

Trellix Endpoint Security Platform and Check Point Harmony Endpoint are leading competitors in the endpoint security category. Based on feature offerings and comprehensive protection capabilities, Check Point Harmony Endpoint seems to have the upper hand with its extensive web protection, anti-ransomware, threat emulation, and zero phishing features.
Features: Trellix Endpoint Security Platform offers robust Data Loss Prevention, centralized management, and sophisticated threat detection. Check Point Harmony Endpoint uniquely focuses on enhancing web protection, provides anti-ransomware capabilities, and includes threat emulation and zero phishing features for a comprehensive security suite.
Room for Improvement: Trellix ESP could enhance its stability and improve automation to address resource consumption and support response times. Check Point Harmony Endpoint would benefit from more intuitive policy management, better integration capabilities, and addressing its high resource requirements.
Ease of Deployment and Customer Service: Trellix ESP supports versatile deployment models, including on-premises, hybrid cloud, and public cloud, offering flexibility in setups. Its customer service receives mixed reviews, praised for responsiveness but criticized for limited local presence. Check Point Harmony Endpoint provides efficient cloud management with user-friendly deployment options, consistently receiving excellent ratings for customer service and support responsiveness.
Pricing and ROI: Trellix ESP is considered reasonably priced but faces criticism for annual price hikes. It provides strong ROI through effective security and ease of user management. Check Point Harmony Endpoint, while slightly more expensive, justifies the cost with its extensive features and flexible licensing. Users report good ROI due to its security resilience and cost-effective operations, although initial costs may be high for smaller organizations.
Initially, we spent two to three days on the investigation process, but now we are able to investigate alerts in only half a day, which has really boosted our performance and shown a return on investment.
Now, the system automatically detects and isolates endpoints within minutes.
The product is affordable and provides excellent coverage and protection across multiple platforms.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
Clients appreciate the solution’s customization capabilities and ongoing product improvements.
There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.
The customer support for Check Point Harmony Endpoint deserves a rating of 10.
We use premium support, and it is beneficial as 24/7 support is available.
I have opened several cases and they were handled very efficiently and quickly.
The response time is a notable issue.
I would rate their customer service nine out of ten.
When we implemented Trellix Endpoint Security in their network, multiple malwares were detected.
We initially purchased only 100 licenses and as we grew, we acquired many more licenses without encountering any issues.
The single agent works for multiple operating systems and endpoint types, providing elastic growth and reducing the overall number of components.
Proactive features help guard against data breaches and vulnerabilities.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
Trellix Endpoint Security is scalable.
Check Point Harmony Endpoint is very stable in our experience, with few crashes or disruptions in daily use.
The stability of the tool is high, as I have not experienced any downtime.
Occasionally, there are some backend issues where the tenant is down, but apart from that, Check Point Harmony Endpoint is stable and working effectively.
I would rate its stability as nine out of ten.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
I think it's stable enough; earlier it had glitches, but now it's stable enough.
Principally regarding the system performance, Check Point Harmony Endpoint impacts us significantly, and addressing this issue would make a substantial difference.
Extending that window would help security teams conduct deeper forensic investigations and meet compliance requirements more easily.
Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
What needs improvement in Trellix Endpoint Security is the reduction of resource consumption by the scanning feature.
Improvements are needed in forensic analytics to detect specific vulnerabilities.
The product does not seem to be cloud-native.
It is not expensive and provides comprehensive coverage.
While the prices are higher than those of other solutions, the features justify the investment for customers.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
My experience with pricing, setup cost, and licensing is good; compared to other tools, Trellix Endpoint Security Platform provides lower costs.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
This feature is valuable for our customer because it stops threats before they reach users by scanning incoming files at the network gateway.
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
Including options like Application Control (formerly Solidcore), integrated monitoring, change control, DLP, and advanced threat protection, the solution offers comprehensive security.
The detection capability of Trellix Endpoint Security is higher than traditional antivirus solutions.
| Product | Market Share (%) |
|---|---|
| Check Point Harmony Endpoint | 2.4% |
| Trellix Endpoint Security Platform | 3.8% |
| Other | 93.8% |

| Company Size | Count |
|---|---|
| Small Business | 134 |
| Midsize Enterprise | 68 |
| Large Enterprise | 76 |
| Company Size | Count |
|---|---|
| Small Business | 67 |
| Midsize Enterprise | 36 |
| Large Enterprise | 61 |
Check Point Harmony Endpoint provides advanced threat prevention with centralized management and seamless integration, safeguarding networks through robust security features and real-time threat detection. It excels at ransomware prevention, encryption protection, and detailed threat analysis.
Check Point Harmony Endpoint is renowned for its comprehensive security features, including anti-ransomware capabilities and centralized management. It integrates seamlessly with existing systems, enhancing network protection through features like SandBlast Agent and threat emulation. Organizations benefit from significant incident reductions, utilizing its powerful threat detection, forensics, VPN capabilities, and robust encryption measures. Centralized management during remote work setups and enhanced security through URL filtering and rollback mechanisms further solidify its efficiency. Despite its high resource consumption and configuration challenges, it remains a preferred choice among enterprises aiming to enhance cybersecurity measures.
What Key Features Does Check Point Harmony Endpoint Offer?In sectors such as finance and healthcare, Check Point Harmony Endpoint is crucial for maintaining data security and regulatory compliance. Its features cater to endpoint protection requirements across industries, providing reliable solutions for encryption and cybersecurity challenges. The tool's deployment across diverse environments secures endpoint systems effectively, ensuring uninterrupted operations amid evolving threats.
Trellix Endpoint Security Platform offers essential features like centralized management, threat prevention, and encryption, facilitating seamless scaling and integration with other systems while prioritizing user security.
This comprehensive platform focuses on endpoint protection, antivirus capabilities, and malware defense. It enhances cybersecurity with data loss prevention, advanced threat detection, and AI-driven features for reliable protection without impacting performance. Central management and advanced reporting streamline integration and ease of use. Flexible policy deployment through the management console and its robust security measures, such as DLP and device control, further increase protection. Challenges include high CPU and memory usage affecting performance, a complex interface, and lengthy deployment. Third-party integration and Windows Hello support need improvement. Additional concerns involve improved threat detection and faster technical support responses.
What are the key features of Trellix Endpoint Security Platform?Trellix Endpoint Security Platform is widely implemented in industries such as banking and government for securing mobile and desktop devices. Its capabilities cover network security, device control, and remote access protection, catering to diverse environments by offering robust cybersecurity management against advanced threats.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.