Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs WithSecure Elements Endpoint Protection comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Protection Platform (EPP)
8th
Average Rating
8.8
Number of Reviews
112
Ranking in other categories
Endpoint Detection and Response (EDR) (8th)
WithSecure Elements Endpoin...
Ranking in Endpoint Protection Platform (EPP)
37th
Average Rating
8.0
Number of Reviews
7
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of September 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of Check Point Harmony Endpoint is 2.7%, up from 2.4% compared to the previous year. The mindshare of WithSecure Elements Endpoint Protection is 0.6%, down from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Prateek Agarwal - PeerSpot reviewer
Jan 24, 2024
Protects organizations from imminent threats and minimizes the impact of breaches
We started using the solution during the pandemic. We have a distributed team globally. We have different devices like PCs, mobile phones, and tablets. We can easily connect with our employees and users across the globe. Our priority is to secure our devices and the end systems of the clients…
Cláudio Fardin - PeerSpot reviewer
Mar 13, 2023
Great tamper protection, advanced malware, and useful DeepGuard features
The most valuable aspects of the solution include: Tamper Protection. There is a layer of security to prevent a malicious agent (malware) from interrupting or stopping services, deleting or modifying registry entries or even stopping the antivirus from acting, ensuring that there will be no interruption of protection. AMSI (Anti-Malware Scan Interface). This is a Microsoft Windows component that allows deeper inspection of built-in scripting services. AMSI is an interface that applications and services running on Windows can use to send requests scans to the antimalware product installed on the computer. Advanced malware uses disguised or encrypted scripts to evade traditional verification methods. This malware is usually loaded directly into memory, so it doesn't use any files on the device. This provides additional protection against harmful software that uses scripts or macros in key Windows components, such as PowerShell and Office365, or other applications to avoid detection. DeepGuard. This monitors applications for potentially harmful changes to the system. DeepGuard ensures that you only use safe apps. The security of an application is verified by the trusted cloud service. If the security of an application cannot be verified, DeepGuard starts monitoring the application's behavior. DeepGuard blocks new, undiscovered Trojans, Worms, Exploits, and other harmful applications that attempt to make changes on your computer and prevents suspicious applications from accessing the Internet.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth."
"Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information."
"The tool minimizes the impact of a breach with autonomous detection and response."
"The forensics allows us to search retrospectively for an URL or file opened by users, for example, when you need to quickly check who else has clicked on a phishing link."
"The technical support is good."
"Deploying new versions of the endpoint are easy."
"The standout features are primarily EDR and MDR."
"The most valuable feature of Check Point Harmony Endpoint is it can be used for all kinds of endpoints, including mobile phones."
"On the cloud management page, the solution scales up very highly."
"F-Secure is useful for keeping user machines up-to-date by pushing out security and critical updates."
"There is a layer of security to prevent a malicious agent (malware) from interrupting or stopping services, deleting or modifying registry entries or even stopping the antivirus from acting, ensuring that there will be no interruption of protection."
"The notifications and patch management features are valuable."
"Both incoming and outgoing traffic is protected."
"We use the product for detecting network vulnerabilities and for software update purposes."
"The most valuable features of WithSecure Elements Endpoint Protection are the clear useful portal and overall company protection."
 

Cons

"There are still functionalities that I have not been able to fully test and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
"The solution needs more alerts to warn of attacks."
"Off the top of my head, I can't think of a way it has improved my organization."
"Some of the less tech-savvy users sometimes find it difficult in adjusting and learning how to use the platform."
"I have a few issues when attempting to install Harmony on some of the machines."
"They should also add new functions such as threat hunting."
"Legacy VPNs and digital footprints should be minimized."
"I would like to see more automation."
"I would like the part of Hash Analysis by external sources to be improved."
"Resource consumption is suboptimal and could be improved."
"There is no technical support available in the Middle East."
"There could be a dedicated security partner with essential knowledge."
"But the biggest one for us is patch management because this has been our top priority when looking at alternatives. Every solution needs to have patch management, if that's possible. It would cut costs on our side if that feature were included, so we don't need to pay for two separate pieces of software."
"The solution could improve by having more real-time responses. For example, when a license gets removed from a computer it does not update the records of the change. Additionally, when I installed Microsoft Windows Defender I was not able to send licenses through email to our tenants. The integration with other solutions could improve."
"The program and cloud service management is in English. It's not a problem for me, however, it might be for users who don't speak English or use it regularly."
 

Pricing and Cost Advice

"We implement this solution with a yearly subscription and there are no extra costs."
"Licensing comes free in that first year or is included in the base package. From a commercial point of view, it really just is the renewal cost, rather than a one-time fixed cost or buy-in."
"The pricing is reasonable."
"The cost is huge compared to other products that are available on market."
"We pay roughly 80,000 Swedish krona per year. When it comes to the firewall, it's roughly 150,000 Swedish krona yearly. There's also maintenance, of course, which is roughly 10,000 krona per month."
"Check Point Harmony Endpoint's pricing is more competitive than any other vendor."
"The solution is too pricey."
"We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it."
"If you purchase licenses in bulk the price of the licenses can decrease."
"We pay a yearly licensing fee of about €20 per computer."
"The cost of the solution depends on the size of the company and where the licenses are being ordered from."
"The product has average pricing."
"The price is comparable."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
805,335 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Government
8%
Financial Services Firm
7%
Manufacturing Company
7%
Computer Software Company
21%
Government
18%
Comms Service Provider
9%
University
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
It scans all the endpoints in your cloud and on-premises for vulnerabilities, threats, and malware attacks.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
The pricing is okay. It is in the enterprise range. It is not middle range. It is not so costly, but it is an enterprise.
What needs improvement with Check Point Harmony Endpoint?
The only drawback is the integration process. For example, I want to integrate with my source platform. It took some time. That's the only concern regarding the integrations. Check Point Harmony En...
What do you like most about F-Secure Protection Service for Business?
The notifications and patch management features are valuable.
What is your experience regarding pricing and costs for F-Secure Protection Service for Business?
The price is comparable. We do not have a problem with the pricing. I rate the pricing a five or six out of ten. There are no additional costs associated with the solution.
What needs improvement with F-Secure Protection Service for Business?
The product does not have technical partners in the Middle East. It only has sales partners. I do not like the sales partners in UAE. They did not support me when I needed help with security. The v...
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
F-Secure Elements Endpoint Protection, F-Secure Protection Service for Business
 

Learn More

 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Information Not Available
Find out what your peers are saying about Check Point Harmony Endpoint vs. WithSecure Elements Endpoint Protection and other solutions. Updated: September 2024.
805,335 professionals have used our research since 2012.