No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Harmony Endpoint vs Sangfor Endpoint Secure comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 1, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Check Point Harmony Endpoint
Ranking in Endpoint Detection and Response (EDR)
7th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
202
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Anti-Malware Tools (3rd)
Sangfor Endpoint Secure
Ranking in Endpoint Detection and Response (EDR)
32nd
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
11
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.4%, down from 4.0% compared to the previous year. The mindshare of Check Point Harmony Endpoint is 2.2%, down from 2.7% compared to the previous year. The mindshare of Sangfor Endpoint Secure is 0.8%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.4%
Check Point Harmony Endpoint2.2%
Sangfor Endpoint Secure0.8%
Other93.6%
Endpoint Detection and Response (EDR)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
GR
Support at a security firm with 51-200 employees
Remote Access Security Reinforced with Real-Time Device Protection
Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility. It would be helpful to tailor views for different roles, such as IT or security support. Regarding needed improvements, custom report building could be enhanced. Current reports are informative, and a drag-and-drop builder would allow teams to create tailored views for compliance, executive summaries, or operational metrics. For further improvements, enhancing threat simulation and testing would be valuable. Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
OA
Coordinator Associate at National Institute of Cardiovascular Diseases
Quick threat response and behavior analysis while enhancing network security
The main use case is usually related to security. It deals with attacks that come day-to-day such as zero-day attacks and APT attacks. Our main task is to secure the network infrastructure in the hospital where I work It facilitates the departments of IT and other departments to procure and…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool is designed to scale for large enterprises and handle large volumes of data."
"The most valuable features of this product are the management capabilities, which allow an IT organization to get quite a good picture of attempted cyber attacks, and its out-of-the-box investigation capabilities."
"These days it's machine-learning technology and behavior-based analytics features that make us more secure."
"The most valuable features are incident creation, policy-based protection, IP whitelisting, and device encryption. These are beneficial for endpoint and server security."
"The initial setup is easy."
"It blocks malicious files. It prevents attacks. It doesn't require many updates, it's a very light application."
"They did what they said, and this solution could apply to any scenario."
"We have a complete overview of all our PCs and it's very easy to handle and to use the interface."
"At the moment we are very satisfied and confident with Check Point."
"The tool comes with an in-built AI feature, which makes file management easier. It also secures the network from viruses, malware, and phishing attacks."
"When sending emails to my colleagues, it detects any virus and blocks any spam that may be shared."
"The best features of Check Point Harmony Endpoint that stand out the most for me include the anti-ransomware protection, which detects abnormal encryption behavior, stops it instantly, and restores affected files, preventing downtime for the users."
"Stability-wise, I rate the solution a ten out of ten."
"Harmony's endpoint sandboxing is really good."
"The product improved the overall security of our organization with features like sandboxing and phishing prevention."
"The initial setup is very easy."
"We use the product for network protection from any malicious threat."
"It has a quick response time, threat intelligence, cybersecurity features, quick report generation, behavior analysis, dynamic detection, and quarantine features."
"The user-friendliness of Sangfor Endpoint Secure is particularly impressive. Even with basic technical knowledge, users can easily navigate the system, make changes, and implement updates."
"What stands out to me is the dual-end user interface they provide."
"The tool's AI feature is helpful in endpoint security."
"The product's initial setup phase was straightforward."
"The tool's most valuable features are control access, endpoint security, and load balancing of ISPs."
"The real-time monitoring feature of Sangfor Endpoint Secure is truly real-time, with no delay compared to other solutions."
 

Cons

"Previously, the endpoint would leave the environment, not being on our VPN, essentially unable to interact with the server to upload files. It was unable to retrieve new file verdicts. It was using a thing called "local analysis" to determine if something was a malicious file or not. There was no dynamic analysis."
"Currently, if you use Palo Alto endpoint protection as the only solution it's very complicated to remove pre-existing threats."
"Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth."
"It's very time-consuming to log support issues and the people that answer the tickets aren't very knowledgeable."
"Basically, they don't provide customer support tools just to investigate the logs."
"There is a severe gap in functionality between Windows, Linux, and Mac versions."
"The solution needs better reports. I think they should let the customer go in and customize the reports."
"Limited remote connection."
"Its guides are identical to the existing ones. These guides should be updated and they should improve their design."
"The software requires considerable resources and can strain less powerful computers."
"An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher."
"The solution has limitations if it's hosted on-prem or as a SaaS."
"I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available."
"The solutions agent could have better performance, it is a little slow sometimes."
"The technical support could be improved."
"Support's service and the response times can be improved. The triaging of the tickets takes a long time and the tickets are only resolved with escalations."
"Sangfor Endpoint Secure should include healing capabilities."
"There are a few areas for improvement. We have encountered licensing issues on occasion, and sometimes updates don't apply properly."
"Sometimes, the VPN is not secure and doesn't work properly in Sangfor Endpoint Secure."
"Sangfor Endpoint Secure performs poorly."
"It would be much more convenient if the migration tool could be installed directly on the customer's VMs, enabling a smoother migration process to the new infrastructure, with potential restrictions addressed accordingly."
"Currently, the tool lacks reporting functionalities."
"It is complicated to establish a tunnel due to technical issues in the VPN system."
"The interface has too many buttons, making it cluttered."
 

Pricing and Cost Advice

"The pricing is okay, although direct support can be expensive."
"I feel it is fairly priced."
"Traps pays for itself within the first 16 months of a three-year subscription. This is attributed to OPEX savings, as security teams spent less time trying to identify and isolate malware for analysis as a result of a reduction in malware incidents, false positives, and breach avoidance."
"Our customers have expressed that the price is high."
"I am using the Community edition."
"We pay about $50,000 USD per year for a bundle that includes Cortex XDR."
"The cost depends on your chosen license type, like Pro or other licenses."
"Cortex XDR is a costly solution."
"Initial monies replacing all AVs with a single product is about £10k."
"The product is averagely priced. The product price is neither very high nor too low. The tool is not really expensive."
"The tool’s cost has increased by almost 300% in two years."
"Check Point Antivirus is the most economical solution."
"Check Point Harmony Endpoint is cost effective."
"I rate the product price a four on a scale of one to ten, where one is low, and ten is high."
"Licensing comes free in that first year or is included in the base package. From a commercial point of view, it really just is the renewal cost, rather than a one-time fixed cost or buy-in."
"We are paying 2,50,000 Sri Lankan Rupees annually which is the fixed charge."
"The solution is cheap. It is cheaper than other products by 15-20 percent."
"Price-wise, Sangfor Endpoint Secure can be considered a competitively priced product in the market as it offers quite low prices compared to other solutions."
"Sangfor Endpoint Secure's pricing is cheap. I rate it seven out of ten."
"Its "pay as you grow" model offers cost-effectiveness compared to major cloud providers."
"Sangfor Endpoint Secure is not a cheap solution."
"We were using Hyper-V. So, we switched to Sangfor because of the pricing."
"The product is expensive compared to other vendors."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Computer Software Company
9%
Financial Services Firm
9%
Outsourcing Company
8%
Manufacturing Company
8%
Financial Services Firm
16%
Comms Service Provider
11%
Media Company
7%
Computer Software Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise21
Large Enterprise48
By reviewers
Company SizeCount
Small Business135
Midsize Enterprise68
Large Enterprise75
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise3
Large Enterprise3
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Har...
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint works well overall, but one area I would like to see improved is the reporting and dashb...
What is your primary use case for Check Point Harmony Endpoint?
Check Point Harmony Endpoint helps to secure our devices as my main use case for this product. When users need to acc...
What needs improvement with Sangfor Endpoint Secure?
The interface has too many buttons, making it cluttered. It would be better if it were a simplified version with fewe...
What is your primary use case for Sangfor Endpoint Secure?
Sangfor Endpoint Secure is easy to handle with its user-friendly interface. The four engines it utilizes for endpoint...
What advice do you have for others considering Sangfor Endpoint Secure?
At first, people might not understand the interface, which is why it should be simplified. However, once they underst...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent, Check Point Antivirus
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Information Not Available
Find out what your peers are saying about Check Point Harmony Endpoint vs. Sangfor Endpoint Secure and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.