Try our new research platform with insights from 80,000+ expert users
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle
User
Great support with faster data processing capabilities and a high level of security
Pros and Cons
  • "Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information."
  • "It blocks safe URLs sometimes when there are network interruptions."

What is our primary use case?

We deployed this product to harmonize our products and have one central access point. 

It helps us to set security features that protect the computing devices from malware attacks. 

It gives me an opportunity to manage applications that works on various workflows centrally. 

Integration with all employee devices has enabled my team to monitor the security situation and put in place emergency measures in case of any threat. 

Team members can connect their working devices from a central networking connection that is secure and reliable.

How has it helped my organization?

The high-level security provided by Check Point Harmony Endpoint has given my team all the required tools for setting up a central network control platform. It provides solutions to challenges that affect workflows slowing down performance. 

There is improved business work processes agility that keeps all the sectors functional. 

There has been improved security compliance and risk management in all the business transactions that we undertake since we deployed this application. 

Laptops and mobile devices that operate within the enterprise have been secured, and teams can easily focus on more productive roles without fear of being attacked.

What is most valuable?

Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information. 

The cloud management system provides security to hybrid information and saved files. 

The customer support services are efficient and always reliable when reached for any consultation. 

It supports operating systems that are deployed in computers and mobile devices. 

New users familiarize themselves easily with the operation of UI since it has flexible dashboards. 

The faster data processing capability saves time and costs for accomplishing given tasks.

What needs improvement?

It has full performance capability to execute the given duties. 

It blocks safe URLs sometimes when there are network interruptions. 

The cost of deployment varies with the existing working conditions and the organization's size. 

The cloud networking infrastructure can be attacked if there are limited security features and poor monitoring capacity from the IT team. 

The overall performance impressed my team. Check Point Harmony Endpoint is the sure deal for enterprise security coverage and computing device control.

Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for ten months.

What do I think about the stability of the solution?

It is stable in the provision of reliable security.

What do I think about the scalability of the solution?

I am impressed by the performance of this product.

How are customer service and support?

The customer support staff is ever supportive.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used a similar solution previously.

How was the initial setup?

The initial setup procedure was straightforward.

What about the implementation team?

There was high-level expertise from the vendor team during implementation.

What was our ROI?

There has been a positive ROI since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The setup cost and licensing terms vary according to enterprise size.

Which other solutions did I evaluate?

I evaluated several options. This platform was the best.

What other advice do I have?

I recommend the implementation of this platform in other organizations.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Improves security, defines policies, and helps with compliance
Pros and Cons
  • "Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity."
  • "There needs to be more internally connected systems in order to achieve real-time effectiveness."

What is our primary use case?

In search of a solution that allowed us to analyze, detect, evaluate and, above all, correct at the antivirus level within the network in a perimeter way, we have used the solutions that come in the Check Point appliances, thus giving us the possibility of enabling a lot of its most outstanding features.

How has it helped my organization?

We had been trying to complement the antivirus solution across our computers. We searched and tested different providers, reaching the conclusion that we could get the most out of solutions that we already had as they were already giving us additional protection. We needed, however, additional protection that would allow us to configure from a perimeter device all the conditions, rules, policies, and needs for blocking or security in the organization's network. With this solution, we could generate value and security in each of the actions that users have within the perimeter network. 

What is most valuable?

Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease. 

What needs improvement?

We should be able to generate client applications based on a structure and scheme that uses the power of computation of local devices to generate interaction and remote management. There needs to be more internally connected systems in order to achieve real-time effectiveness. The solution should establish communication in real-time, thereby multiplying those possibilities of interaction in a faster way when it comes to communicating against your central server. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Ankita  Singh - PeerSpot reviewer
Application Developer at Capegemini Consulting India Private Limited
Real User
Top 20
Highly productive, compatible, and easy-to-use
Pros and Cons
  • "Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background."
  • "Overall I didn't personally face any issues while implementing Check Point Antivirus."

What is our primary use case?

After implementing Check Point Antivirus, we've had a few compatibility issues with my devices.

Check Point Antivirus proved to be highly productive for my work and has helped with data security via its features. It offers VPN capabilities and provides multiple device protection. It is very easy to monitor results across all covered devices.

Check Point Antivirus is highly compatible with other solutions and is scalable while offering extremely low pricing.

How has it helped my organization?

Check Point Antivirus proved to be highly productive and scalable for my work. The data security features, including malware detection and escalation, operated quickly. There are multiple devices protected by the software. It is now very easy to carry out and monitor results from the same task across all devices.

Check Point Antivirus automatically fixes pop-up ads and effortlessly detects all kinds of malware and threats while syncing systems in the background.

What is most valuable?

Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background.

Along with Check Point Antivirus, the support provides multiple updates and upgrades in quick succession. It's quick to restore the management of the database and has scheduled security system and network upgrades for risk-free work management.

Overall, Check Point Antivirus is highly productive, scalable, compatible, and easy-to-use software for data security and system management. I highly recommend this platform.

What needs improvement?

There are no areas that Check Point Antivirus needs to work on.

Overall I didn't personally face any issues while implementing Check Point Antivirus. In comparison to alternatives present in the market Check Point Antivirus has high efficiency and a better ability to protect our devices both online and offline.

Personally, I highly recommend this platform to professionals for data security and management.

For how long have I used the solution?

I've used Check Point Antivirus integration for approximately one year or so.

Which solution did I use previously and why did I switch?

I haven't used any other such platform for data security and system management.

What's my experience with pricing, setup cost, and licensing?

Overall, Check Point Antivirus is highly productive, scalable, compatible, and very easy to use. It's good software for data security and systems management and I highly recommend it.

Which other solutions did I evaluate?

I did look into other options. For a simple comparison, I visited certain websites for product reviews. In the end, I found Check Point Antivirus to be the best option.

What other advice do I have?

Go for it. First, implement it and see the change in your levels of security.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC
User
Timely updates, comprehensive data management features, and good monitoring
Pros and Cons
  • "It monitors data flow across the networking system to enhance comprehensive workflow infrastructure."
  • "The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis."

What is our primary use case?

Harmony Endpoint helps the company to protect devices from phishing attacks. 

It offers instant notification when it senses any form of external threat that can compromise data. 

It can be easily deployed on both mobile and desktop devices. 

The product has saved my team a lot of time and resources during the project implementation process. 

It responds quickly to data threats that can leak internal information into an unsafe environment. We have accomplished many projects and submitted them successfully to our clients without any challenges since deploying Harmony Endpoint.

How has it helped my organization?

This solution provides threat intelligence to all sectors to enhance effective planning and decision-making before we get into trouble. 

It monitors data flow across the networking system to enhance comprehensive workflow infrastructure. 

Real-time monitoring provides essential tools for security configurations that cannot be interfered with by ransomware attacks easily. This is the best solution, far from other related software in attack prediction and threat analysis. It is cloud-based, and teams across the organization find it to be more flexible for real-time analytics.

What is most valuable?

Network monitoring provides the best reports based on real-time performance, which helps our members locate any drawbacks across the workflow system.

The threat response system from the user dashboard blocks malware attacks that can affect email and the flow of information among colleagues. 

Endpoint protection is fundamental in security enhancement; it's effectively protecting our devices from internet viruses.

The application investigation system enables the IT team to come up with reliable reports on the cause and prevention measures that can be adapted to prevent any future attacks.

What needs improvement?

The system has comprehensive data management features that have saved us from incurring unplanned losses. 

Timely updates and suitable configurations can block malware attacks and provide effective reports on security situations. 

The setup process was complicated, however, when the customer service team came in, they provided productive guidelines that have kept the system working efficiently. 

The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis.

For how long have I used the solution?

I've used the solution for 18 months.

What do I think about the stability of the solution?

This platform is highly stable, and the performance is awesome.

What do I think about the scalability of the solution?

The scalability has impressed all relevant teams.

How are customer service and support?

The customer service team is passionate about their work, and they provide timely responses.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with other related products.

How was the initial setup?

The setup was straightforward. We had assistance from the customer support team.

What about the implementation team?

implementation took place through the vendor team.

What was our ROI?

The targeted ROI has been achieved since we deployed the application.

What's my experience with pricing, setup cost, and licensing?

The setup and cost depend on the number of devices that have to be secured.

Which other solutions did I evaluate?

I evaluated Intercept X Endpoint. However, it did not impress the entire team.

What other advice do I have?

I am satisfied with the current performance and I thoroughly recommend Harmony Endpoint to other business enterprises.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1777338 - PeerSpot reviewer
Supervisor Tecnico at M.Coutinho Douro - ComÉrcio De AutomÓveis, S.A.
User
Good URL filtering and application control with useful dick encryption
Pros and Cons
  • "The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options."
  • "Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant."

What is our primary use case?

We're using this for our endpoint protection in terms of antivirus and malware protection, disk encryption, and URL and application filtering on our client computers.

We integrate the VPN feature with Check Point's firewall allowing our clients to access internal resources with security policies enforced and controlled.

The reports given by the software are also a benefit since it allows better management and control of access to all our client computers at any time from anywhere.

The web console is also nice.

How has it helped my organization?

We have all our information and policies on one platform for all the features, and we can assign our technicians' several permissions and roles on the product.

Our customers are also better protected, and we can guarantee that security policies are enforced and compliant in each one of them.

Security has been a significant focus for us, and Harmony Endpoint, together with the entire Check Point ecosystem, made it easy for our organization to enforce such policies.

We value the URL and app filtering of the platform.

What is most valuable?

The URL filtering and application control are very helpful since it's typically hard to block productivity loss apps/URLs on clients when abroad. Harmony made it easy to control the usage of the company resources and bandwidth.

Disk encryption is a nice feature if you don't have other systems. However, since we've already had BitLocker deployed, we saved a few dollars on this licensing type.

The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options.

What needs improvement?

Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant. URL filtering should allow for time-based rules, for example, don't allow media streaming during work hours yet allow it on weekends.

The same applies to application control. When in our headquarters, we can solve this on the Check Point Firewall. However, the Harmony client does not support this type of condition, and we had to find a "middle ground" between policies and usability for our clients.

For how long have I used the solution?

We've been using this solution for two years.

Which solution did I use previously and why did I switch?

We did use Microsoft Defender. It lacked features, and therefore we moved away from the solution.

What's my experience with pricing, setup cost, and licensing?

I'd advise users to try to implement BitLocker for disk encryption since it's free.

Which other solutions did I evaluate?

We did not evaluate other options. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
EmmaRichardson - PeerSpot reviewer
Database Administrator at Hildes Technologies
Real User
Top 20
Easy to configure with good virus and malware protection
Pros and Cons
  • "The simplicity of management and remote assistance for the users make it a smooth experience, and administrators can easily handle tasks remotely."
  • "There could be more additions to the compatible systems and applications for integration purposes."

What is our primary use case?

The primary use case of Check Point Antivirus is to protect our machines and data from viruses and to clean our systems from all malware to ensure the security of our data and servers from external threats and invasions. 

We have configured Check Point antivirus with all our machines, servers, and databases as a security solution against real-time virus threats that may harm our systems. 

It has been easy to configure and provides up-to-date advanced-level protection. Remote management is also being used to remove any potential viruses from users' machines if found. 

How has it helped my organization?

It has improved the overall security of our machines and data with multi-layered antivirus solutions. Real-time threat protection is a wonderful aspect of Check Point Antivirus and can provide 24/7 security to configured machines.

It makes us feel more secure and helps us to react proactively against any online invasion and data protection. The simplicity of management and remote assistance for the users make it a smooth experience, and administrators can easily handle tasks remotely. 

What is most valuable?

The most important and useful feature is the regular updates against modern-day viruses. We have seen that new viruses and malware are introduced by hackers every day, and we need to keep ourselves a step ahead for protection against those threats. 

Check Point Antivirus, with its up-to-date features, ensures that we are always ahead of the new versions of viruses and provides real-time protection. The overall features and data loss prevention makes it a valuable product in every way.

What needs improvement?

There could be more additions to the compatible systems and applications for integration purposes. It doesn't cover some of the applications and operating systems like macOS and SAP cloud products. 

Another issue I can recall is the fake threat calls and removal of safe applications (assuming them to be viruses and malware), which is sometimes annoying. The overall product features and functions are reliable and have everything covered otherwise and I consider it to be the best antivirus solution. 

For how long have I used the solution?

I've used the solution for more than two years.

What do I think about the stability of the solution?

We find it to be an almost 99% stable solution.

What do I think about the scalability of the solution?

This is an excellent, scalable solution.

How are customer service and support?

Technical support is very effective and knowledgeable. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

What's my experience with pricing, setup cost, and licensing?

This is a good solution that comes at a reasonable price.

Which other solutions did I evaluate?

I did not evaluate other options. 

What other advice do I have?

It is a very effective antivirus and I would recommend it. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
OumarDiallo - PeerSpot reviewer
Cyber Security Engineer at AFRICAN CYBERSECURITY MARKET
Real User
Easy to set up, allows you to manage all the endpoints, works against every attack, and has helpful technical support
Pros and Cons
  • "What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security. You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution."
  • "An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher."

What is our primary use case?

We use Check Point Antivirus for cyber security purposes.

What is most valuable?

What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security.

You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution.

What needs improvement?

An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher.

For how long have I used the solution?

I've been using Check Point Antivirus for six months.

What do I think about the stability of the solution?

Check Point Antivirus is a stable solution. It's a very good solution.

What do I think about the scalability of the solution?

Check Point Antivirus is a scalable solution.

How are customer service and support?

The technical support for Check Point Antivirus is helpful, but sometimes, it isn't easy to reach the support team.

On a scale of one to five, my rating for Check Point Antivirus support is four.

How was the initial setup?

Setting up Check Point Antivirus wasn't difficult because it just required downloading the software, then installing it where you want to install it. There wasn't any issue with the initial setup of Check Point Antivirus.

How long the deployment of Check Point Antivirus takes would depend on the number of client endpoints, but the process could take just five or six minutes maximum. If your internet connection is slow, then deploying Check Point Antivirus would take longer.

What about the implementation team?

I implemented Check Point Antivirus myself.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is an expensive solution, especially for clients that don't have as many endpoints.

Check Point Antivirus has a free trial for one month, and within the trial period, there's no limit to the number of endpoints it can support, but when the trial expires, you'll have to buy the license, which covers one year.

You can't buy a license for the solution without being a Check Point partner first.

What other advice do I have?

I'm using the latest version of Check Point Antivirus.

I deploy Check Point Antivirus for the customer. I'm a network and cyber security engineer, so I provide Check Point Antivirus to clients. I'm an integrator, and currently, my clients have a total of one hundred fifty endpoints on Check Point Antivirus. I also manage the solution for clients, which includes reporting, looking into the traffic and attacks, then I explain whatever's going on to the clients.

Maintenance can be done on Check Point Antivirus, and you just have to select the user that's very vulnerable to attacks, then that would trigger maintenance, and Check Point Antivirus would update automatically. It isn't difficult as long as your internet is good.

I would recommend Check Point Antivirus to others because it's very good software, and it works against every attack. Check Point Antivirus is an important solution.

On a scale of one to ten, my rating for the solution is eight because there's still room for improvement.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Jhonjerlyn Morales - PeerSpot reviewer
CEO at JL Real Estate
User
Good technical support with constant updating of the EDR and good overall security
Pros and Cons
  • "New viruses emerge day after day, and this EDR system helps action be taken before viruses affect the internal system."
  • "Currently, you can only have general reports of the threats removed and the behavior of the database. You cannot get separate reports of the Check Point service-linked devices."

What is our primary use case?

Check Point Antivirus is being used with integrations in all our company software and also with connections to all the computers that we use in our work sectors. All areas of our company such as sales, marketing, or finance have Check Point Antivirus implemented. 

This antivirus is capable of monitoring the state of the network and knowing if there is any threat in our business network while being able to clean it up immediately. 

All departments within the company have been kept safe since day one of using Check Point. In order to connect all the computers and monitor them in real-time from the Check Point application, we use an app. From this app, you can see the status of all computers, restore them, and eliminate threats from a single panel.

How has it helped my organization?

Previously, we had trouble detecting data leaks and protecting the services we used in our business. Financial and marketing software services were the main affected areas. 

After the implementation of Check Point, our computers have remained connected to a secure network where threats are prevented from entering thanks to the EDR system, and systems have been restored to a stable state where there are no threats. 

We have kept our files safe and restored them to an original state before being affected by a threat thanks to the system recovery system. 

We are very grateful for the results obtained in recent years. Our computers (the main source of work) have remained secure. Our employees can manage online campaigns and control the flow of clients without fear of being affected by any threat; it has a system of anti-malware and anti-phishing to detect threats in time.

What is most valuable?

The main valuable feature of Check Point is the constant updating of the EDR database in order to detect new threats. 

This update system is responsible for inserting new viruses into a database so that it is easier to detect and eliminate them despite the fact that constant notifications are sent when the virus database is updated, I have no complaints about this feature as it has helped me to restrict the passage of new threats. 

New viruses emerge day after day, and this EDR system helps action be taken before viruses affect the internal system.

Another of the striking functions is that Check Point monitors the online activity of each user, ensuring that they do not access websites that have a suspicious encryption code or that have an unusual certificate; this has helped us to navigate calmly and detect pages that might put our work integrity at risk.

What needs improvement?

One of the features that should be improved in Check Point is when it comes to obtaining reports on computer behavior. Currently, you can only have general reports of the threats removed and the behavior of the database. You cannot get separate reports of the Check Point service-linked devices. I would like to obtain separate reports for each computer, to see the behavior of the threats and be able to take action in time. 

It does not need any other function, it is a fairly complete antivirus service that helps protect business networks on time.

For how long have I used the solution?

We have been using this solution for about two years. We did not expect such precise and potential results and our security service has been maintained in the long term thanks to this general security on all types of devices.

What do I think about the stability of the solution?

It turned out to be an antivirus that exceeded my expectations in the long run. 

During the use that we have had in these last two years, our computers have remained protected 24 hours a day and seven days a week. On some occasions, threats have entered our computers, however, the system restore system has counteracted this without any problem. 

It has been a stable antivirus, without any real problems.

What do I think about the scalability of the solution?

The process of scaling, implementation and use went quite well; it took approximately two software engineers and three cyber security experts to successfully implement the service. They were in charge of configuring the real-time monitoring system for computers and updating the status of viruses.

How are customer service and support?

Customer service was satisfactory. 

During our implementation process, several questions arose about how the data leak detection system should be configured. All of these questions were answered immediately in a live chat with the Check Point team.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, I used the Microsoft service, however, it was not able to protect all the threats trying to get into our business computers. 

One of the main reasons why I stopped using the Microsoft Antivirus service, is due to the fact that it was consuming a lot of resources on the computers while it was running and while the EDR database was being updated. This directly affects the experience of our employees on the computer and limited them at work. Since we implemented the Check Point service, the consumption of resources decreased on a large scale and we managed to obtain better analysis and virus detection.

How was the initial setup?

Setting up the system was somewhat complicated, requiring several of our engineers and cyber experts to successfully implement the antivirus service. 

The initial implementation took approximately one week to set up all the company's computers and synchronize them on the same protected network.

What about the implementation team?

The implementation was done with an internal team in our company; there was no involvement of a vendor team.

What was our ROI?

Our return on investment has been the protection of the entire work structure, our administrative processes have been protected by this great EDR system, and all the devices used in our company are monitored by a system that is responsible for eliminating threats before they react. 

We are happy with the money spent on this great security software; our computers have been more protected.

What's my experience with pricing, setup cost, and licensing?

I would recommend that you have a good amount of capital to access a considerably good protection plan from Check Point. 

Currently, the prices for installation and configuration are a bit high, and small or medium-sized companies could not afford these prices. 

You need a trained team to implement the Antivirus system as quickly as possible since it is a bit difficult to configure.

What other advice do I have?

In a solution that is undoubtedly worthwhile, it has a perfect methodology for finding viruses before they react to the computer's files. 

It has a very good interface, is easy to handle, and protects all kinds of services that are being used.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.