Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs Cybereason Endpoint Detection & Response comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Protection Platform (EPP)
8th
Ranking in Endpoint Detection and Response (EDR)
9th
Average Rating
8.8
Reviews Sentiment
8.0
Number of Reviews
112
Ranking in other categories
No ranking in other categories
Cybereason Endpoint Detecti...
Ranking in Endpoint Protection Platform (EPP)
35th
Ranking in Endpoint Detection and Response (EDR)
25th
Average Rating
8.0
Reviews Sentiment
7.9
Number of Reviews
21
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Endpoint Detection and Response (EDR) category, the mindshare of Check Point Harmony Endpoint is 2.6%, down from 3.1% compared to the previous year. The mindshare of Cybereason Endpoint Detection & Response is 1.0%, down from 1.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR)
 

Featured Reviews

Alejandro Flores. - PeerSpot reviewer
Good visibility with cloud centralized management and several layers of security
There are some "weak points" that have to be mentioned, including: 1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents. 2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions. 3) You need a mature security team to manage this solution in order to get the most value from it.
Chad Kliewer - PeerSpot reviewer
We can make more informed decisions on whether an action is malicious
The ease of use and dashboards are improving. We came in at a time when they were developing a new dashboard screen. Therefore, we have had some confusing times between the old and new dashboards. Knowing how the new one works, I have seen vast improvements with it. While the product is very good, there are still some areas for improvement. The initial triage area could be a bit simpler. They get into the weeds real fast; it gets very detailed very fast. I am still looking for an easier triage layer on top with the ability to dig deeper. They are improving on this because I have seen some improvements in the user interface that helps with this. Part of it was moving two different screens into one, merging the two together. It is very good, but it is very technically detailed and would be harder for an entry-level person to decipher. However, improvements are being made. It leverages indicators of behavior to help us remediate faster against attacks. Sometimes, I wish there was more detail on why they consider it malicious.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most important characteristic of our requirements was the implementation of disk encryption."
"It's pretty complete for preventing threats to endpoints. Its capabilities are great."
"We're able to secure all endpoints and manage them from a single console."
"The most valuable feature is the integration with CheckPoint's firewalls. You can have one port, and follow the logs from both Endpoint and firewall security."
"The solution has good threat intelligence features."
"The zero-day threat prevention is excellent."
"It monitors data flow across the networking system to enhance comprehensive workflow infrastructure."
"The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options."
"The interface is user-friendly."
"What I like most about Cybereason Endpoint Detection & Response is the support because the support is good. The solution is also easy to use, and it has a dashboard. Everything is good, and there's no problem with it."
"The most valuable feature is the capability of the command used by the machine so that we see the kind of performance that is running."
"The initial setup process is straightforward."
"The initial setup is not overly complicated."
"We didn't have the visibility that we now have. It has increased our visibility by a lot. So, we put a lot more time into really looking at our environment and what is happening throughout our different networks. It has increased our visibility by around fivefold."
"Cybereason absolutely enables us to mitigate and isolate on the fly. Our managed detection response telemetry has dropped dramatically since we began using it. It's very top-of-mind. We were running some tabletop exercises and none of the detections were getting triggered by the managed security services provider. So we needed to find a solution that would trigger high-fidelity alerts. That was Cybereason and it dramatically changed our landscape from the detection and response perspective."
"What I find most valuable is the clarity of the platform."
 

Cons

"For the future, I would like to see maybe a content-filtering emulation feature in Harmony Endpoint."
"I think some work needs to be done to improve the integration with other third-party products, namely SIEM solutions."
"We know that Check Point has a very good database about threats even Check Point tries to make this EDR stable still there are some issues we were facing after upgrading or taking TAC to help its got resolved but Check Point really needs to work on metadata."
"Its guides are identical to the existing ones. These guides should be updated and they should improve their design."
"The remote deployment with Check Point Endpoint Security requires improvement. We have to depend on some of their deployment tools. I would like a system endpoint protection management tool or a remote deployment tool."
"There was a learning curve for our general population of employees (the user)."
"One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days."
"If you're using an endpoint that does not have sufficient resources, it would be very tough to use."
"Its Microsoft PowerShell protections still need some compatibility improvements. We have run across just a few. It is compatible with 90% of what we have in our network, but there is that 10% that we are still struggling with as far as compatibility with the type of PowerShell scripts needed to run our day-to-day business."
"The deployment on individual endpoints is more geared toward larger organizations. It might prove to be a bit too complicated for a smaller organization. You need to know what you're doing when you're deploying the sensor."
"I feel that the product lacks reporting features and needs improvement."
"It initially took some time to deploy."
"The product's reporting isn't great."
"The integration with Microsoft solutions and Microsoft capabilities needs to be improved."
"Ad hoc higher-level reporting to senior management can be improved or can be implemented. That's definitely an area of improvement that they need to focus on."
"I would like to see improvements on the operational side, specifically in grouping."
 

Pricing and Cost Advice

"In comparison to other software solutions available on the market, it comes at a higher price point."
"I rate the solution's pricing a five out of ten. It costs around ₱2,200 per endpoint."
"The tool’s cost has increased by almost 300% in two years."
"Initial monies replacing all AVs with a single product is about £10k."
"The solution is reasonable, but there are cheaper solutions out there."
"In addition to the standard licensing fees, there is a cost for support."
"Check Point Harmony Endpoint is cost effective."
"The cost is huge compared to other products that are available on market."
"We considered a few other solutions. Some were ridiculously overpriced, while others didn't have solutions for Mac endpoints. That was a deal-breaker because most of our organization is on Mac. It came down to two vendors: Cybereason and another. They had similar pitches and almost identical approaches, but in the end, Cybereason gave us the best value for our money."
"This product is somewhat expensive and should be cheaper."
"On a scale of one to ten, where one is cheap and ten is expensive, I rate the pricing an eight."
"I had to go through a third-party to purchase it, which I wasn't really pleased about."
"In terms of pricing, it's a good solution."
"Though it is not the cheapest solution but it fits our budget. We pay an annual licensing fee."
"I do not have experience with the licensing of the product."
"In terms of cost, this is a good choice for our needs."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
849,686 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Manufacturing Company
8%
Financial Services Firm
8%
Government
8%
Computer Software Company
17%
Financial Services Firm
11%
Manufacturing Company
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
The price for Check Point Harmony Endpoint ( /products/check-point-harmony-endpoint-reviews ) is good considering the services it offers. It is not expensive and provides comprehensive coverage.
What needs improvement with Check Point Harmony Endpoint?
One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days.
What is your experience regarding pricing and costs for Cybereason Endpoint Detection & Response?
Comparison with other products showed it be cheaper than some larger competitors. Set up cost for us were cheaper as we already had users experienced with the product in other business units. Initi...
What is your primary use case for Cybereason Endpoint Detection & Response?
We use it to improve detection in the whole industrial sector. We are a big energy company. Across multiple endpoints, we deploy the EDR to secure all, improve detection, and also attempt to automa...
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
Cybereason EDR, Cybereason Deep Detect & Respond
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Lockheed Martin, Spark Capital, DocuSign, Softbank Capital
Find out what your peers are saying about Check Point Harmony Endpoint vs. Cybereason Endpoint Detection & Response and other solutions. Updated: April 2025.
849,686 professionals have used our research since 2012.