Try our new research platform with insights from 80,000+ expert users
Ido Sarusi - PeerSpot reviewer
Developer at a tech services company with 1-10 employees
Real User
Sep 11, 2023
Incorporates security AI features and effectively manages bandwidth with its DRS capabilities, but the software could be more resource-efficient
Pros and Cons
  • "This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities."
  • "The software requires considerable resources and can strain less powerful computers."

What is our primary use case?

We continue to offer our support solutions to other companies as requested. I focus on cyber security, specifically specializing in detecting malware in text and searching for remote access or reverse channels on computers.

What is most valuable?

This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities. However, there's still room for improvement and the addition of more features. Nevertheless, in the broader market landscape, it's considered one of the leading products. While there might be some competition from others like Cisco, it remains a strong choice. The feature lies in mapping and providing top-notch malware protection.

What needs improvement?

Perhaps the software could be made more resource-efficient. While many improvements come to mind, I don't have them readily available. Essentially, I aim to enhance the software's efficiency so that it places fewer demands on computer resources.

For how long have I used the solution?

I have been working with Check Point Harmony Endpoint for the past two years.

Buyer's Guide
Check Point Harmony Endpoint
February 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.

What do I think about the stability of the solution?

It is a stable solution and I would rate it seven out of ten.

What do I think about the scalability of the solution?

It isn’t very scalable since I wasn't able to bypass the security a couple of times. I would rate it a six out of ten. 

How was the initial setup?

I would rate it a six out of ten because it could have been easier. It might be somewhat challenging due to the numerous policies in place. For instance, it's more straightforward for me when users can easily set up policies because they come built-in. However, with Check Point, you do have the option to create custom policies. I'm not entirely certain if it's a strict either/or situation, as there might be some flexibility. Nonetheless, having a predefined "zero one" option can make it easier for users, as they don't necessarily have to customize policies themselves.

The deployment takes long enough.

What other advice do I have?

Currently, this software stands out as one of the top choices in the field. It's undoubtedly a strong contender for enhancing computer security, and while there are various other products available, this one ranks among the best.

I recommend the solution, but I would rate it a six out of ten, mainly because the software requires considerable resources and can strain less powerful computers. It tends to impact system efficiency, especially on computers with weaker hardware, causing frequent restarts and putting a significant load on the CPU and memory.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Enterprise architect at a logistics company with 1,001-5,000 employees
Real User
Mar 26, 2023
Very robust, providing good ransomware protection
Pros and Cons
  • "A very good and robust antivirus solution."
  • "Reporting and management could be improved."

What is our primary use case?

We use Check Point for ransomware protection. It provides standard endpoint protection. 

What is most valuable?

We need ransomware protection and that's what we get. It's a very good and robust antivirus solution.

What needs improvement?

As with most antivirus products, the reporting and management could be improved. 

For how long have I used the solution?

I've been using this solution for one year. 

What do I think about the stability of the solution?

The solution is stable. 

What do I think about the scalability of the solution?

The solution is scalable, we have a few thousand users. 

How are customer service and support?

We haven't had any issues with the technical support. 

Which solution did I use previously and why did I switch?

I previously used Symantec and McAfee depending on the requirements at the time. There's not much difference between all the solutions in this area. It comes down to how manageable they are and how frequently false positives exist in that environment and whether they slow down the transactions or the processing of the machine. 

How was the initial setup?

The initial setup is fairly straightforward, deployment takes a few minutes. It's just a matter of setting up the server, your policies, and pushing out the agents. 

What was our ROI?

Our ROI has been from an operational perspective. If you're not fighting with a product every day, it saves you time and money. 

What's my experience with pricing, setup cost, and licensing?

Licensing costs are usually paid annually or every three years. This is not a particularly expensive solution. 

What other advice do I have?

I rate this solution eight out of 10. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
February 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.
Cloud Support at a tech company with 1-10 employees
User
Top 5
Feb 20, 2023
Check Point Antivirus its a great solution, easy installation.
Pros and Cons
  • "It generates enough visibility in terms of what happens on our equipment."
  • "We would like to see better guides in the future with more concrete examples of the best practices."

What is our primary use case?

The implementation was really easy. We were able to activate the antivirus blade and install it on the computers we required. In this way, we were able to provide security for malware protection - all represented by Check Point Security Management.

It was required to expand or have the license to use the antivirus security utility. A point that cost us at the beginning was implementing the licenses in the management server however, once up and running, it was easy.

It is an old brand that has all the anti-malware protection, signatures, and revisions to avoid vulnerabilities.

How has it helped my organization?

Our organization teams used a Microsoft-based antivirus. However, we already had Check Point gateways in use. We wanted to unify the protection more, and we tried the use of Check Point Antivirus. We really have no complaints. It offers good anti-malware protection and ransomware, among other modern threat protection features. The installation of the equipment was easy, and we achieved the main objective of unifying the protected environment.

We currently use Check Point Management R81, which is one of the most complete versions.

What is most valuable?

The logs and monitoring are valuable features. It generates enough visibility in terms of what happens on our equipment.

The sandboxing validates some files that have threat qualities. 

We like this security tool.

What needs improvement?

Check Point is one of the best security brands according to the Gartner quadrant. However, it needs improvement in some areas.

We would like to see better guides in the future with more concrete examples of the best practices.

The support is somewhat complicated. Sometimes they take a long time to solve problems. The language barrier is an issue for Spanish-speaking people. 

Support hours are generally contrary to the hours in Latin America. They could expand the support more and have more trained and effective technical personnel to help customers.

For how long have I used the solution?

For at least eight months, we have used this solution, which greatly facilitates our security. It is an antivirus implemented through Check Point Gateway R81.

Which solution did I use previously and why did I switch?

Previously, we used a Microsoft Antivirus. It's not bad. However, we wanted a tool integrated with our Check Point technologies, and therefore, we validated the options to make the required changes.

What's my experience with pricing, setup cost, and licensing?

It is important to assess and verify the costs of Check Point technologies with an expert vendor to help determine the technology and tool that can meet the specific business needs of each company.

The documentation is outdated. However, if it is validated well, it is possible to obtain what is required for the implementations.

Which other solutions did I evaluate?

At the level of antivirus, we looked at Sophos and McAfee. However, the implementation most adopted in our environment was Check Point. We are convinced that it was the best option.

What other advice do I have?

The product is an easy-to-implement and centralized antivirus solution. I recommend it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2008410 - PeerSpot reviewer
Software Engineer at a tech vendor with 201-500 employees
User
Jan 29, 2023
Great support with faster data processing capabilities and a high level of security
Pros and Cons
  • "Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information."
  • "It blocks safe URLs sometimes when there are network interruptions."

What is our primary use case?

We deployed this product to harmonize our products and have one central access point. 

It helps us to set security features that protect the computing devices from malware attacks. 

It gives me an opportunity to manage applications that works on various workflows centrally. 

Integration with all employee devices has enabled my team to monitor the security situation and put in place emergency measures in case of any threat. 

Team members can connect their working devices from a central networking connection that is secure and reliable.

How has it helped my organization?

The high-level security provided by Check Point Harmony Endpoint has given my team all the required tools for setting up a central network control platform. It provides solutions to challenges that affect workflows slowing down performance. 

There is improved business work processes agility that keeps all the sectors functional. 

There has been improved security compliance and risk management in all the business transactions that we undertake since we deployed this application. 

Laptops and mobile devices that operate within the enterprise have been secured, and teams can easily focus on more productive roles without fear of being attacked.

What is most valuable?

Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information. 

The cloud management system provides security to hybrid information and saved files. 

The customer support services are efficient and always reliable when reached for any consultation. 

It supports operating systems that are deployed in computers and mobile devices. 

New users familiarize themselves easily with the operation of UI since it has flexible dashboards. 

The faster data processing capability saves time and costs for accomplishing given tasks.

What needs improvement?

It has full performance capability to execute the given duties. 

It blocks safe URLs sometimes when there are network interruptions. 

The cost of deployment varies with the existing working conditions and the organization's size. 

The cloud networking infrastructure can be attacked if there are limited security features and poor monitoring capacity from the IT team. 

The overall performance impressed my team. Check Point Harmony Endpoint is the sure deal for enterprise security coverage and computing device control.

For how long have I used the solution?

I've used the solution for ten months.

What do I think about the stability of the solution?

It is stable in the provision of reliable security.

What do I think about the scalability of the solution?

I am impressed by the performance of this product.

How are customer service and support?

The customer support staff is ever supportive.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used a similar solution previously.

How was the initial setup?

The initial setup procedure was straightforward.

What about the implementation team?

There was high-level expertise from the vendor team during implementation.

What was our ROI?

There has been a positive ROI since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The setup cost and licensing terms vary according to enterprise size.

Which other solutions did I evaluate?

I evaluated several options. This platform was the best.

What other advice do I have?

I recommend the implementation of this platform in other organizations.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 20
Jan 29, 2023
Improves security, defines policies, and helps with compliance
Pros and Cons
  • "Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity."
  • "There needs to be more internally connected systems in order to achieve real-time effectiveness."

What is our primary use case?

In search of a solution that allowed us to analyze, detect, evaluate and, above all, correct at the antivirus level within the network in a perimeter way, we have used the solutions that come in the Check Point appliances, thus giving us the possibility of enabling a lot of its most outstanding features.

How has it helped my organization?

We had been trying to complement the antivirus solution across our computers. We searched and tested different providers, reaching the conclusion that we could get the most out of solutions that we already had as they were already giving us additional protection. We needed, however, additional protection that would allow us to configure from a perimeter device all the conditions, rules, policies, and needs for blocking or security in the organization's network. With this solution, we could generate value and security in each of the actions that users have within the perimeter network. 

What is most valuable?

Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease. 

What needs improvement?

We should be able to generate client applications based on a structure and scheme that uses the power of computation of local devices to generate interaction and remote management. There needs to be more internally connected systems in order to achieve real-time effectiveness. The solution should establish communication in real-time, thereby multiplying those possibilities of interaction in a faster way when it comes to communicating against your central server. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Bala_Krishna - PeerSpot reviewer
Director at a computer software company with 11-50 employees
Real User
Top 5
Jan 19, 2023
A good endpoint antivirus solution, with an excellent zero-day protection feature
Pros and Cons
  • "We find the zero-day protection to be an extremely valuable feature of this solution."
  • "We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's."

What is our primary use case?

We use this product as an endpoint antivirus solution.

What is most valuable?

We find the zero-day protection to be an extremely valuable feature of this solution.

What needs improvement?

We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's.

For how long have I used the solution?

We have been working with this solution for nearly four years.

What do I think about the stability of the solution?

We have found this to be a very stable solution during our time using it.

What do I think about the scalability of the solution?

We have not had any issues with the scalability of this solution due to the fact that it is cloud-based, and can be deployed to more users automatically as needed.

How was the initial setup?

The initial setup of this solution is very simple, and the cloud-based deployment is very quick.

What about the implementation team?

We used a team of integrators for our implementation.

Which other solutions did I evaluate?

We also evaluated Palo Alto Endpoint, but it was too complicated to configure, and presented too many technical challenges.

What other advice do I have?

We recommend the cloud-based variant of this solution to organizations of all sizes as there is no upper limit to the number of users it can cover, and the price is affordable for SMB's.

We would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Consultant at a consultancy with 11-50 employees
Consultant
Jan 10, 2023
It has a threat prevention policy that can stop different types of threats from entering the environment, but it lacks an EDL feature and is a little costly
Pros and Cons
  • "What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment."
  • "What's missing in Check Point Antivirus is the EDL feature."

What is our primary use case?

I'm using Check Point Antivirus for my customer, mainly to check threat activity and generate a report on threats in the customer environment. I then compare different reports and check for possible IP threats by reviewing the IP address database on Check Point Antivirus. I also use the tool to check malicious activity on applications and use it as an EPS solution.

What is most valuable?

What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment. It has a threat prevention policy so that I can stop different types of threats from entering a workspace or environment.

What needs improvement?

What's missing in Check Point Antivirus is the EDL feature, which I want Check Point to add in the future.

What do I think about the stability of the solution?

Check Point Antivirus is very stable, and I'd rate its stability as nine out of ten.

What do I think about the scalability of the solution?

Check Point Antivirus has excellent scalability, but you need a license because there's a limit depending on your license. The tool works fine if you have the correct number of licenses.

The scalability of the tool is a nine out of ten.

How are customer service and support?

Check Point Antivirus provides excellent technical support, but if the customer doesn't pay for the correct number of licenses, there will be issues, and support may not be as good.

I'd rate Check Point Antivirus support as eight out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup for Check Point Antivirus wasn't difficult for me. If you know your network, then it's not complicated. Configuring and setting the tool up could be difficult if you don't have networking knowledge.

Installing the architecture with different appliances takes two to three days, and learning the tool and the rules would take one week for the customer.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is a good solution, but it's a little costly and is similar to Fortinet, pricing-wise.

What other advice do I have?

I'm a consultant working with Check Point technologies, including Check Point Antivirus.

Deploying and maintaining Check Point Antivirus requires two to three engineers.

My advice to anyone planning to use Check Point Antivirus is that it's a good tool, especially if you're using an endpoint solution from Check Point.

My rating for Check Point Antivirus is seven out of ten because you need to be certified to manage the tool and for it to work well for your company. It could be a very complex tool, depending on the customer.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner/Consultant
PeerSpot user
Ankita  Singh - PeerSpot reviewer
Application Developer at a tech services company with 201-500 employees
Real User
Top 20
Jan 9, 2023
Highly productive, compatible, and easy-to-use
Pros and Cons
  • "Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background."
  • "Overall I didn't personally face any issues while implementing Check Point Antivirus."

What is our primary use case?

After implementing Check Point Antivirus, we've had a few compatibility issues with my devices.

Check Point Antivirus proved to be highly productive for my work and has helped with data security via its features. It offers VPN capabilities and provides multiple device protection. It is very easy to monitor results across all covered devices.

Check Point Antivirus is highly compatible with other solutions and is scalable while offering extremely low pricing.

How has it helped my organization?

Check Point Antivirus proved to be highly productive and scalable for my work. The data security features, including malware detection and escalation, operated quickly. There are multiple devices protected by the software. It is now very easy to carry out and monitor results from the same task across all devices.

Check Point Antivirus automatically fixes pop-up ads and effortlessly detects all kinds of malware and threats while syncing systems in the background.

What is most valuable?

Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background.

Along with Check Point Antivirus, the support provides multiple updates and upgrades in quick succession. It's quick to restore the management of the database and has scheduled security system and network upgrades for risk-free work management.

Overall, Check Point Antivirus is highly productive, scalable, compatible, and easy-to-use software for data security and system management. I highly recommend this platform.

What needs improvement?

There are no areas that Check Point Antivirus needs to work on.

Overall I didn't personally face any issues while implementing Check Point Antivirus. In comparison to alternatives present in the market Check Point Antivirus has high efficiency and a better ability to protect our devices both online and offline.

Personally, I highly recommend this platform to professionals for data security and management.

For how long have I used the solution?

I've used Check Point Antivirus integration for approximately one year or so.

Which solution did I use previously and why did I switch?

I haven't used any other such platform for data security and system management.

What's my experience with pricing, setup cost, and licensing?

Overall, Check Point Antivirus is highly productive, scalable, compatible, and very easy to use. It's good software for data security and systems management and I highly recommend it.

Which other solutions did I evaluate?

I did look into other options. For a simple comparison, I visited certain websites for product reviews. In the end, I found Check Point Antivirus to be the best option.

What other advice do I have?

Go for it. First, implement it and see the change in your levels of security.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2026
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.