Try our new research platform with insights from 80,000+ expert users
reviewer1678761 - PeerSpot reviewer
Assistant Manager at CIANS ANALYTICS PVT. LTD
User
A good antivirus with excellent email alerts but needs better technical support
Pros and Cons
  • "We like the sandbox feature."
  • "Technical support could be better."

What is our primary use case?

We primarily use the solution as an antivirus. We want to protect our systems from malware and viruses.

We are still doing work from home and we are not sure how long this will last. Before Check Point Harmony software, we depended on Windows Defender Antivirus, but we realized that it was not so good. We wanted some good AV so that users who are working on a VPN would have an antivirus installed on their system. 

Also, we wanted a sandbox feature so that, if any machine got infected, we can automatically isolate it from the network.

How has it helped my organization?

When starting, we faced many issues. It was due to a partner mistake, however. The partner gave us the wrong setup which caused laptops to crash and it lowered the efficiency. We escalated to our Check Point sales account manager. He immediately set us up with some other partner and tried to resolve the issue. He found the root cause, but still, we needed to format the system. It has been more than 3 months, and now the user's system is working fine. 

We always receive alert emails from Check Point regarding malware or virus status, which is helpful.

What is most valuable?

We like the sandbox feature. If any machine got infected, it would get automatically isolated from the network. As such, we haven't faced any issues. We like that we have an option to isolate. 

The alert email from Check Point is also very valuable. If any machine didn't get a scan or has a virus due to visiting various websites on a browser, it automatically sends us an email to warn us. Accordingly, we can take action on that particular machine. 

Overall, the antivirus is good.

What needs improvement?

Technical support could be better. When we register a complaint, we need to register it via the portal only, which is atime consuming.

When we register the complaint, it says there's a minimum of four hours of turnaround time which is high. It should be a minimum of 60 minutes. 

The GUI of Harmony is very slow to upload. I'm not sure if it is due to the internet, but still, at times, we found that when we click on any tab, it takes a minimum of five seconds to get it open.

All other things are okay from our end.

One feature we want to add is an EDR/XDR into this antivirus module.

Buyer's Guide
Check Point Antivirus
May 2025
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.

For how long have I used the solution?

I've been using the solution for 4 months.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

I found the solution to be okay. I'm not sure how others are providing the support as we haven't checked that.

How are customer service and support?

Technical support is good.

Which solution did I use previously and why did I switch?

No, we haven't used any other antivirus. It was by default in Windows.

How was the initial setup?

The initial setup was okay.

What about the implementation team?

We implement it through a vendor. 

I would rate their level of service at a 2 out of 5 where 1 is lowest and 5 is best.

What was our ROI?

If we talk about ROI, then the solution is good, as we are getting a sandbox feature in it plus the VPN licenses if we have the Check Point firewall.

What's my experience with pricing, setup cost, and licensing?

The setup is okay depending on the partner and what the relationship is with you and your partner. The pricing is okay.

Which other solutions did I evaluate?

Yes, we have evaluated other options. For example, we've evaluated Sophos.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Regularly updated and has good event visibility and logging
Pros and Cons
  • "There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives."
  • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point Antivirus software blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of scanning files that are traversing the network for the presence of viruses or other malicious software.

How has it helped my organization?

The Check Point HA Clusters are used to protect our company's datacenter, located in Asia (Taiwan). This software blade, the Check Point Antivirus, is activated in conjunction with the others and serves to scan the files traversing via the network. They may be in the form of email attachments or via HTTP/S.

Such files are scanned for the presence of known viruses and malware with the help of the built-in database. The database is updated as per schedule, which for us is four times per day.

The software is quite simple to use, yet still efficient. The antivirus scans are the basic security mechanism, which should be implemented on all the levels. In my opinion, the Check Point Antivirus does its job just right.

What is most valuable?

  1. The Antivirus software blade is part of the Next Generation Threat Prevention license bundle.
  2. The Antivirus is able to scan files downloaded from the internet or traversing the network via Check Point Gateways/Clusters.
  3. The Antivirus software blade is configured via the Unified Threat Prevention policy in the Smart Console (at least for R80.10, the version we use).
  4. There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives.
  5. The updates for the blade are downloaded every two hours.
  6. As with the other Check Point blades, the visibility and logging of events are outstanding.

What needs improvement?

I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

We also had several support cases opened for software issues, but none of them were connected with the Check Point Antivirus software blade.

For how long have I used the solution?

We have been using this product for about three years, starting in late 2017.

What do I think about the stability of the solution?

The Check Point Antivirus software blade is stable and we haven't faced any issues with it.

What do I think about the scalability of the solution?

The Check Point Antivirus software blade scales well with the gateways we use, since it doesn't affect the overall performance much after activation.

How are customer service and technical support?

We have had several support cases opened, but none of them were connected with the Check Point Mobile Access Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

The longest issue took about one month to be resolved, which we consider too long.

Which solution did I use previously and why did I switch?

No, we didn't previously use another network antivirus solution.

How was the initial setup?

The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

What about the implementation team?

Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

What's my experience with pricing, setup cost, and licensing?

Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

Which other solutions did I evaluate?

No, since we had Check Point NGFWs implemented, we just enabled the new software blade.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Antivirus
May 2025
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
OumarDiallo - PeerSpot reviewer
Cyber Security Engineer at AFRICAN CYBERSECURITY MARKET
Real User
Easy to set up, allows you to manage all the endpoints, works against every attack, and has helpful technical support
Pros and Cons
  • "What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security. You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution."
  • "An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher."

What is our primary use case?

We use Check Point Antivirus for cyber security purposes.

What is most valuable?

What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security.

You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution.

What needs improvement?

An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher.

For how long have I used the solution?

I've been using Check Point Antivirus for six months.

What do I think about the stability of the solution?

Check Point Antivirus is a stable solution. It's a very good solution.

What do I think about the scalability of the solution?

Check Point Antivirus is a scalable solution.

How are customer service and support?

The technical support for Check Point Antivirus is helpful, but sometimes, it isn't easy to reach the support team.

On a scale of one to five, my rating for Check Point Antivirus support is four.

How was the initial setup?

Setting up Check Point Antivirus wasn't difficult because it just required downloading the software, then installing it where you want to install it. There wasn't any issue with the initial setup of Check Point Antivirus.

How long the deployment of Check Point Antivirus takes would depend on the number of client endpoints, but the process could take just five or six minutes maximum. If your internet connection is slow, then deploying Check Point Antivirus would take longer.

What about the implementation team?

I implemented Check Point Antivirus myself.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is an expensive solution, especially for clients that don't have as many endpoints.

Check Point Antivirus has a free trial for one month, and within the trial period, there's no limit to the number of endpoints it can support, but when the trial expires, you'll have to buy the license, which covers one year.

You can't buy a license for the solution without being a Check Point partner first.

What other advice do I have?

I'm using the latest version of Check Point Antivirus.

I deploy Check Point Antivirus for the customer. I'm a network and cyber security engineer, so I provide Check Point Antivirus to clients. I'm an integrator, and currently, my clients have a total of one hundred fifty endpoints on Check Point Antivirus. I also manage the solution for clients, which includes reporting, looking into the traffic and attacks, then I explain whatever's going on to the clients.

Maintenance can be done on Check Point Antivirus, and you just have to select the user that's very vulnerable to attacks, then that would trigger maintenance, and Check Point Antivirus would update automatically. It isn't difficult as long as your internet is good.

I would recommend Check Point Antivirus to others because it's very good software, and it works against every attack. Check Point Antivirus is an important solution.

On a scale of one to ten, my rating for the solution is eight because there's still room for improvement.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
reviewer2098998 - PeerSpot reviewer
Software Engineer at Mercado Libre
User
Good pricing, easy to deploy, and useful antivirus capabilities
Pros and Cons
  • "The virus detection models orchestrate real-time monitoring of data with reliable reporting information."
  • "The next release can focus more on timely upgrades to enhance computing compatibility."

What is our primary use case?

Check Point Antivirus helps us to detect malware attacks and any phishing attacks that can destroy data and affect programs. 

When installed in any computing device, it provides tracking information that enables members to connect virtually with colleagues in remote areas. It is less costly since it enables members to access company websites from anywhere. 

The endpoint protection services ensure there is data security across the defined network infrastructure. It protects our devices against virus attacks.

How has it helped my organization?

The antivirus has enhanced the secure implementation of most projects and tasks among teams in the enterprise. 

The pricing is good, and it is easy to deploy this software. 

When linking with my colleagues from remote areas, it ensures the communication network is free from cyber attacks. 

The virus detection models orchestrate real-time monitoring of data with reliable reporting information. 

It has reduced the cost of attending events physically and catering accommodations for employees. 

The threat response system has saved teams from engaging with unsafe content and visiting unprotected online sites.

What is most valuable?

It provides automatic scans to most websites to ascertain security situations and alerts the user when there are potential threats that can affect data. 

The webcam protection system prevents unauthorized members from joining virtual meetings organized by employees. 

The phishing protection system prevents teams from spamming across email conversation channels. 

It is easy to install and learn how this platform works. 

It has various location connection that enables the user to select preferred sites that are safe.

What needs improvement?

I am satisfied with the set features due to their competitive performance since we deployed them. 

Integration with some applications was challenging during the deployment process. 

The next release can focus more on timely upgrades to enhance computing compatibility. 

The cost is worth its functionalities and contribution towards the protection of our systems. 

The software services and functions have met the company's requirements and policies. 

There are many notifications that keep streaming in when using the antivirus, and that can be improved.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

It is stable in virus prevention.

What do I think about the scalability of the solution?

I am impressed by the reliable services of this platform.

How are customer service and support?

There have been improved customer support services since we deployed them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used any similar antivirus products.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The implementation took place through the vendor.

What was our ROI?

There is increased ROI from a stable performance.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is the best platform for preventing virus penetration.

Which other solutions did I evaluate?

I looked into other options. The cost and performance capability of this version were the best.

What other advice do I have?

This is a great product that I recommend to other organizations.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Improves security, defines policies, and helps with compliance
Pros and Cons
  • "Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity."
  • "There needs to be more internally connected systems in order to achieve real-time effectiveness."

What is our primary use case?

In search of a solution that allowed us to analyze, detect, evaluate and, above all, correct at the antivirus level within the network in a perimeter way, we have used the solutions that come in the Check Point appliances, thus giving us the possibility of enabling a lot of its most outstanding features.

How has it helped my organization?

We had been trying to complement the antivirus solution across our computers. We searched and tested different providers, reaching the conclusion that we could get the most out of solutions that we already had as they were already giving us additional protection. We needed, however, additional protection that would allow us to configure from a perimeter device all the conditions, rules, policies, and needs for blocking or security in the organization's network. With this solution, we could generate value and security in each of the actions that users have within the perimeter network. 

What is most valuable?

Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease. 

What needs improvement?

We should be able to generate client applications based on a structure and scheme that uses the power of computation of local devices to generate interaction and remote management. There needs to be more internally connected systems in order to achieve real-time effectiveness. The solution should establish communication in real-time, thereby multiplying those possibilities of interaction in a faster way when it comes to communicating against your central server. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ankita  Singh - PeerSpot reviewer
Application Developer at Capegemini Consulting India Private Limited
Real User
Top 20
Highly productive, compatible, and easy-to-use
Pros and Cons
  • "Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background."
  • "Overall I didn't personally face any issues while implementing Check Point Antivirus."

What is our primary use case?

After implementing Check Point Antivirus, we've had a few compatibility issues with my devices.

Check Point Antivirus proved to be highly productive for my work and has helped with data security via its features. It offers VPN capabilities and provides multiple device protection. It is very easy to monitor results across all covered devices.

Check Point Antivirus is highly compatible with other solutions and is scalable while offering extremely low pricing.

How has it helped my organization?

Check Point Antivirus proved to be highly productive and scalable for my work. The data security features, including malware detection and escalation, operated quickly. There are multiple devices protected by the software. It is now very easy to carry out and monitor results from the same task across all devices.

Check Point Antivirus automatically fixes pop-up ads and effortlessly detects all kinds of malware and threats while syncing systems in the background.

What is most valuable?

Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background.

Along with Check Point Antivirus, the support provides multiple updates and upgrades in quick succession. It's quick to restore the management of the database and has scheduled security system and network upgrades for risk-free work management.

Overall, Check Point Antivirus is highly productive, scalable, compatible, and easy-to-use software for data security and system management. I highly recommend this platform.

What needs improvement?

There are no areas that Check Point Antivirus needs to work on.

Overall I didn't personally face any issues while implementing Check Point Antivirus. In comparison to alternatives present in the market Check Point Antivirus has high efficiency and a better ability to protect our devices both online and offline.

Personally, I highly recommend this platform to professionals for data security and management.

For how long have I used the solution?

I've used Check Point Antivirus integration for approximately one year or so.

Which solution did I use previously and why did I switch?

I haven't used any other such platform for data security and system management.

What's my experience with pricing, setup cost, and licensing?

Overall, Check Point Antivirus is highly productive, scalable, compatible, and very easy to use. It's good software for data security and systems management and I highly recommend it.

Which other solutions did I evaluate?

I did look into other options. For a simple comparison, I visited certain websites for product reviews. In the end, I found Check Point Antivirus to be the best option.

What other advice do I have?

Go for it. First, implement it and see the change in your levels of security.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Good security features and excellent protection from malware and ransomware
Pros and Cons
  • "One of the characteristics of this antivirus that is valuable is the detection of ransomware."
  • "We'd like them to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident."

What is our primary use case?

We had an absence of an antivirus utility that would give us protection inside and outside the organization. This tool integrated into several Check Point solutions helped us remedy this need. Starting from there, we have been applying this feature to meet the need and keep our users safe and secure. 

This solution is consistently implemented as part of the organization's endpoint security solution, combining global threat intelligence and next-generation advanced threat prevention engines. 

How has it helped my organization?

The endpoint security features are great. You not only have a solution that manages your computer but also protects you from malware, ransomware, and also from any other virus. You can do so from wherever you are and connect your computer to the internet. This feature learns well and is supported by global threat intelligence and zero-day threat prevention engines and many of the new generation. 

For us, it is important to have solutions that always protect and innovate the security of users and above all security and protection in real time. 

What is most valuable?

One of the characteristics of this antivirus that is valuable is the detection of ransomware. I can detect viruses that have done the most damage in recent years. I can protect users from damages and total or partial loss of information. We're being well protected. This protection feeds on databases that are constantly updated, giving greater security. It is worth using, and having in our organization is one of the products that will make the difference during an attack and will safeguard the security of the equipment.

What needs improvement?

I would like to see, in the future, this virus emulation feature deployed to endpoint security where it sends the virus found in sandboxing and emulates the attack, notifying administrators via a portal so that they can find out and learn from the attack that they are having.  

Another point to consider is the ability to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the scalability of the solution?

It is easy to configure and is not very invasive with users, which makes it very practical to use.

What's my experience with pricing, setup cost, and licensing?

Their service in Spanish is something that we need. We've had a bad taste based on this part of the service. We need more attention to our language. 

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1738914 - PeerSpot reviewer
Network Operations Engineer at SFR
Real User
Scalable, easy to configure, and simple to manage
Pros and Cons
  • "It is very easy to manage the Antivirus blade, even for newcomers in our technical support team, which is a key area of interest for us."
  • "It may be interesting to improve this solution against zero-day attacks, as they happen very frequently and are clearly a severe threat."

What is our primary use case?

We are using the Antivirus blade to protect our organization against threats such as viruses/malware that could propagate in our information system and harm it in various ways. 

Thanks to the important database maintained by Check Point that relies on this blade, we can enforce a strong security policy on our devices and be compliant with the latest best practices regarding internet threats. 

We operate several firewalls in our organization and we especially need this kind of efficiency on the internet-facing ones.

How has it helped my organization?

The Antivirus blade has improved our organization in several ways, including having better global security against viruses and malware, having better visibility and protection regarding files that go in and out of our company, offering better scaling and integration with other security products, and probably offering better threat management. 

It globally helps us in having centralized management of all internet content, which is efficient in terms of managing exploitation and helps our technical support teams to fulfill their daily missions.

What is most valuable?

One of the features that we find most valuable is the simplicity of the configuration through the Smart Console interface. 

It is very easy to manage the Antivirus blade, even for newcomers in our technical support team, which is a key area of interest for us. 

Also, the sandbox feature is very interesting as it can automatically isolate an infected machine from the network, which is valuable. 

We could also talk about the real-time detection scan feature that can monitor files as they are being accessed, which allows for a quicker response time.

What needs improvement?

It may be interesting to improve this solution against zero-day attacks, as they happen very frequently and are clearly a severe threat. 

On a more practical level, the complaint opening process through technical support could be better, as it must be done through the portal only for now. 

On a financial level, prices for CP products could be improved. We know for sure that they are all high-quality products, however, sometimes it doesn't justify high prices on some products.

For how long have I used the solution?

We have been Check Point Antivirus for two years now.

What do I think about the scalability of the solution?

The solution is easily scalable among CP devices.

Which solution did I use previously and why did I switch?

We used the Stormshield solution and we switched to have a better integration with other security devices.

What's my experience with pricing, setup cost, and licensing?

The setup can be painful, and pricing/licensing can be high. That said, the quality is there.

Which other solutions did I evaluate?

Yes, we also evaluated Fortinet.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2025
Product Categories
Anti-Malware Tools
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.