Try our new research platform with insights from 80,000+ expert users
Berkhan Yaman - PeerSpot reviewer
Cyber ​​Security Specialist at a tech services company with 11-50 employees
Reseller
Sep 18, 2023
Has a great encapsulation system but could use better support ticketing
Pros and Cons
  • "The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists."
  • "In terms of improvement, the ticketing system could be better. It is a little tricky to try to open a case and give it to an engineer."

What is our primary use case?

Our company uses Harmony Endpoint for encryption and encapsulation. Our clients use it for data encryption.

What is most valuable?

The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists.

What needs improvement?

In terms of improvement, the ticketing system could be better.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for about three months. 

Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.

What do I think about the stability of the solution?

In terms of stability, I would rate it an eight out of ten.

What do I think about the scalability of the solution?

I would rate the scalability of the solution a solid eight out of ten. It could be slightly improved. Approximately 1000 people use Harmony Endpoint at our company. The maintenance is done once a week by a team of three engineers.

How are customer service and support?

In the Harmony series, the products are linked to each other. It is a little tricky when you try to open a case and give it to an engineer because, in our custom environment, we have to access it from their devices. For example, in Harmony Mobile, their Android or iPhone devices have to be used. All of that takes time and it would be good if Check Point could find a better solution to this and create a feature to help us collect logs for the cases. I would rate the support a six out of ten.

Which solution did I use previously and why did I switch?

I'm currently working with Cisco Secure Endpoint and Palo Alto Cortex XDR. 

How was the initial setup?

We use both the cloud and on-premise solutions. The initial setup is simple and creating a profile with the agents is easy. We only create agents and direct them to versions of the agents while we integrate them with the process. It only takes about five minutes to deploy one mission.

What was our ROI?

We have seen good results with the solution. If it is used with Linux or Mac, it provides better performance.

What's my experience with pricing, setup cost, and licensing?

Check Point Harmony Endpoint is a subscription-based solution and the pricing is quite reasonable when compared to other solutions on the market. I would give it a nine out of ten in terms of affordability.

What other advice do I have?

My advice to people who are considering using Check Point Harmony Endpoint is to be careful of which version you choose while deploying the solution. You should get the recommended versions for the agents. Otherwise, there will be a lot of problems and soft ticketing. Overall, I would rate Harmony Endpoint a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Ido Sarusi - PeerSpot reviewer
Developer at Shavit-security
Real User
Sep 11, 2023
Incorporates security AI features and effectively manages bandwidth with its DRS capabilities, but the software could be more resource-efficient
Pros and Cons
  • "This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities."
  • "The software requires considerable resources and can strain less powerful computers."

What is our primary use case?

We continue to offer our support solutions to other companies as requested. I focus on cyber security, specifically specializing in detecting malware in text and searching for remote access or reverse channels on computers.

What is most valuable?

This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities. However, there's still room for improvement and the addition of more features. Nevertheless, in the broader market landscape, it's considered one of the leading products. While there might be some competition from others like Cisco, it remains a strong choice. The feature lies in mapping and providing top-notch malware protection.

What needs improvement?

Perhaps the software could be made more resource-efficient. While many improvements come to mind, I don't have them readily available. Essentially, I aim to enhance the software's efficiency so that it places fewer demands on computer resources.

For how long have I used the solution?

I have been working with Check Point Harmony Endpoint for the past two years.

What do I think about the stability of the solution?

It is a stable solution and I would rate it seven out of ten.

What do I think about the scalability of the solution?

It isn’t very scalable since I wasn't able to bypass the security a couple of times. I would rate it a six out of ten. 

How was the initial setup?

I would rate it a six out of ten because it could have been easier. It might be somewhat challenging due to the numerous policies in place. For instance, it's more straightforward for me when users can easily set up policies because they come built-in. However, with Check Point, you do have the option to create custom policies. I'm not entirely certain if it's a strict either/or situation, as there might be some flexibility. Nonetheless, having a predefined "zero one" option can make it easier for users, as they don't necessarily have to customize policies themselves.

The deployment takes long enough.

What other advice do I have?

Currently, this software stands out as one of the top choices in the field. It's undoubtedly a strong contender for enhancing computer security, and while there are various other products available, this one ranks among the best.

I recommend the solution, but I would rate it a six out of ten, mainly because the software requires considerable resources and can strain less powerful computers. It tends to impact system efficiency, especially on computers with weaker hardware, causing frequent restarts and putting a significant load on the CPU and memory.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.
Enterprise architect at Kapsch
Real User
Mar 26, 2023
Very robust, providing good ransomware protection
Pros and Cons
  • "A very good and robust antivirus solution."
  • "Reporting and management could be improved."

What is our primary use case?

We use Check Point for ransomware protection. It provides standard endpoint protection. 

What is most valuable?

We need ransomware protection and that's what we get. It's a very good and robust antivirus solution.

What needs improvement?

As with most antivirus products, the reporting and management could be improved. 

For how long have I used the solution?

I've been using this solution for one year. 

What do I think about the stability of the solution?

The solution is stable. 

What do I think about the scalability of the solution?

The solution is scalable, we have a few thousand users. 

How are customer service and support?

We haven't had any issues with the technical support. 

Which solution did I use previously and why did I switch?

I previously used Symantec and McAfee depending on the requirements at the time. There's not much difference between all the solutions in this area. It comes down to how manageable they are and how frequently false positives exist in that environment and whether they slow down the transactions or the processing of the machine. 

How was the initial setup?

The initial setup is fairly straightforward, deployment takes a few minutes. It's just a matter of setting up the server, your policies, and pushing out the agents. 

What was our ROI?

Our ROI has been from an operational perspective. If you're not fighting with a product every day, it saves you time and money. 

What's my experience with pricing, setup cost, and licensing?

Licensing costs are usually paid annually or every three years. This is not a particularly expensive solution. 

What other advice do I have?

I rate this solution eight out of 10. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2098998 - PeerSpot reviewer
Software Engineer at Mercado Libre
User
Feb 26, 2023
Good pricing, easy to deploy, and useful antivirus capabilities
Pros and Cons
  • "The virus detection models orchestrate real-time monitoring of data with reliable reporting information."
  • "The next release can focus more on timely upgrades to enhance computing compatibility."

What is our primary use case?

Check Point Antivirus helps us to detect malware attacks and any phishing attacks that can destroy data and affect programs. 

When installed in any computing device, it provides tracking information that enables members to connect virtually with colleagues in remote areas. It is less costly since it enables members to access company websites from anywhere. 

The endpoint protection services ensure there is data security across the defined network infrastructure. It protects our devices against virus attacks.

How has it helped my organization?

The antivirus has enhanced the secure implementation of most projects and tasks among teams in the enterprise. 

The pricing is good, and it is easy to deploy this software. 

When linking with my colleagues from remote areas, it ensures the communication network is free from cyber attacks. 

The virus detection models orchestrate real-time monitoring of data with reliable reporting information. 

It has reduced the cost of attending events physically and catering accommodations for employees. 

The threat response system has saved teams from engaging with unsafe content and visiting unprotected online sites.

What is most valuable?

It provides automatic scans to most websites to ascertain security situations and alerts the user when there are potential threats that can affect data. 

The webcam protection system prevents unauthorized members from joining virtual meetings organized by employees. 

The phishing protection system prevents teams from spamming across email conversation channels. 

It is easy to install and learn how this platform works. 

It has various location connection that enables the user to select preferred sites that are safe.

What needs improvement?

I am satisfied with the set features due to their competitive performance since we deployed them. 

Integration with some applications was challenging during the deployment process. 

The next release can focus more on timely upgrades to enhance computing compatibility. 

The cost is worth its functionalities and contribution towards the protection of our systems. 

The software services and functions have met the company's requirements and policies. 

There are many notifications that keep streaming in when using the antivirus, and that can be improved.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

It is stable in virus prevention.

What do I think about the scalability of the solution?

I am impressed by the reliable services of this platform.

How are customer service and support?

There have been improved customer support services since we deployed them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used any similar antivirus products.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The implementation took place through the vendor.

What was our ROI?

There is increased ROI from a stable performance.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is the best platform for preventing virus penetration.

Which other solutions did I evaluate?

I looked into other options. The cost and performance capability of this version were the best.

What other advice do I have?

This is a great product that I recommend to other organizations.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Feb 20, 2023
Check Point Antivirus its a great solution, easy installation.
Pros and Cons
  • "It generates enough visibility in terms of what happens on our equipment."
  • "We would like to see better guides in the future with more concrete examples of the best practices."

What is our primary use case?

The implementation was really easy. We were able to activate the antivirus blade and install it on the computers we required. In this way, we were able to provide security for malware protection - all represented by Check Point Security Management.

It was required to expand or have the license to use the antivirus security utility. A point that cost us at the beginning was implementing the licenses in the management server however, once up and running, it was easy.

It is an old brand that has all the anti-malware protection, signatures, and revisions to avoid vulnerabilities.

How has it helped my organization?

Our organization teams used a Microsoft-based antivirus. However, we already had Check Point gateways in use. We wanted to unify the protection more, and we tried the use of Check Point Antivirus. We really have no complaints. It offers good anti-malware protection and ransomware, among other modern threat protection features. The installation of the equipment was easy, and we achieved the main objective of unifying the protected environment.

We currently use Check Point Management R81, which is one of the most complete versions.

What is most valuable?

The logs and monitoring are valuable features. It generates enough visibility in terms of what happens on our equipment.

The sandboxing validates some files that have threat qualities. 

We like this security tool.

What needs improvement?

Check Point is one of the best security brands according to the Gartner quadrant. However, it needs improvement in some areas.

We would like to see better guides in the future with more concrete examples of the best practices.

The support is somewhat complicated. Sometimes they take a long time to solve problems. The language barrier is an issue for Spanish-speaking people. 

Support hours are generally contrary to the hours in Latin America. They could expand the support more and have more trained and effective technical personnel to help customers.

For how long have I used the solution?

For at least eight months, we have used this solution, which greatly facilitates our security. It is an antivirus implemented through Check Point Gateway R81.

Which solution did I use previously and why did I switch?

Previously, we used a Microsoft Antivirus. It's not bad. However, we wanted a tool integrated with our Check Point technologies, and therefore, we validated the options to make the required changes.

What's my experience with pricing, setup cost, and licensing?

It is important to assess and verify the costs of Check Point technologies with an expert vendor to help determine the technology and tool that can meet the specific business needs of each company.

The documentation is outdated. However, if it is validated well, it is possible to obtain what is required for the implementations.

Which other solutions did I evaluate?

At the level of antivirus, we looked at Sophos and McAfee. However, the implementation most adopted in our environment was Check Point. We are convinced that it was the best option.

What other advice do I have?

The product is an easy-to-implement and centralized antivirus solution. I recommend it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle
User
Jan 29, 2023
Great support with faster data processing capabilities and a high level of security
Pros and Cons
  • "Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information."
  • "It blocks safe URLs sometimes when there are network interruptions."

What is our primary use case?

We deployed this product to harmonize our products and have one central access point. 

It helps us to set security features that protect the computing devices from malware attacks. 

It gives me an opportunity to manage applications that works on various workflows centrally. 

Integration with all employee devices has enabled my team to monitor the security situation and put in place emergency measures in case of any threat. 

Team members can connect their working devices from a central networking connection that is secure and reliable.

How has it helped my organization?

The high-level security provided by Check Point Harmony Endpoint has given my team all the required tools for setting up a central network control platform. It provides solutions to challenges that affect workflows slowing down performance. 

There is improved business work processes agility that keeps all the sectors functional. 

There has been improved security compliance and risk management in all the business transactions that we undertake since we deployed this application. 

Laptops and mobile devices that operate within the enterprise have been secured, and teams can easily focus on more productive roles without fear of being attacked.

What is most valuable?

Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information. 

The cloud management system provides security to hybrid information and saved files. 

The customer support services are efficient and always reliable when reached for any consultation. 

It supports operating systems that are deployed in computers and mobile devices. 

New users familiarize themselves easily with the operation of UI since it has flexible dashboards. 

The faster data processing capability saves time and costs for accomplishing given tasks.

What needs improvement?

It has full performance capability to execute the given duties. 

It blocks safe URLs sometimes when there are network interruptions. 

The cost of deployment varies with the existing working conditions and the organization's size. 

The cloud networking infrastructure can be attacked if there are limited security features and poor monitoring capacity from the IT team. 

The overall performance impressed my team. Check Point Harmony Endpoint is the sure deal for enterprise security coverage and computing device control.

For how long have I used the solution?

I've used the solution for ten months.

What do I think about the stability of the solution?

It is stable in the provision of reliable security.

What do I think about the scalability of the solution?

I am impressed by the performance of this product.

How are customer service and support?

The customer support staff is ever supportive.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used a similar solution previously.

How was the initial setup?

The initial setup procedure was straightforward.

What about the implementation team?

There was high-level expertise from the vendor team during implementation.

What was our ROI?

There has been a positive ROI since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The setup cost and licensing terms vary according to enterprise size.

Which other solutions did I evaluate?

I evaluated several options. This platform was the best.

What other advice do I have?

I recommend the implementation of this platform in other organizations.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 20
Jan 29, 2023
Improves security, defines policies, and helps with compliance
Pros and Cons
  • "Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity."
  • "There needs to be more internally connected systems in order to achieve real-time effectiveness."

What is our primary use case?

In search of a solution that allowed us to analyze, detect, evaluate and, above all, correct at the antivirus level within the network in a perimeter way, we have used the solutions that come in the Check Point appliances, thus giving us the possibility of enabling a lot of its most outstanding features.

How has it helped my organization?

We had been trying to complement the antivirus solution across our computers. We searched and tested different providers, reaching the conclusion that we could get the most out of solutions that we already had as they were already giving us additional protection. We needed, however, additional protection that would allow us to configure from a perimeter device all the conditions, rules, policies, and needs for blocking or security in the organization's network. With this solution, we could generate value and security in each of the actions that users have within the perimeter network. 

What is most valuable?

Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease. 

What needs improvement?

We should be able to generate client applications based on a structure and scheme that uses the power of computation of local devices to generate interaction and remote management. There needs to be more internally connected systems in order to achieve real-time effectiveness. The solution should establish communication in real-time, thereby multiplying those possibilities of interaction in a faster way when it comes to communicating against your central server. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Bala_Krishna - PeerSpot reviewer
Director at esupport Solutions Pvt ltd
Real User
Top 5
Jan 19, 2023
A good endpoint antivirus solution, with an excellent zero-day protection feature
Pros and Cons
  • "We find the zero-day protection to be an extremely valuable feature of this solution."
  • "We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's."

What is our primary use case?

We use this product as an endpoint antivirus solution.

What is most valuable?

We find the zero-day protection to be an extremely valuable feature of this solution.

What needs improvement?

We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's.

For how long have I used the solution?

We have been working with this solution for nearly four years.

What do I think about the stability of the solution?

We have found this to be a very stable solution during our time using it.

What do I think about the scalability of the solution?

We have not had any issues with the scalability of this solution due to the fact that it is cloud-based, and can be deployed to more users automatically as needed.

How was the initial setup?

The initial setup of this solution is very simple, and the cloud-based deployment is very quick.

What about the implementation team?

We used a team of integrators for our implementation.

Which other solutions did I evaluate?

We also evaluated Palo Alto Endpoint, but it was too complicated to configure, and presented too many technical challenges.

What other advice do I have?

We recommend the cloud-based variant of this solution to organizations of all sizes as there is no upper limit to the number of users it can cover, and the price is affordable for SMB's.

We would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.