Try our new research platform with insights from 80,000+ expert users
Christal Tan - PeerSpot reviewer
Network and Cybersecurity Engineer at Respiro
Reseller
Jan 29, 2024
A tool that offers great functionalities in areas like web protection and threat prevention
Pros and Cons
  • "The most valuable features of the solution are web protection and threat prevention."
  • "A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings."

What is our primary use case?

When it comes to Check Point Harmony Endpoint, I have not dealt with any of our company's clients yet since I am still in the discovery phase.

What is most valuable?

The most valuable features of the solution are web protection and threat prevention.

What needs improvement?

A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings. Sometimes the product's page doesn't load at all, and sometimes it does. The position of the tabs and the other stuff on the product page needs to change a little bit.

I think the product's deployment process is much quicker in Mac devices, and it takes a bit more steps for Windows and the area, which needs a bit of improvement so that some balance is created when it comes to the steps in the deployment phase.

Considering last year, the pace at which the technical support team is progressing is a bit slow, making it an area where improvements are required.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for a year. My company has a partnership with Check Point Harmony Endpoint.

Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a nine out of ten.

My company mostly caters to the needs of small companies where the solution is used.

How are customer service and support?

I rate the technical support an eight out of ten.

How was the initial setup?

I rate the product's initial setup phase a ten on a scale of one to ten, where one is a difficult setup phase, and ten is an easy setup process.

The solution is deployed on the cloud.

The solution can be deployed in around ten minutes.

What's my experience with pricing, setup cost, and licensing?

I recently started to look for the prices of other products in the market and found out that Check Point Harmony Endpoint is cheaper than most of the other available solutions in my country. Price-wise, the product is affordable. There are no additional costs apart from the licensing charges that are attached to the product.

What other advice do I have?

Check Point Harmony Endpoint is a really good endpoint security solution because it comes as a full package. With the solution, there are not many additional costs for add-on features, especially when compared to the costs of the add-ons offered by other solutions in the market.

I rate the solution a ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1625493 - PeerSpot reviewer
Chief Information Security Officer at a consultancy with 1-10 employees
Real User
Jan 15, 2024
A scalable tool that offers great EDR functionalities
Pros and Cons
  • "Scalability-wise, I rate the solution a ten out of ten."
  • "It's not easy to investigate an incident that you find in the company. Users often face trouble when downloading files, so it is very slow in terms of how it works."

What is our primary use case?

I work as a consultant for a company where the solution is needed as an EDR solution. After my company made comparisons between a few companies, we felt Check Point Harmony Endpoint won, considering the pricing model that it offered in the market. The company that uses the product wants to set up a big business for some local authorities with the help of the EDR functionalities provided by Check Point Harmony Endpoint, which is why Check Point is also trying to push its product into the market.

What is most valuable?

The most valuable features of the solution stem from the EDR functionalities it provides to users, as it does its work properly.

What needs improvement?

The tool is not too intuitive if you want to monitor and see the results to investigate in a layer. It's not easy to investigate an incident that you find in the company. Users often face trouble when downloading files, so it is very slow in terms of how it works. The tool is not very supportive of all the versions when it comes to the part of loading hash codes, so it may support SHA-1 but not SHA-256, meaning it doesn't support all the formats. Calling the support team for the solution doesn't help.

The support team of the solution lacks etiquette. The technical team of the product told our company that we need to get Check Point products through an official vendor only. Technical support for the solution is an area with issues where improvements are needed.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for two years. I work as a consultant for a company where the solution is used.

What do I think about the stability of the solution?

It is not a stable solution because if users find a problem with it, they have to disable the product.

Stability-wise, I rate the solution a six out of ten.

What do I think about the scalability of the solution?

It is easy to use the scalability feature of the product since users just need to acquire more licenses.

Scalability-wise, I rate the solution a ten out of ten.

The product is used mostly by small-sized businesses.

How are customer service and support?

I rate the technical support a four out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

CrowdStrike, SentinelOne, Cynet, and Fortinet FortiGate are a few of the solutions that I have worked with in the past. Among all the solutions that I have used to date, CrowdStrike is the best.

How was the initial setup?

I rate the product's initial setup phase a seven out of ten on a scale of one to ten. Compared to Check Point Harmony Endpoint, the deployment process of CrowdStrike was much easier.

Compared to Check Point Harmony Endpoint, the deployment process of CrowdStrike was much easier as it could be deployed in hundreds of locations in two hours. Check Point Harmony Endpoint's deployment process takes a week to be completed. Check Point Harmony Endpoint's deployment process takes time since there are many troubles, as my company has to meet with the client to conduct certain checks, owing to which it cannot be deployed through a central management process.

The number of people required to take care of Check Point Harmony Endpoint's deployment process depends on the organization's size. One good engineer is enough to take care of the product's deployment process. Having ten engineers without knowing the product or issue cannot help a user deal with the tool's deployment area, and it is usually the same for each product deployed in any company.


What's my experience with pricing, setup cost, and licensing?

I rate the product price a four on a scale of one to ten, where one is low, and ten is high.

The problem with the product is that Check Point tries to push it to the market. FortiGate, a firewall solution I purchased for the first time around twelve years ago, was very cheap because Fortinet had to push the product into the market. Users can get it for good prices only during the beginning phase of the tool.

Our company has to make yearly payments towards the licensing charges attached to the solution. There are no additional charges attached to the product apart from the licensing costs attached to the solution.

What other advice do I have?

The maintenance of the product is difficult since it is something to be done online.

To those who plan to use the solution of the future, I would say that they get the support involved in the contract before purchasing the product.

I rate the overall tool an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.
Ishant Gupta - PeerSpot reviewer
Trainee - cybersecurity engineer at Integrated Tech9labs Pvt. Ltd.
User
Nov 1, 2023
Good threat detection with real-time scanning and automatic updates
Pros and Cons
  • "It has significantly bolstered our overall cybersecurity posture."
  • "One aspect that could see enhancement is the user interface."

What is our primary use case?

In our corporate environment, the primary use case for Check Point Antivirus is to provide robust endpoint antivirus protection. 

Our organization operates within a complex digital ecosystem, and ensuring the security of our network and devices is of utmost importance. 

Check Point Antivirus serves as the frontline defense, guarding against a myriad of cyber threats that could compromise our sensitive data and operations. 

Our organization operates in a dynamic and interconnected digital landscape, and ensuring the security of our network and devices is paramount

How has it helped my organization?

Check Point has brought about tangible improvements within our organization. It has significantly bolstered our overall cybersecurity posture. 

We've witnessed a noticeable enhancement in our ability to detect and respond to threats promptly. 

This solution has reduced risks and vulnerabilities, contributing to a more secure and reliable digital environment for our company. 

However, it's worth noting that no antivirus solution is foolproof, and the effectiveness of our security measures also relies on user awareness and best practices.

What is most valuable?

Among the features offered by Check Point Antivirus, the real-time scanning and automatic updates stand out as the most valuable. Real-time scanning ensures that threats are detected as soon as they appear, minimizing the potential damage they can cause. Automatic updates, on the other hand, keep our antivirus protection up-to-date with the latest threat intelligence and security patches. These features combine to offer a proactive and effective defense against a constantly evolving threat landscape.

What needs improvement?

While we find Check Point Antivirus to be a powerful tool, there are areas where it could be improved. One aspect that could see enhancement is the user interface. A more user-friendly and intuitive interface would make it easier for our security team to navigate and manage the solution efficiently. Additionally, improvements in reporting capabilities would enable us to better analyze security incidents and fine-tune our defenses.

Looking ahead to the next release of Check Point Antivirus, we hope to see advanced threat analytics as a part of the package. This would enable us to proactively identify emerging threats and vulnerabilities, allowing us to stay one step ahead of potential risks. 

Furthermore, greater customization options would be valuable, as they would allow us to tailor our security measures to the specific needs of our organization. In an ever-evolving cybersecurity landscape, these features would further empower us to protect our digital assets effectively.

For how long have I used the solution?

We have been using this antivirus within our company for six to eight months now.

What do I think about the stability of the solution?

It is quite a stable product.

What do I think about the scalability of the solution?

It is a scalable product across your enterprise and secures you from threats.

How are customer service and support?

Sometimes there is a delay in customer support, however, the issue is resolved at the end.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We've used Sophos previously, however, it made our systems very slow in performance.

How was the initial setup?

The initial setup is straightforward.

What about the implementation team?

We implemented the solution with an in-house team.

What's my experience with pricing, setup cost, and licensing?

There is minimal effort needed for the setup and deployment.

Which other solutions did I evaluate?

We also evaluated Trend Micro before choosing Check Point.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Sales Manager, Checkpoint at South Asian Technologies
Reseller
Jul 17, 2023
A solution with a number of valuable blades that make it competitive
Pros and Cons
  • "With the prevention blade, Harmony scales higher than many other solutions."
  • "I have a few issues when attempting to install Harmony on some of the machines."

What is our primary use case?

I handle Check Point SMB along with Check Point Harmony Endpoint, and I have recently provided around 400 endpoints to a construction company in Sri Lanka.

What is most valuable?

The Rollback feature is valuable because ransomware attacks are very familiar nowadays, and anti-phishing and anti-ransomware blades are required by many of our customers. Other features, like prevention blades, are also okay, where you get threat extraction and evaluation. Likewise, the forensic report is also very important.

With the prevention blade, Harmony scales higher than many other solutions. Even CrowdStrike has technical problems when you're offline. But Harmony is not like that. Even if I don't have Internet connectivity, I have seen how remediation and rollback happen. All the encrypted files come to a state where it works with micro-backups.

Customers would like to have a very advanced endpoint to protect themselves from anti-phishing, especially ransomware.

What needs improvement?

I have clients who use very old Windows versions, so I have a few issues when attempting to install Harmony on some of the machines. At times, even with the latest Windows versions, the machines' performance gets slower. We still don't have a clear idea of what has been happening. If you take 100 PCs, two, three, or four are still troublesome when you attempt to install Harmony.

Also, the price could come down slightly, and I am not saying by a huge gap, but slightly. Even Sri Lanka's smaller customers have to buy a minimum quantity, and with Harmony Connect, they have to buy 50 licenses at once. If they could come down to 20, 30, or something like that, I should be able to sell much more. Some customers would like to have Harmony, but they have to buy a minimum quantity of 50. That's a bit troublesome for me as a salesperson.

For how long have I used the solution?

I have worked with Checkpoint Harmony Endpoint for almost one year now.

What do I think about the stability of the solution?

I rate the solution's stability a nine out of ten.

What do I think about the scalability of the solution?

I highly rate the solution's scalability.

How are customer service and support?

We have a set of engineers who specialize in Harmony Endpoint and Harmony Connect.

How would you rate customer service and support?

Positive

How was the initial setup?

The deployment takes one or two weeks. The deployer always creates a tenant, through which they install the solution. They also trained customers and end users to install Harmony, and they managed to install the entire license.

What's my experience with pricing, setup cost, and licensing?

I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high.

What other advice do I have?

Features like factory remediation, basically callback, are getting familiarized by Sri Lankan customers. Many have bought Harmony endpoints, so many customers have been considering Harmony Connect. This will lead to it having a good future.

When speaking to customers, I first communicate what ThreatCloud is all about. ThreatCloud is shared by other solutions like CloudGuard, Quantum, and Quantum Spark. It's very common to them. This means you will get the prevention blade, not the detection blade. Whenever you have phishing attacks, malware attacks, DDoS attacks, and even zero-day attacks, they are all always prevented by Check Point Harmony and Check Point products.

I always advise people to go for an advanced endpoint because IT managers have less of a hassle when using products like Check Point.

I have been facing lots of competition with CrowdStrike and Kaspersky. I don't think other products should compete with Check Point Harmony Endpoint because it is a different level endpoint altogether. I want to give them competition with the pricing.

I rate Check Point a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Complaints analysis/investigation at compugana
Real User
Feb 2, 2023
Great features, helps with blocking unauthorized access, and protects data
Pros and Cons
  • "With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access."
  • "We'd like to see better integration with other security tools."

What is our primary use case?

Check Point Antivirus helps us to protect our networks and systems against computer threats such as viruses, spyware, malware, and online attacks. It helped us greatly improve the security perimeter with its advanced features, such as intrusion prevention, threat detection, and access control, which help to protect sensitive data and company information. It's helped us shrink all the security gaps and is an excellent tool for protecting all the endpoints of an organization. If the company must be audited, it helps a lot to meet many of the compliance requirements.

How has it helped my organization?

Check Point Antivirus helped us to improve in several ways. It offers advanced features such as data protection. With it, we were able to protect sensitive and confidential company data from online threats and external attacks. 

We also achieved intrusion prevention using intrusion detection to prevent attacks on the company network. 

With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access.

With its various features, we can enable business continuity with adequate protection while minimizing risks in operations.

What is most valuable?

Some of the Check Point Antivirus features that users may find valuable include:

The firewall helps provide protection to block unauthorized access to the network.

Intrusion prevention prevents attacks on the company network and helps companies to comply with regulatory requirements related to data protection.

It has a wide range of features that help make this tool one of the best on the market.

What needs improvement?

As with any tool, improvements can be made. Some improvements that would be useful include:

  • An updated user interface to improve it to make it easier to use.
  • Integration with other security tools. We'd like to see better integration with other security tools.
  • They should incorporate artificial intelligence and machine learning 
  • Performance could be better to reduce the impact on system resources as it consumes a lot of resources from some endpoints.

For how long have I used the solution?

The solution was implemented approximately five years ago.

What do I think about the stability of the solution?

The tool was designed to be highly stable with regular software updates and proactive monitoring.

What do I think about the scalability of the solution?

It is a highly scalable tool that has centralized management, automatic updates, and load-balancing capabilities. 

How are customer service and support?

They must improve support and customer service by improving response times and their SLA.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, we only used an antivirus on the devices. After migrating our platform to the cloud, we needed a more robust tool and chose Check Point. 

How was the initial setup?

The installation of the product is complex if you do not have any previous knowledge. Once that learning curve is overcome, the administration and configuration become easy.

What about the implementation team?

The implementation was done in conjunction with an engineer from the provider and the IT department.

What was our ROI?

It is always good to generate an implementation plan for the acquisition and company requirements to make the best purchase decision and to gain a quick return.

What's my experience with pricing, setup cost, and licensing?

The price and licenses will depend on the features and functions that need to be implemented, as well as the number of devices needed. It is easy to install, however, you must have prior knowledge of the product.

Which other solutions did I evaluate?

We evaluated several solutions on the market that met the characteristics and requirements that we needed. Some were:

What other advice do I have?

It is always important to do a cost analysis and check requirements before making a decision.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Adhi Wahyu - PeerSpot reviewer
Network Engineer at RSUP Dr. Sardjito
Real User
Top 5
Sep 22, 2022
Great real-time scans, east central management, and helpful support
Pros and Cons
  • "The reporting feature where we can see and monitor what happened on our client computers is useful."
  • "Check Point Harmony Endpoint (endpoint antivirus) has helped our organization by preventing further damage to the computers and the network by detecting and taking appropriate action (quarantine, clean, delete) to viruses and malware."
  • "They need to make the user interface on the server more intuitive and user-friendly."
  • "They need to make the user interface on the server more intuitive and user-friendly."

What is our primary use case?

We use Check Point on our 500 computers to protect them from viruses and malware. The network is a protected local area network with limited connectivity to the internet. Not all computers are connected to the internet; only users with the necessity to connect can access it. We also increase the protection from viruses/malware by disabling USB ports for mobile storage. With all the protection steps taken, we still see that antivirus is a must to have as standard computer protection.

How has it helped my organization?

With all security steps taken to protect the network, viruses and malware still appeared in the network. Check Point Harmony Endpoint (endpoint antivirus) has helped our organization by preventing further damage to the computers and the network by detecting and taking appropriate action (quarantine, clean, delete) to viruses and malware. 

By doing this, our organization's business can maintain its operational state without any significant disturbance, and that is the most important thing to achieve.

What is most valuable?

Some of the most valuable features from Check Point include:

1. Its ability to run real-time scans in the background and detect all the malware and viruses while taking action to clean the system from the threat.

2. On-premise centralized management, so the client can do signature updates locally and save the internet bandwidth.

3. The reporting feature where we can see and monitor what happened on our client computers. For example, which client has out-of-date signatures, which client is infected by what virus, et cetera. 

What needs improvement?

Some areas of improvement could be :

1. Making the user interface on the server more intuitive and user-friendly. 

2. Making it easier for the user to do tuning and configuration to the server or the client application. For example, to turn off notifications, the user should be able to do that with some clicks on the user interface instead of searching and reading about how to do it in the knowledge base first and then trying to do it.

3. Our application version is quite old, and Check Point already released a newer version for endpoint protection, which includes a cloud version. After doing some trials, we see that Check Point already made many improvements to the features and user interface.   

For how long have I used the solution?

I've been using the solution for five years.

What do I think about the stability of the solution?

Tthis solution runs with good stability.

What do I think about the scalability of the solution?

If we deploy it on-premise, we should see the server hardware requirement first and match it with the number of clients we want to handle.

How are customer service and support?

Customer service gave good support when we needed it. For example, when we need support on renewing the license or when we need to upgrade the client version, they have a quick response time to deal with the problem.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did use a different solution previously. We switched as we want to use the same brand for our NGFW and our endpoint protection.

How was the initial setup?

The setup was quite straightforward. We installed the server first and then made the client installer. If you have an active directory on the network, you can install it with push installation. That said, we don't have it, so we needed to install the client by accessing the client directly.

What about the implementation team?

We implemented the product together with the vendor and an in-house team. The vendor team has good knowledge when it comes to implementing the product.

What's my experience with pricing, setup cost, and licensing?

At the time we purchased it, the licensing was separated into some modules. There were antivirus modules, data protection modules, and full modules if I'm not mistaken. You should make sure that the module you choose fits your requirement. 

Which other solutions did I evaluate?

We evaluated the ESET antivirus.

What other advice do I have?

Check Point has released their new product on endpoint protection, which includes a cloud version. You could try it for free to see if this product matches your needs before purchasing it.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
William Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Jun 23, 2025
Good scanning capabilities, excellent network security, and easy to configure
Pros and Cons
  • "It can scan the files that our users have downloaded to check if they have a virus."
  • "One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously."

What is our primary use case?

Check Point Antivirus is used with integrations in all the software of our company and also with connections to all the computers that we use in our employees. All operational areas have Check Point Antivirus implemented.

Check Point Antivirus has the ability to monitor the status of the network and know if there is any threat in our network and thus clean it immediately and maintain security.

In our organization, all departments of the company are protected and secure since the implementation and something important can be monitored in real-time from the application of Check Point Antivirus.

How has it helped my organization?

It was necessary to implement a tool to detect data leaks and protect the services in our business. The most sensitive software service was where Check Point began to be implemented, seeing how well it worked, it expanded to different areas of the business

With the implementation of Check Point, our computers have been safe within our network and have prevented the entry of threats thanks to the EDR system. We also needed a tool that had system recovery and this tool satisfactorily meets all our requirements.

What is most valuable?

All the features that Check Point antivirus presents are very important for the implementation of network security and the most valuable part of this tool is the easy and interactive way of its configuration through SmartConsole in Check Point.

It can scan the files that our users have downloaded to check if they have a virus, which is the most important thing. IPS and Antivirus work together, which provides more flexibility and security throughout our work environment and thus be able to have a well-secured infrastructure

What needs improvement?

One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously. However, once the update is done, it does not present any problem and works very well. The solution has high CPU and memory consumption on the firewall. It should work on the consumption of resources since we have also detected that the same thing happens with the performance of the users' machines.

The graphical interface of the solution should also improve a little since it is a little complicated to find certain objects to be able to make a configuration, in addition the guides are outdated and sometimes they do not match the interface which is sometimes complicated to implement.

For how long have I used the solution?

Check Point Antivirus was implemented 4 years ago..

What do I think about the stability of the solution?

It is a very stable product. However, we've had some problems with the updates.

What do I think about the scalability of the solution?

It has excellent scalability. The same profile can be used with the same exceptions in the management firewalls

How are customer service and support?

The technical support is regular. There are well-prepared technicians. There are others who are still lacking since some problems have arisen and it has cost them to solve them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Check Point as our first option.

How was the initial setup?

The initial configuration is simple since it presents a very intuitive graphical interface for the user. The configuration of blocking and allowing rules is easy since the panel was designed to make it as user-friendly as possible.

What about the implementation team?

The implementation was done together with the provider and was quite profitable. The provider was qualified to do this type of installation.

What was our ROI?

Our ROI is that we keep all our network and equipment safe and updated.

What's my experience with pricing, setup cost, and licensing?

I'd recommend you to try it. It is a good tool that allows and gives users the confidence to manage the network and keep it safe.

Which other solutions did I evaluate?

As we have already been working with different Check Point products, it was the first option to maintain a consistent line of technology.

What other advice do I have?

Before making the implementation, I'd advise users to verify the performance of the machines where it will be used.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
IdoSarusi - PeerSpot reviewer
Developer at Shavit-security
Reseller
Top 5Leaderboard
Jul 17, 2024
Has an efficient sandboxing feature, but the malware detection capabilities need improvement
Pros and Cons
  • "The initial setup was straightforward."
  • "There is room for improvement in detecting more sophisticated and emerging threats."

What is our primary use case?

We primarily install Check Point Antivirus on company computers and laptops to prevent malware infections, particularly focusing on protecting against phishing attacks and malicious downloads by employees.

How has it helped my organization?

The platform has significantly improved our organization's cybersecurity posture by effectively detecting and containing malware threats. 

What is most valuable?

The product's sandboxing feature is valuable as it runs suspicious files in a virtual environment. It helps us analyze their behavior without risking the main system.

What needs improvement?

The platform's malware detection capabilities could be enhanced. There is room for improvement in detecting more sophisticated and emerging threats.

Additionally, including AI-driven features that can automatically generate and optimize security policies based on the organization's specific needs and threats would be beneficial.

For how long have I used the solution?

I have been using Check Point Antivirus for about two to three years.

What do I think about the stability of the solution?

The platform has proven to be very stable. We have not encountered any major issues or downtime related to its operation.

What do I think about the scalability of the solution?

The product seamlessly scales from small to large deployments without any noticeable performance degradation. I rate the scalability a ten. 

How are customer service and support?

I have heard positive feedback regarding the technical support team's responsiveness and expertise.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup was straightforward. Installing agents and deploying the software on devices was simple, although configuring detailed security policies required some cybersecurity knowledge.

What other advice do I have?

I rate Check Point Antivirus a seven out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.