Check Point Harmony Endpoint and Comodo Advanced Endpoint Protection are advanced security solutions designed to protect endpoints from threats. Users are generally more satisfied with Check Point Harmony Endpoint's overall performance and customer service, while Comodo Advanced Endpoint Protection is praised more for its extensive features despite requiring higher expenditures.
Features: Check Point Harmony Endpoint impresses users with strong detection capabilities, intuitive management, and straightforward deployment. Comodo Advanced Endpoint Protection receives high marks for comprehensive threat containment, malware protection, and robust threat intelligence.
Room for Improvement: Users of Check Point Harmony Endpoint note the need for better integration with third-party applications, enhanced reporting capabilities, and improved mobile support. Comodo Advanced Endpoint Protection users desire a simpler configuration, streamlined updates, and a more user-friendly interface.
Ease of Deployment and Customer Service: Check Point Harmony Endpoint is appreciated for its straightforward deployment and responsive customer support. Comodo Advanced Endpoint Protection, although providing robust deployment options, may involve a steeper learning curve, but it is known for excellent customer service.
Pricing and ROI: Check Point Harmony Endpoint is often regarded as offering good value with reasonable setup costs and solid ROI. Comodo Advanced Endpoint Protection, while viewed as more expensive, is perceived to justify the cost with high-level protection and ROI.
Initially, we spent two to three days on the investigation process, but now we are able to investigate alerts in only half a day, which has really boosted our performance and shown a return on investment.
The product is affordable and provides excellent coverage and protection across multiple platforms.
I have seen a return on investment with Check Point Harmony Endpoint, as it has saved money and time due to the minimum disruption of production hours, which allows users to focus on their main tasks and desired targets, avoiding downtime and contributing to business growth.
We use premium support, and it is beneficial as 24/7 support is available.
While they handle simple issues quickly, resolution for more complex problems can take four to six months.
Only email support is available, leading to delays in getting assistance.
Customer support is generally satisfactory but could be improved, especially in terms of response time.
We initially purchased only 100 licenses and as we grew, we acquired many more licenses without encountering any issues.
Allowing us to add more users or endpoints for protection as our organization grows without any issues.
The scalability of Check Point Harmony Endpoint is effective, as it manages behaviors, process trees, and analysis in a centralized way.
The stability of the tool is high, as I have not experienced any downtime.
Check Point Harmony Endpoint is stable for our organization size of 1,000 to 10,000 members.
Occasionally, there are some backend issues where the tenant is down, but apart from that, Check Point Harmony Endpoint is stable and working effectively.
The stability of Comodo Advanced Endpoint Protection is rated at ninety-five to ninety-seven percent.
Better technical support would enhance the product's competitiveness.
High resource consumption, requiring high-performance PCs on our endpoint site.
The Endpoint Agent can be more lightweight so that older machines and laptops can easily handle its consumption.
Comodo Advanced Endpoint Protection could improve by extending its auto containment feature to Mac and Linux systems since it currently only supports Windows.
It is not expensive and provides comprehensive coverage.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
My experience with pricing, setup costs, and licensing reveals that while it is a bit higher than previous SMB devices, the pricing is worth it for what we are getting in terms of protection and features.
Pricing is competitive and considered average compared to other solutions.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features.
It includes an auto containment feature, ensuring files and folders remain secure.
Check Point Harmony Endpoint integrates security solutions, allowing comprehensive protection against cyber threats. It's designed to suit enterprise-scale operations with robust features for threat prevention and management.
Check Point Harmony Endpoint offers advanced security capabilities that prioritize threat analysis, detection, and prevention. Tailored for professional environments, it provides tools to handle endpoint vulnerabilities effectively. Its user-centric design ensures that IT teams can manage network security with streamlined operations. Continuous updates and threat intelligence are offered to counter emerging threats, and its deployment is optimized for ease of use.
What are the key features of Check Point Harmony Endpoint?In specific industries like finance and healthcare, Check Point Harmony Endpoint is deployed to secure sensitive data and protect against sector-specific threats. Its flexibility allows adaptation to meet industry standards, ensuring critical infrastructures maintain operational security without hindrance.
Comodo Advanced Endpoint Protection (AEP) delivers patent-pending auto-containment, where unknown executables and other files that request runtime privileges are automatically run in a virtual contain that does not have access to the host system's resources or user data.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.