Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs Check Point Harmony Endpoint comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.9
BeyondTrust ensures compliance and security, improving ROI, particularly during transitions to zero-trust models on platforms like Azure.
Sentiment score
8.3
Organizations praise Check Point Harmony Endpoint for enhanced security, cost savings, improved performance, reduced alerts, and quick ROI.
Initially, we spent two to three days on the investigation process, but now we are able to investigate alerts in only half a day, which has really boosted our performance and shown a return on investment.
The product is affordable and provides excellent coverage and protection across multiple platforms.
I have seen a return on investment with Check Point Harmony Endpoint, as it has saved money and time due to the minimum disruption of production hours, which allows users to focus on their main tasks and desired targets, avoiding downtime and contributing to business growth.
 

Customer Service

Sentiment score
7.1
BeyondTrust's support is efficient with quick resolutions, though timezone delays and escalations can sometimes slow responses.
Sentiment score
7.5
Check Point Harmony Endpoint's support is knowledgeable and flexible but needs quicker response times and improved training.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
We use premium support, and it is beneficial as 24/7 support is available.
While they handle simple issues quickly, resolution for more complex problems can take four to six months.
Only email support is available, leading to delays in getting assistance.
 

Scalability Issues

Sentiment score
7.4
BeyondTrust Endpoint Privilege Management efficiently supports up to 100,000 devices, praised for scalability, reliability, and seamless expansion.
Sentiment score
8.7
Check Point Harmony Endpoint is scalable and adaptable, efficiently managing thousands of endpoints with a flexible, central management console.
The initial understanding of the environment is crucial, followed by a simple deployment process.
We initially purchased only 100 licenses and as we grew, we acquired many more licenses without encountering any issues.
Allowing us to add more users or endpoints for protection as our organization grows without any issues.
The scalability of Check Point Harmony Endpoint is effective, as it manages behaviors, process trees, and analysis in a centralized way.
 

Stability Issues

Sentiment score
7.6
BeyondTrust Endpoint Privilege Management is stable and reliable, with minor issues, often attributed to user environments rather than the system.
Sentiment score
8.2
Check Point Harmony Endpoint is highly stable, reliable, and efficient, with minor backend issues and supports large-scale environments.
The appliances are stable, and there are no significant issues with backups or recovery.
The stability of the tool is high, as I have not experienced any downtime.
Check Point Harmony Endpoint is stable for our organization size of 1,000 to 10,000 members.
Occasionally, there are some backend issues where the tenant is down, but apart from that, Check Point Harmony Endpoint is stable and working effectively.
 

Room For Improvement

BeyondTrust needs UI, integration, and support improvements, streamlined deployment, simpler licensing, AI expansion, and better documentation.
Check Point Harmony Endpoint needs compatibility improvements, streamlined deployment, better support, and optimized performance, especially for older systems.
The ability to view recorded live sessions of specific users is a crucial benefit.
There is a need for better MQ integration with DevOps and improvements in architecture.
Better technical support would enhance the product's competitiveness.
High resource consumption, requiring high-performance PCs on our endpoint site.
The Endpoint Agent can be more lightweight so that older machines and laptops can easily handle its consumption.
 

Setup Cost

BeyondTrust Endpoint Privilege Management is costly yet feature-rich, with varied licensing and setup costs across different platforms.
Check Point Harmony Endpoint is valued for robust security and flexible licensing, though perceived as costly by some users.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
It is not expensive and provides comprehensive coverage.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
My experience with pricing, setup costs, and licensing reveals that while it is a bit higher than previous SMB devices, the pricing is worth it for what we are getting in terms of protection and features.
 

Valuable Features

BeyondTrust offers robust security through Privilege Management, integration with other platforms, and ease of cloud or on-premises implementation.
Check Point Harmony Endpoint offers centralized management, enhancing security and efficiency with robust protection, integration, and scalability features.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
Administrators need a tool that provides visibility and clarity about endpoint management within the organization.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features.
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
30
Ranking in other categories
Privileged Access Management (PAM) (8th), Anti-Malware Tools (14th)
Check Point Harmony Endpoint
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
119
Ranking in other categories
Endpoint Protection Platform (EPP) (6th), Endpoint Detection and Response (EDR) (8th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. BeyondTrust Endpoint Privilege Management is designed for Privileged Access Management (PAM) and holds a mindshare of 3.8%, down 5.2% compared to last year.
Check Point Harmony Endpoint, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 2.2% mindshare, down 2.8% since last year.
Privileged Access Management (PAM)
Endpoint Protection Platform (EPP)
 

Featured Reviews

Prashant Uppuluri - PeerSpot reviewer
Provides critical application control and ensures security with a flexible setup process
Regarding the feedback scenario, it's a tough question as I have thoroughly gone through the entire partner portal and library of BeyondTrust, as well as BeyondTrust University. I have also interacted with support whenever a ticket is raised, ranging from P1 to P3 or P2. Most end users and partners seem happy and content with BeyondTrust. The deployment of the solution is generally easy, flexible, and scalable. However, it can be challenging in certain environments, especially regarding management. Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users. In some cases of competition, I have noted specific use cases where the recording of sessions was an endpoint for BeyondTrust, providing an edge for higher management. The ability to view recorded live sessions of specific users is a crucial benefit.
Alejandro Flores. - PeerSpot reviewer
Good visibility with cloud centralized management and several layers of security
There are some "weak points" that have to be mentioned, including: 1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents. 2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions. 3) You need a mature security team to manage this solution in order to get the most value from it.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
854,338 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
14%
Manufacturing Company
10%
Government
7%
Computer Software Company
17%
Financial Services Firm
8%
Manufacturing Company
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
Setup costs vary depending on the scenario. Sometimes we win orders, and other times we lose due to partner preferences or deal scenarios. Customers may negotiate on price, understanding that quali...
What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
We purchased Check Point directly from Check Point. We are partners. We didn't purchase it from the AWS marketplace.
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint poses a steep learning curve and has high resource consumption, requiring high-performance PCs on our endpoint site.
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: May 2025.
854,338 professionals have used our research since 2012.