We performed a comparison between Check Point Harmony Endpoint and ZoneAlarm based on real PeerSpot user reviews.Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in EPP (Endpoint Protection for Business).
"The most valuable feature is the analysis, because of the beta structure."
"The price is low and quite competitive with others."
"Additionally, when it comes to EDR, there are more tools available to assist with client work."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"The product detects and blocks threats and is more proactive than firewalls."
"The stability is very good."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"This is stable and scalable."
"Its stability during any heavy performance activity is excellent."
"The zero-day threat prevention is excellent."
"I found the fact of working across multiple attack vectors easy and more beneficial."
"We love that we don't have to upgrade it anymore. They take care of that."
"The most valuable feature of Check Point Harmony Endpoint is centralized management."
"Resource overheads have been reduced and we are overall more secure as a business."
"It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks."
"Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint."
"The solution really focused on giving more security than an antivirus."
"The solution maintains reasonable scalability."
"It is quick and easy to configure."
"It gives us security for the users' mobiles and ends up protecting us in a significant way."
"ZoneAlarm protects all computers from viruses, spyware, and hackers."
"It is easy to use through interfaces and easy to configure each of the customizations we created based on the characteristics that we wanted."
"The phone access scan stands out as the most valuable feature for me."
"The only minor concern is occasional interference with desired programs."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"We've encountered challenges during API deployment, occasionally resulting in unstable environments."
"The support needs improvement."
"We find the solution to be a bit expensive."
"I haven't seen the use of AI in the solution."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"I would like to see more automation."
"Check Point Harmony Endpoint could improve mobile device management (MDM)."
"Check Point offers solutions with only a few features for our company's customers' sites."
"The solution needs better reports and centralized logs."
"We have observed some policies are not working as expected."
"The management in Check Point Harmony Endpoint could be improved."
"We would like to make the documentation for more modern solutions like the Harmony family easier to find."
"We need a higher maximum file size in the sandboxing feature."
"We'd like better performance of the network equipment. There are high-speed environments where an immediate response is required."
"The support is not always so effective."
"I would like it to be integrated with the Check Point centralization solution like Infinity Portal. It would be great to be able to manage it through the same website."
"Perhaps the primary area for potential enhancement is to make it faster, ensuring a more seamless experience while maintaining robust security features."
"They need to update and improve the features available for Mac."
"ZoneAlarm should be a light application that does not take too much memory in mobile phones."
"They should release a single update with all the necessary characteristics to avoid being in a cycle of consecutive updates."
Fortinet FortiEDR is a real-time endpoint protection, detection, and automated response solution. Its primary purpose is to detect advanced threats to stop breaches and ransomware damage. It is designed to do so in real time, even on an already compromised device, allowing you to respond and remediate incidents automatically so your data can remain protected.
Fortinet FortiEDR Features
Fortinet FortiEDR has many valuable key features, including:
Fortinet FortiEDR Benefits
Some of the key benefits of using Fortinet FortiEDR include:
Reviews from Real Users
Below are some reviews and helpful feedback written by Fortinet FortiEDR users.
An Owner at a security firm says, "The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers. The customer has literally about 800 cash registers. That was the use case for Fortinet FortiEDR - to get that down into a tiny space. The only way to do that was to use this product because it had that ability to unbundle services that were a surplus.”
Chandan M., Chief Technical Officer at Provision Technologies LLP, mentions, “The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration.” He also adds, “The security is also very good and the firewall response is good.”
Harpreet S., Information Technology Support Specialist at Chemtrade Logistics, explains, "It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
DeAndre V., Senior Network Administrator at a financial services firm, states, “The dashboard is easy to follow and use. The deployment and uninstalling were easy. I like the detailed information about the path of a file that might be suspicious. Being able to check that out was easy to follow. Exceptions are easy to create and the interface is easy to follow with a nice appearance.
Check Point Harmony Endpoint is a robust security solution that enables users to use a single piece of software to accomplish tasks that often require the use of multiple pieces of software. It prevents impending threats from doing harm while at the same time enabling users to identify and deal with any harm that results from breaches.
Check Point Harmony Endpoint provides users with an excellent total cost of ownership. It combines six security solutions into a single powerful solution. Instead of being unwieldy, it is, in fact, a highly flexible solution. Users can easily manage and deploy it on site in their offices or via the cloud according to their needs. It upgrades effortlessly without ever causing disruptions to the work users are doing. The end result is a high return on a user’s investment.
Benefits of Check Point Harmony Endpoint
Some of the benefits of using Check Point Harmony Endpoint include:
Check Point Harmony Endpoint offers users a piece of security software which is completely cutting-edge. It stands out among its competitors for a number of reasons. Two major ones are the raw power of the solution and the usefulness of Check Point Harmony Endpoint’s built-in automation. Check Point Harmony Endpoint has a high ceiling when it comes to dealing with threats. Users are given the ability to decide how aggressively they want to employ it, which creates a great deal of flexibility. Check Point Harmony Endpoint’s automation is constantly running in the background of the program. It creates reports that empower users to take appropriate steps to protect their systems.
Reviews from Real Users
Sumit B., a consultant at Cognizant, notes the usefulness of Check Point Harmony Endpoint’s built-in automation. He writes, “SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth.”
A PeerSpot user who serves as a Network Technical Specialist at a manufacturing company adds that “It's pretty complete for preventing threats to endpoints. Its capabilities are great.”
ZoneAlarm protects you by preventing hackers from remotely accessing and controlling your device, and lets you know which apps have excessive permissions so you can decide whether they threaten your privacy.
Check Point Harmony Endpoint is ranked 8th in EPP (Endpoint Protection for Business) with 49 reviews while ZoneAlarm is ranked 16th in Anti-Malware Tools with 7 reviews. Check Point Harmony Endpoint is rated 8.6, while ZoneAlarm is rated 8.0. The top reviewer of Check Point Harmony Endpoint writes "Resilient by design, provides redundancy, and offers ongoing constant improvements". On the other hand, the top reviewer of ZoneAlarm writes "Maintains continuity, prevents malicious attacks, and offers helpful configuration capabilities". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas ZoneAlarm is most compared with Microsoft Defender for Endpoint, Malwarebytes, Bitdefender GravityZone EDR, Avira Antivirus and ESET PROTECT Enterprise.
We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.