Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs Elastic Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 23, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
6.9
Check Point Harmony Endpoint optimized security by reducing incidents, saving costs, improving resource allocation, and enhancing network safety.
Sentiment score
6.0
Elastic Security provides satisfactory ROI and cost savings, though users experience varied support levels and payback periods.
Initially, we spent two to three days on the investigation process, but now we are able to investigate alerts in only half a day, which has really boosted our performance and shown a return on investment.
Pre Sales Consultant at Redington Group
Now, the system automatically detects and isolates endpoints within minutes.
Administrador De Redes at a financial services firm with 501-1,000 employees
The product is affordable and provides excellent coverage and protection across multiple platforms.
Manager, Information Technology Cyber At Edeltech O & M at Ezom
It does not require hefty security budgets and can be deployed for enterprise security effectively.
Assistant Director at PTA
 

Customer Service

Sentiment score
7.0
Check Point Harmony Endpoint is praised for its responsive and knowledgeable customer support, with occasional delays noted.
Sentiment score
6.4
Elastic Security support is inconsistent; users favor community and documentation, while premium users seek more responsive and personalized help.
The customer support for Check Point Harmony Endpoint deserves a rating of 10.
Enterprise Network Engineer at a outsourcing company with 201-500 employees
We use premium support, and it is beneficial as 24/7 support is available.
Pre Sales Consultant at Redington Group
I have opened several cases and they were handled very efficiently and quickly.
Operations Engineer at a media company with 51-200 employees
Support is prompt and helpful.
Senior Cyber Security Manager at a tech services company with 11-50 employees
Most of the time when my team encounters issues, they receive responses within 24 hours.
Assistant Director at PTA
I have not faced any difficulties with Elastic Security, as we have a pretty good support service from them.
Chief Product Officer at ClusterPower
 

Scalability Issues

Sentiment score
7.8
Check Point Harmony Endpoint scales efficiently for any organization, but license availability and hardware needs might be challenging.
Sentiment score
7.3
Elastic Security offers scalable solutions adaptable to various environments, praised for flexibility and requiring careful planning for integration.
We initially purchased only 100 licenses and as we grew, we acquired many more licenses without encountering any issues.
Pre Sales Consultant at Redington Group
The single agent works for multiple operating systems and endpoint types, providing elastic growth and reducing the overall number of components.
Cloud Engineer at Interglobalmsp
Proactive features help guard against data breaches and vulnerabilities.
Adjunct Professor, Cybersecurity at University of the People
It allows us to think about specific use cases, such as gathering malicious IPs in a single view and analyzing threats based on geolocation.
Assistant Director at PTA
Elastic Security is quite scalable.
Chief Product Officer at ClusterPower
 

Stability Issues

Sentiment score
8.0
Check Point Harmony Endpoint is highly stable and reliable, maintaining security efficiently with minimal disruptions and regular updates.
Sentiment score
7.7
Elastic Security is generally stable and reliable but can face challenges with big data and requires careful configuration.
Check Point Harmony Endpoint is very stable in our experience, with few crashes or disruptions in daily use.
Networking and System Consultant at Orbcom,Lda.
The stability of the tool is high, as I have not experienced any downtime.
Manager, Information Technology Cyber At Edeltech O & M at Ezom
Occasionally, there are some backend issues where the tenant is down, but apart from that, Check Point Harmony Endpoint is stable and working effectively.
Pre Sales Consultant at Redington Group
In terms of stability, I would rate Elastic a solid eight out of ten.
Senior Cyber Security Manager at a tech services company with 11-50 employees
 

Room For Improvement

Check Point Harmony Endpoint needs improvements in compatibility, integration, UI, resource consumption, and user support, with better documentation and pricing.
Elastic Security needs improvements in authentication, usability, automation, scalability, integration, and pricing, with user-friendly dashboards and documentation.
Principally regarding the system performance, Check Point Harmony Endpoint impacts us significantly, and addressing this issue would make a substantial difference.
Operations Engineer at a media company with 51-200 employees
Extending that window would help security teams conduct deeper forensic investigations and meet compliance requirements more easily.
Cloud Support at a security firm with 51-200 employees
Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
Support at a security firm with 51-200 employees
CrowdStrike and Defender have more established threat intelligence integration due to having a larger client base.
Senior Cyber Security Manager at a tech services company with 11-50 employees
My security testing team continuously reports vulnerabilities, and we have to fix and update the versions frequently.
Assistant Director at PTA
Machine learning algorithms become better with time; as they ingest a huge volume of data, they become better.
Chief Product Officer at ClusterPower
 

Setup Cost

Check Point Harmony Endpoint offers flexible licensing with cost-effective packages, though pricing can be high for smaller organizations.
Elastic Security provides a free open-source option, competitive pricing, and subscription plans, appealing to cost-conscious enterprises.
It is not expensive and provides comprehensive coverage.
Manager, Information Technology Cyber At Edeltech O & M at Ezom
While the prices are higher than those of other solutions, the features justify the investment for customers.
Information Technology Engineer at ZAVASI TECHNOLOGIES PVT LTD
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
Technical Director at Geekz Information Technology
The pricing is reasonable, especially for Small Medium Enterprises (SMEs), making it a viable option for businesses building their security infrastructure.
Senior Cyber Security Manager at a tech services company with 11-50 employees
This is beneficial for SMEs as they do not need extensive budgets for security solutions.
Assistant Director at PTA
Elastic Security is considered cost-effective, especially at lower EPS levels.
Performance Practice Specialist at a local government with 10,001+ employees
 

Valuable Features

Check Point Harmony Endpoint excels in advanced threat prevention, ease of use, scalability, and comprehensive security features.
Elastic Security provides scalable, customizable threat response with fast search, real-time analysis, and strong community support for actionable insights.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
Cybersecurity Engineer at a tech services company with 11-50 employees
This feature is valuable for our customer because it stops threats before they reach users by scanning incoming files at the network gateway.
Cybersecurity Engineer at a tech services company with 11-50 employees
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
Technical Specialist at Softcell Technologies Limited
Elastic Security offers good insight regarding alerts, reports, and cases.
Senior Cyber Security Manager at a tech services company with 11-50 employees
Elastic Security offers advanced features such as machine learning and integration with ChatGPT.
Performance Practice Specialist at a local government with 10,001+ employees
We require rapid processing speed for alerts and event data, and Elastic Security is very efficient at handling this level of data.
Assistant Director at PTA
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
205
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Anti-Malware Tools (3rd)
Elastic Security
Ranking in Endpoint Detection and Response (EDR)
14th
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
66
Ranking in other categories
Log Management (8th), Security Information and Event Management (SIEM) (5th), Security Orchestration Automation and Response (SOAR) (5th), Extended Detection and Response (XDR) (8th)
 

Mindshare comparison

As of January 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Check Point Harmony Endpoint is 2.6%, down from 2.9% compared to the previous year. The mindshare of Elastic Security is 2.5%, up from 2.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Market Share Distribution
ProductMarket Share (%)
Check Point Harmony Endpoint2.6%
Elastic Security2.5%
Other94.9%
Endpoint Detection and Response (EDR)
 

Featured Reviews

GR
Support at a security firm with 51-200 employees
Remote Access Security Reinforced with Real-Time Device Protection
Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility. It would be helpful to tailor views for different roles, such as IT or security support. Regarding needed improvements, custom report building could be enhanced. Current reports are informative, and a drag-and-drop builder would allow teams to create tailored views for compliance, executive summaries, or operational metrics. For further improvements, enhancing threat simulation and testing would be valuable. Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
Laurentiu Popescu - PeerSpot reviewer
Chief Product Officer at ClusterPower
Has improved threat detection with deep log analysis and streamlined investigation workflows
The most useful features I find in Elastic Security are the forensic ones that allow us to carry deeper analysis into the logs for in-depth investigations, and the dashboards, with the reporting dashboard being quite user-friendly. Elastic Security is quite good at identifying threats, as it is part of the deep investigation tool that I mentioned before. Unless we need to look further into a certain log, we can carry out a deeper analysis and forensics on those particular logs. I can assess the impact of Elastic Security's real-time data analysis on our threat response efficiency as working pretty good. We are looking for real-time analysis because we have a continuous inflow of logs from different sources: from our cloud, from Active Directory, from our network. So it works pretty well.
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
880,745 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Manufacturing Company
9%
Outsourcing Company
7%
Comms Service Provider
6%
Computer Software Company
12%
Government
9%
Comms Service Provider
8%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business133
Midsize Enterprise69
Large Enterprise76
By reviewers
Company SizeCount
Small Business40
Midsize Enterprise11
Large Enterprise15
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Harmony Endpoint offered competitive pricing for small user counts such as thirty-f...
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint works well overall, but one area I would like to see improved is the reporting and dashboard experience. Sometimes the alerts are clear, but digging into historical dat...
Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good c...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because ...
What is your experience regarding pricing and costs for Elastic Security?
I am satisfied with the pricing, setup cost, and licensing cost. It is a pure 10.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent, Check Point Antivirus
Elastic SIEM, ELK Logstash
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Find out what your peers are saying about Check Point Harmony Endpoint vs. Elastic Security and other solutions. Updated: December 2025.
880,745 professionals have used our research since 2012.