We performed a comparison between Check Point Harmony Endpoint and Elastic Security based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"The most valuable feature is the analysis, because of the beta structure."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"The product's initial setup phase is very easy."
"It is stable and scalable."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"Forensics is a valuable feature of Fortinet FortiEDR."
"Check Point Endpoint Security really helped the business stop various malware attacks throughout the time we used it, including a ransomware attack, which was stopped in minutes."
"The dashboard is user-friendly and easy to understand."
"The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers."
"The most valuable feature of this solution is the VPN."
"It's a scalable product as it is a cloud offering."
"The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry."
"It is minimally invasive. From a single installer, the equipment is protected and secured."
"The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets."
"Elastic Security is very customizable, and the dashboards are very easy to build."
"The solution is compatible with the cloud-native environment and they can adapt to it faster."
"The visualization is very good."
"The stability of the solution is good."
"The most valuable features of the solution are the prevention methods and the incident alerts."
"Elastic Security is very easy to adapt."
"The most valuable features of Elastic Security are it is open-source and provides a high level of security."
"Stability-wise, I rate the solution a ten out of ten."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"The solution is not stable."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"The only minor concern is occasional interference with desired programs."
"Cannot be used on mobile devices with a secure connection."
"I think cloud security and SASE are areas of concern in the product where improvements are required. The tool's cloud version has to be improved in terms of the security it offers."
"The network monitoring features must be improved."
"It gives you an alert for malicious sites, which, after searching on the Google database, don't come out to be the same."
"A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings."
"The solution has limitations if it's hosted on-prem or as a SaaS."
"They could improve memory consumption."
"A couple of times, we experienced some sales issues."
"As I understand there will be a URL filtering feature included with the browser agent in the future. This will allow URL filtering without the need for a Gateway Device. This is something I am looking forward to and would be a great addition to list of features."
"I would like to see is this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses."
"The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there."
"We're using the open-source edition, for now, I think maybe they can allow their OLED plugin to be open source, as at the moment it is commercialised."
"Elastic Security's maintenance is hard and its scalability is a challenge. There are complications in scaling and upgrading. The solution needs to also provide periodic upgrade checks."
"Upgrades currently released as stacks when it should be a plugin or an extension to save removal and reinstallation."
"This solution cannot do predictive maintenance, so we have to build our own modules for doing it."
"With Elastic Security, the challenge arises from the fact that there is a learning curve in relation to queries and understanding the query language provided to extract usable data."
"Elastic has one problem. In the past, Elastic Security was free. Now, they currently only offer the basic license or a certain period of time."
"The training that is offered for Elastic is in need of improvement because there is no depth to it."
Check Point Harmony Endpoint is ranked 7th in Endpoint Detection and Response (EDR) with 101 reviews while Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 58 reviews. Check Point Harmony Endpoint is rated 8.8, while Elastic Security is rated 7.6. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint. See our Check Point Harmony Endpoint vs. Elastic Security report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.