Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs OpenText EnCase eDiscovery comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Endpoint
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
205
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Anti-Malware Tools (3rd), Endpoint Detection and Response (EDR) (6th)
OpenText EnCase eDiscovery
Average Rating
7.8
Reviews Sentiment
7.7
Number of Reviews
8
Ranking in other categories
eDiscovery (12th)
 

Mindshare comparison

Check Point Harmony Endpoint and OpenText EnCase eDiscovery aren’t in the same category and serve different purposes. Check Point Harmony Endpoint is designed for Endpoint Protection Platform (EPP) and holds a mindshare of 2.2%, down 2.7% compared to last year.
OpenText EnCase eDiscovery, on the other hand, focuses on eDiscovery, holds 3.1% mindshare, up 3.1% since last year.
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
Check Point Harmony Endpoint2.2%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.7%
Other83.3%
Endpoint Protection Platform (EPP)
eDiscovery Market Share Distribution
ProductMarket Share (%)
OpenText EnCase eDiscovery3.1%
Microsoft Purview eDiscovery9.8%
kCura Relativity5.5%
Other81.6%
eDiscovery
 

Featured Reviews

GR
Support at a security firm with 51-200 employees
Remote Access Security Reinforced with Real-Time Device Protection
Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility. It would be helpful to tailor views for different roles, such as IT or security support. Regarding needed improvements, custom report building could be enhanced. Current reports are informative, and a drag-and-drop builder would allow teams to create tailored views for compliance, executive summaries, or operational metrics. For further improvements, enhancing threat simulation and testing would be valuable. Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
Alejandro Stromer - PeerSpot reviewer
Director Consulting SAP OpenText en Entelgy at DCL Consultores EIM SL
A stable and scalable hybrid solution with easy setup
The solution is scalable. It has three levels. You have the presentation area that can be escalated to the balance sheet. You have the back-end area that can be escalated using higher viability to configure more application servers. Also, the area of storage can be increased. We usually cater to enterprise solutions but have small- and medium-sized customers. It starts with 25 users and goes up to 100s and 1000s.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Check Point Harmony Endpoint has positively impacted our organization by significantly improving our security posture, especially for remote and hybrid users."
"The reporting feature where we can see and monitor what happened on our client computers is useful."
"Check Point Harmony Endpoint has positively impacted the organization by allowing policies to be configured and enforced from the central console, eliminating the need to manage multiple branches separately."
"It is one of the fastest malware prevention software with advanced upgrades to have 360-degree threat detection and system remediation."
"The most valuable features of the solution are web protection and threat prevention."
"In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations."
"The best features Check Point Harmony Endpoint offers are its comprehensive and proactive approach; these features stand out because it's very lightweight and has very good anti-ransomware protection."
"The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read."
"Data Recovery: Its ability to repair damaged partitions and uncover hidden partitions from within the tool, and allow further analysis."
"It indexes much faster, and is more reflexive because of the Enscripts."
"The most important feature we've found is the Enscripts. That is one powerful feature that I, personally, love to use."
"I like the processing feature on the product because it does everything at once, i.e, indexing, recovery, keyword searches, etc."
"The solution is very stable."
"It speeds up the process, so I can meet my deadlines."
"The technical support is excellent."
 

Cons

"I think Check Point Harmony Endpoint could be improved, as the documentation is not intuitive."
"The endpoint might consume excessive resources from the machine, which can impact its performance."
"The solutions agent could have better performance, it is a little slow sometimes."
"I would like to see support for a policy in the appliance that will refuse to create a connection if it does not detect an active virus scanner."
"Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner."
"Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries."
"While features are really good and promising to use and implement, a certain level of improvement is required in terms of software deployment across different business environments."
"I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available."
"The reporting is a bit unreliable. It needs to be better."
"I would like to see a capability to ingest and absorb more data. That would be really good. It currently is lacking this function."
"There were minor UI bugs."
"We have come across problems with the end-case. We could not find an email discovery type of module and there was not flexibility with the email."
"Ease of use and learning curve need improvement."
"​Sometimes the application can take more time to complete the image processing or fail at the end of the process.​"
"In the past, incident response time for tech support was slow."
 

Pricing and Cost Advice

"In comparison to other software solutions available on the market, it comes at a higher price point."
"We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it."
"We pay roughly 80,000 Swedish krona per year. When it comes to the firewall, it's roughly 150,000 Swedish krona yearly. There's also maintenance, of course, which is roughly 10,000 krona per month."
"Check Point Harmony Endpoint is cost effective."
"I rate the product price a four on a scale of one to ten, where one is low, and ten is high."
"The tool’s cost has increased by almost 300% in two years."
"The licensing cost for Check Point is $3 USD or $4 USD per end-user."
"Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years."
"We have a license. And, we found the cost high. We contacted them and talked to them about the ratio of the US dollar versus the Indian rupee and then we came to a solution."
"We have a license. And, we found the cost high. We contacted them and talked to them about the ratio of the US dollar versus the Indian rupee and then we came to a solution."
"​The product is affordable and user-friendly.​"
"EnCase is an affordable solution."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
881,821 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Manufacturing Company
9%
Outsourcing Company
7%
Comms Service Provider
6%
Performing Arts
14%
Financial Services Firm
9%
Government
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business133
Midsize Enterprise70
Large Enterprise75
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise2
Large Enterprise3
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Harmony Endpoint offered competitive pricing for small user counts such as thirty-f...
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint works well overall, but one area I would like to see improved is the reporting and dashboard experience. Sometimes the alerts are clear, but digging into historical dat...
Ask a question
Earn 20 points
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent, Check Point Antivirus
EnCase eDiscovery
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Ontario Ministry of Government, Aerospace Company, Chesterfield Police Department
Find out what your peers are saying about Check Point Harmony Endpoint vs. OpenText EnCase eDiscovery and other solutions. Updated: January 2020.
881,821 professionals have used our research since 2012.