In search of a solution that allowed us to analyze, detect, evaluate and, above all, correct at the antivirus level within the network in a perimeter way, we have used the solutions that come in the Check Point appliances, thus giving us the possibility of enabling a lot of its most outstanding features.
Perimeter Security Administrator at a security firm with 51-200 employees
Improves security, defines policies, and helps with compliance
Pros and Cons
- "Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity."
- "There needs to be more internally connected systems in order to achieve real-time effectiveness."
What is our primary use case?
How has it helped my organization?
We had been trying to complement the antivirus solution across our computers. We searched and tested different providers, reaching the conclusion that we could get the most out of solutions that we already had as they were already giving us additional protection. We needed, however, additional protection that would allow us to configure from a perimeter device all the conditions, rules, policies, and needs for blocking or security in the organization's network. With this solution, we could generate value and security in each of the actions that users have within the perimeter network.
What is most valuable?
Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease.
What needs improvement?
We should be able to generate client applications based on a structure and scheme that uses the power of computation of local devices to generate interaction and remote management. There needs to be more internally connected systems in order to achieve real-time effectiveness. The solution should establish communication in real-time, thereby multiplying those possibilities of interaction in a faster way when it comes to communicating against your central server.
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director at esupport Solutions Pvt ltd
A good endpoint antivirus solution, with an excellent zero-day protection feature
Pros and Cons
- "We find the zero-day protection to be an extremely valuable feature of this solution."
- "We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's."
What is our primary use case?
We use this product as an endpoint antivirus solution.
What is most valuable?
We find the zero-day protection to be an extremely valuable feature of this solution.
What needs improvement?
We would like to see the URL filtering functionality improved in this solution, so that we can exclude domains, rather than just single site URL's.
For how long have I used the solution?
We have been working with this solution for nearly four years.
What do I think about the stability of the solution?
We have found this to be a very stable solution during our time using it.
What do I think about the scalability of the solution?
We have not had any issues with the scalability of this solution due to the fact that it is cloud-based, and can be deployed to more users automatically as needed.
How was the initial setup?
The initial setup of this solution is very simple, and the cloud-based deployment is very quick.
What about the implementation team?
We used a team of integrators for our implementation.
Which other solutions did I evaluate?
We also evaluated Palo Alto Endpoint, but it was too complicated to configure, and presented too many technical challenges.
What other advice do I have?
We recommend the cloud-based variant of this solution to organizations of all sizes as there is no upper limit to the number of users it can cover, and the price is affordable for SMB's.
We would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
Consultant at SOCIEDAD AXIOBASE S.A.
It has a threat prevention policy that can stop different types of threats from entering the environment, but it lacks an EDL feature and is a little costly
Pros and Cons
- "What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment."
- "What's missing in Check Point Antivirus is the EDL feature."
What is our primary use case?
I'm using Check Point Antivirus for my customer, mainly to check threat activity and generate a report on threats in the customer environment. I then compare different reports and check for possible IP threats by reviewing the IP address database on Check Point Antivirus. I also use the tool to check malicious activity on applications and use it as an EPS solution.
What is most valuable?
What I like best about Check Point Antivirus is that it's a strong tool for preventing malicious traffic and threats from entering the environment. It has a threat prevention policy so that I can stop different types of threats from entering a workspace or environment.
What needs improvement?
What's missing in Check Point Antivirus is the EDL feature, which I want Check Point to add in the future.
What do I think about the stability of the solution?
Check Point Antivirus is very stable, and I'd rate its stability as nine out of ten.
What do I think about the scalability of the solution?
Check Point Antivirus has excellent scalability, but you need a license because there's a limit depending on your license. The tool works fine if you have the correct number of licenses.
The scalability of the tool is a nine out of ten.
How are customer service and support?
Check Point Antivirus provides excellent technical support, but if the customer doesn't pay for the correct number of licenses, there will be issues, and support may not be as good.
I'd rate Check Point Antivirus support as eight out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup for Check Point Antivirus wasn't difficult for me. If you know your network, then it's not complicated. Configuring and setting the tool up could be difficult if you don't have networking knowledge.
Installing the architecture with different appliances takes two to three days, and learning the tool and the rules would take one week for the customer.
What's my experience with pricing, setup cost, and licensing?
Check Point Antivirus is a good solution, but it's a little costly and is similar to Fortinet, pricing-wise.
What other advice do I have?
I'm a consultant working with Check Point technologies, including Check Point Antivirus.
Deploying and maintaining Check Point Antivirus requires two to three engineers.
My advice to anyone planning to use Check Point Antivirus is that it's a good tool, especially if you're using an endpoint solution from Check Point.
My rating for Check Point Antivirus is seven out of ten because you need to be certified to manage the tool and for it to work well for your company. It could be a very complex tool, depending on the customer.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner/Consultant
Application Developer at Capegemini Consulting India Private Limited
Highly productive, compatible, and easy-to-use
Pros and Cons
- "Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background."
- "Overall I didn't personally face any issues while implementing Check Point Antivirus."
What is our primary use case?
After implementing Check Point Antivirus, we've had a few compatibility issues with my devices.
Check Point Antivirus proved to be highly productive for my work and has helped with data security via its features. It offers VPN capabilities and provides multiple device protection. It is very easy to monitor results across all covered devices.
Check Point Antivirus is highly compatible with other solutions and is scalable while offering extremely low pricing.
How has it helped my organization?
Check Point Antivirus proved to be highly productive and scalable for my work. The data security features, including malware detection and escalation, operated quickly. There are multiple devices protected by the software. It is now very easy to carry out and monitor results from the same task across all devices.
Check Point Antivirus automatically fixes pop-up ads and effortlessly detects all kinds of malware and threats while syncing systems in the background.
What is most valuable?
Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background.
Along with Check Point Antivirus, the support provides multiple updates and upgrades in quick succession. It's quick to restore the management of the database and has scheduled security system and network upgrades for risk-free work management.
Overall, Check Point Antivirus is highly productive, scalable, compatible, and easy-to-use software for data security and system management. I highly recommend this platform.
What needs improvement?
There are no areas that Check Point Antivirus needs to work on.
Overall I didn't personally face any issues while implementing Check Point Antivirus. In comparison to alternatives present in the market Check Point Antivirus has high efficiency and a better ability to protect our devices both online and offline.
Personally, I highly recommend this platform to professionals for data security and management.
For how long have I used the solution?
I've used Check Point Antivirus integration for approximately one year or so.
Which solution did I use previously and why did I switch?
I haven't used any other such platform for data security and system management.
What's my experience with pricing, setup cost, and licensing?
Overall, Check Point Antivirus is highly productive, scalable, compatible, and very easy to use. It's good software for data security and systems management and I highly recommend it.
Which other solutions did I evaluate?
I did look into other options. For a simple comparison, I visited certain websites for product reviews. In the end, I found Check Point Antivirus to be the best option.
What other advice do I have?
Go for it. First, implement it and see the change in your levels of security.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Project Manager at Digitas APAC
Timely updates, comprehensive data management features, and good monitoring
Pros and Cons
- "It monitors data flow across the networking system to enhance comprehensive workflow infrastructure."
- "The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis."
What is our primary use case?
Harmony Endpoint helps the company to protect devices from phishing attacks.
It offers instant notification when it senses any form of external threat that can compromise data.
It can be easily deployed on both mobile and desktop devices.
The product has saved my team a lot of time and resources during the project implementation process.
It responds quickly to data threats that can leak internal information into an unsafe environment. We have accomplished many projects and submitted them successfully to our clients without any challenges since deploying Harmony Endpoint.
How has it helped my organization?
This solution provides threat intelligence to all sectors to enhance effective planning and decision-making before we get into trouble.
It monitors data flow across the networking system to enhance comprehensive workflow infrastructure.
Real-time monitoring provides essential tools for security configurations that cannot be interfered with by ransomware attacks easily. This is the best solution, far from other related software in attack prediction and threat analysis. It is cloud-based, and teams across the organization find it to be more flexible for real-time analytics.
What is most valuable?
Network monitoring provides the best reports based on real-time performance, which helps our members locate any drawbacks across the workflow system.
The threat response system from the user dashboard blocks malware attacks that can affect email and the flow of information among colleagues.
Endpoint protection is fundamental in security enhancement; it's effectively protecting our devices from internet viruses.
The application investigation system enables the IT team to come up with reliable reports on the cause and prevention measures that can be adapted to prevent any future attacks.
What needs improvement?
The system has comprehensive data management features that have saved us from incurring unplanned losses.
Timely updates and suitable configurations can block malware attacks and provide effective reports on security situations.
The setup process was complicated, however, when the customer service team came in, they provided productive guidelines that have kept the system working efficiently.
The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis.
For how long have I used the solution?
I've used the solution for 18 months.
What do I think about the stability of the solution?
This platform is highly stable, and the performance is awesome.
What do I think about the scalability of the solution?
The scalability has impressed all relevant teams.
How are customer service and support?
The customer service team is passionate about their work, and they provide timely responses.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not worked with other related products.
How was the initial setup?
The setup was straightforward. We had assistance from the customer support team.
What about the implementation team?
implementation took place through the vendor team.
What was our ROI?
The targeted ROI has been achieved since we deployed the application.
What's my experience with pricing, setup cost, and licensing?
The setup and cost depend on the number of devices that have to be secured.
Which other solutions did I evaluate?
I evaluated Intercept X Endpoint. However, it did not impress the entire team.
What other advice do I have?
I am satisfied with the current performance and I thoroughly recommend Harmony Endpoint to other business enterprises.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Supervisor Tecnico at M.Coutinho Douro - ComÉrcio De AutomÓveis, S.A.
Good URL filtering and application control with useful dick encryption
Pros and Cons
- "The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options."
- "Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant."
What is our primary use case?
We're using this for our endpoint protection in terms of antivirus and malware protection, disk encryption, and URL and application filtering on our client computers.
We integrate the VPN feature with Check Point's firewall allowing our clients to access internal resources with security policies enforced and controlled.
The reports given by the software are also a benefit since it allows better management and control of access to all our client computers at any time from anywhere.
The web console is also nice.
How has it helped my organization?
We have all our information and policies on one platform for all the features, and we can assign our technicians' several permissions and roles on the product.
Our customers are also better protected, and we can guarantee that security policies are enforced and compliant in each one of them.
Security has been a significant focus for us, and Harmony Endpoint, together with the entire Check Point ecosystem, made it easy for our organization to enforce such policies.
We value the URL and app filtering of the platform.
What is most valuable?
The URL filtering and application control are very helpful since it's typically hard to block productivity loss apps/URLs on clients when abroad. Harmony made it easy to control the usage of the company resources and bandwidth.
Disk encryption is a nice feature if you don't have other systems. However, since we've already had BitLocker deployed, we saved a few dollars on this licensing type.
The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options.
What needs improvement?
Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant. URL filtering should allow for time-based rules, for example, don't allow media streaming during work hours yet allow it on weekends.
The same applies to application control. When in our headquarters, we can solve this on the Check Point Firewall. However, the Harmony client does not support this type of condition, and we had to find a "middle ground" between policies and usability for our clients.
For how long have I used the solution?
We've been using this solution for two years.
Which solution did I use previously and why did I switch?
We did use Microsoft Defender. It lacked features, and therefore we moved away from the solution.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to try to implement BitLocker for disk encryption since it's free.
Which other solutions did I evaluate?
We did not evaluate other options.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Human Resources Manager at Beat
Good virus detection with helpful performance metrics and a simple deployment
Pros and Cons
- "The application runs very fast and does not affect the performance speed of the device where it is installed."
- "A secure work environment has contributed to increased ROI."
- "When there are many devices, it is more costly since each device requires unique login credentials."
- "When there are many devices, it is more costly since each device requires unique login credentials."
What is our primary use case?
The antivirus helps the organization in securing desktops and mobile devices from external data threats. It detects the entry of viruses to devices that can destroy data and quickly takes necessary action.
Once the software is installed, there is no additional cost that is required to run it. It troubleshoots any errors that may slow down workflows across applications. Check Point Antivirus integrates with multiple operating systems, including Windows and Linux.
Since I installed it on my desktop, the browsing speed has improved, and I can visit several sites without fear.
How has it helped my organization?
The software has improved the digital experience of employees who have deployed it.
I can comfortably open links attached to my emails and share documents with my colleagues without fear of cyber attacks.
Departments that used to lose data to virus attacks can work from any site and focus more on productive business engagements.
The antivirus provides advanced security data analytics that helps the user to work from safe sites that can affect tasks in progress.
The software screens applications to ensure they perform effectively.
What is most valuable?
Virus detection helps teams to be aware of any threats that can harm data and take precautions in advance.
It provides networking reports on the data security situation, which enables users to make decisions.
Performance metrics provided regularly help the IT team plan to curb any threats to company data.
It is easy to deploy the antivirus and learn how it works.
The application runs very fast and does not affect the performance speed of the device where it is installed.
Daily security analysis indicators help team members to engage any abnormality with real-time insights.
What needs improvement?
The current features are doing extremely well. That said, the system coding can be simplified to enable any user to interpret the security situation of the used device.
I am happy with the set data models since they monitor the security situation of new sites before browsing.
I have not observed most failures since I started using this software.
The company can embark on timely updates to ensure the application is compatible with devices.
Customer support comes in on time when we contact them via online chats and phone calls.
When there are many devices, it is more costly since each device requires unique login credentials.
The product is heavy, and it requires more space for effective operation. New users can find it difficult to set up and install due to the lack of a robust user manual.
For how long have I used the solution?
I've used the solution for eight months.
What do I think about the stability of the solution?
It works for a long time without failing and does not misbehave.
What do I think about the scalability of the solution?
The antivirus performance has been excellent.
How are customer service and support?
The customer service team has never failed us.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used Kaspersky Antivirus, however, it used to fail most of the time.
How was the initial setup?
The installation process of the application is easy and straightforward.
What about the implementation team?
I deployed it through a vendor, and they are doing well.
What was our ROI?
A secure work environment has contributed to increased ROI.
What's my experience with pricing, setup cost, and licensing?
The pricing is suitable, and the setup process is simple.
Which other solutions did I evaluate?
I evaluated most free online antiviruses, however, they were not effective.
What other advice do I have?
Check Point Antivirus is a sure bet for the detection of any virus.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Administrative Assistant at Tecapro
Great security, reliability, and offers a centralized administration of unified services
Pros and Cons
- "Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard."
- "This solution has become a great ally for the prevention of threats and security problems caused by viruses such as ransomware, and we are protected against threats, which is of great value."
- "I would like to see is this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses."
- "I would like to see this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses."
What is our primary use case?
We had to protect our equipment inside and outside the perimeter network, regardless of where we were. Due to this need, we came to use Check Point Harmony Endpoint, which was extremely easy to deploy from the moment we logged in to the website.
This solution is very user-friendly. After the Check Point tenant is created, it allows us to download the application for iOS or Windows, and it is only a matter of installing it so that the teams can start reporting to the Harmony Endpoint cloud.
How has it helped my organization?
It came to provide us with security, reliability, and a centralized administration of unified services. It works regardless of whether you work on Mac or Windows systems, which are among the equipment we have in our organization. Today, our equipment is very diverse. However, we have managed to protect everyone with this solution. Check Point Harmony Endpoint provides support within the new organizational disruption trend of teleworking. With it, we manage to protect and manage all teams from a centralized policy.
What is most valuable?
Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard. We are achieving uniform work that is easy to manage if any changes are necessary. Being able to give us an inventory of the equipment and the health status of everything from a single place has been great. This solution has become a great ally for the prevention of threats and security problems caused by viruses such as ransomware, and we are protected against threats, which is of great value.
What needs improvement?
I would like to see this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses. We'd like to be able to integrate several products and services into one to be more efficient and user-friendly within the infrastructure.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Cortex XDR by Palo Alto Networks
Microsoft Defender for Endpoint
SentinelOne Singularity Endpoint
IBM Security QRadar
Huntress Managed EDR
Elastic Security
HP Wolf Security
Trellix Endpoint Security Platform
Microsoft Defender XDR
WatchGuard Firebox
Fortinet FortiEDR
TrendAI Vision One
Fortinet FortiClient
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?


















