

Check Point Harmony Endpoint and SentinelOne Singularity Complete compete in the advanced endpoint protection category. Based on the results, SentinelOne offers a slight edge due to its efficient automated remediation process.
Features: Check Point Harmony Endpoint offers centralized management, integration with Check Point's firewall, and protection across multiple vectors, including zero-day threats and ransomware. SentinelOne Singularity Complete provides autonomous threat prevention, active EDR, AI-based threat analysis, and rollback technology.
Room for Improvement: Check Point could improve third-party integration, documentation, and user interfaces. SentinelOne could enhance SIEM integration, support responsiveness, and streamline reporting to reduce false positives.
Ease of Deployment and Customer Service: Check Point offers flexible deployment across on-premises, public, private, and hybrid clouds, but support can be slow. SentinelOne is primarily cloud-based, simplifying large-scale deployments, but support can also be slow and convoluted.
Pricing and ROI: Check Point is generally more expensive but justified by its feature set. SentinelOne offers competitive pricing with efficient threat prevention features. Both deliver good ROI, but SentinelOne's automated operations offer notable efficiency gains.
Initially, we spent two to three days on the investigation process, but now we are able to investigate alerts in only half a day, which has really boosted our performance and shown a return on investment.
Now, the system automatically detects and isolates endpoints within minutes.
The product is affordable and provides excellent coverage and protection across multiple platforms.
SentinelOne Singularity Complete has helped reduce my organization's mean time to detect by fifty percent.
Since then, I have not faced any intrusions, which is one reason I chose SentinelOne over ESET.
We have not faced any attacks since we implemented it.
The customer support for Check Point Harmony Endpoint deserves a rating of 10.
We use premium support, and it is beneficial as 24/7 support is available.
I have opened several cases and they were handled very efficiently and quickly.
We are using the automated email process for support, and they respond within an hour or two hours sometimes.
A chat service would be beneficial.
The technical support from SentinelOne Singularity Complete is very active and good, with a strong knowledge base available online.
We initially purchased only 100 licenses and as we grew, we acquired many more licenses without encountering any issues.
The single agent works for multiple operating systems and endpoint types, providing elastic growth and reducing the overall number of components.
Proactive features help guard against data breaches and vulnerabilities.
It's all auto-scale and auto-categorized, configuring automatically.
SentinelOne Singularity Complete is very scalable.
My deployment is relatively small, and SentinelOne Singularity Complete works within those constraints.
Check Point Harmony Endpoint is very stable in our experience, with few crashes or disruptions in daily use.
The stability of the tool is high, as I have not experienced any downtime.
Occasionally, there are some backend issues where the tenant is down, but apart from that, Check Point Harmony Endpoint is stable and working effectively.
This indicates room for improvement in stability when interacting with other solutions.
Initially, there were issues, particularly on the management side, but now the console is much more stable.
Everything is managed automatically, so there is no user interference needed for upgrades.
Principally regarding the system performance, Check Point Harmony Endpoint impacts us significantly, and addressing this issue would make a substantial difference.
Extending that window would help security teams conduct deeper forensic investigations and meet compliance requirements more easily.
Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
The only thing that prevented the attack from succeeding was a free version of Malwarebytes.
Providing a single pane of visibility for the end user would be beneficial.
That seems to play a little havoc and can conflict with manual installs, causing issues where it wants to delete and reinstall the client.
It is not expensive and provides comprehensive coverage.
While the prices are higher than those of other solutions, the features justify the investment for customers.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
If you want protection, you have to pay the price.
There are other products that are less expensive, but I tell my clients that in security, they cannot cut corners or look for the cheapest solution.
Reputation and quality are important, but especially in today’s economy, price is a significant factor.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
This feature is valuable for our customer because it stops threats before they reach users by scanning incoming files at the network gateway.
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
I have an advanced app providing visibility of all my endpoints, which was not the case before.
SentinelOne has a feature to decommission automatically, which has been fantastic.
There's also automation that gives my team free time, preventing them from having to look for every alert.
| Product | Market Share (%) |
|---|---|
| SentinelOne Singularity Complete | 5.1% |
| Check Point Harmony Endpoint | 2.6% |
| Other | 92.3% |

| Company Size | Count |
|---|---|
| Small Business | 133 |
| Midsize Enterprise | 69 |
| Large Enterprise | 76 |
| Company Size | Count |
|---|---|
| Small Business | 87 |
| Midsize Enterprise | 44 |
| Large Enterprise | 76 |
Check Point Harmony Endpoint provides advanced threat prevention with centralized management and seamless integration, safeguarding networks through robust security features and real-time threat detection. It excels at ransomware prevention, encryption protection, and detailed threat analysis.
Check Point Harmony Endpoint is renowned for its comprehensive security features, including anti-ransomware capabilities and centralized management. It integrates seamlessly with existing systems, enhancing network protection through features like SandBlast Agent and threat emulation. Organizations benefit from significant incident reductions, utilizing its powerful threat detection, forensics, VPN capabilities, and robust encryption measures. Centralized management during remote work setups and enhanced security through URL filtering and rollback mechanisms further solidify its efficiency. Despite its high resource consumption and configuration challenges, it remains a preferred choice among enterprises aiming to enhance cybersecurity measures.
What Key Features Does Check Point Harmony Endpoint Offer?In sectors such as finance and healthcare, Check Point Harmony Endpoint is crucial for maintaining data security and regulatory compliance. Its features cater to endpoint protection requirements across industries, providing reliable solutions for encryption and cybersecurity challenges. The tool's deployment across diverse environments secures endpoint systems effectively, ensuring uninterrupted operations amid evolving threats.
SentinelOne Singularity Complete delivers advanced endpoint protection leveraging AI-driven threat detection and behavior analysis for efficient malware and ransomware response. Its standout features enhance security insights and ensure comprehensive endpoint management.
SentinelOne Singularity Complete provides robust ransomware recovery through unique rollback capabilities and seamless integration with various security solutions. Its machine learning enhances endpoint protection, minimizing false positives and automating responses. While praised for real-time threat monitoring, incident management, and asset management, it faces challenges in managing the console, customizing UI, and maintaining policy flexibility. Some users report difficulties with deployment and integration with existing systems, and enhanced reporting, alert management, and documentation are desired. Its appeal extends to deploying across multiple operating systems, offering comprehensive security coverage and facilitating cybersecurity compliance.
What standout features does SentinelOne Singularity Complete offer?Industries implement SentinelOne Singularity Complete for its AI capabilities in advanced endpoint protection, particularly against malware and ransomware. It's utilized across diverse operating systems, aiding in real-time threat monitoring and facilitating compliance. Organizations use it for vulnerability assessments and asset management, ensuring optimal protection in complex IT environments.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.