Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 20
Modern Antivirus - Excellent security CheckPoint
Pros and Cons
  • "There is a lot of documentation to be able to use this security feature in the best way using the best practices indicated by the manufacturer."
  • "The solution is expensive."

What is our primary use case?

Due to many attacks in our country, we decided to look for a robust solution to avoid current threats, including ransomware among others.

Our company was looking to protect our infrastructure or perimeter, but due to constant attacks in our country with modern threats to computer systems, we decided to use a tool that can provide us with the correct security. In addition to validating that we could include it in our Check Point environment in a simple way.

The simple administration gave us the ability to provide greater security with the company's permission, avoiding threats such as malware, among others.

We currently have this resource and we can manage and verify it from our management server.

How has it helped my organization?

We have been able to internally provide security to our teams, with robust antivirus security policies to take actions and regulations to prevent the spread of viruses and malware that is modernizing more and more.

This antivirus blade is not like the previous security versions, it really is a powerful tool which provides this additional layer of protection against malicious files that could affect both data and systems, we feel safer and calmer with this solution despite all the attacks that have occurred in recent times in our country, but not in our company..

What is most valuable?

We really like this antivirus security tool, included in the security management server used for our Check Point gateways. The ability to include blades is very good, it allows the centralization of security in our gateways natively.

There is also a lot of documentation to be able to use this security feature in the best way using the best practices indicated by the manufacturer, with this we guarantee the use of the tool correctly.

Finally, in our company, we like the ease of implementation.

What needs improvement?

Check Point Antivirus could use improvement in some areas, as almost all blades within the security management server are not the same as in gateway management.

On the other hand, the solution is expensive, they could improve costs in order to win more customers.

There are new tools that generate this protection, so this tool can become old, I would like for it not to be discontinued.    

Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.

What do I think about the scalability of the solution?

Once this tool has been implemented in Microsoft Azure, it can be used with a VSS or with a cluster to provide scalability.

Which solution did I use previously and why did I switch?

We previously used ESET, but it did not meet expectations against ransomware at an enterprise group company we support. We prefer to opt for a tool with prestige.

What was our ROI?

Check Point's tools, specifically this one, are quite stable to manage from the security management server.

What's my experience with pricing, setup cost, and licensing?

The costs are high, however, the tool fulfills its security objective very well,

I recommend looking for a good partner that will help you both with your needs and find the right tool to provide the company's internal security.

Which other solutions did I evaluate?

It is always a good practice to review the options in the security market to avoid threats and acquire the solution that best suits the company's conditions.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Support at a security firm with 51-200 employees
User
Ease of installation with fair pricing and good product documentation
Pros and Cons
  • "It offers a really simple and minimally invasive installation for users."
  • "The SLA is slow."

What is our primary use case?

We required a product recognized for its brand visibility and achievements in cybersecurity at a global level.

Check Point was perfectly suited and we decided to use it effectively for our endpoint devices that are corporate property. In this way, we have avoided daily threats on devices with a great degree of acceptance seen by users.

How has it helped my organization?

Check Point Antivirus has helped us a lot with the personal protection of users' computers and protection against current threats and ransomware, among others. It is an excellent product that generates much business confidence when dealing with any cyber threat that can compromise computers.

It offers a really simple and minimally invasive installation for users. In this way, it does not generate performance problems.

What is most valuable?

It is a good tool. The price is accessible. It protects against modern threats in a great way; there is a lot of confidence in Check Point.

There is quite a lot of product documentation to assist with a correct implementation.

The ease of installation is great.

What needs improvement?

The Check Point language for opening and solving cases is English. They could expand languages for Latin America, and it would be easier to solve problems in these areas.

Costs are only available through a Check Point partner.

The SLA is slow. The solutions provided to address problems and breakdowns are slow.

For how long have I used the solution?

As a product from the Check Point security family, we have been using it for one year or more.

Which solution did I use previously and why did I switch?

Previously, we used ESET, however, we were inclined to switch to Check Point.

Which other solutions did I evaluate?

Our company always evaluates the tools before buying them and before putting them into production.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Bala_Krishna - PeerSpot reviewer
Director at Rhinexa India Pvt Ltd.
Real User
Top 10
A good endpoint antivirus solution, with an excellent zero-day protection feature
Pros and Cons
  • "We find the zero-day protection to be an extremely valuable feature of this solution."
  • "We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's."

What is our primary use case?

We use this product as an endpoint antivirus solution.

What is most valuable?

We find the zero-day protection to be an extremely valuable feature of this solution.

What needs improvement?

We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's.

For how long have I used the solution?

We have been working with this solution for nearly four years.

What do I think about the stability of the solution?

We have found this to be a very stable solution during our time using it.

What do I think about the scalability of the solution?

We have not had any issues with the scalability of this solution due to the fact that it is cloud-based, and can be deployed to more users automatically as needed.

How was the initial setup?

The initial setup of this solution is very simple, and the cloud-based deployment is very quick.

What about the implementation team?

We used a team of integrators for our implementation.

Which other solutions did I evaluate?

We also evaluated Palo Alto Endpoint, but it was too complicated to configure, and presented too many technical challenges.

What other advice do I have?

We recommend the cloud-based variant of this solution to organizations of all sizes as there is no upper limit to the number of users it can cover, and the price is affordable for SMB's.

We would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Consultant at SOCIEDAD AXIOBASE S.A.
Consultant
It has a threat prevention policy that can stop different types of threats from entering the environment, but it lacks an EDL feature and is a little costly
Pros and Cons
  • "What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment."
  • "What's missing in Check Point Antivirus is the EDL feature."

What is our primary use case?

I'm using Check Point Antivirus for my customer, mainly to check threat activity and generate a report on threats in the customer environment. I then compare different reports and check for possible IP threats by reviewing the IP address database on Check Point Antivirus. I also use the tool to check malicious activity on applications and use it as an EPS solution.

What is most valuable?

What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment. It has a threat prevention policy so that I can stop different types of threats from entering a workspace or environment.

What needs improvement?

What's missing in Check Point Antivirus is the EDL feature, which I want Check Point to add in the future.

What do I think about the stability of the solution?

Check Point Antivirus is very stable, and I'd rate its stability as nine out of ten.

What do I think about the scalability of the solution?

Check Point Antivirus has excellent scalability, but you need a license because there's a limit depending on your license. The tool works fine if you have the correct number of licenses.

The scalability of the tool is a nine out of ten.

How are customer service and support?

Check Point Antivirus provides excellent technical support, but if the customer doesn't pay for the correct number of licenses, there will be issues, and support may not be as good.

I'd rate Check Point Antivirus support as eight out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup for Check Point Antivirus wasn't difficult for me. If you know your network, then it's not complicated. Configuring and setting the tool up could be difficult if you don't have networking knowledge.

Installing the architecture with different appliances takes two to three days, and learning the tool and the rules would take one week for the customer.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is a good solution, but it's a little costly and is similar to Fortinet, pricing-wise.

What other advice do I have?

I'm a consultant working with Check Point technologies, including Check Point Antivirus.

Deploying and maintaining Check Point Antivirus requires two to three engineers.

My advice to anyone planning to use Check Point Antivirus is that it's a good tool, especially if you're using an endpoint solution from Check Point.

My rating for Check Point Antivirus is seven out of ten because you need to be certified to manage the tool and for it to work well for your company. It could be a very complex tool, depending on the customer.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner/Consultant
PeerSpot user
reviewer2005803 - PeerSpot reviewer
Digital Coordinator at Modis
Real User
Blocks phishing, identifies ransomeware, and helps quash security threats
Pros and Cons
  • "When sending emails to my colleagues, it detects any virus and blocks any spam that may be shared."
  • "Configuration with some applications did not take place effectively due to setup complications."

What is our primary use case?

This software enhances the security of our remote workforce. It creates safe collaboration routes that cyber attacks cannot compromise. Data safety and communication infrastructure have been well maintained since we deployed this software. 

Endpoint protection has enabled teams to complete projects faster and monitor workflows efficiently. 

It has automated security protocols to cover the wide networking area in the enterprise. Check Point Harmony Endpoint has deployed comprehensive security that prevents any external attacks that may be a threat to our internal policies.

How has it helped my organization?

This software has quashed many security threats that could affect operations and slow down production. 

When sending emails to my colleagues, it detects any virus and blocks any spam that may be shared. It is flexible and gives the IT team full access and control during deployment. 

We have been able to attain security compliance and requirements for an excellent working environment. 

The entire organization has been doing well since we deployed this software due to safe collaboration channels and improved security data awareness.

What is most valuable?

The total cost of ownership has enabled the company's teams to identify any areas with security weaknesses and appropriately assign security models. 

The log4j-related attacks blocking system detects any vulnerable endpoints in advance. 

Identifying ransomware behaviors has upgraded the security monitoring system and put measures in place to curb such threats. 

When browsing, it blocks phishing sites that may hack personal data and leak to internet cyber criminals. 

The endpoint behavioral guard identifies online threats that easily prevent credential theft that may lead to funding theft.

What needs improvement?

The current performance of Check Point Harmony Endpoint has impressed all the sectors in the organization.

Configuration with some applications did not take place effectively due to setup complications. 

Interpreting the threat intelligence sensors may lead to poor data tabulation and slow performance. 

The cost of deployment and maintenance is high, and many small enterprises may not be able to afford premium subscriptions. 

The set security enhancement objectives have been achieved, and internet threats have been blocked effectively. I totally recommend this software to other organizations for reliable endpoint protection.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

This software offers a stable performance.

What do I think about the scalability of the solution?

The performance is good, and I am impressed by the overall output.

How are customer service and support?

We have been served well by customer service since we started engaging them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with any other product.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Deployment was done by the vendor team.

What was our ROI?

The targeted ROI has been achieved, and there is increasing growth.

What's my experience with pricing, setup cost, and licensing?

The setup and pricing are flexible depending on company size and security demands.

Which other solutions did I evaluate?

I have only worked with Check Point Harmony Endpoint.

What other advice do I have?

Comprehensive security for the company's network infrastructure is essential, and this is what this platform has provided.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2005812 - PeerSpot reviewer
Human Resources Manager at Beat
User
Good virus detection with helpful performance metrics and a simple deployment
Pros and Cons
  • "The application runs very fast and does not affect the performance speed of the device where it is installed."
  • "When there are many devices, it is more costly since each device requires unique login credentials."

What is our primary use case?

The antivirus helps the organization in securing desktops and mobile devices from external data threats. It detects the entry of viruses to devices that can destroy data and quickly takes necessary action. 

Once the software is installed, there is no additional cost that is required to run it. It troubleshoots any errors that may slow down workflows across applications. Check Point Antivirus integrates with multiple operating systems, including Windows and Linux. 

Since I installed it on my desktop, the browsing speed has improved, and I can visit several sites without fear.

How has it helped my organization?

The software has improved the digital experience of employees who have deployed it. 

I can comfortably open links attached to my emails and share documents with my colleagues without fear of cyber attacks. 

Departments that used to lose data to virus attacks can work from any site and focus more on productive business engagements. 

The antivirus provides advanced security data analytics that helps the user to work from safe sites that can affect tasks in progress. 

The software screens applications to ensure they perform effectively.

What is most valuable?

Virus detection helps teams to be aware of any threats that can harm data and take precautions in advance. 

It provides networking reports on the data security situation, which enables users to make decisions. 

Performance metrics provided regularly help the IT team plan to curb any threats to company data.

It is easy to deploy the antivirus and learn how it works. 

The application runs very fast and does not affect the performance speed of the device where it is installed. 

Daily security analysis indicators help team members to engage any abnormality with real-time insights.

What needs improvement?

The current features are doing extremely well. That said, the system coding can be simplified to enable any user to interpret the security situation of the used device. 

I am happy with the set data models since they monitor the security situation of new sites before browsing. 

I have not observed most failures since I started using this software. 

The company can embark on timely updates to ensure the application is compatible with devices. 

Customer support comes in on time when we contact them via online chats and phone calls. 

When there are many devices, it is more costly since each device requires unique login credentials. 

The product is heavy, and it requires more space for effective operation. New users can find it difficult to set up and install due to the lack of a robust user manual.

For how long have I used the solution?

I've used the solution for eight months.

What do I think about the stability of the solution?

It works for a long time without failing and does not misbehave.

What do I think about the scalability of the solution?

The antivirus performance has been excellent.

How are customer service and support?

The customer service team has never failed us.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Kaspersky Antivirus, however, it used to fail most of the time. 

How was the initial setup?

The installation process of the application is easy and straightforward.

What about the implementation team?

I deployed it through a vendor, and they are doing well.

What was our ROI?

A secure work environment has contributed to increased ROI.

What's my experience with pricing, setup cost, and licensing?

The pricing is suitable, and the setup process is simple.

Which other solutions did I evaluate?

I evaluated most free online antiviruses, however, they were not effective.

What other advice do I have?

 Check Point Antivirus is a sure bet for the detection of any virus.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Security Network Engineer at АТ "Банк інвестицій та заощаджень"
Real User
Top 20
Useful centralized management, responsive support, but resources usage could improve
Pros and Cons
  • "The most valuable feature of Check Point Harmony Endpoint is centralized management."
  • "Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features."

What is our primary use case?

We have many clients using this solution for different use cases.

The solution can be deployed on the cloud and on-premise.

Check Point Harmony Endpoint is mainly used for protection. 

What is most valuable?

The most valuable feature of Check Point Harmony Endpoint is centralized management.

What needs improvement?

Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for approximately two years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is very stable.

What do I think about the scalability of the solution?

The scalability of the Check Point Harmony Endpoint is good. It can scale easily.

We have some clients with 10,000 users that are using this solution.

How are customer service and support?

I have opened up many tickets with the support and they have been responsive. I have not had any problems with them. They have helped whenever I faced a problem.

I rate the support from Check Point Harmony Endpoint a four out of five.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup of the Check Point Harmony Endpoint is easy. We use the main policy for the installation across the organization.

We have had some problems with connection management because if we install the initial client on the computer, we cannot stop or delete this client or install the full package afterward.

If we have a new signature technical support ticket, they add this signature to the database in three to five days which they could improve.

I rate the initial setup from Check Point Harmony Endpoint a four out of five.

Which other solutions did I evaluate?

Check Point Harmony Endpoint does not have some features that SentinelOne or CloudStrike has.

What other advice do I have?

I rate Check Point Harmony Endpoint a seven out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 20
A fast solution that is easy to install and simple to manage
Pros and Cons
  • "Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint."
  • "Its guides are identical to the existing ones. These guides should be updated and they should improve their design."

What is our primary use case?

With the changes produced by the pandemic, we needed to secure the equipment inside and outside the organization. That is why we looked for a solution that would protect business equipment, providing a robust security line and where perimeter protection for users is established. Those working from home or anywhere else are not compromised with this product on-side, and these users are connecting easily. By having the experience of using the tool, we realize that it secures and protects us from all kinds of attacks.

How has it helped my organization?

We have realized that it helps us with the prevention of ransomware, malware and identification of suspicious connections. It allowed us to have a centralized administration panel which makes it easier for us to view and manage each of the devices and the alerts found or notified by each of them. devices, creating rules and allowing us to protect the activities carried out by users. We can say that Check Point Harmony Endpoint is a fast solution, easy to install, simple to manage, and, above all, when in use, it is not very intrusive with users' daily activities.

What is most valuable?

One of the characteristics is the detection of anti-ransomware, which helps us to protect our equipment and data against any eventuality. This solution detects and analyzes any attempt to encrypt the data. If they are encrypted, the same solution stores and restores a version of the compromised data. 

Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint. Among other features, this Endpoint Behavioral Guard identifies families of malware, file-less attacks, and other generic malicious behaviors that are the most common attacks when you are in unsafe networks without a protection solution.

What needs improvement?

It is one of the best, however, with respect to its support on iOS and Android, it can improve a little more.

Something worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies.

Its guides are identical to the existing ones. These guides should be updated, and they should improve their design.

Let people try it, and it will quickly remote users. 

For how long have I used the solution?

I've used the solution for two years.

What do I think about the scalability of the solution?

It is quick to configure and easy to manage. Therefore it is really scalable. 

Which solution did I use previously and why did I switch?

We did not previously use a different solution. 

What's my experience with pricing, setup cost, and licensing?

The issue of licensing is something that I don't like. The licenses are per package, not per unit, and that in some cases affects the acquisition of the solution.

Which other solutions did I evaluate?

We did not evaluate other options. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.