Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs Check Point Harmony Endpoint comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.9
Organizations benefit from BeyondTrust by enhancing security, achieving compliance, reducing costs, and integrating zero-trust for increased ROI.
Sentiment score
8.3
Organizations praise Check Point Harmony Endpoint for enhanced security, cost savings, improved performance, reduced alerts, and quick ROI.
Money saving is the main part because every organization tries to reduce their costs.
Initially, we spent two to three days on the investigation process, but now we are able to investigate alerts in only half a day, which has really boosted our performance and shown a return on investment.
The product is affordable and provides excellent coverage and protection across multiple platforms.
I have seen a return on investment with Check Point Harmony Endpoint, as it has saved money and time due to the minimum disruption of production hours, which allows users to focus on their main tasks and desired targets, avoiding downtime and contributing to business growth.
 

Customer Service

Sentiment score
7.1
BeyondTrust support is efficient and knowledgeable, yet experiences delay issues, especially in Asia-Pacific, affecting user satisfaction.
Sentiment score
7.5
Check Point Harmony Endpoint's support is knowledgeable and flexible but needs quicker response times and improved training.
Support is critical, especially when challenges arise related to PAM.
They offer support around the clock, and responses are generally quick.
BeyondTrust support is reliable.
We use premium support, and it is beneficial as 24/7 support is available.
While they handle simple issues quickly, resolution for more complex problems can take four to six months.
Only email support is available, leading to delays in getting assistance.
 

Scalability Issues

Sentiment score
7.5
BeyondTrust Endpoint Privilege Management offers seamless scalability and reliability for organizations of any size, ensuring efficient user asset management.
Sentiment score
8.7
Check Point Harmony Endpoint is scalable and adaptable, efficiently managing thousands of endpoints with a flexible, central management console.
The initial understanding of the environment is crucial, followed by a simple deployment process.
We initially purchased only 100 licenses and as we grew, we acquired many more licenses without encountering any issues.
Allowing us to add more users or endpoints for protection as our organization grows without any issues.
The scalability of Check Point Harmony Endpoint is effective, as it manages behaviors, process trees, and analysis in a centralized way.
 

Stability Issues

Sentiment score
7.6
Users commend BeyondTrust for stability and reliability, despite initial setup challenges and minor UI and integration issues.
Sentiment score
8.2
Check Point Harmony Endpoint is highly stable, reliable, and efficient, with minor backend issues and supports large-scale environments.
The appliances are stable, and there are no significant issues with backups or recovery.
The stability of the tool is high, as I have not experienced any downtime.
Check Point Harmony Endpoint is stable for our organization size of 1,000 to 10,000 members.
Occasionally, there are some backend issues where the tenant is down, but apart from that, Check Point Harmony Endpoint is stable and working effectively.
 

Room For Improvement

BeyondTrust Endpoint Privilege Management requires enhancements in security, integration, support, deployment, error management, pricing, and responsive customer service.
Check Point Harmony Endpoint needs compatibility improvements, streamlined deployment, better support, and optimized performance, especially for older systems.
The ability to view recorded live sessions of specific users is a crucial benefit.
There is a need for better MQ integration with DevOps and improvements in architecture.
This product is highly ranked on Gartner, Peers, and other review sites.
Better technical support would enhance the product's competitiveness.
High resource consumption, requiring high-performance PCs on our endpoint site.
The Endpoint Agent can be more lightweight so that older machines and laptops can easily handle its consumption.
 

Setup Cost

BeyondTrust Endpoint Privilege Management is seen as expensive due to licensing complexities and additional costs, especially for Mac clients.
Check Point Harmony Endpoint is valued for robust security and flexible licensing, though perceived as costly by some users.
If a solution fits a customer's budget, considerations must be made that it may not have all the features of more expensive solutions.
It is not expensive and provides comprehensive coverage.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
My experience with pricing, setup costs, and licensing reveals that while it is a bit higher than previous SMB devices, the pricing is worth it for what we are getting in terms of protection and features.
 

Valuable Features

BeyondTrust enhances security with privilege management, integration, session recording, and is valued for ease of use and scalability.
Check Point Harmony Endpoint offers centralized management, enhancing security and efficiency with robust protection, integration, and scalability features.
Another important aspect is the ability to move the solution to the cloud or install it on-premises, offering my customers flexibility.
When any unauthorized user makes an attempt, it notifies the administrators.
Administrators need a tool that provides visibility and clarity about endpoint management within the organization.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features.
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
31
Ranking in other categories
Privileged Access Management (PAM) (8th), Anti-Malware Tools (14th)
Check Point Harmony Endpoint
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
119
Ranking in other categories
Endpoint Protection Platform (EPP) (6th), Endpoint Detection and Response (EDR) (8th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. BeyondTrust Endpoint Privilege Management is designed for Privileged Access Management (PAM) and holds a mindshare of 3.8%, down 5.2% compared to last year.
Check Point Harmony Endpoint, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 2.2% mindshare, down 2.9% since last year.
Privileged Access Management (PAM)
Endpoint Protection Platform (EPP)
 

Featured Reviews

Md Abdul Hakim - PeerSpot reviewer
Offers solid performance and user adaptability but needs better pricing options and local support
BeyondTrust is a strong, compliance-driven solution with excellent market recognition (Gartner, Peers, etc.), making it appealing for Bangladeshi enterprises. However, some key improvements could accelerate adoption: Areas for Improvement: Pricing & Local Affordability While the product’s capabilities justify its value, cost remains a barrier for many Bangladeshi organizations. Competitive pricing or regional discounts would make it more accessible. Local Support & Partnerships Currently, lack of local partners or trainers creates delays in support, implementation, and pricing negotiations. Establishing a Bangladesh-based support team or authorized resellers would improve responsiveness and trust. Enhanced Onboarding & Training Offering localized training programs (in Bengali/English) and documentation would help IT teams deploy and manage the solution more efficiently. Recommendations for Next Release: Introduce tiered pricing for emerging markets like Bangladesh. Develop a partner network in Bangladesh for faster service and sales. Add simplified dashboards for easier monitoring by non-technical staff. Final Note: BeyondTrust is already a top-tier PAM solution, but addressing these gaps would solidify its leadership in Bangladesh’s growing cybersecurity market.
Nasseer Qureshi - PeerSpot reviewer
Comprehensive defensive features boost daily protection and efficiency
I see a need for improvement especially in policy management and policy customization with Check Point Harmony Endpoint. As a new user, I find it somewhat difficult to customize and apply policies due to the various options available. I would appreciate improvement in fine-tuning those policies and integrating with other tools, such as being able to send logs from Check Point to our SIM or syslog solution. The user interface is good, and I really appreciate it, but improvements are needed in policy customization and integration with third-party products. Additionally, I would prefer to see a mechanism to send agents directly from the console to an endpoint during installation.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
857,162 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
14%
Manufacturing Company
10%
Government
7%
Computer Software Company
17%
Manufacturing Company
8%
Financial Services Firm
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
Setup costs vary depending on the scenario. Sometimes we win orders, and other times we lose due to partner preferences or deal scenarios. Customers may negotiate on price, understanding that quali...
What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing, setup costs, and licensing reveals that while it is a bit higher than previous SMB devices, the pricing is worth it for what we are getting in terms of protection and fe...
What needs improvement with Check Point Harmony Endpoint?
Regarding improvements for Check Point Harmony Endpoint, I note that I am using the 1600 versions of the Quantum Spark, and certain options are not available in the dashboard; thus, I selected this...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: June 2025.
857,162 professionals have used our research since 2012.