Check Point Harmony Endpoint vs ZoneAlarm comparison

You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Harmony Endpoint and ZoneAlarm based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in EPP (Endpoint Protection for Business).
To learn more, read our detailed EPP (Endpoint Protection for Business) Report (Updated: November 2023).
745,341 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
"The most valuable feature is the analysis, because of the beta structure.""The price is low and quite competitive with others.""Additionally, when it comes to EDR, there are more tools available to assist with client work.""Fortinet has helped free up around 20 percent of our staff's time to help us out.""The product detects and blocks threats and is more proactive than firewalls.""The stability is very good.""It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward.""This is stable and scalable."

More Fortinet FortiEDR Pros →

"Its stability during any heavy performance activity is excellent.""The zero-day threat prevention is excellent.""I found the fact of working across multiple attack vectors easy and more beneficial.""We love that we don't have to upgrade it anymore. They take care of that.""The most valuable feature of Check Point Harmony Endpoint is centralized management.""Resource overheads have been reduced and we are overall more secure as a business.""It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks.""Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint."

More Check Point Harmony Endpoint Pros →

"The solution really focused on giving more security than an antivirus.""The solution maintains reasonable scalability.""It is quick and easy to configure.""It gives us security for the users' mobiles and ends up protecting us in a significant way.""ZoneAlarm protects all computers from viruses, spyware, and hackers.""It is easy to use through interfaces and easy to configure each of the customizations we created based on the characteristics that we wanted.""The phone access scan stands out as the most valuable feature for me."

More ZoneAlarm Pros →

"The only minor concern is occasional interference with desired programs.""Once, we had an event that was locked and blocked, but information about it came to us two or three days later.""We've encountered challenges during API deployment, occasionally resulting in unstable environments.""The support needs improvement.""We find the solution to be a bit expensive.""I haven't seen the use of AI in the solution.""The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location.""FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."

More Fortinet FortiEDR Cons →

"I would like to see more automation.""Check Point Harmony Endpoint could improve mobile device management (MDM).""Check Point offers solutions with only a few features for our company's customers' sites.""The solution needs better reports and centralized logs.""We have observed some policies are not working as expected.""The management in Check Point Harmony Endpoint could be improved.""We would like to make the documentation for more modern solutions like the Harmony family easier to find.""We need a higher maximum file size in the sandboxing feature."

More Check Point Harmony Endpoint Cons →

"We'd like better performance of the network equipment. There are high-speed environments where an immediate response is required.""The support is not always so effective.""I would like it to be integrated with the Check Point centralization solution like Infinity Portal. It would be great to be able to manage it through the same website.""Perhaps the primary area for potential enhancement is to make it faster, ensuring a more seamless experience while maintaining robust security features.""They need to update and improve the features available for Mac.""ZoneAlarm should be a light application that does not take too much memory in mobile phones.""They should release a single update with all the necessary characteristics to avoid being in a cycle of consecutive updates."

More ZoneAlarm Cons →

Pricing and Cost Advice
  • "The price is comprable to other endpoint security solutions."
  • "The pricing is typical for enterprises and fairly priced."
  • "I'm not familiar with pricing, but it looks a bit costly compared to other vendors I think."
  • "The pricing is good."
  • "I would rate the solution's pricing an eight out of ten."
  • "The hardware costs about €100,000 and about €20,000 annually for access."
  • "Fortinet FortiEDR has a yearly subscription."
  • "It's not cheap, but it's not expensive either."
  • More Fortinet FortiEDR Pricing and Cost Advice →

  • "We implement this solution with a yearly subscription and there are no extra costs."
  • "The price of Check Point Harmony Endpoint is comparable to SonicWall. The price could be a bit lower."
  • "Check Point Harmony Endpoint's pricing is more competitive than any other vendor."
  • "I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high."
  • "Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years."
  • More Check Point Harmony Endpoint Pricing and Cost Advice →

  • "We have to pay a yearly licensing fee for ZoneAlarm, which is cheap."
  • "The pricing is reasonable, with a yearly renewal license costing seventy dollars."
  • More ZoneAlarm Pricing and Cost Advice →

    Use our free recommendation engine to learn which EPP (Endpoint Protection for Business) solutions are best for your needs.
    745,341 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:I suggest Fortinet’s FortiEDR over FortiClient for several reasons. For starters, FortiEDR guarantees solid protection… more »
    Top Answer:Additionally, when it comes to EDR, there are more tools available to assist with client work.
    Top Answer:It is expensive and I would rate it an eight out of ten.
    Top Answer:Resource overheads have been reduced and we are overall more secure as a business.
    Top Answer:The management of the solution is very simple and the deployment tools are diverse, which greatly reduces the workload… more »
    Top Answer:There are a number of features behind paywalls which can be frustrating when you are already paying a premium. The… more »
    Top Answer:ZoneAlarm protects all computers from viruses, spyware, and hackers.
    Top Answer:We have to pay a yearly licensing fee for ZoneAlarm, which is cheap.
    Top Answer:The mobile phone applications get slower because of ZoneAlarm. ZoneAlarm should be a light application that does not… more »
    Also Known As
    enSilo, FortiEDR
    Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
    Learn More

    Fortinet FortiEDR is a real-time endpoint protection, detection, and automated response solution. Its primary purpose is to detect advanced threats to stop breaches and ransomware damage. It is designed to do so in real time, even on an already compromised device, allowing you to respond and remediate incidents automatically so your data can remain protected.

    Fortinet FortiEDR Features

    Fortinet FortiEDR has many valuable key features, including:

    • Easily customizable
    • Real-time proactive risk mitigation & IoT security
    • Pre-infection protection
    • Post-infection protection
    • Track applications and ratings
    • Reduce the attack surface with risk-based proactive policies
    • Achieve analysis of entire log history
    • Optional managed detection and response (MDR) service

    Fortinet FortiEDR Benefits

    Some of the key benefits of using Fortinet FortiEDR include:

    • Protection: Fortinet FortiEDR provides proactive, real-time, automated endpoint protection with the orchestrated incident response across platforms. It stops the breach with real-time postinfection blocking to protect data from exfiltration and ransomware encryption.

    • Single unified console: Fortinet FortiEDR has a single unified console with an intuitive interface, which makes management easier. The solution automates mundane endpoint security tasks so your employees don’t need to do it.

    • Cost savings: With Fortinet FortiEDR you can eliminate post-breach operational expenses and breach damage costs.

    • Flexibility: Fortinet FortiEDR can be deployed on premises or on a secure cloud instance. With Fortinet FortiEDR, endpoints are protected both on- and off-line.

    • Scalability: Because Fortinet can be deployed quickly and has a small footprint, it is easy to scale up to protect hundreds of thousand endpoints.

    Reviews from Real Users

    Below are some reviews and helpful feedback written by Fortinet FortiEDR users.

    An Owner at a security firm says, "The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers. The customer has literally about 800 cash registers. That was the use case for Fortinet FortiEDR - to get that down into a tiny space. The only way to do that was to use this product because it had that ability to unbundle services that were a surplus.”

    Chandan M., Chief Technical Officer at Provision Technologies LLP, mentions, “The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration.” He also adds, “The security is also very good and the firewall response is good.”

    Harpreet S., Information Technology Support Specialist at Chemtrade Logistics, explains, "It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."

    DeAndre V., Senior Network Administrator at a financial services firm, states, “The dashboard is easy to follow and use. The deployment and uninstalling were easy. I like the detailed information about the path of a file that might be suspicious. Being able to check that out was easy to follow. Exceptions are easy to create and the interface is easy to follow with a nice appearance.

    Check Point Harmony Endpoint is a robust security solution that enables users to use a single piece of software to accomplish tasks that often require the use of multiple pieces of software. It prevents impending threats from doing harm while at the same time enabling users to identify and deal with any harm that results from breaches. 

    Check Point Harmony Endpoint provides users with an excellent total cost of ownership. It combines six security solutions into a single powerful solution. Instead of being unwieldy, it is, in fact, a highly flexible solution. Users can easily manage and deploy it on site in their offices or via the cloud according to their needs. It upgrades effortlessly without ever causing disruptions to the work users are doing. The end result is a high return on a user’s investment.

    Benefits of Check Point Harmony Endpoint

    Some of the benefits of using Check Point Harmony Endpoint include: 

    • The ability to completely protect endpoints from all manner of immediate digital threats. Check Point Harmony Endpoint stops both malware and phishing sites from harming your networks. All files you receive or download are either run through Check Point Harmony Endpoint’s Threat Emulation sandbox, which scans it for malware, or sterilized by a Threat Extraction process. These prevent malware from ever entering your system. It also prevents phishing sites from stealing credentials. The software scans the sites and, if they are found to be malicious, they are locked out of the system. All of this occurs in real time. 
    • The ability to quickly recover from any attack which manages to do damage to your system. Check Point Harmony Endpoint’s automation responds to a threat once it is detected. Any device that is infected is automatically quarantined from the rest of the network and disinfected. This prevents further infection and allows administrators to render the machine safe for use. It also automatically creates reports which break down the nature of the attack and all other relevant details. These reports give users the information that they need to conduct triage and repair the damage done by an attack.

    Check Point Harmony Endpoint offers users a piece of security software which is completely cutting-edge. It stands out among its competitors for a number of reasons. Two major ones are the raw power of the solution and the usefulness of Check Point Harmony Endpoint’s built-in automation. Check Point Harmony Endpoint has a high ceiling when it comes to dealing with threats. Users are given the ability to decide how aggressively they want to employ it, which creates a great deal of flexibility. Check Point Harmony Endpoint’s automation is constantly running in the background of the program. It creates reports that empower users to take appropriate steps to protect their systems.

    Reviews from Real Users

    Sumit B., a consultant at Cognizant, notes the usefulness of Check Point Harmony Endpoint’s built-in automation. He writes, “SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth.”

    A PeerSpot user who serves as a Network Technical Specialist at a manufacturing company adds that “It's pretty complete for preventing threats to endpoints. Its capabilities are great.”

    ZoneAlarm protects you by preventing hackers from remotely accessing and controlling your device, and lets you know which apps have excessive permissions so you can decide whether they threaten your privacy.

    Learn more about Fortinet FortiEDR
    Learn more about Check Point Harmony Endpoint
    Learn more about ZoneAlarm
    Sample Customers
    Financial, Healthcare, Legal, Technology, Enterprise, Manufacturing ... 
    Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
    Terma, Optix, Samsung Research Amercia, SF Police Credit Union, Independence Care System, Mattias Thomsen, Carmel Partners, Desert Research Institute, CRIF, FXCM Inc, US State Agency
    Top Industries
    Financial Services Firm22%
    Comms Service Provider11%
    Educational Organization6%
    Media Company6%
    Computer Software Company16%
    Manufacturing Company8%
    Financial Services Firm7%
    Financial Services Firm20%
    Computer Software Company15%
    Manufacturing Company11%
    Healthcare Company9%
    Computer Software Company16%
    Comms Service Provider11%
    Construction Company7%
    Security Firm43%
    Computer Software Company14%
    Logistics Company14%
    Comms Service Provider21%
    Security Firm15%
    Computer Software Company10%
    Financial Services Firm9%
    Company Size
    Small Business39%
    Midsize Enterprise21%
    Large Enterprise39%
    Small Business31%
    Midsize Enterprise19%
    Large Enterprise50%
    Small Business45%
    Midsize Enterprise19%
    Large Enterprise35%
    Small Business31%
    Midsize Enterprise20%
    Large Enterprise49%
    Small Business72%
    Midsize Enterprise11%
    Large Enterprise17%
    Small Business33%
    Midsize Enterprise20%
    Large Enterprise46%
    Buyer's Guide
    EPP (Endpoint Protection for Business)
    November 2023
    Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in EPP (Endpoint Protection for Business). Updated: November 2023.
    745,341 professionals have used our research since 2012.

    Check Point Harmony Endpoint is ranked 8th in EPP (Endpoint Protection for Business) with 49 reviews while ZoneAlarm is ranked 16th in Anti-Malware Tools with 7 reviews. Check Point Harmony Endpoint is rated 8.6, while ZoneAlarm is rated 8.0. The top reviewer of Check Point Harmony Endpoint writes "Resilient by design, provides redundancy, and offers ongoing constant improvements". On the other hand, the top reviewer of ZoneAlarm writes "Maintains continuity, prevents malicious attacks, and offers helpful configuration capabilities". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas ZoneAlarm is most compared with Microsoft Defender for Endpoint, Malwarebytes, Bitdefender GravityZone EDR, Avira Antivirus and ESET PROTECT Enterprise.

    We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.