactive in terms of their advanced product development and their reaction time to any issue or complexity is just fantastic which ensures no deep damage to the system from threats.

EDR improvement checks system security and a proactive business and tech team improves customer interaction in the greatest manner possible.

View full review »
reviewer1957878 - PeerSpot reviewer
IT Manager at First National Bank in Philip

Deploying new versions of the endpoint are easy. It was a hassle before with a local management server, and now it's as easy as selecting the version you want from a drop-down menu. 

The options for removing/adding blades with the click of a button from the portal are great. The built-in VPN blade makes it so easy to deploy on my endpoints if I need employee remote access to my LAN. 

The installation is so easy with the simple MSI deployment packages, and I can watch the deployment process in real-time from the Cloud Portal. 

View full review »
Thao Vo - PeerSpot reviewer
Cloud Solutions Architect at Practice Management of America

The following is a list of the valuable features:

  • Good price
  • Best virus database
  • It isolates the infected machine.                                                                 
View full review »
GC
ICT Officer at Kenyatta National Hospital

I love the product’s flexibility. We can manage the blade without changing the protocols. It is easy to manage how the tool runs the network. The product is easy to deploy. It’s a good firewall. It supports most of our OS, such as Linux and Windows. We can use it even on mobile devices. The browser and data protection are good. The solution has good threat intelligence features.

View full review »
VP
Sales Manager, Checkpoint at South Asian Technologies

The Rollback feature is valuable because ransomware attacks are very familiar nowadays, and anti-phishing and anti-ransomware blades are required by many of our customers. Other features, like prevention blades, are also okay, where you get threat extraction and evaluation. Likewise, the forensic report is also very important.

With the prevention blade, Harmony scales higher than many other solutions. Even CrowdStrike has technical problems when you're offline. But Harmony is not like that. Even if I don't have Internet connectivity, I have seen how remediation and rollback happen. All the encrypted files come to a state where it works with micro-backups.

Customers would like to have a very advanced endpoint to protect themselves from anti-phishing, especially ransomware.

View full review »
reviewer2098998 - PeerSpot reviewer
Software Engineer at Mercado Libre

It provides automatic scans to most websites to ascertain security situations and alerts the user when there are potential threats that can affect data. 

The webcam protection system prevents unauthorized members from joining virtual meetings organized by employees. 

The phishing protection system prevents teams from spamming across email conversation channels. 

It is easy to install and learn how this platform works. 

It has various location connection that enables the user to select preferred sites that are safe.

View full review »
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle

Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information. 

The cloud management system provides security to hybrid information and saved files. 

The customer support services are efficient and always reliable when reached for any consultation. 

It supports operating systems that are deployed in computers and mobile devices. 

New users familiarize themselves easily with the operation of UI since it has flexible dashboards. 

The faster data processing capability saves time and costs for accomplishing given tasks.

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease. 

View full review »
Ankita  Singh - PeerSpot reviewer
Application Developer at Capegemini Consulting India Private Limited

Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background.

Along with Check Point Antivirus, the support provides multiple updates and upgrades in quick succession. It's quick to restore the management of the database and has scheduled security system and network upgrades for risk-free work management.

Overall, Check Point Antivirus is highly productive, scalable, compatible, and easy-to-use software for data security and system management. I highly recommend this platform.

View full review »
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC

Network monitoring provides the best reports based on real-time performance, which helps our members locate any drawbacks across the workflow system.

The threat response system from the user dashboard blocks malware attacks that can affect email and the flow of information among colleagues. 

Endpoint protection is fundamental in security enhancement; it's effectively protecting our devices from internet viruses.

The application investigation system enables the IT team to come up with reliable reports on the cause and prevention measures that can be adapted to prevent any future attacks.

View full review »
reviewer1777338 - PeerSpot reviewer
Supervisor Tecnico at M.Coutinho Douro - ComÉrcio De AutomÓveis, S.A.

The URL filtering and application control are very helpful since it's typically hard to block productivity loss apps/URLs on clients when abroad. Harmony made it easy to control the usage of the company resources and bandwidth.

Disk encryption is a nice feature if you don't have other systems. However, since we've already had BitLocker deployed, we saved a few dollars on this licensing type.

The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options.

View full review »
EmmaRichardson - PeerSpot reviewer
Database Administrator at Hildes Technologies

The most important and useful feature is the regular updates against modern-day viruses. We have seen that new viruses and malware are introduced by hackers every day, and we need to keep ourselves a step ahead for protection against those threats. 

Check Point Antivirus, with its up-to-date features, ensures that we are always ahead of the new versions of viruses and provides real-time protection. The overall features and data loss prevention makes it a valuable product in every way.

View full review »
OumarDiallo - PeerSpot reviewer
Cyber Security Engineer at AFRICAN CYBERSECURITY MARKET

What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security.

You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

One of the characteristics is the detection of anti-ransomware, which helps us to protect our equipment and data against any eventuality. This solution detects and analyzes any attempt to encrypt the data. If they are encrypted, the same solution stores and restores a version of the compromised data. 

Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint. Among other features, this Endpoint Behavioral Guard identifies families of malware, file-less attacks, and other generic malicious behaviors that are the most common attacks when you are in unsafe networks without a protection solution.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

One of the characteristics of this antivirus that is valuable is the detection of ransomware. I can detect viruses that have done the most damage in recent years. I can protect users from damages and total or partial loss of information. We're being well protected. This protection feeds on databases that are constantly updated, giving greater security. It is worth using, and having in our organization is one of the products that will make the difference during an attack and will safeguard the security of the equipment.

View full review »
Jhonjerlyn Morales - PeerSpot reviewer
CEO at JL Real Estate

The main valuable feature of Check Point is the constant updating of the EDR database in order to detect new threats. 

This update system is responsible for inserting new viruses into a database so that it is easier to detect and eliminate them despite the fact that constant notifications are sent when the virus database is updated, I have no complaints about this feature as it has helped me to restrict the passage of new threats. 

New viruses emerge day after day, and this EDR system helps action be taken before viruses affect the internal system.

Another of the striking functions is that Check Point monitors the online activity of each user, ensuring that they do not access websites that have a suspicious encryption code or that have an unusual certificate; this has helped us to navigate calmly and detect pages that might put our work integrity at risk.

View full review »
reviewer1773669 - PeerSpot reviewer
Network Security Engineer at Maine Bureau Of Taxation

Scalability is a huge factor. 

The need for no downtime is key for us - and this solution offers that. When you have six gateways you have to patch and no one even notices, it's phenomenal. 

We need to be able to keep these connections running 100% of the time. The fact that we can patch and reboot firewalls and no one even notices is a huge plus. We need to be able to keep it secure but also keep it up and running. 

Having the six gateways and being able to clone them in when we need a new gateway is excellent. I love that we are able to just put a new gateway in and clone it.

View full review »
reviewer1753452 - PeerSpot reviewer
Manager of IT Security at a healthcare company with 5,001-10,000 employees

The set of features is quite comprehensive.

The Endpoint security solution integrates with the Check Point firewall services, so it's a combined approach to security.

A unique feature with this product is that it will detect if the user is entering their password on a website, and then block it.

View full review »
Anil Redekar - PeerSpot reviewer
Network and Security Engineer at a consultancy with 10,001+ employees

The below features are most valuable:

1) Anti-malware

2) Threat protection with signature

3) Anti-ransomware

4) Anti-phishing (support for all leading browsers)

1) Anti-malware (to detect and prevent malicious activity)

2)  Threat protection with signatures to prevent the threat on the basis of a signature. Signatures are stored in the database. 

View full review »
SB
Consultant at Cognizant

SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth. 

We set up reports, which were weekly or biweekly. Then, our admins, who are mainly working with SandBlast Agent, were able to look at daily reports or even more granular reports, hourly or daily, based on their customizations.

The automated part keeps it running in the background. It only gives us notifications when there have been major attempts to breach data. We also have reports that show logs for what external, unauthorized systems tried to access the data. Through those reports, which are automated in the background, we are able to do what we want in order to keep our systems secure. We feel the automation part is pretty good with this application.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

All the features that Check Point antivirus presents are very important for the implementation of network security and the most valuable part of this tool is the easy and interactive way of its configuration through SmartConsole in Check Point.

It can scan the files that our users have downloaded to check if they have a virus, which is the most important thing. IPS and Antivirus work together, which provides more flexibility and security throughout our work environment and thus be able to have a well-secured infrastructure

View full review »
IdoSarusi - PeerSpot reviewer
Developer at Shavit-security

The product's sandboxing feature is valuable as it runs suspicious files in a virtual environment. It helps us analyze their behavior without risking the main system.

View full review »
Mantu Shaw - PeerSpot reviewer
Project Manager at a outsourcing company with 1,001-5,000 employees

The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client. Both features offer significant advantages from different perspectives.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner.

The threat extraction and threat emulation have been a great benefit to give more autonomy to users.

On the other hand, it cannot be left out that it reduces the number of malicious attacks. It has helped us to properly monitor what has been happening with our network traffic and prevent individual attacks from accessing certain sites where we want to have restrictions or limitations.

View full review »
Berkhan Yaman - PeerSpot reviewer
Cyber ​​Security Specialist at a tech services company with 11-50 employees

The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists.

View full review »
DH
Security IT at a tech services company with 51-200 employees

The most important characteristic of our requirements was the implementation of disk encryption. It's necessary to avoid loss or theft of the equipment and, therefore, loss of data from the equipment. It can be applied to all the equipment from the portal or segments.

Another advantage is the control of applications and access policies that can be carried out in a granular manner for different company profiles. It works very well.

It offers secure administration from Check Point Infinity Portal. It is a security center where many of the Check Point solutions are located.

View full review »
DH
Security IT at a tech services company with 51-200 employees

We really like this antivirus security tool, included in the security management server used for our Check Point gateways. The ability to include blades is very good, it allows the centralization of security in our gateways natively.

There is also a lot of documentation to be able to use this security feature in the best way using the best practices indicated by the manufacturer, with this we guarantee the use of the tool correctly.

Finally, in our company, we like the ease of implementation.

View full review »
NG
Support at a security firm with 51-200 employees

It is a good tool. The price is accessible. It protects against modern threats in a great way; there is a lot of confidence in Check Point.

There is quite a lot of product documentation to assist with a correct implementation.

The ease of installation is great.

View full review »
Bala_Krishna - PeerSpot reviewer
Director at Rhinexa India Pvt Ltd.

We find the zero-day protection to be an extremely valuable feature of this solution.

View full review »
JC
Consultant at SOCIEDAD AXIOBASE S.A.

What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment. It has a threat prevention policy so that I can stop different types of threats from entering a workspace or environment.

View full review »
reviewer2005803 - PeerSpot reviewer
Digital Coordinator at Modis

The total cost of ownership has enabled the company's teams to identify any areas with security weaknesses and appropriately assign security models. 

The log4j-related attacks blocking system detects any vulnerable endpoints in advance. 

Identifying ransomware behaviors has upgraded the security monitoring system and put measures in place to curb such threats. 

When browsing, it blocks phishing sites that may hack personal data and leak to internet cyber criminals. 

The endpoint behavioral guard identifies online threats that easily prevent credential theft that may lead to funding theft.

View full review »
reviewer2005812 - PeerSpot reviewer
Human Resources Manager at Beat

Virus detection helps teams to be aware of any threats that can harm data and take precautions in advance. 

It provides networking reports on the data security situation, which enables users to make decisions. 

Performance metrics provided regularly help the IT team plan to curb any threats to company data.

It is easy to deploy the antivirus and learn how it works. 

The application runs very fast and does not affect the performance speed of the device where it is installed. 

Daily security analysis indicators help team members to engage any abnormality with real-time insights.

View full review »
AK
Security Network Engineer at АТ "Банк інвестицій та заощаджень"

The most valuable feature of Check Point Harmony Endpoint is centralized management.

View full review »
SHRINKHALA SINGH - PeerSpot reviewer
Senior Manager at Advertising Standards Council of India

The ThreatCloud is an amazing feature and helps in intelligent and proactive detection of threat attacks along with auto-remediation of the system.

The industry cloud and integration services with alert notifications are some really exciting features that helped in achieving flexible and strengthened security administration.

It addresses zero-day threats and next-gen viral threat attacks on the system and also has strengthened the security administration through a single management console.

View full review »
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

Phishing is an issue that is affecting a lot of businesses given the huge email traffic in businesses. Sometimes the server security firewalls won't detect threats from coming into the endpoints, so email protection is definitely one of them that's helpful. 

Filtering the websites that can be visited is important also as there's always a chance to come by sites that, just by clicking, will download malicious threats. Even when you are on secure sites, you will see that, with Check Point, some ads and advertising will be blocked as they could be potential viruses.

View full review »
Anuj V. - PeerSpot reviewer
Consultant at ANALYTICS EDGE

Check Point antivirus software is agile and efficient in managing spam and threat attacks on web and cloud systems. The software is extremely efficient in scanning computers and websites all the time. The software runs in the back of the system and never hampers the work at the front end.

It is highly cost-effective and saves enough manpower cost in tackling such phishing attacks on the system.

It has a customer-savvy interface and easily customizable as per client and business requirements.

Deployment is easily adjustable.

View full review »
JurajMackovič - PeerSpot reviewer
Sales ManagerService Delivery at K_CORP

The solution is easy to use and easy to manage.

The security in regards to phishing, viruses, and so on, is very powerful. 

For mobile devices, encryption is excellent. 

From our point of view, Check Point is really easy to implement and really easy to manage. From the customer's point of view, the main reason was that the Check Point is the best brand, one of the best brands in our region. When they evaluate in comparison to competitors it comes out on top.

The solution is stable.

It's easy to scale as needed. 

Check Point Harmony covers everything.

View full review »
reviewer1853898 - PeerSpot reviewer
Engineer at Harbers ICT

The Harmony Endpoint browser plugin is powerful tooling that is visibly present and doing its job. 

Previous antivirus packages that we used and our customers used did not include a browser plugin. Now that users see that the endpoint really does scan everything on the browser page (such as username and password fields) they also see the added value of an antivirus package on the computer. 

View full review »
reviewer1850805 - PeerSpot reviewer
Sr. Data Scientist at a tech vendor with 10,001+ employees

I found the fact of working across multiple attack vectors easy and more beneficial. 

It has helped with USB to human errors to website issues to all types of threats and bot attacks. 

I also found the features of provisioning a VM for some security requirements and the fact of access across SSH and remote terminals also beneficial. 

Client-based access and the suite of products from SaaS API and Browser Protection are also very beneficial. It follows the ZTNA which tells that the VPN model of security would come to be obsolete in a few years with the Harmony benefit of Check Point.

View full review »
KS
Senior Security Specialist at Tech Mahindra Limited

    The solution allows us to reduce the attack surface via:

    • Host Firewall
    • Application Control
    • Compliance
    • NGAV: Prevent Attacks Before They Run
      • Anti-Malware
      • ML based NGAV
        GAV: Runtime Detection and Protection
        • Anti-Ransomware
        • Behavioral Guard
        • Anti-Bot
        • Anti-Exploit
          Web Protection
          • Zero-day Phishing site protection
          • Corporate Password Reuse Protection
          • URL Filtering
          • Malicious site protection
            Attack Investigation and Response
            • Forensics collection and detection
            • Forensics report – incident visibility, MITRE mapping
            • Automated attack chain full sterilization
            • Ransomware encrypted files restoration
            • Threat Hunting
              Data Protection
              • Host Encryption
              • Media encryption and port protection
                Mobile Protection
                • iOS Protection
                • Android Protection
                  Centralized Management
View full review »
reviewer1777338 - PeerSpot reviewer
Supervisor Tecnico at M.Coutinho Douro - ComÉrcio De AutomÓveis, S.A.

The management of all endpoint settings from a single portal does not need to use more than this one to set all the policies. We used the deployment of this product to push drive encryption to some of the more sensitive users of the company since we haven't had any solution to this problem.

We're also using application control to block some unwanted apps from being executed on clients, however, sometimes the management of those apps can be a little time-consuming due to newer versions being released often.

View full review »
reviewer1398543 - PeerSpot reviewer
Network Security Engineer at a financial services firm with 51-200 employees

We love that we don't have to upgrade it anymore. They take care of that.

The upgrade process was nice with the new Management Station compared to the old one. I like how they have the clients already available. I didn't have to download them and upload them as I did with the old Management Station.

We're happy with the solution overall as it takes away the administrative overhead of operating it and patching it and being able to also sign in through the web browser anywhere as opposed to just having to VPN back to our work and connect to the Management Station in order to use it. We can just use the Check Point portal and just use any browser anywhere. That gives us more options, which we like. 

I've noticed they're constantly updating the interface and making it easier to use, which I appreciate. When we first started using it, it was really laggy and it was really slow and it was hard to sort some of the computers and users, however, they make updates almost every time that I log in. It gets better and better every day. It has gotten better and it's not as slow as it was.

There seem to be constant improvements happening, which you can't say for everything. We don't have to upgrade to get the benefits of the improvements, either. That takes a lot off of our plate and allows us to focus on other things. We're taking the good with the bad and the bad seem to be one-offs and we're looking forward to the future.

Therefore, the most valuable feature is its ability to take the management and the administration of the product off of our plate and onto their plate. We don't have to worry about upgrading it, creating downtime, working off-hours, doing all the research and stress of seeing if it's compatible, if there are problems, letting them test it. That's nice. Previously, we would upgrade our products or patch them maybe two to four times a year, depending on if there's a security vulnerability. Each time we do something like that, it was about three to four hours of downtime. Now, that process doesn't exist. 

Before, with on-premise, we had two Management Stations. One was primary, one was secondary and there were two different data centers in case one data center was down. The other one would come up and be the Management Station for all of the clients. Now, in this case, we only have one. It's in their cloud. Their cloud is in AWS. It's a great thing. It's resilient by design and it provides redundancy in a single source of administration for us. We like that too

View full review »
reviewer1738914 - PeerSpot reviewer
Network Operations Engineer at SFR

One of the features that we find most valuable is the simplicity of the configuration through the Smart Console interface. 

It is very easy to manage the Antivirus blade, even for newcomers in our technical support team, which is a key area of interest for us. 

Also, the sandbox feature is very interesting as it can automatically isolate an infected machine from the network, which is valuable. 

We could also talk about the real-time detection scan feature that can monitor files as they are being accessed, which allows for a quicker response time.

View full review »
Bala_Krishna - PeerSpot reviewer
Director at Rhinexa India Pvt Ltd.

Harmony's endpoint sandboxing is really good.

View full review »
reviewer1676439 - PeerSpot reviewer
CISO, CIO, AVP at CIANS ANALYTICS PVT. LTD

We found all features valuable - other than the encryption since we were already using that feature. Since we required some application to safeguard ourselves in this work from home situation. We were evaluating anti-malware products specifically. 

There can be scenarios where this encryption feature will be applicable and fruitful if it is implemented with proper planning and organized with respect to a particular organization. There have to be proper requirements gathering and a plan to work effectively.

View full review »
reviewer1678761 - PeerSpot reviewer
Assistant Manager at CIANS ANALYTICS PVT. LTD

We like the sandbox feature. If any machine got infected, it would get automatically isolated from the network. As such, we haven't faced any issues. We like that we have an option to isolate. 

The alert email from Check Point is also very valuable. If any machine didn't get a scan or has a virus due to visiting various websites on a browser, it automatically sends us an email to warn us. Accordingly, we can take action on that particular machine. 

Overall, the antivirus is good.

View full review »
TM
Sr. Manager at Incedo Inc.

All of the available features are good (for example Threat Emulation/Threat Extraction, Antibot, Anti-Exploit, Anti-Ransomware protection, UBA, Zero-day Phishing protection, Behavioral Guard, Encryption, VPN, and compliance), however, the one I have thought to be very valuable is the Ransomware Protection Feature which has been used widely during the pandemic. It protects as well as saves original file copies to prevent data loss.

Forensic Analysis provides a complete analysis of threats via detailed reports. The threat prevention, which includes a detailed threat landscape is very good.

The VPN connectivity and compliance check are also very good features.

View full review »
Daphne - PeerSpot reviewer
Project Manager at Junta de Andalucia

Right away, we noticed when using Check Point's Harmony Endpoint tool, was the ease of deployment. In our case, it was deployed without too many difficulties, considering the deployment involved several tens of thousands of devices. 

Once deployed, the dashboard and all the inventory information that we had been able to obtain and that we did not know about before proved to be very interesting. 

One of the strengths of Harmony is its power to detect threats and keep us safe. Also the ability to apply policies specifically to users or groups is very useful.

View full review »
BD
Chief Information Security Officer at Abcl

Harmony Endpoint provides complete EDPR functionality using multiple modules and features that are available with the solution. These include Compliance, Anti-Malware, Media Encryption, Port Protection, Firewall, Application Control, Full Disk Encryption, Remote access VPN, Capsule DOC, URL Filtering, Anti-Bot, Anti-Ransomware, Behaviour Guard, Forensics, Threat Emulation, and Anit-Exploit. This group of features is able to protect the endpoint from any next-generation attack. Any of the modules can be enabled or disabled based on the organization's requirements.

Harmony Endpoint is able to detect, monitor, block, and mitigate attacks on the endpoint and it builds and maintains relevant logs for later inspection. The agent sends telemetry/metadata to the centralized console for forensic purposes.

Policies for endpoints can be created based on the username or endpoint.

Integration with the Threat intel platform is helpful for blocking any attack at an early stage.

The complete solution can be hosted on-premises or SaaS on the cloud.

Remote access VPN is provided as default in the base license.

A different Policy Server can be configured and hosted at each location so that the agent does not have to reach a central location to receive policy updates. Policy servers are created using an OVF file, which can be installed on any Virtual Platform such as VMware.

It has secure communication between the Policy Server and the Management Console using Certificate/SIC communication.

The agent footprint is small on the endpoint.

It supports integration with other security solutions for sharing threat intel within an organization or over the cloud.

The anti-ransomware module is very strong; it's able to detect any ransomware attack at a very early stage.

Host-based firewall policy configuration is simple, which helps to access an endpoint if the machine is not in the organization's network.

View full review »
reviewer1444728 - PeerSpot reviewer
Network Technical Specialist at a manufacturing company with 10,001+ employees

It's pretty complete for preventing threats to endpoints. Its capabilities are great.

The solution's automated detection and response capabilities are pretty good. It really depends on how aggressive we want to be with it. We've not deployed it in the most aggressive way you can, such as shutting down everything, because we've not deployed it in a greenfield site. It has not been deployed with that in mind. It has been deployed as an add-on service. As such, we don't want to be as aggressive as some top security firms would recommend we should be.

View full review »
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack

The insight and visibility of the detection is good.  

View full review »
Ido Sarusi - PeerSpot reviewer
Developer at Shavit-security

This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities. However, there's still room for improvement and the addition of more features. Nevertheless, in the broader market landscape, it's considered one of the leading products. While there might be some competition from others like Cisco, it remains a strong choice. The feature lies in mapping and providing top-notch malware protection.

View full review »
SM
Enterprise architect at Kapsch

We need ransomware protection and that's what we get. It's a very good and robust antivirus solution.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

The logs and monitoring are valuable features. It generates enough visibility in terms of what happens on our equipment.

The sandboxing validates some files that have threat qualities. 

We like this security tool.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

The characteristic that most attracts our attention is the administration portal. It doesn't require a management server since its licensing and management are through the Check Point Infinity Portal. It is very intuitive and easy to implement.

The way in which the agent is installed on the computers is very easy, it does not consume almost any performance of the server or final computers, in this way there is no need to worry about increasing resources to be able to protect them with Check Point Harmony Endpoint.

We love the reports and monitoring they provide. It helps us quickly see what vulnerabilities we have on our endpoints.

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard. We are achieving uniform work that is easy to manage if any changes are necessary. Being able to give us an inventory of the equipment and the health status of everything from a single place has been great. This solution has become a great ally for the prevention of threats and security problems caused by viruses such as ransomware, and we are protected against threats, which is of great value. 

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

Its most valuable feature is the integration of analytics with the cloud. We like that we can detect zero-day incidents, problems, or virus attacks inside or outside the organization. It's one of the most complex and integrated antivirus solutions. The value of analysis in real-time every time we are having an attack, vulnerability, or security breach is very helpful. Today, we want to have integrated solutions and quick solutions that will protect us mainly with new attacks and solutions that protect us from the hijacking of our data (ransomware).

View full review »
reviewer1954029 - PeerSpot reviewer
Head of Security and Operational Risk at Medianet

The most valuable aspects include:

  • Web Filtering. This feature is easy to manage, and it applies new policies in seconds. 
  • Real-time Click Protection. It protects the user from phishing attacks in real time. 
  • Compatibility with Windows, Linux, Android, and Mac. We don't need additional solution to protect all our endpoint. 
  • Cloud Management. This feature allows us to reduce our operating burden and also improve our TCO.

We now have the ability to block a compromised machine from the network.

We now have the ability to block in near real-time IOC.

View full review »
reviewer1805079 - PeerSpot reviewer
Network Engineer at Fujairah Port

Our environment is well-protected by Check Point Antivirus in many ways. We use web filtering to restrict and defend when users access the internet

The sandbox feature is good. Any contaminated computer would be immediately disconnected from the network. The smart event gives the administrator a high-level security view of the enterprise.

It also helps us to block malicious file downloads and access to infected sites from our network. Moreover, the signature-based detection works well.

 Overall, this system performs a superb job of safeguarding us.

View full review »
JamesYa - PeerSpot reviewer
Senior Solutions Architect at Cloud4C Services

The solution has all the standard features you would expect for endpoint protection.

View full review »
Sandeep Sehrawat - PeerSpot reviewer
Information Technology Security Consultant at Sify Technologies

The functionality is quite good. It can run well on mobile devices. 

You can also create profiles for individual mobile devices. 

It is easy to set up and implement. 

The product is stable.

It's very scalable. 

View full review »
reviewer1835919 - PeerSpot reviewer
CISO at a financial services firm with 51-200 employees

Overall, it's a good tool. It's doing a good job for what it is designed for.

It is easy to set up.

The solution is stable.

It's a scalable product as it is a cloud offering.

You can layer in this solution with others. I like layering myself with various technologies, depending on the environment we're working in.

The product offers good pricing.

View full review »
reviewer1853787 - PeerSpot reviewer
Systems Engineer at HarborTech Mobility

If you need a good antivirus, Check Point Antivirus is more than great. 

Check Point Anti-Virus has many positive characteristics. First, Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters. Second, Like the other Check Point blades, the visibility and logging of events are remarkable.

One of the features that I love the most about this large software is that It allows me to stop incoming malicious files, and stop users from accessing malicious software-infested sites. Also, it gives me the opportunity to get very comprehensive reports where we can collect summaries of infections and trends to provide greater visibility of threats, which is absolutely fantastic.

View full review »
reviewer1853499 - PeerSpot reviewer
IT Security Manager at a manufacturing company with 1,001-5,000 employees

The most valuable features are threat emulation and threat extraction. Despite some false positives, it gives quite good security for file downloading.

Phishing form detection based on on-site similarity (not only on URL) has at least 50% efficiency in real-life examples that passed our antispam systems (and most of the false negatives are pretty general forms, which are not so convincing to the user).

The forensics allows us to search retrospectively for an URL or file opened by users, for example, when you need to quickly check who else has clicked on a phishing link.

View full review »
JamesYa - PeerSpot reviewer
Senior Solutions Architect at Cloud4C Services

It just has standard antivirus. It does what it needs to.

The solution offers good performance. 

Its stability has been good.

The initial setup is easy.

View full review »
JJ
Project Manager at Junta de Andalucia

What we liked the most about the product, apart from detecting any attempted attack, is the graphical interface.

The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers.

We also highly value the anti-ransomware functionality, which creates a copy of the files on the computers and in case of infection by ransomware is able to restore them to a date when the computer was not infected.

View full review »
reviewer1776063 - PeerSpot reviewer
IT Manager at a renewables & environment company with 51-200 employees

Cloud management and reporting are great. The management interface is very simple and easy to navigate. Just getting a logon to start is very helpful. The Check Point support at this stage was great. While it was very simple and intuitive, having someone talk over the defaults provided recommendations that helped us jump forward very easily.

Again, the cloud management service has a several inbuilt default reports which are easy to customize and provide more visibility than we have had previously with several solutions. 

View full review »
MV
IT Specalist at vTech Solution

The product offers advanced anti-malware and antivirus protection to protect, detect, and correct malware across multiple endpoint devices and operating systems. Proactive web security is available to ensure safe browsing on the web. Data classification and data loss prevention are there to prevent data loss and exfiltration.

SandBlast Agent defends endpoints and web browsers with a complete set of real-time advanced browser and endpoint protection technologies, including Threat
Emulation, Threat Extraction, Anti-Bot, and Zero Phishing. 

The zero-day prevention is very valuable.

View full review »
JA
Presales Engineer at Data Warden

Without a doubt, the best security feature is Full Disk Encryption (FDE). In cases where the endpoint is stolen or lost, you are sure that the information will not be accessible without the access password being the correct, maintaining the confidentiality of files at all times.

In addition, if someone tries to extract the physical disk and places it as a removable disk in a PC, they will not have access to the information either, since the files are still encrypted, ensuring that this method of extracting the information does not work without the decryption key. 

View full review »
reviewer1721463 - PeerSpot reviewer
Manager, IT Infrastructure and Security at Control Southern Inc.

The anti-ransomware blade is great. It stops device encryption automatically and has caught hundreds of cases on client laptops. 

One of the coolest features is that it provides an HTML report on the laptop and the endpoint console for the administrator. It will show you the forensic report of where it came from and if it spread to other systems that have the endpoint client installed. 

The best thing is it never gets past the first client as it looks for bad behavior. If needed, you can open the console and allow it.

View full review »
LR
Support Manager at Sefisa

The fact that everything is centralized is great. For example, the management is centralized on one portal in the cloud. 

We like the fact that we have a lot of visibility with this solution and the protection is very good. I have seen cases where customers, get attacked by ransomware and it is very easy for Check Point to restore a file that has been compromised with ransomware. It's 100% effective. 

They are developing new technologies. For example, they added SASE to their portfolio with Harmony. They also have Infinity SOC. If one of the Harmony Endpoints gets compromised, Check Point Infinity SOC is going to see it, and it's going to highlight that.

They're on the very edge of technology and are very fast with implementing new technologies. 

The solution is very stable.

They have a great knowledge base that you can leverage as a user.

The product scales well. 

Technical support is knowledgeable and responsive.

Every now and then, every vendor does have a vulnerability that is discovered. For example, when many vendors were using open SSL, they had to do some fixes on their software in order to fix that particular vulnerability. Check Point was the first one to fix that. It's clear that, unlike the competition, it is always keeping up with the patching of its own software.

View full review »
reviewer1601424 - PeerSpot reviewer
Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees

The solution offers disk encryption, anti-malware, and BPM blades. For example, the Disc Encryption Software Blade is actually a part of this endpoint security solution. The whole thing is good for us.

The product has been proven 100% effective with us. We haven't had anything related to any threats passing to us for the past five years.

The solution is easy to use. It is self updated when there's a new version. It updates seamlessly, no matter what features you have. However, depending on what we use, there are some features that they will not apply in the clinics. We don't have the preview screen. We can customize it in a way that it doesn't disrupt our operation depending on if it is a laptop, it is a desktop.

The security is very good.

The solution is very straightforward.

The solution scales well.

We have found the stability to be very reliable. 

View full review »
reviewer1666413 - PeerSpot reviewer
Head of IT Operations at Puerta de Hierro Hospitals

The endpoint agents, which can be installed in one go, are great. The communication with the console is very dynamic and remote, without the need to return to the computer locally. 

From the administration console, we can generate content filtering rules and labels, as well as run an analysis of emails and downloads that the collaborator does to fulfill their functions. Informing the administrator of threats by mail gives us the facility to detect real-time vulnerabilities in order to continue fulfilling the objective of safeguarding the information of the organization.

View full review »
reviewer1519446 - PeerSpot reviewer
Geography and History Teacher at a comms service provider with 10,001+ employees

When starting to use Check Point's Harmony Endpoint tool, the first thing that strikes us is its great ease of deployment. In our case, it has been a deployment without too many incidents considering that we are talking about a deployment in the tens of thousands of devices. Once deployed, the dashboard and all the inventory information that we have been able to obtain and that we did not know before are very interesting. Of course, one of the key points of Harmony is its great ability to detect threats and keep us safe.

View full review »
reviewer1626762 - PeerSpot reviewer
Assitant Manager - IT Support at a outsourcing company with 1,001-5,000 employees

The anti-malware and port protection, etc., are good. We have about 200 endpoints on this solution being maintained. We like that its server is cloud-based and that our in-house IT team can handle the installation and configuration on endpoints. It's great for securing our endpoints from any external attacks. We can control access to end-users. 

View full review »
Mantu Shaw - PeerSpot reviewer
Project Manager at a outsourcing company with 1,001-5,000 employees

The features available are all good. One of the best features is the Ransomware Protection Feature. It is great and is a way to protect endpoints. It protects as well as it saves original file copies to prevent data loss.

Zero-Day Anti-phishing detects phishing sites in real-time and prevents users from any data and other losses.

Forensic Analysis provides a complete analysis of threats via detailed reports. Threat prevention with an included detailed threat landscape is very good.

The VPN connectivity and compliance check are also very good features. 

View full review »
it_user1536681 - PeerSpot reviewer
Network, Systems and Security Engineer at SOLTEL Group

For us, the most valuable feature of Check Point Antivirus is the real-time detection scan that monitors files as they are accessed. It is important because we can react quickly.

Today, malicious coders and hackers are experts at evasive tactics that shield their activities. Therefore, in today’s cybersecurity landscape, antivirus is just one of the many tools in an organization’s cybersecurity arsenal to keep the business safe.

The antivirus solution should be implemented as part of the organization’s endpoint security solution that combines global threat intelligence and advanced threat prevention engines that address zero-day and other next-generation threats.

View full review »
reviewer1521789 - PeerSpot reviewer
Information Security Analyst at VPS Holdings Limited

The most useful feature so far has been having a functioning and up-to-date anti-malware scanner. This has found multiple dormant threats that have existed within the business that other anti-virus products could not detect.

In addition to this, threat extraction & threat emulation have been a big benefit to give the users more autonomy. For example, allowing them to release their own spam emails that were captured by our spam filter, knowing that the files that are released will be scanned and checked for known viruses.

View full review »
reviewer1489602 - PeerSpot reviewer
Network Security Assurance Specialist at Visa Inc.

The Sandblast Agent really made a difference for the organization. It integrated well with the existing Check Point environment we had in place. It was used both for threat protection and remote access VPN.

View full review »
KP
Network Engineer at LTTS

The most valuable feature is the Zero-day protection, which covers our on-premises users, and well as those users who are outside of our network. 

With Zero-day protection, we have complied with our customer-specific policies as well.

Most of our users are working on customer-related projects and today, everybody is looking to have zero-day protection at the endpoint level, as well as to protect against unknown threats or viruses.

View full review »
JA
Information Technology Specialist at RBC

The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry.

View full review »
OP
Senior Network/Security Engineer at Skywind Group
  1. The Antivirus software blade is part of the Next Generation Threat Prevention license bundle.
  2. The Antivirus is able to scan files downloaded from the internet or traversing the network via Check Point Gateways/Clusters.
  3. The Antivirus software blade is configured via the Unified Threat Prevention policy in the Smart Console (at least for R80.10, the version we use).
  4. There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives.
  5. The updates for the blade are downloaded every two hours.
  6. As with the other Check Point blades, the visibility and logging of events are outstanding.
View full review »
NM
Team Lead Implementation Services/Systems Integration Engineer at Trinidad Systems Limited

One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users' machine. This is a very valuable feature of this solution.

The Zero Phishing feature is also very valuable. This feature has the ability to scan the username and password fields on a website before you enter your credentials and verify if the site is legitimate. This brilliant feature prevents the stealing of account information.

View full review »
TP
Head of IT at a real estate/law firm with 11-50 employees

The biggest value we found was ease of deployment. I haven't really used it much, so I can't really comment beyond that. I haven't used it much, but it's working.

View full review »
PA
CIO / CTO at a financial services firm with 51-200 employees

The most valuable feature is the integration with Check Point's firewalls. You can have one port, and follow the logs from both Endpoint and firewall security.

View full review »
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack

The most valuable features of Check Point are threat cloud integration, sandboxing, and behavioral analysis.

View full review »
IE
Cyber Security Consultant at Wirespeed

The solution provides endpoint security, ransomware protection, endpoint detection, and response. Also, cloud-based management is a good feature with an excellent catch rate.

View full review »
Muhammed Basheer - PeerSpot reviewer
Territory Manager at a tech services company with 501-1,000 employees

The most valuable feature of Check Point Harmony Endpoint is it can be used for all kinds of endpoints, including mobile phones.

View full review »
reviewer1866651 - PeerSpot reviewer
Brand Manager at Corporation Sekiura S.A.C.E.I.

All of these features quoted below are valuable for us, as the set of solutions is what makes the solution really valuable. 

  • Endpoint Threat Prevention features
  • Web Protection (malicious sites/URL Filtering)
  • Anti-Ransomware
  • Anti-Bot
  • Anti-Exploit
  • NGAV
  • Anti-Virus
  • Forensic collection and automated reports
  • Threat Hunting
  • Sandbox Emulation and Extraction (CDR)
  • Endpoint Access Control Features
  • Endpoint Firewall
  • Application Control
  • Port Protection
  • Endpoint Compliance
  • Remote Access VPN

If we had to choose one, we really like the EDR included.

View full review »
reviewer1821144 - PeerSpot reviewer
IT Security Officer at a tech services company with 1,001-5,000 employees

The sandblast agent, policies implementation, and logs are quite valuable aspects of the solution. 

Threat emulation and anti-exploits are great features to protect the endpoints. 

The remote access VPN within the endpoint agent is quite easy to set up and use. 

The Harmony portal allows us to do a single sign-on using our active directory which makes the life of admins easy. 

Harmony Endpoint scans all website before opening and also scans fields on the website that protects from XSS and CSRF attacks which is really an advanced level feature. 

The endpoint scanning tools are quite enhanced and detect most malicious files. 

View full review »
VK
Cybersecurity Architect at a computer software company with 201-500 employees

I have found the Zero phishing and IPS features the most useful in Check Point Harmony Endpoint. Additionally, threat emulation sandboxing is effective.

View full review »
reviewer1597644 - PeerSpot reviewer
Chief Technology Officer at a tech services company with 11-50 employees

My customers choose Check Point Harmony Endpoint because deployment is easier and because it's cost effective and more secure.

It is also a stable and scalable solution.

View full review »
AI
Pre-Sales Engineer at a tech services company with 51-200 employees

The most valuable features in this solution are the EDR tool and the integration.

View full review »
reviewer1477194 - PeerSpot reviewer
Engineer at a tech services company with 51-200 employees

The most valuable feature is forensics.

View full review »
reviewer1098015 - PeerSpot reviewer
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees

The feature that we find most valuable is the easy way of configuring it via the SmartConsole on Check Point. The configuration is very straightforward and although it has some impact on the firewall CPU and memory, it doesn't impact the IPS, for example. It allows for the scanning of downloaded files from the internet. Scanning files that our users have downloaded to check if they have any virus is the most important thing. IPS and Antivirus work in conjunction. It doesn't even cross the perimeter firewall to the inside.

View full review »
reviewer1399449 - PeerSpot reviewer
Network and Security Engineer at Information Technology Company

The most valuable features are the availability, the ease of checking current logs of blocks,  and the option to update the system easily. 

View full review »
it_user1399404 - PeerSpot reviewer
Business Analyst / Developer at a tech services company

The sandboxing feature: I like the entire process. It's one thing for it to detect, but another thing to have a remediation plan. It actually extracts out what we need to make it a clean file. 

View full review »
PD
Associate Consult at Atos

Most of EDR solutions which detect malware based on AI or ML. Check Point provides the most sophisticated attack vector information by combining these two. The forensic analysis gives detail information about host compromised how exact payload was executed and bots were communicating and how it prevents them.

Anti-ransomware createS a copy of your entire disk in case any suspicious activity founded then it automatically restored all files to its last backup file date so even after the system gets compromised by ransomware still we get hope to get all data safely.

View full review »
reviewer1375017 - PeerSpot reviewer
Senior Solution Architect at a comms service provider with 51-200 employees

Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum.

View full review »
PP
RSSI at SDIS49

The most valuable feature is security.

Check Point integrates well with other security products.

View full review »
JA
Owner and CEO at A.T.I.K. Maroc

One of my favorite features is the logging. The log journal is very descriptive in what it records about the traffic. It is a good way of tracking who comes in and who goes out of your network.

View full review »
JG
Owner at Giliam Network & System Solutions

The most valuable feature of this solution is the VPN.

View full review »
CM
Head of IT Director at Cosyn Limited

We used to have Fortigate, the firewall, and endpoints were only protected by an antivirus. We did not have threat management or ransomware protection. We upgraded to Check Point to get this kind of protection at the endpoint level. It covers firewall, availability, VPN, IP security, IPS, application control, URL filtering, antibot, antivirus, anti-spam, and sandblast threat emulation and extraction.

View full review »
seniorse527517 - PeerSpot reviewer
Senior Security Consultant - Checkpoint Technologies at a tech services company with 11-50 employees

The most valuable feature of Check Point Endpoint Security is the SandBlast Agent.

View full review »
Bala_Krishna - PeerSpot reviewer
Director at Rhinexa India Pvt Ltd.

The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature.

View full review »
MT
Operations Director at a tech services company with 1-10 employees

The most valuable features are the innovations that they release in every version. The end-user facilities for managing the tool are also good.

View full review »
Lead547e - PeerSpot reviewer
Lead at a financial services firm with 10,001+ employees
  • Certificate management
  • VPN
View full review »
reviewer1039464 - PeerSpot reviewer
Network Administrator at a healthcare company with 1,001-5,000 employees

The security is its most valuable feature.

Administratively, it's easy to control.

View full review »
NetworkAc063 - PeerSpot reviewer
Network Architect at Leprino Foods

Its ease of use is the most valuable feature. The interface board is also easy to use.

We had existing endpoints, and it was an easy upgrade process.  

View full review »
CP
Owner at a tech services company with 1-10 employees

Its ability to rollback anti-ransomware once an attack has started is the most valuable feature. 

View full review »
it_user5520 - PeerSpot reviewer
Network Manager at a manufacturing company with 501-1,000 employees
Endpoint security is a client-server managed network protection program. It blocks unauthorized software, malware, virus etc from entering the network and each client machine. Can be set up company specific to block specific file extensions or other devices from accessing the network. It provides updates based on server settings, can perform one network scan daily and can be set up to scan per client machine setting. Any machine that has the software installed on the network is protected by the endpoint security. Logs are created per client and machine settings. View full review »
it_user1068 - PeerSpot reviewer
Tech Support Staff at a tech company with 51-200 employees
Endpoint security protects networks from unauthorized programs, viruses and malware, and allows you to control the network by blocking devices that you do not want to have access to it, for example by file extensions or using the device’s ID.It also controls access and prevents theft of data by controlling access to storage devices that are portable. USB storage devices are also encrypted for security purposes.Centralized monitoring, logging and generation of reports and automatic protection of newly added computers to the network are other functions and capabilities of endpoint security. View full review »
reviewer1098015 - PeerSpot reviewer
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees

Check Point is easy to configure, and it detects many threats.

View full review »
reviewer1126782 - PeerSpot reviewer
Information Technology Security Engineer at a tech services company with 11-50 employees

The traditional anti-malware engine is valuable.

View full review »
reviewer2300304 - PeerSpot reviewer
Virtualization & Workplace Consultant at Outscope

Features like anti-ransomware help to identify behaviors such as file encryption or attempts, malware protection to protect from web browsing or email attachments, and patch management to deploy all patches from the vendors. 

It offers complete endpoint protection for all assets.

View full review »
Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,676 professionals have used our research since 2012.