Check Point Endpoint Security is to protect our employee endpoints as we're currently working from home. The user is totally unaware of the cyber threats, so the basic functionality of endpoint security provides a lot more security. With it, any threat attack can be rebuffed. Any user downloading any suspicious data from the web will first have Check Point scan it deeply. If there's malware then it quarantines it. Otherwise, the user can access it. We're using it on a primary basis. We don't have any other solutions in place apart from the Check Point.
IT Specalist at vTech Solution
Constantly updated with good zero-day prevention and excellent prevention capabilities
Pros and Cons
- "Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today's complex threat landscape."
- "Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today's complex threat landscape."
- "They could improve memory consumption."
- "Once we installed a CP agent in our system, we found that it was consuming more memory. Even a normal configuration system can be hung."
What is our primary use case?
How has it helped my organization?
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today's complex threat landscape.
It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response. That's how our organization improved its security. Before that, we didn't have the security to prevent such threats as ransomware, phishing, etc. Due to that, our IT environment is more secure and business has also increased.
What is most valuable?
The product offers advanced anti-malware and antivirus protection to protect, detect, and correct malware across multiple endpoint devices and operating systems. Proactive web security is available to ensure safe browsing on the web. Data classification and data loss prevention are there to prevent data loss and exfiltration.
SandBlast Agent defends endpoints and web browsers with a complete set of real-time advanced browser and endpoint protection technologies, including Threat
Emulation, Threat Extraction, Anti-Bot, and Zero Phishing.
The zero-day prevention is very valuable.
What needs improvement?
Personally, I'm looking forward to separating server management policies. They could improve memory consumption. Once we installed a CP agent in our system, we found that it was consuming more memory. Even a normal configuration system can be hung.
Malware detection is an add-on plan that can't be added on. It's the most important part of endpoint security. There's a forensic addon which is very important after threat hunting against attacks.
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
For how long have I used the solution?
I've been using this solution for two years.
What do I think about the stability of the solution?
I haven't seen any corruption on the agent side. It's stable.
What do I think about the scalability of the solution?
It's scalable. It always updates its malware database for security concerns on a daily basis
How are customer service and support?
Technical support is good. You can raise a ticket with the CP support portal and a technician will contact you based on the severity.
Which solution did I use previously and why did I switch?
I didn't have that much experience with anything else. When I was joined, our company was using the same solution.
How was the initial setup?
The solution's initial setup is straightforward. Even new users can handle the process with help of online guidelines.
What about the implementation team?
We used a vendor team and they were experts in what they were doing.
What was our ROI?
As a security solution, of course, it gives back lots of return on investment.
What's my experience with pricing, setup cost, and licensing?
The setup cost is nothing. The licensing is costly due to the fact that, in return, it's giving the best security.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Operations Engineer at SFR
Scalable, easy to configure, and simple to manage
Pros and Cons
- "It is very easy to manage the Antivirus blade, even for newcomers in our technical support team, which is a key area of interest for us."
- "The Antivirus blade has improved our organization in several ways, including having better global security against viruses and malware, having better visibility and protection regarding files that go in and out of our company, offering better scaling and integration with other security products, and probably offering better threat management."
- "It may be interesting to improve this solution against zero-day attacks, as they happen very frequently and are clearly a severe threat."
- "It may be interesting to improve this solution against zero-day attacks, as they happen very frequently and are clearly a severe threat."
What is our primary use case?
We are using the Antivirus blade to protect our organization against threats such as viruses/malware that could propagate in our information system and harm it in various ways.
Thanks to the important database maintained by Check Point that relies on this blade, we can enforce a strong security policy on our devices and be compliant with the latest best practices regarding internet threats.
We operate several firewalls in our organization and we especially need this kind of efficiency on the internet-facing ones.
How has it helped my organization?
The Antivirus blade has improved our organization in several ways, including having better global security against viruses and malware, having better visibility and protection regarding files that go in and out of our company, offering better scaling and integration with other security products, and probably offering better threat management.
It globally helps us in having centralized management of all internet content, which is efficient in terms of managing exploitation and helps our technical support teams to fulfill their daily missions.
What is most valuable?
One of the features that we find most valuable is the simplicity of the configuration through the Smart Console interface.
It is very easy to manage the Antivirus blade, even for newcomers in our technical support team, which is a key area of interest for us.
Also, the sandbox feature is very interesting as it can automatically isolate an infected machine from the network, which is valuable.
We could also talk about the real-time detection scan feature that can monitor files as they are being accessed, which allows for a quicker response time.
What needs improvement?
It may be interesting to improve this solution against zero-day attacks, as they happen very frequently and are clearly a severe threat.
On a more practical level, the complaint opening process through technical support could be better, as it must be done through the portal only for now.
On a financial level, prices for CP products could be improved. We know for sure that they are all high-quality products, however, sometimes it doesn't justify high prices on some products.
For how long have I used the solution?
We have been Check Point Antivirus for two years now.
What do I think about the scalability of the solution?
The solution is easily scalable among CP devices.
Which solution did I use previously and why did I switch?
We used the Stormshield solution and we switched to have a better integration with other security devices.
What's my experience with pricing, setup cost, and licensing?
The setup can be painful, and pricing/licensing can be high. That said, the quality is there.
Which other solutions did I evaluate?
Yes, we also evaluated Fortinet.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
Presales Engineer at Data Warden
Robust and reliable with a useful Full Disk Encryption feature
Pros and Cons
- "There's the possibility of being able to do the administration from the Check Point portal, maintaining control and visibility of the different security events at all times."
- "By acquiring this tool, companies will have a robust and reliable solution for endpoint protection."
- "They could be focused on the analysis of USB devices."
- "We need to ensure that the USB device will not be available until the scan has been completed, however, this may represent a malfunction when using other tools such as Rufus, as, by blocking access to USB drives, Harmony Endpoint will block access to these drives, thus Rufus will not be properly detecting USB drives and therefore it cannot operate properly."
What is our primary use case?
We started using the product months before the start of the pandemic. It is a robust solution for the protection of endpoints. It contains the classic antivirus, however, it has anti-bot and disk encryption functions (FDE) as well as the integration of a sandboxing for the consultation and download of files in a safe way (whether they are downloaded from a page or from an email).
It is a very complete tool for users who need to be able to connect from home or some other public access point since it has a VPN service, in addition to different layered-in security solutions.
How has it helped my organization?
The addition of Check Point's Harmony Endpoint as the main security tool for the company's collaborators has represented a reliable source of security since updates can be executed automatically or manually, as may be required.
There's the possibility of being able to do the administration from the Check Point portal, maintaining control and visibility of the different security events at all times.
Admin users are able to access an adjustable dashboard that shows the most relevant information about the status of the endoints and the statistics of threats found.
What is most valuable?
Without a doubt, the best security feature is Full Disk Encryption (FDE). In cases where the endpoint is stolen or lost, you are sure that the information will not be accessible without the access password being the correct, maintaining the confidentiality of files at all times.
In addition, if someone tries to extract the physical disk and places it as a removable disk in a PC, they will not have access to the information either, since the files are still encrypted, ensuring that this method of extracting the information does not work without the decryption key.
What needs improvement?
They could be focused on the analysis of USB devices. It has the ability to block the use of USB storage memories until it is completely scanned for any virus or threat. We need to ensure that the USB device will not be available until the scan has been completed, however, this may represent a malfunction when using other tools such as Rufus, as, by blocking access to USB drives, Harmony Endpoint will block access to these drives, thus Rufus will not be properly detecting USB drives and therefore it cannot operate properly.
For how long have I used the solution?
I've used the solution for one year and eight months.
What do I think about the stability of the solution?
I have had almost no problems with the execution of the software agent and it is very useful when I need to do research on the internet.
What do I think about the scalability of the solution?
It is fully scalable by scheduling updates from the console. When the agent is updated it will be necessary to update the PC, however.
How are customer service and support?
As a user, I have not had contact with the manufacturer's technical support.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We did not use a different solution.
How was the initial setup?
Although it is an intuitive configuration, due to the variety of blades available, it may take some time to complete the configuration. Everything will depend on the number of blades a company needs to configure.
What about the implementation team?
We handled the implementation in-house.
What's my experience with pricing, setup cost, and licensing?
Licensing is based on sizing and based on the number of users and the desired security blades. All versions include access to the Check Point web portal for administration.
Which other solutions did I evaluate?
We did not evaluate other options.
What other advice do I have?
By acquiring this tool, companies will have a robust and reliable solution for endpoint protection.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Manager, IT Infrastructure and Security at Control Southern Inc.
Great anti-ransomware blade, provides HTML reports, and protects endpoints well
Pros and Cons
- "One of the coolest features is that it provides an HTML report on the laptop and the endpoint console for the administrator."
- "The anti-ransomware blade is great; it stops device encryption automatically and has caught hundreds of cases on client laptops."
- "The product updates are a manual process for my administrator and can take several hours out of his day."
- "The product updates are a manual process for my administrator and can take several hours out of his day."
What is our primary use case?
This solution handles AV, malware, VPN, ransomware and so much more. It's a solution for all of our endpoints. We have 250 users spread out over the southeast US and they all connect back to corporate for onsite ERP.
Most of our workforce is remote in offices or homes in Georgia, Alabama, Florida, and Tennessee. We also have technicians that work in plants with limited or no internet connectivity so when they get to a hotel or other public internet hotspots. The auto-connect to VPN is critical to them having a secure connection to our corporate network.
How has it helped my organization?
The solution has provided enhanced security on all endpoints for URL filtering, VPN, media encryption, and scanning. One of the most common responses from our clients is that they love the auto-connect of the VPN, yet hate that we scan all USB devices they plugin.
When our technicians are working at a plant with no internet and they go to a public hot spot, the VPN auto-connecting to corporate secures their data back to corporate without them having to do anything.
The scanning of ransomware has stopped dozens of attempts from malicious websites.
What is most valuable?
The anti-ransomware blade is great. It stops device encryption automatically and has caught hundreds of cases on client laptops.
One of the coolest features is that it provides an HTML report on the laptop and the endpoint console for the administrator. It will show you the forensic report of where it came from and if it spread to other systems that have the endpoint client installed.
The best thing is it never gets past the first client as it looks for bad behavior. If needed, you can open the console and allow it.
What needs improvement?
The product updates are a manual process for my administrator and can take several hours out of his day. I understand this is partially due to the Windows version limitations. When you do need to update the client version it is pretty easy. Usually, it's a case of the end-user not being online to accept the push of the software. That is where it can take up a few hours of my administrator's time. The administrator has to wait and email for our technicians to go to an internet available area. It is usually not a big deal, however, it can take time.
For how long have I used the solution?
I've been using the solution for five years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees
Easy to use, very effective, and scales well
Pros and Cons
- "We have found the stability to be very reliable."
- "The product has been proven 100% effective with us; we haven't had anything related to any threats passing to us for the past five years."
- "Technical support can be a bit slow at times."
- "Technical support can be a bit slow at times."
What is our primary use case?
We have this at an enterprise level and we have it for all our endpoints. We use the product for disk encryption, anti-malware, and BPM blades.
What is most valuable?
The solution offers disk encryption, anti-malware, and BPM blades. For example, the Disc Encryption Software Blade is actually a part of this endpoint security solution. The whole thing is good for us.
The product has been proven 100% effective with us. We haven't had anything related to any threats passing to us for the past five years.
The solution is easy to use. It is self updated when there's a new version. It updates seamlessly, no matter what features you have. However, depending on what we use, there are some features that they will not apply in the clinics. We don't have the preview screen. We can customize it in a way that it doesn't disrupt our operation depending on if it is a laptop, it is a desktop.
The security is very good.
The solution is very straightforward.
The solution scales well.
We have found the stability to be very reliable.
What needs improvement?
The solution is mostly very good. The reason why I'm trying to compare it with FireEye is due to the fact that it's supposed to be a mandate by the State. We are trying to justify the fact that we don't need to change our environment. For example, if the only thing that they want is to provide reports for the State, then that's a different story. We can customize the reports based on what they're asking for. We don't need to change or want to, however, the State may require us to.
Technical support can be a bit slow at times.
For how long have I used the solution?
We've dealt with the solution for ten years.
What do I think about the stability of the solution?
The solution is very stable. There are no bugs or glitches. Its performance is good. It doesn't crash or freeze.
What do I think about the scalability of the solution?
The scalability of the product is very good.
How are customer service and support?
The solution offers very good technical support. While they may be a bit slow, they always come through with a solution.
How was the initial setup?
The initial setup is very straightforward. It's not a problem at all.
What's my experience with pricing, setup cost, and licensing?
I have no information in terms of the pricing. I'm not involved with neither the purchase, maintenance, contract, or anything that has to do with licensing.
Which other solutions did I evaluate?
The company may be interested in trying to change to FireEye. I'm looking at it now to see what differences and advantages are at play.
What other advice do I have?
We're just a customer and an end-user.
I'd rate the solution at a ten out of ten. We've had no problems with it at all.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director at esupport Solutions Pvt ltd
The sandboxing feature is really good
Pros and Cons
- "Harmony's endpoint sandboxing is really good."
- "Harmony is better than Crowd Strike or any other similar solution in that class."
- "Check Point Harmony is definitely pricier compared to other endpoints."
- "Check Point Harmony is definitely pricier compared to other endpoints."
What is our primary use case?
Kaspersky is suitable for small and medium-sized businesses (SMB), while Harmony is for enterprise segments. There are different requirements for enterprises versus SMBs. At an SMB, one administrator handles the firewall, network, and endpoints. You have more specialization in an enterprise. So at a larger scale, where you have a 5,000 or 10,000 users use case, Harmony helps pinpoint where security is lacking on a particular machine.
What is most valuable?
Harmony's endpoint sandboxing is really good.
What do I think about the scalability of the solution?
I haven't had any difficulty deploying Harmony for up to 5,000 users.
How are customer service and support?
Check Point support is really good.
How was the initial setup?
Harmony is very easy to deploy.
What's my experience with pricing, setup cost, and licensing?
Check Point Harmony is definitely pricier compared to other endpoints.
What other advice do I have?
I rate Check Point Harmony 10 out of 10. It's a unique product. It's the best in this class. I feel that Harmony is better than Crowd Strike or any other similar solution in that class. However, I would like to see more competitive pricing and better training for partners.
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
CISO, CIO, AVP at CIANS ANALYTICS PVT. LTD
Good encryption feature and scalable but needs to be more accurate
Pros and Cons
- "Cost-wise it's cheaper than other options."
- "Cost-wise it's cheaper than other options."
- "It gives you an alert for malicious sites, which, after searching on the Google database, don't come out to be the same."
- "In my case, I had pretty much faced disaster after implementation that I would not suggest anybody go with the product."
What is our primary use case?
We primarily use the solution for anti-malware. We installed it on around 300 systems. Since we required some application to safeguard ourselves in this situation of work from home, so we were evaluating Antimalware products.
After some research, we finalized Check Point and took a demo. The product seems fine as per our scenario and fits current conditions. We were evaluating it for work-from-home situations. it had a multifeatured tool that helps in safeguarding the current digital attack vector for organizations of all types.
How has it helped my organization?
It helps in safeguarding our infra from malicious attacks. However, initially, we faced lots of challenges while implementation as the vendor who was implementing it made blunders, which resulted in chaos for the organization.
Our team worked almost 24/7 for 3 to 4 weeks to resolve the issues. We haven't requested the encryption feature, yet they implemented it. Our laptops were already encrypted, so it started decryption and re-encryption, which was a nightmare for us. We are still facing a few challenges for which we couldn't find any reason for the issues we've since found that were not there before installation.
What is most valuable?
We found all features valuable - other than the encryption since we were already using that feature. Since we required some application to safeguard ourselves in this work from home situation. We were evaluating anti-malware products specifically.
There can be scenarios where this encryption feature will be applicable and fruitful if it is implemented with proper planning and organized with respect to a particular organization. There have to be proper requirements gathering and a plan to work effectively.
What needs improvement?
There are improvements required in terms of accuracy. It gives you an alert for malicious sites, which, after searching on the Google database, don't come out to be the same.
There can be scenarios where specific planning will be required before even giving thought to implementing it into an organization - be it small, medium, or large. Everything needs to be organized with respect to each particular organization. There has to be proper requirement gathering and a plan for the SOW to work accordingly.
I would suggest that the Check Point team always allocates an SME to all the vendors before implementation as it will improve the first impression. In my case, I had pretty much faced disaster after implementation that I would not suggest anybody go with the product.
The product needs to improve the security infra.
For how long have I used the solution?
I've been using the solution for three months.
What do I think about the stability of the solution?
In terms of stability, I would rate it at a five out of ten. There were issues like once a version was installed and was not working properly, even the checkpoint team couldn't uninstall it and as a result, we had to format the system. few cases were reported for software installed but was not visible in the control panel.
What do I think about the scalability of the solution?
The scalability is good.
What was our ROI?
Our ROI has been neutral.
What's my experience with pricing, setup cost, and licensing?
Cost-wise it's cheaper than other options.
Which other solutions did I evaluate?
We did evaluate another solution. However, I can't reveal the name.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. SIG Informatics
Assistant Manager at CIANS ANALYTICS PVT. LTD
A good antivirus with excellent email alerts but needs better technical support
Pros and Cons
- "We like the sandbox feature."
- "If we talk about ROI, then the solution is good, as we are getting a sandbox feature in it plus the VPN licenses if we have the Check Point firewall."
- "Technical support could be better."
- "When starting, we faced many issues. It was due to a partner mistake, however. The partner gave us the wrong setup which caused laptops to crash and it lowered the efficiency."
What is our primary use case?
We primarily use the solution as an antivirus. We want to protect our systems from malware and viruses.
We are still doing work from home and we are not sure how long this will last. Before Check Point Harmony software, we depended on Windows Defender Antivirus, but we realized that it was not so good. We wanted some good AV so that users who are working on a VPN would have an antivirus installed on their system.
Also, we wanted a sandbox feature so that, if any machine got infected, we can automatically isolate it from the network.
How has it helped my organization?
When starting, we faced many issues. It was due to a partner mistake, however. The partner gave us the wrong setup which caused laptops to crash and it lowered the efficiency. We escalated to our Check Point sales account manager. He immediately set us up with some other partner and tried to resolve the issue. He found the root cause, but still, we needed to format the system. It has been more than 3 months, and now the user's system is working fine.
We always receive alert emails from Check Point regarding malware or virus status, which is helpful.
What is most valuable?
We like the sandbox feature. If any machine got infected, it would get automatically isolated from the network. As such, we haven't faced any issues. We like that we have an option to isolate.
The alert email from Check Point is also very valuable. If any machine didn't get a scan or has a virus due to visiting various websites on a browser, it automatically sends us an email to warn us. Accordingly, we can take action on that particular machine.
Overall, the antivirus is good.
What needs improvement?
Technical support could be better. When we register a complaint, we need to register it via the portal only, which is atime consuming.
When we register the complaint, it says there's a minimum of four hours of turnaround time which is high. It should be a minimum of 60 minutes.
The GUI of Harmony is very slow to upload. I'm not sure if it is due to the internet, but still, at times, we found that when we click on any tab, it takes a minimum of five seconds to get it open.
All other things are okay from our end.
One feature we want to add is an EDR/XDR into this antivirus module.
For how long have I used the solution?
I've been using the solution for 4 months.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
I found the solution to be okay. I'm not sure how others are providing the support as we haven't checked that.
How are customer service and technical support?
Technical support is good.
Which solution did I use previously and why did I switch?
No, we haven't used any other antivirus. It was by default in Windows.
How was the initial setup?
The initial setup was okay.
What about the implementation team?
We implement it through a vendor.
I would rate their level of service at a 2 out of 5 where 1 is lowest and 5 is best.
What was our ROI?
If we talk about ROI, then the solution is good, as we are getting a sandbox feature in it plus the VPN licenses if we have the Check Point firewall.
What's my experience with pricing, setup cost, and licensing?
The setup is okay depending on the partner and what the relationship is with you and your partner. The pricing is okay.
Which other solutions did I evaluate?
Yes, we have evaluated other options. For example, we've evaluated Sophos.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Cortex XDR by Palo Alto Networks
Microsoft Defender for Endpoint
SentinelOne Singularity Endpoint
IBM Security QRadar
Huntress Managed EDR
Elastic Security
HP Wolf Security
Trellix Endpoint Security Platform
Microsoft Defender XDR
WatchGuard Firebox
Fortinet FortiEDR
TrendAI Vision One
Fortinet FortiClient
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?















