Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs CompassOne by Blackpoint Cyber comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 14, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
205
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Anti-Malware Tools (3rd)
CompassOne by Blackpoint Cyber
Ranking in Endpoint Detection and Response (EDR)
34th
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
5
Ranking in other categories
Security Information and Event Management (SIEM) (36th), Vulnerability Management (41st), Application Control (9th), Managed Detection and Response (MDR) (10th)
 

Mindshare comparison

As of January 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Check Point Harmony Endpoint is 2.6%, down from 2.9% compared to the previous year. The mindshare of CompassOne by Blackpoint Cyber is 0.5%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Market Share Distribution
ProductMarket Share (%)
Check Point Harmony Endpoint2.6%
CompassOne by Blackpoint Cyber0.5%
Other96.9%
Endpoint Detection and Response (EDR)
 

Featured Reviews

GR
Support at a security firm with 51-200 employees
Remote Access Security Reinforced with Real-Time Device Protection
Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility. It would be helpful to tailor views for different roles, such as IT or security support. Regarding needed improvements, custom report building could be enhanced. Current reports are informative, and a drag-and-drop builder would allow teams to create tailored views for compliance, executive summaries, or operational metrics. For further improvements, enhancing threat simulation and testing would be valuable. Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
Gary Herbstman - PeerSpot reviewer
Owner at Byte Solutions Inc.
Experienced reduced alert fatigue with streamlined notifications
We use Blackpoint Cyber MDR for our higher-end clients who need a higher level of control over security I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real. This feature ensures that I am notified only…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Since deploying Check Point Harmony Endpoint, I have seen a clear reduction in security incidents, such as phishing and malware infections."
"I have found the Zero phishing and IPS features the most useful in Check Point Harmony Endpoint. Additionally, threat emulation sandboxing is effective."
"It gets regular updates of newly found threat signatures which keeps it updated."
"The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read."
"What I really appreciate about Check Point Harmony Endpoint is its integration with ThreatCloud AI, which is connected to more than 50 million endpoints globally and includes Harmony Browse, Next Generation Firewall, and CloudGuard."
"The most valuable features of the solution are web protection and threat prevention."
"The most valuable feature is forensics."
"The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry."
"I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real."
"On my end, the most valuable feature of this solution is that I can install it and forget about it. After that, their SOC team takes over and they only call me when there's a problem."
"The solution is all encompassing and can incorporate email monitoring."
"On a scale from one to ten, I would rate the overall solution as a ten."
"Their SOC is phenomenal in not monitoring and responding and taking action."
"I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real."
"The solution also watches over Microsoft 365 and keeps a copy of logs."
 

Cons

"While the platform is powerful, the user interface of Check Point Harmony Endpoint could be more intuitive for non-technical users."
"Performance and resource consumption should be reduced."
"I think the documentation for Check Point Harmony Endpoint is a little thin because it is not really intuitive."
"This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market."
"Check Point services and antivirus solutions can improve their customer offerings by offering various discounts in their subscription model and they can also reconsider their pricing model as well."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"Legacy VPNs and digital footprints should be minimized."
"There needs to be more internally connected systems in order to achieve real-time effectiveness."
"The solution does not tie into other EDR products like CyberArk or CrowdStrike but that might be more useful."
"Some texts seem to report items as normal too quickly."
"The interface could be more intuitive."
"The feature we keep asking for is a vulnerability scan."
"While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement."
"The interface could be more intuitive. More transparency is needed in the interface as a lot of details are hidden behind the scenes, making them difficult or impossible to access."
"While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement."
 

Pricing and Cost Advice

"The solution is reasonable, but there are cheaper solutions out there."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years."
"The price of Check Point Harmony Endpoint is comparable to SonicWall. The price could be a bit lower."
"Check Point Antivirus is a good solution, but it's a little costly."
"Check Point Harmony Endpoint's pricing is more competitive than any other vendor."
"We implement this solution with a yearly subscription and there are no extra costs."
"The price is good."
"The pricing is in line with other products."
"The pricing is reasonable."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
881,114 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Manufacturing Company
9%
Outsourcing Company
7%
Comms Service Provider
6%
Computer Software Company
12%
Healthcare Company
8%
Retailer
6%
Financial Services Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business133
Midsize Enterprise69
Large Enterprise76
No data available
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Harmony Endpoint offered competitive pricing for small user counts such as thirty-f...
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint works well overall, but one area I would like to see improved is the reporting and dashboard experience. Sometimes the alerts are clear, but digging into historical dat...
What needs improvement with Blackpoint Cyber MDR?
While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement.
What is your primary use case for Blackpoint Cyber MDR?
The solution serves as a baseline security offering. We have implemented it for every client that we do business with.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent, Check Point Antivirus
Blackpoint Cyber Managed Detection + Response, Blackpoint Cyber Managed Detection and Response
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
CoreRecon, Peerless Tech Solutions, Lorien Health
Find out what your peers are saying about Check Point Harmony Endpoint vs. CompassOne by Blackpoint Cyber and other solutions. Updated: December 2025.
881,114 professionals have used our research since 2012.