Today, with our current organizational needs, we find great complexities when it comes to protecting each of our users inside and outside of the network. As a result, we came to use solutions that had not been deployed yet, and one of them is the integration that Check Point has in its range of solutions, such as the Blade and what we know today as the Check Point Antivirus. Thanks to this solution, we are protected.
Administrative Assistant at Tecapro
Good prevention and detection with helpful analytics
Pros and Cons
- "Its most valuable feature is the integration of analytics with the cloud."
- "The solution adds value to our organization since it is protecting us and integrates analytics with the Check Point cloud."
- "I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available."
- "I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available."
What is our primary use case?
How has it helped my organization?
The Antivirus is part of the added value we are getting from Check Point. It's offering greater prevention and detection of attacks. The solution adds value to our organization since it is protecting us and integrates analytics with the Check Point cloud. We're getting great computing power and analysis behind the security.
What is most valuable?
Its most valuable feature is the integration of analytics with the cloud. We like that we can detect zero-day incidents, problems, or virus attacks inside or outside the organization. It's one of the most complex and integrated antivirus solutions. The value of analysis in real-time every time we are having an attack, vulnerability, or security breach is very helpful. Today, we want to have integrated solutions and quick solutions that will protect us mainly with new attacks and solutions that protect us from the hijacking of our data (ransomware).
What needs improvement?
I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available. We want the solution to help us achieve 360-degree security across all work teams.
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for about two years.
What do I think about the stability of the solution?
The solution is really simple. It is not difficult to configure, and it is very stable for me, from my experience.
What do I think about the scalability of the solution?
Due to its deployment, it is integrated within our network, and it is a quick and easy solution to scale or modify.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Network Engineer at АТ "Банк інвестицій та заощаджень"
Useful centralized management, responsive support, but resources usage could improve
Pros and Cons
- "The most valuable feature of Check Point Harmony Endpoint is centralized management."
- "The most valuable feature of Check Point Harmony Endpoint is centralized management."
- "Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features."
- "Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features."
What is our primary use case?
We have many clients using this solution for different use cases.
The solution can be deployed on the cloud and on-premise.
Check Point Harmony Endpoint is mainly used for protection.
What is most valuable?
The most valuable feature of Check Point Harmony Endpoint is centralized management.
What needs improvement?
Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for approximately two years.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is very stable.
What do I think about the scalability of the solution?
The scalability of the Check Point Harmony Endpoint is good. It can scale easily.
We have some clients with 10,000 users that are using this solution.
How are customer service and support?
I have opened up many tickets with the support and they have been responsive. I have not had any problems with them. They have helped whenever I faced a problem.
I rate the support from Check Point Harmony Endpoint a four out of five.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup of the Check Point Harmony Endpoint is easy. We use the main policy for the installation across the organization.
We have had some problems with connection management because if we install the initial client on the computer, we cannot stop or delete this client or install the full package afterward.
If we have a new signature technical support ticket, they add this signature to the database in three to five days which they could improve.
I rate the initial setup from Check Point Harmony Endpoint a four out of five.
Which other solutions did I evaluate?
Check Point Harmony Endpoint does not have some features that SentinelOne or CloudStrike has.
What other advice do I have?
I rate Check Point Harmony Endpoint a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
Head of Security and Operational Risk at Medianet
Great real-time click protection, web filtering, and compatability
Pros and Cons
- "We are able to manage all our endpoints from a single cloud console."
- "We now have so many capabilities we did not have before, as follows: We are able to manage all our endpoints from a single cloud console."
- "It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products."
- "It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products."
What is our primary use case?
As a financial company, we use the solution to provide security to our CDE environment and compliance with all PCI requirements. This tool enables us to provide security to the endpoints and also, to comply with local and foreign regulations regarding platform security.
We use this solution to protect all our endpoints, including personal computers and mobile phones.
We have deployed the solution in Windows, Linux servers, workstations, and mobile phones.
We also use the web filter capabilities both on mobile phones and on corporate computers.
How has it helped my organization?
We now have so many capabilities we did not have before, as follows:
- We are able to manage all our endpoints from a single cloud console
- We don't need adicional on-premise servers to run this solution
- The time that the endpoint refresh and identify new policies is very short. It takes seconds and this is a great value for us to fight emerging threats
- We are now able to protect web browsing in all web browsers and also we don't need additional policies to block browsers in private browsing
- The integratión with our SIEM solution was very smooth and the solution provides valuable information for security analysis
What is most valuable?
The most valuable aspects include:
- Web Filtering. This feature is easy to manage, and it applies new policies in seconds.
- Real-time Click Protection. It protects the user from phishing attacks in real time.
- Compatibility with Windows, Linux, Android, and Mac. We don't need additional solution to protect all our endpoint.
- Cloud Management. This feature allows us to reduce our operating burden and also improve our TCO.
We now have the ability to block a compromised machine from the network.
We now have the ability to block in near real-time IOC.
What needs improvement?
It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products.
It would also be great to include FIM capabilities for the Endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products.
It would be great if we could have additional DLP capabilities to identify personal information or any kind of information to comply with regulations that require information protection.
For how long have I used the solution?
I have been using the solution for about three months.
What do I think about the stability of the solution?
We haven't had any problems or downtime since we acquired the solution. It is stable.
What do I think about the scalability of the solution?
The solution is scalable. It is quite simple to add new endpoints to the solution or add additional features, all with zero downtime.
How are customer service and support?
Customer support and channel support are also always willing to help.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have been using McAfee Endpoint protection for about ten years. We were missing so many features and needed additional tools and effort to protect our endpoint.
How was the initial setup?
It took a few minutes to deploy the whole solution.
What about the implementation team?
It was through a vendor. They were experts on the product.
What's my experience with pricing, setup cost, and licensing?
The costs depend on the company size. In my case, I was able to have all the features, including email protection, remote access, mobile protection, and endpoint protection, for a great price.
Which other solutions did I evaluate?
I evaluated Trend Micro and McAfee.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Offers good protection against malware, but the price could be better
Pros and Cons
- "The solution has all the standard features you would expect for endpoint protection."
- "Installation is straightforward, it took our IT department 20 minutes."
- "The price of the product could be more friendly."
- "I would recommend Microsoft Defender for Endpoint over this solution."
What is our primary use case?
We use the product for endpoint protection against viruses, malware and ransomware technologies.
What is most valuable?
The solution has all the standard features you would expect for endpoint protection.
What needs improvement?
The price of the product could be more friendly.
For how long have I used the solution?
I have been using the solution for one year now.
What do I think about the stability of the solution?
We have had no problems with stability so far.
What do I think about the scalability of the solution?
The solution isn't very scalable, it's a PC, and it's all endpoint.
Currently, there are 2000 users of this product in my company. This number can change in the future due to company growth. Next year, each employee at the company will have a notebook and each notebook will have this software installed in it. If the headcount increases, the license will increase accordingly.
Which solution did I use previously and why did I switch?
We previously used McAfee for endpoint protection, it was a corporate decision to switch. This could have been due to a cost or technology issue.
How was the initial setup?
Installation is straightforward, it took our IT department 20 minutes.
The product has very fast deployment, as we roll out the product in batches. These batches can vary between one and hundreds. This number depends on how the team schedules the roll-out, as each roll-out is customized to match the bandwidth requirements.
What about the implementation team?
We used an in-house team to implement the solution.
What's my experience with pricing, setup cost, and licensing?
We implement this solution with a yearly subscription and there are no extra costs.
What other advice do I have?
I would recommend Microsoft Defender for Endpoint over this solution.
I would rate this solution a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Technology Security Consultant at Sify Technologies
Easy to set up and implement with good functionality
Pros and Cons
- "The product is stable."
- "The product has been stable and reliable."
- "Legacy VPNs and digital footprints should be minimized."
- "Mobile users are reluctant to actually use the solution."
What is our primary use case?
The major use was to provide protection to the mobile workforce. It gives elaborated insight about what is happening, what kind of particular applications we have installed, and what particular application they are using, and protecting them from online phishing, and random virus attacks also.
What is most valuable?
The functionality is quite good. It can run well on mobile devices.
You can also create profiles for individual mobile devices.
It is easy to set up and implement.
The product is stable.
It's very scalable.
What needs improvement?
Mobile users are reluctant to actually use the solution.
Check Point should focus on providing more compliant solutions, such as compliant for cloud-specific solutions. The digital footprint can be minimized, and then the Legacy VPNs can also be streamlined. As of now, most of the connectivity partners use Legacy VPNs to connect to their DC or their service partners. Legacy VPNs and digital footprints should be minimized.
For how long have I used the solution?
I've been dealing with the solution for a couple of months at this point. My first project was last September and then I did another last December.
What do I think about the stability of the solution?
The product has been stable and reliable. There are no bugs or glitches and it doesn't crash or freeze.
They've been delivering solutions for 15 to 20 years and I can attest to, over the last ten years, never run into any issues in terms of stability.
What do I think about the scalability of the solution?
The solution is very scalable. If a company needs to expand, it can do so - especially if a company is using a cloud-based deployment.
So far, we have delivered two projects to clients.
How are customer service and support?
Technical support is good. We are satisfied with the level of support on offer.
Which solution did I use previously and why did I switch?
I've also worked with CrowdStrike, which I also like very much.
How was the initial setup?
The initial setup is straightforward. You simply need to deploy the agents onto mobile devices. The enrollment process would happen on the device.
It's very flexible in that it can be a hybrid. It supports on-premises and cloud devices.
In terms of the size of the team a company would need to deploy and maintain the solution, it all depends on the timelines that you have. A single guy, if everything is being managed, a single guy can deploy at least 50 to 100 Harmony Endpoint agents in a day. And if things are not going well, it may require more people.
What's my experience with pricing, setup cost, and licensing?
We have different products in our portfolio and they all have their own specific costs. They also vary according to size and parameters.
What other advice do I have?
The solution is automatically updated and therefore we're always using the most updated product.
I'd recommend the solution to others. They're one of the leading security solutions providers in the world.
I'd rate the solution eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
CISO at a financial services firm with 51-200 employees
Well priced, simple to set up and easy to layer in with other products
Pros and Cons
- "It's a scalable product as it is a cloud offering."
- "Overall, it's a good tool, it's doing a good job for what it is designed for, it is easy to set up, the solution is stable, it's a scalable product as it is a cloud offering, you can layer in this solution with others, and the product offers good pricing."
- "Specifically, there are gaps when it comes to security."
- "Specifically, there are gaps when it comes to security."
What is our primary use case?
The solution is primarily used to protect us. It's a tool that we have installed on all the users from sales.
What is most valuable?
Overall, it's a good tool. It's doing a good job for what it is designed for.
It is easy to set up.
The solution is stable.
It's a scalable product as it is a cloud offering.
You can layer in this solution with others. I like layering myself with various technologies, depending on the environment we're working in.
The product offers good pricing.
What needs improvement?
Everything can always be improved. Specifically, there are gaps when it comes to security.
For how long have I used the solution?
I've been using the solution for a couple of years now.
What do I think about the stability of the solution?
If you go by the recommended version, yes, it's stable.
What do I think about the scalability of the solution?
The cloud offering is scalable.
We have about two hundred or more users on the solution.
Which solution did I use previously and why did I switch?
We're also using Sophos.
How was the initial setup?
The solution is very straightforward to set up. It's not overly complex or difficult.
To set it up from the server-side, the deployment takes a couple of hours. To set it up from the user side, it's a couple of minutes.
What's my experience with pricing, setup cost, and licensing?
The product is reasonably priced. It's not overly expensive.
Which other solutions did I evaluate?
Currently, we're looking at CrowdStrike. We have not yet bought it. We're currently talking about options. I'm already set with a good partner on it and just discussing right now, discussing what is best suited as a product, rather than pricing.
What other advice do I have?
I am a customer and an end-user.
I'm not sure which version we are using currently, however, it is visible in the portal. The solution is a software as a service.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Systems Engineer at HarborTech Mobility
Good file scanning, stops malicious files, and detects/blocks malware
Pros and Cons
- "Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters."
- "If you are looking for a good antivirus, Check Point Antivirus is more than good, you will be surprised how excellent it is in all its aspects."
- "I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics."
- "I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics."
What is our primary use case?
The Check Point Antivirus offers our company a high level of security. It helps us to filter outgoing URLs with possible malevolent threats. Also, this great solution secures endpoints efficiently so that connections, applications, websites, and software.
The Check Point Antivirus uses real-time anti-virus protection and protection based on Threat Cloud anomalies. It's very useful.
I like that the antivirus hardly affects the performance of our security gateways, thus offering additional security almost without penalty.
How has it helped my organization?
Check Point Antivirus really is a great solution. It helps us to improve our company. First, it offers a high-security level. It helps me filter out outgoing URLs with potential malicious threats. Second, Check Point Antivirus is very easy to configure and enables me to take measurements under any threat quickly. Thanks to its constant updates in real-time, it is always up to date with possible new threats, so it is very effective at detecting all kinds of instructions, malware, or viruses.
Also, Check Point Antivirus allows me to keep all my computers protected against any potential cyber threat. It gives me the capability to detect and block malware threats by using virus signatures in real-time.
What is most valuable?
If you need a good antivirus, Check Point Antivirus is more than great.
Check Point Anti-Virus has many positive characteristics. First, Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters. Second, Like the other Check Point blades, the visibility and logging of events are remarkable.
One of the features that I love the most about this large software is that It allows me to stop incoming malicious files, and stop users from accessing malicious software-infested sites. Also, it gives me the opportunity to get very comprehensive reports where we can collect summaries of infections and trends to provide greater visibility of threats, which is absolutely fantastic.
What needs improvement?
Until now, I've found no negative features sufficiently important to complain about. In general terms, the software works perfectly. One time, I had a little issue, however, the technical support staff resolved it almost immediately.
I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics.
I like that activating Check Point antivirus hardly affects the performance of our security gateways, thus providing additional security almost without penalty.
For how long have I used the solution?
We are started using Check Point Antivirus in 2016. This great solution allows us to avoid malware traffic before reaching end users.
Check Point Antivirus is also really easy to set up. In just one click in the Smart Console, you can set up the policy and you're ready to go. Check Point Antivirus has a number of positive features that make it stand out through other means such as software.
Which solution did I use previously and why did I switch?
We use just Check Point Antivirus. We found everything we want in this great solution. It helps us to improve and secure our network. Also, Checkpoint Antivirus does excellent environmental protection work in many ways.
What's my experience with pricing, setup cost, and licensing?
I have just one piece of advice: if you can lower the price for this solution so that more companies can use this great solution and protect their environment, that would be ideal.
Which other solutions did I evaluate?
We just work with Check Point Antivirus until now and we found that this solution is the best.
What other advice do I have?
If you are looking for a good antivirus, Check Point Antivirus is more than good, you will be surprised how excellent it is in all its aspects.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Brand Manager at Corporation Sekiura S.A.C.E.I.
Excellent anti-ransomware, anti-bot and anti-exploit features
Pros and Cons
- "It has improved the detection of malware."
- "At the moment we are very satisfied and confident with Check Point."
- "Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle."
- "Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle."
What is our primary use case?
The first use case is to detect malware as well as advanced threat protection for known, unknown, and zero-day malware, sandbox emulation and extraction, and enhanced by automated endpoint forensics analysis.
Zero-day attacks are a risk for the company which seemed very important to us, plus the sandbox in the cloud. We have a cloud console that is easy to use and easy to monitor.
The details of our environment are Harmony Endpoint Advanced for 100 on-premise users with cloud managment console, and support for one year.
How has it helped my organization?
It has improved the detection of malware. We are very satisfied with the friendly and easy-to-monitor console. We chose the advanced version as it seemed very important to have advanced threat protection for known, unknown, and zero-day malware plus sandbox emulation and extraction, enhanced by automated endpoint forensics analysis.
At the moment we are very satisfied and confident with Check Point.
What is most valuable?
All of these features quoted below are valuable for us, as the set of solutions is what makes the solution really valuable.
- Endpoint Threat Prevention features
- Web Protection (malicious sites/URL Filtering)
- Anti-Ransomware
- Anti-Bot
- Anti-Exploit
- NGAV
- Anti-Virus
- Forensic collection and automated reports
- Threat Hunting
- Sandbox Emulation and Extraction (CDR)
- Endpoint Access Control Features
- Endpoint Firewall
- Application Control
- Port Protection
- Endpoint Compliance
- Remote Access VPN
If we had to choose one, we really like the EDR included.
What needs improvement?
The Check Point Harmony Endpoint is a very complete solution. Even in the most basic version, it already includes EDR, which today is very important and something that all endpoint solutions should consider having from the most basic versions. We would like to have one more step and that's to give and have full-disk encryption.
Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle. We could have it with Check Point Endpoint, mobile, cloud, or firewall. An all-in-one console would be great.
For how long have I used the solution?
I've been using the solution for six months.
What do I think about the stability of the solution?
The stability has been positive.
What do I think about the scalability of the solution?
The scalability has been positive.
How are customer service and support?
We did not have any problems. We got good solution training
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not previously use the solution.
What about the implementation team?
We had a positive experience with the implementation via a vendor.
What was our ROI?
Our ROI has been positive.
What's my experience with pricing, setup cost, and licensing?
If you need the on-premise management console, you have to pay an additional cost. It's not much, however, it's good to ask for a quote.
Which other solutions did I evaluate?
We also looked into Sophos.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. The company want to keep anonymity.
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Cortex XDR by Palo Alto Networks
Microsoft Defender for Endpoint
SentinelOne Singularity Endpoint
IBM Security QRadar
Huntress Managed EDR
Elastic Security
HP Wolf Security
Trellix Endpoint Security Platform
Microsoft Defender XDR
WatchGuard Firebox
Fortinet FortiEDR
TrendAI Vision One
Fortinet FortiClient
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?

















