We use Check Point Antivirus for cyber security purposes.
Cyber Security Engineer at AFRICAN CYBERSECURITY MARKET
Easy to set up, allows you to manage all the endpoints, works against every attack, and has helpful technical support
Pros and Cons
- "What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security. You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution."
- "What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. and it can do a lot in terms of security."
- "An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher."
- "An area for improvement in Check Point Antivirus is its price because it's expensive."
What is our primary use case?
What is most valuable?
What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security.
You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution.
What needs improvement?
An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher.
For how long have I used the solution?
I've been using Check Point Antivirus for six months.
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.
What do I think about the stability of the solution?
Check Point Antivirus is a stable solution. It's a very good solution.
What do I think about the scalability of the solution?
Check Point Antivirus is a scalable solution.
How are customer service and support?
The technical support for Check Point Antivirus is helpful, but sometimes, it isn't easy to reach the support team.
On a scale of one to five, my rating for Check Point Antivirus support is four.
How was the initial setup?
Setting up Check Point Antivirus wasn't difficult because it just required downloading the software, then installing it where you want to install it. There wasn't any issue with the initial setup of Check Point Antivirus.
How long the deployment of Check Point Antivirus takes would depend on the number of client endpoints, but the process could take just five or six minutes maximum. If your internet connection is slow, then deploying Check Point Antivirus would take longer.
What about the implementation team?
I implemented Check Point Antivirus myself.
What's my experience with pricing, setup cost, and licensing?
Check Point Antivirus is an expensive solution, especially for clients that don't have as many endpoints.
Check Point Antivirus has a free trial for one month, and within the trial period, there's no limit to the number of endpoints it can support, but when the trial expires, you'll have to buy the license, which covers one year.
You can't buy a license for the solution without being a Check Point partner first.
What other advice do I have?
I'm using the latest version of Check Point Antivirus.
I deploy Check Point Antivirus for the customer. I'm a network and cyber security engineer, so I provide Check Point Antivirus to clients. I'm an integrator, and currently, my clients have a total of one hundred fifty endpoints on Check Point Antivirus. I also manage the solution for clients, which includes reporting, looking into the traffic and attacks, then I explain whatever's going on to the clients.
Maintenance can be done on Check Point Antivirus, and you just have to select the user that's very vulnerable to attacks, then that would trigger maintenance, and Check Point Antivirus would update automatically. It isn't difficult as long as your internet is good.
I would recommend Check Point Antivirus to others because it's very good software, and it works against every attack. Check Point Antivirus is an important solution.
On a scale of one to ten, my rating for the solution is eight because there's still room for improvement.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Assistant Manager at ASCI
Great support, good threat detection, and high customization
Pros and Cons
- "Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users."
- "I strongly recommend this solution to all IT businesses and professionals."
- "Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner."
What is our primary use case?
Check Point Antivirus software is highly reliable and dependable security software that restricts malware entry into our IT system and keeps secure our IT system at its best. It is the most advanced security solution which enables the IT system to scan all the system components effortlessly and do proactive threat detection onto the system to identify any incumbent threats.
It helps run the scanning on integrated system components and the cloud server with fewer false negative cases to ensure the system's performance at its best. It provides the system with foolproof security and ensures high customer satisfaction always.
How has it helped my organization?
This security solution is one of the best so far. It enables IT professionals and businesses to work carefree with internal and external stakeholders and their IT systems and exchange information securely without any data theft or leakage. It is highly advised to incorporate this solution at all the critical windows and stages of system flow so that no malware attack can come inside the system under any circumstance.
It has improved the turnaround time for our project completion and system integration activities as it's the need of the hour for all the stakeholders in today's world.
It has lead to improved positive performance outcomes with high-end productivity. There are no more system issues, and complaints as IT does not bother us now.
What is most valuable?
Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users.
The Check Point Partner keeps updating its EDR system and ensures no lapses occurred during the operating time. The entire team of Check Point is quite agile and proactive in terms of their advanced product development and their reaction time to any issue or complexity is just fantastic which ensures no deep damage to the system from threats.
EDR improvement checks system security and a proactive business and tech team improves customer interaction in the greatest manner possible.
What needs improvement?
Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner. This will ensure more credibility and confidence in customers and helps relationships last longer. High-end wonderful experiences for clientele will result in peer recommendations, which will certainly enhance the customer base for Check Point.
Keep improving your business offerings and go for an extension of the trial version for a longer period so that everyone can be benefitted from the same.
For how long have I used the solution?
It's been over six months now since we started using the product. It's one of the best available solutions so far.
What do I think about the stability of the solution?
The product offers high stability and flexibility.
What do I think about the scalability of the solution?
The product is quite scalable and replicable across all kinds of IT environments
How are customer service and support?
Support is wonderful and we highly recommend them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were using a few peer-recommended security solutions earlier.
How was the initial setup?
The setup is not complicated at all. We had smooth onboarding and easy deployment.
What about the implementation team?
We implemented it through a vendor.
What was our ROI?
We've seen over 75% ROI.
What's my experience with pricing, setup cost, and licensing?
It's cheap and quite low presently, and the room for customization is humongous currently. High time to go for these solutions as they are accelerating with great performance and pace.
Which other solutions did I evaluate?
We looked at McAfee and Kaspersky. They were evaluated thoroughly by our business and tech teams.
What other advice do I have?
I strongly recommend this solution to all IT businesses and professionals. This is a one-stop solution for all your security woes. Go for its trial today and experience the new age security utilities on your own.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.
CEO / direktor at S3Next
Great sandboxing and phishing protection with the ability to expand
Pros and Cons
- "The product improved the overall security of our organization with the features like sandboxing and phishing prevention."
- "The product improved the overall security of our organization with features like sandboxing and phishing prevention."
- "We need a higher maximum file size in the sandboxing feature."
- "We need a higher maximum file size in the sandboxing feature."
What is our primary use case?
We were searching for a next-generation antivirus solution, and this was the best choice on the market.
We have 25 users who work from home and the office.
All computers have Windows Professional version 10 or 11 installed.
We implemented a policy in which every client (either PC or mobile) has to have the Endpoint protection software installed with all the available blades.
Our company's cyber security monitoring process includes centralized product monitoring.
How has it helped my organization?
The product improved the overall security of our organization with the features like sandboxing and phishing prevention.
We have centralized monitoring of the security of the clients even if they are not connected to our VPN network.
The e-mail and office solution is a great add-on to our existing Office 365 protection on our company's e-mails.
I also have to mention that we did not have our mobile devices protected before the implementation of Harmony mobile. That was really the next step in securing our company's overall IT security.
What is most valuable?
The sandboxing is good. We didn't have any file ransomware attacks since implementation.
The phishing protection works. It prevented a lot of nasty situations with fake websites.
Using this solution in e-mail and Office, we recognized how many man-in-the-middle attacks have been started to get some credential information from our employees.
In mobile, we didn't realize before how much harm can be done from the mobile devices in the network.
It replaced the ESET solutions we used before in our company.
What needs improvement?
We need a higher maximum file size in the sandboxing feature.
Maybe the exceptions could be made much more understandable and easy to use.
There should be an option added to temporarily disable the protection of all or some blades for testing reasons.
The email and Office solution could have some options for exceptions, for example: don't scan e-mails sent to the local PDF scanner e-mail address.
Maybe an option to auto-upgrade the client version to the next stable release of the client software would be nice.
For how long have I used the solution?
We have been using this solution for more then two years.
What do I think about the stability of the solution?
We didn't have any stability issues. We always use the stable releases of the client software.
What do I think about the scalability of the solution?
The solution offers very good scalability.
How are customer service and support?
So far, support is very good. I recommend them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used ESET, which was not satisfying.
How was the initial setup?
It was straightforward.
What about the implementation team?
We implemented through a local implementor.
What was our ROI?
The protection it gives to the clients is priceless.
What's my experience with pricing, setup cost, and licensing?
Get in contact with your local Check Point solution provider to give you an offer regarding the implementation.
Which other solutions did I evaluate?
We evalute the Fortinet solution.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Manager at First National Bank in Philip
Easy to install and deploy with great threat mitigation
Pros and Cons
- "Deploying new versions of the endpoint are easy."
- "A good endpoint security product must be able to be flexible in both deployments and across multiple OS versions, and Check Point Harmony Endpoint does that for us."
- "The Infinity Portal login is "iffy" at times."
- "Support could be improved. I'd give them a 7/10 before COVID, and maybe a 5/10 post-COVID."
What is our primary use case?
Endpoints have always been a network's weak point, as they are the main interface users use daily. A good endpoint security product must be able to be flexible in both deployments and across multiple OS versions.
Check Point Harmony Endpoint does that for us. With multiple blades that add security to these weak points, I can be assured that threats are being mitigated in real-time. Also, Harmony Endpoint works seamlessly with Check Point's new MDR product, so logging, detecting, and responding couldn't be easier.
How has it helped my organization?
With the new Harmony interface, I don't have to worry about a local endpoint management server anymore, making my deployments and updating of endpoints so much easier across the board.
I haven't had issues with anti-malware updates anymore, and I can manage my endpoints from one Infinity Cloud portal.
Being short-staffed in my department, this solution has absorbed some of the daily tasks of monitoring endpoint products to ensure they are up and running. Also, reporting services/blades that aren't running lets me use my time more freely.
What is most valuable?
Deploying new versions of the endpoint are easy. It was a hassle before with a local management server, and now it's as easy as selecting the version you want from a drop-down menu.
The options for removing/adding blades with the click of a button from the portal are great. The built-in VPN blade makes it so easy to deploy on my endpoints if I need employee remote access to my LAN.
The installation is so easy with the simple MSI deployment packages, and I can watch the deployment process in real-time from the Cloud Portal.
What needs improvement?
The Infinity Portal login is "iffy" at times. I would like to restrict it to only US traffic, however, due to the hosting in the cloud, it sometimes retrieves data from the EU and across seas.
Also, if there was a way to simplify the SmartConsole login more, there could be an opportunity to take away some clicks to log in. Navigating back to the browser to log in through that portal site just makes for a more extended login transition. Just have the MFA capability right there on the local application and be done with it.
For how long have I used the solution?
I've been using Check Point's endpoint solution for five years, however, just recently moved to the Harmony interface this summer.
What do I think about the stability of the solution?
The stability makes it easy to move up or down.
What do I think about the scalability of the solution?
The scalability makes it easy to move up or down.
How are customer service and support?
Support could be improved. I'd give them a 7/10 before COVID, and maybe a 5/10 post-COVID. If you know who to ask for, it's more an 8/10.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We did not use a different solution previously.
How was the initial setup?
The setup is straightforward. Check Point assists the whole way, so it was very easy.
What about the implementation team?
I handled the deployment in-house, myself.
What was our ROI?
I'm not sure if we have seen an ROI.
What's my experience with pricing, setup cost, and licensing?
Our rep has been great to work with concerning quotes/licensing. The setup is relatively easy, being in the cloud. A new customer could be up and running on a new Harmony install within days.
Which other solutions did I evaluate?
CrowdStrike was the main one we evaluated against this product.
What other advice do I have?
It is a great product. Check Point could work on their Technical Assistance Center (TAC) to assist customers, however, they usually get the job done in the end.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud Engineer at ITQS
A fast solution that is easy to install and simple to manage
Pros and Cons
- "Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint."
- "We can say that Check Point Harmony Endpoint is a fast solution, easy to install, simple to manage, and, above all, when in use, it is not very intrusive with users' daily activities."
- "Its guides are identical to the existing ones. These guides should be updated and they should improve their design."
- "The issue of licensing is something that I don't like."
What is our primary use case?
With the changes produced by the pandemic, we needed to secure the equipment inside and outside the organization. That is why we looked for a solution that would protect business equipment, providing a robust security line and where perimeter protection for users is established. Those working from home or anywhere else are not compromised with this product on-side, and these users are connecting easily. By having the experience of using the tool, we realize that it secures and protects us from all kinds of attacks.
How has it helped my organization?
We have realized that it helps us with the prevention of ransomware, malware and identification of suspicious connections. It allowed us to have a centralized administration panel which makes it easier for us to view and manage each of the devices and the alerts found or notified by each of them. devices, creating rules and allowing us to protect the activities carried out by users. We can say that Check Point Harmony Endpoint is a fast solution, easy to install, simple to manage, and, above all, when in use, it is not very intrusive with users' daily activities.
What is most valuable?
One of the characteristics is the detection of anti-ransomware, which helps us to protect our equipment and data against any eventuality. This solution detects and analyzes any attempt to encrypt the data. If they are encrypted, the same solution stores and restores a version of the compromised data.
Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint. Among other features, this Endpoint Behavioral Guard identifies families of malware, file-less attacks, and other generic malicious behaviors that are the most common attacks when you are in unsafe networks without a protection solution.
What needs improvement?
It is one of the best, however, with respect to its support on iOS and Android, it can improve a little more.
Something worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies.
Its guides are identical to the existing ones. These guides should be updated, and they should improve their design.
Let people try it, and it will quickly remote users.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the scalability of the solution?
It is quick to configure and easy to manage. Therefore it is really scalable.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
What's my experience with pricing, setup cost, and licensing?
The issue of licensing is something that I don't like. The licenses are per package, not per unit, and that in some cases affects the acquisition of the solution.
Which other solutions did I evaluate?
We did not evaluate other options.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Manager at Advertising Standards Council of India
Addresses zero-day threats and next-gen viral threat attacks while offering very good integration
Pros and Cons
- "It is one of the best security solutions in the market today."
- "It is one of the best antivirus applications on the market currently."
- "The cases of false positives should substantially be reduced to the greatest extent to keep the efficiency excellent."
- "The cases of false positives should substantially be reduced to the greatest extent to keep the efficiency excellent."
What is our primary use case?
Check Point Antivirus helps restrict malicious threats and trojans from entering into the IT system and secure the system end to end.
Also, its feature of endpoint detection and response helps business users to restrict any malware attack onto the system in more robust manner and stop any threat attack attempts.
It also secures the system in a foolproof way and boosts the performance to greatest extent. This result boosted productivity and improved outcomes for the organization as a whole. It is one of the best antivirus applications on the market currently.
How has it helped my organization?
Check Point Antivirus has removed the endpoint threats in a more secure and structured manner.
Also, its advanced malware detection technique helped strengthen the IT system's security and permanently remove any threat entrant from the system.
Through ThreatCloud, it helps in the identification and correct detection of potential malware entry into the cloud server and also provides immediate auto-remediation upon detection of any threat attack on the server.
It is one of the best security solutions in the market today. We highly recommend it to everyone.
What is most valuable?
The ThreatCloud is an amazing feature and helps in intelligent and proactive detection of threat attacks along with auto-remediation of the system.
The industry cloud and integration services with alert notifications are some really exciting features that helped in achieving flexible and strengthened security administration.
It addresses zero-day threats and next-gen viral threat attacks on the system and also has strengthened the security administration through a single management console.
What needs improvement?
The cases of false positives should substantially be reduced to the greatest extent to keep the efficiency excellent.
Competition is huge and is strongly advised to keep innovating the features and utilities so that it stands out in comparison to its competition in the market.
They need to have an extension of the trial period/trial version so that more startups and small, marginal, and medium enterprises can also be part of this without any hesitation.
For how long have I used the solution?
I've used the solution for six to 12 months.
What do I think about the stability of the solution?
The product offers amazing stability features.
What do I think about the scalability of the solution?
The scalability is great.
How are customer service and support?
We've had the best experience with technical support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are a first-time user.
How was the initial setup?
It is easy to use and deploy across any platform.
What about the implementation team?
The vendor assisted with the setup.
What was our ROI?
We've seen an ROI of over 80%.
What's my experience with pricing, setup cost, and licensing?
I'd advise potential users to go for the Check Point advanced security solutions as they are credible and trusted by many.
Which other solutions did I evaluate?
A lot of security solutions were checked by the tech team.
What other advice do I have?
Users should go for it; you will not regret it.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud computing at Tech Data Limited
Filters websites well, has good phishing protection, and is reasonably priced
Pros and Cons
- "Check Point offers a comprehensive solution that will not only create a firewall but will also protect the traffic of data from an application usage standpoint."
- "I came to the realization that this was the best solution for the need and the budget I had available and it hasn't disappointed me since."
- "Filtering the websites that can be visited is important also as there's always a chance to come by sites that, just by clicking, will download malicious threats."
- "We've noticed that the management console has some limitations as it's managed through the browser."
What is our primary use case?
I wanted to protect my system from threats as sensitive business information was being stored in it, understanding that keeping the hardware in a secure location won't be enough measure to protect all the data in it. I went over different options in the market as Kaspersky Lab, ESET, Symantec, and Check Point of course, and spoke to a representative and did my own investigations. I came to the realization that this was the best solution for the need and the budget I had available and it hasn't disappointed me since.
How has it helped my organization?
Given the fact that threats are evolving every day, it is really important to have a solution that's ahead of transforming viruses that can leak in multiple forms and channels. Check Point offers a comprehensive solution that will not only create a firewall but will also protect the traffic of data from an application usage standpoint. It also provides email protection and detects threats in the public networks you're trying to connect your device to.
What is most valuable?
Phishing is an issue that is affecting a lot of businesses given the huge email traffic in businesses. Sometimes the server security firewalls won't detect threats from coming into the endpoints, so email protection is definitely one of them that's helpful.
Filtering the websites that can be visited is important also as there's always a chance to come by sites that, just by clicking, will download malicious threats. Even when you are on secure sites, you will see that, with Check Point, some ads and advertising will be blocked as they could be potential viruses.
What needs improvement?
We've noticed that the management console has some limitations as it's managed through the browser. Despite being user-friendly it could definitely include a wider range of security measurements that can make it more customizable depending on the end-user interests. If the end-user happens to want a Linux OS it can't access the smart console as it's .exe and only supported through Windows. This means they'll have to use a virtual PC to access the .exe which just makes it a bit of a hassle for these end-users.
For how long have I used the solution?
I've been using the solution for over seven years.
Which solution did I use previously and why did I switch?
We did use Kaspersky and switched as there were security concerns around the privacy of the data.
What's my experience with pricing, setup cost, and licensing?
Check Point's price point was right in the middle. It's not the cheapest and not the most expensive and offers a good cost/benefit ratio.
Which other solutions did I evaluate?
We looked at Kaspersky, ESET, Symantec, BitDefender, and McAfee.
What other advice do I have?
Overall I am very satisfied.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
An all-in-one solution that prevents attacks and is easy to set up
Pros and Cons
- "It has a customer-savvy interface and easily customizable as per client and business requirements."
- "Check Point antivirus is a one-stop solution for managing endpoint security solutions along with providing advanced security features to prevent malware attacks."
- "We'd like the solution to kindly start this service offering on SaaS and PaaS models also."
- "We'd like the solution to kindly start this service offering on SaaS and PaaS models also."
What is our primary use case?
I work in a technologically advanced environment of data analytics and data mining services. We are experts in providing management consulting in the field of financial audit and data analytics for corporates to determine future business projections. We use a large number of tech tools and software with APIs with various platforms and portals of different vendors and clients' systems. Check Point antivirus is a one-stop solution for managing endpoint security solutions along with providing advanced security features to prevent malware attacks.
How has it helped my organization?
Check Point antivirus software is an all-in-one solution for providing system security from malware and phishing attacks from multiple systems and web sources. We are living in an era of hyper cyber threats and attacks and to tackle such threats, it is essential to have foolproof system security from all kinds of endpoints.
The antivirus software should be able to prevent all kinds of system attacks in a smart and efficient way without harming the system configuration. It is highly cost-effective and results in an umbrella solution against all kinds of malware and spam. It provides 360 degrees in security management for web and cloud systems.
What is most valuable?
Check Point antivirus software is agile and efficient in managing spam and threat attacks on web and cloud systems. The software is extremely efficient in scanning computers and websites all the time. The software runs in the back of the system and never hampers the work at the front end.
It is highly cost-effective and saves enough manpower cost in tackling such phishing attacks on the system.
It has a customer-savvy interface and easily customizable as per client and business requirements.
Deployment is easily adjustable.
What needs improvement?
We'd like the solution to kindly start this service offering on SaaS and PaaS models also. It would help more and more small, marginal and large businesses to come forward and try the solution. Customer attraction and retention are the need of the hour.
It is highly advisable to receive more and more genuine feedback from users and publish it on websites as feedback traffic is extremely important to gauge business performance progress.
It is advised to have a longish trial period for business users as an extended trial period will help customers to assess their requirements in a better way and will greatly help in their buying decision.
For how long have I used the solution?
It's been more than two years now since I started using the solution and the experience is so far so good.
What do I think about the stability of the solution?
It is highly stable in the most fragile environments. It never breaks down.
What do I think about the scalability of the solution?
The solution is impressive and highly scalable
How are customer service and support?
Technical support is highly responsive and attentive to any of our service requests.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used the Quick Heal Total Security Antivirus solution in past and found the same little costly and ineffective in a few performance parameters which pushed me to switch from the earlier solution to Check Point.
How was the initial setup?
It is an easy deployment with no tech detailing as things were crystal clear since inception and were not at all fussy.
What about the implementation team?
We used a vendor team only. We had a good experience with them. I'd rate them five out of five.
What was our ROI?
We've seen an ROI of almost 30%.
What's my experience with pricing, setup cost, and licensing?
Always aim to optimize the setup cost, pricing, and licensing as any overboard in these costs can backfire on the organization and business can get adversely affected.
Which other solutions did I evaluate?
We also looked at Norton, McAfee, and Trend Micro security solutions.
What other advice do I have?
It's a one-stop solution for 360-degree endpoint security management for your web and cloud systems. It provides end-to-end protection from viruses and malware attacks and strengthens our system security to the fullest.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Cortex XDR by Palo Alto Networks
SentinelOne Singularity Complete
Fortinet FortiEDR
HP Wolf Security
Huntress Managed EDR
Elastic Security
Microsoft Defender XDR
Trellix Endpoint Security Platform
WatchGuard Firebox
TrendAI Vision One
Fortinet FortiClient
Symantec Endpoint Security
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?



















