No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Harmony Endpoint vs CompassOne by Blackpoint Cyber comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 15, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Check Point Harmony Endpoint
Ranking in Endpoint Detection and Response (EDR)
7th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
202
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Anti-Malware Tools (3rd)
CompassOne by Blackpoint Cyber
Ranking in Endpoint Detection and Response (EDR)
38th
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
5
Ranking in other categories
Security Information and Event Management (SIEM) (38th), Vulnerability Management (45th), Application Control (10th), Managed Detection and Response (MDR) (10th)
 

Mindshare comparison

As of May 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.4%, down from 4.0% compared to the previous year. The mindshare of Check Point Harmony Endpoint is 2.2%, down from 2.7% compared to the previous year. The mindshare of CompassOne by Blackpoint Cyber is 0.8%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.4%
Check Point Harmony Endpoint2.2%
CompassOne by Blackpoint Cyber0.8%
Other93.6%
Endpoint Detection and Response (EDR)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
GR
Support at a security firm with 51-200 employees
Remote Access Security Reinforced with Real-Time Device Protection
Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility. It would be helpful to tailor views for different roles, such as IT or security support. Regarding needed improvements, custom report building could be enhanced. Current reports are informative, and a drag-and-drop builder would allow teams to create tailored views for compliance, executive summaries, or operational metrics. For further improvements, enhancing threat simulation and testing would be valuable. Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
Gary Herbstman - PeerSpot reviewer
Owner at Byte Solutions Inc.
Experienced reduced alert fatigue with streamlined notifications
We use Blackpoint Cyber MDR for our higher-end clients who need a higher level of control over security I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real. This feature ensures that I am notified only…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has a higher cost than other solutions, like CrowdStrike or Microsoft’s EDR tools, but it reduces the cost of our operations because it’s a new generation antivirus tool."
"It can automatically correlate events and logs, which is very helpful for an IT administrator. It can correlate different kinds of malware activities over a network, agent, or host system. You do not need to do it manually. It is a good feature. It is also a user-friendly solution. We have deployed it on the cloud because our space does not provide any flexibility for on-premises deployment, but Palo Alto has added some flexibility to install it on-premises. It must be like the same Cortex XDR agent for all the VPN services, web filtering services, and everything else."
"Cortex is the best tool for endpoint detection, with playbooks that automate and gather endpoint logs, block malicious processes, and update incident tickets, showcasing end-to-end processes with automation in investigation and reducing the analysis workflow."
"Has great threat detection capabilities."
"Its interface and pricing are most valuable. It is better than other vendors in terms of security."
"It's very stable. I've never experienced downtime for the ASM console or ASM core."
"The multi-layered approach to the product gives you confidence that it will stop exploits, ransomware, worms, or viruses from compromising endpoints, essentially providing peace of mind."
"After installing this solution, it identified, blocked, and provided the complete attack chain, which was very helpful."
"It was probably one of the easiest products I've ever had to deploy, and I set it up and deployed it all from a mobile phone on a beach in about 20 minutes."
"We upgraded to Check Point to get this kind of protection at the endpoint level, and it covers firewall, availability, VPN, IP security, IPS, application control, URL filtering, antibot, antivirus, anti-spam, and SandBlast threat emulation and extraction."
"Check Point Antivirus goes in-depth and looks for threats and malware - including phishing attempts."
"The rollout and management of devices were very simple."
"The forensics allows us to search retrospectively for an URL or file opened by users, for example, when you need to quickly check who else has clicked on a phishing link."
"The best features that Check Point Harmony Endpoint offers are the central management and its ThreatCloud intelligence that provides good protection from threats and real-time updates on new threat attacks worldwide."
"In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations."
"Check Point Endpoint Security really helped the business stop various malware attacks throughout the time we used it, including a ransomware attack, which was stopped in minutes."
"On my end, the most valuable feature of this solution is that I can install it and forget about it. After that, their SOC team takes over and they only call me when there's a problem."
"Their SOC is phenomenal in not monitoring and responding and taking action."
"The solution also watches over Microsoft 365 and keeps a copy of logs."
"I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real."
"I appreciate that there are people behind the scenes sorting out valuable alerts from those that are not, so I only get alerts when they are real."
"The solution is all encompassing and can incorporate email monitoring."
"On a scale from one to ten, I would rate the overall solution as a ten."
 

Cons

"The solution should offer more dashboards and they should be better customized."
"It automatically detects security issues. It should be able to protect our network devices while operating autonomously."
"When it comes to malware files, it should be a little quick because, at times, it would give a wrong result in the sense of what it might be on malware, even if it still might be a normal one."
"When it comes to core analysis, and security analysis, Cortex needs to provide more information."
"Cortex XDR could be improved with more GUI features."
"The solution could improve by providing better integration with their own products and others."
"We would also like to have advanced tech protection and email scanning."
"Cortex XDR could improve its sales support team, including better commission structures and referral programs."
"It gives you an alert for malicious sites, which, after searching on the Google database, don't come out to be the same."
"There needs to be compatibility with the most recent versions of the various operating systems."
"Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle."
"The antivirus could be improved in terms of the resources it consumes, particularly regarding CPU and memory usage. We've encountered issues with some of our firewalls, leading us to turn off the antivirus feature due to its heavy resource consumption."
"A couple of times, we experienced some sales issues."
"The integration challenges with Check Point Harmony Endpoint involve needing support with other third-party applications that I wish it worked with more seamlessly."
"While using Check Point Harmony Endpoint, I find that the initial deployment can be a bit complex, especially for large or distributed environments, requiring proper planning and familiarity with the Check Point ecosystem."
"There could be more additions to the compatible systems and applications for integration purposes."
"The solution does not tie into other EDR products like CyberArk or CrowdStrike but that might be more useful."
"While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement."
"The interface could be more intuitive."
"The interface could be more intuitive. More transparency is needed in the interface as a lot of details are hidden behind the scenes, making them difficult or impossible to access."
"While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a beneficial improvement."
"The feature we keep asking for is a vulnerability scan."
"Some texts seem to report items as normal too quickly."
 

Pricing and Cost Advice

"When we first bought it, it was a bit expensive, but it was worth it. The licensing was straightforward."
"The return on investment is from the user side because we have seen the performance of it increase the delivery time of the product if we are using too many web-based and on-premise applications. In indirect ways, we saw the return of investment in terms of performance and user satisfaction increase."
"It's about $55 per license on a yearly basis."
"Cortex XDR by Palo Alto Networks is an expensive solution."
"It is present, but when compared to other competitive products, I would say it is not less expensive; however, when all of the other added values are considered, the price is reasonable."
"The price of the solution is high for the license and in general."
"It has reasonable pricing for the use cases it provides to the company."
"This is an expensive solution."
"The product is averagely priced. The product price is neither very high nor too low. The tool is not really expensive."
"We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it."
"Price-wise, the product is affordable. There are no additional costs apart from the licensing charges that are attached to the product."
"The pricing is reasonable."
"I bought them for 12 months and I genuinely cannot remember what I paid for them. I think it's about 100 pounds per user per year, so about 10 pounds a month per person."
"I rate the product price a four on a scale of one to ten, where one is low, and ten is high."
"The pricing is very expensive. You need to buy the appliance and subscription as well."
"There are three different licensing models including basic, advanced, and complete, and it needs to be selected according to the endpoint."
"The pricing is in line with other products."
"The pricing is reasonable."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
893,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Computer Software Company
9%
Financial Services Firm
9%
Outsourcing Company
8%
Manufacturing Company
8%
Computer Software Company
11%
Financial Services Firm
8%
Outsourcing Company
7%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business46
Midsize Enterprise20
Large Enterprise49
By reviewers
Company SizeCount
Small Business135
Midsize Enterprise68
Large Enterprise75
No data available
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Har...
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint works well overall, but one area I would like to see improved is the reporting and dashb...
What is your primary use case for Check Point Harmony Endpoint?
Check Point Harmony Endpoint helps to secure our devices as my main use case for this product. When users need to acc...
What needs improvement with Blackpoint Cyber MDR?
While I am very satisfied with the service, supporting additional platforms, particularly Linux support, would be a b...
What is your primary use case for Blackpoint Cyber MDR?
The solution serves as a baseline security offering. We have implemented it for every client that we do business with.
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent, Check Point Antivirus
Blackpoint Cyber Managed Detection + Response, Blackpoint Cyber Managed Detection and Response
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
CoreRecon, Peerless Tech Solutions, Lorien Health
Find out what your peers are saying about Check Point Harmony Endpoint vs. CompassOne by Blackpoint Cyber and other solutions. Updated: April 2026.
893,311 professionals have used our research since 2012.