We performed a comparison between Check Point Harmony Endpoint and Trellix Endpoint Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. The solution is praised for its forensic analysis and VPN connectivity. Trellix Endpoint Security is highly valued for its easy administration options and reliability. Users say Check Point could improve its endpoint vulnerability management and threat-hunting features. Reviews suggest that Trellix could reduce resource consumption and improve user-friendliness.
Service and Support: While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement. Some users have found the support for Trellix Endpoint Security helpful and reliable, while others have encountered ineffective assistance and communication problems.
Ease of Deployment: Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades. The setup process for Trellix Endpoint Security varies in difficulty, depending on the user's experience with McAfee and general technical expertise.
Pricing: Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower. Some find Trellix’s price reasonable and competitive, while others feel there is room for improvement.
ROI: Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow. Trellix Endpoint Security provides significant time savings.
"The setup is pretty simple."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"The product detects and blocks threats and is more proactive than firewalls."
"NGAV and EDR features are outstanding."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"It is very easy to set up. I would rate my experience with the initial setup a ten out of ten, with ten being very easy to set up."
"In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations."
"We love the reports and monitoring they provide."
"The most valuable feature of Check Point Harmony Endpoint is it can be used for all kinds of endpoints, including mobile phones."
"I have found the Zero phishing and IPS features the most useful in Check Point Harmony Endpoint. Additionally, threat emulation sandboxing is effective."
"The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry."
"One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users machine. This is a very valuable feature of this solution."
"It is minimally invasive. From a single installer, the equipment is protected and secured."
"It has extended OS support to ensure your legacy endpoints also have zero-day protection."
"This is a good solution for antivirus and malware protection."
"It has improved my organization because it helps with visibility, in terms of security. We can see the actual attack and can contain it. The antivirus can detect that."
"Threat prevention is valuable because most clients use other solutions like antivirus as part of web protection. I don't find that kind of solution useful."
"Technical support is always available and very helpful."
"It can be deployed quickly, and it's scalable. Those are the two advantages of it."
"The most valuable features are reporting from the ePO console and the advanced threat protection (ATP)."
"The solution is stable."
"The package of protection that it provides is useful. It has antivirus, malware protection, VPN, and a whole bunch of other features."
"It takes about two business days for initial support, which is too slow in urgent situations."
"I haven't seen the use of AI in the solution."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"The only minor concern is occasional interference with desired programs."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"The solution is not stable."
"The solution should address emerging threats like SQL injection."
"We have observed some policies are not working as expected."
"There was a learning curve for our general population of employees (the user)."
"The remote deployment with Check Point Endpoint Security requires improvement. We have to depend on some of their deployment tools. I would like a system endpoint protection management tool or a remote deployment tool."
"An additional feature I would like to see involves the VPN."
"Sometimes the portal loads slowly which should be improved."
"There needs to be compatibility with the most recent versions of the various operating systems."
"The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis."
"They could improve memory consumption."
"The local technical support could be better."
"McAfee GW Security and McAfee Child Safety need some improvement as they are relatively new."
"Every time we open a ticket with McAfee, their response differs and they are not consistent."
"The software download features could stand improvement."
"The vendor should simplify the way they bundle the products because it's very hard to explain to customers what products contain which features."
"There are two main areas that require improvement. One is the size of the packages. Although I'll admit manageability is good, if I want to deploy, let's say just the antivirus or just the firewall, each of those package sizes are quite large. They are sometimes as big as 200MB or 250MB. When I have operations in remote areas where connectivity is always poor, it's difficult. To deploy such a package in a remote location over the internet or something like that is always challenging."
"There are certain shortcomings in the features concerning DLP in Trellix, where certain additions must be made in the future."
"We would like to see all the features available on cloud."
Check Point Harmony Endpoint is ranked 8th in EPP (Endpoint Protection for Business) with 99 reviews while Trellix Endpoint Security is ranked 12th in EPP (Endpoint Protection for Business) with 94 reviews. Check Point Harmony Endpoint is rated 8.8, while Trellix Endpoint Security is rated 8.0. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Trellix Endpoint Security writes "Good user behavioral analysis and helpful patching but needs better support services". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Trellix Endpoint Security is most compared with Trellix Endpoint Security (ENS), Microsoft Defender for Endpoint, CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and Cisco Secure Endpoint. See our Check Point Harmony Endpoint vs. Trellix Endpoint Security report.
See our list of best EPP (Endpoint Protection for Business) vendors.
We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.