Try our new research platform with insights from 80,000+ expert users
reviewer1477194 - PeerSpot reviewer
Engineer at a tech services company with 51-200 employees
Real User
Good sandbox and forensics capabilities, good visibility
Pros and Cons
  • "The most valuable feature is forensics."
  • "We cannot integrate this product with other solutions, which is something that should be improved."

What is our primary use case?

We primarily use this product for the SandBlast module. It is used for sandboxing, malware detection, antivirus, and forensics blade.

What is most valuable?

The most valuable feature is forensics.

What needs improvement?

We cannot integrate this product with other solutions, which is something that should be improved. I believe that it is in the roadmap.

Other vendors have some non-security-related features in their endpoint protection solutions that should be implemented in this one.

For how long have I used the solution?

I have been using Check Point Endpoint Security for approximately one year.

Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.

What do I think about the stability of the solution?

The stability is okay but if you have limited resources then it gets slow.

What do I think about the scalability of the solution?

I have not used this product in a large deployment. Certainly, it scales, but my deployment is for less than 500 endpoints. Our company is really small, with just 25 people. As a partner, we also deploy it for our customers.

How are customer service and support?

The people that work for the vendor are sometimes a little hard to get a hold of, but once you do get in contact with them, they get the problem fixed.

How was the initial setup?

It is rather easy to set up. As a cloud solution, you can have it up and running in a day or less. We have defined different policies, which makes it easy to get up and running. After you, you can customize the setup.

What other advice do I have?

My advice to anyone who is considering Check Point Endpoint Security is that it is a great solution that is very easy to deploy, and it really gives you visibility of what's happening on your endpoint. It helps you do deal with security issues pretty fast.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
PeerSpot user
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
Stops viruses from crossing the perimeter firewall to the inside
Pros and Cons
  • "The feature that we find most valuable is the easy way of configuring it via the SmartConsole on Check Point. The configuration is very straightforward and although it has some impact on the firewall CPU and memory, it doesn't impact the IPS, for example. It allows for the scanning of downloaded files from the internet. Scanning files that our users have downloaded to check if they have any virus is the most important thing."
  • "Sometimes the antivirus updates fail. We don't understand why because sometimes it fails but the next time you try it goes well and the firewall always has access to the internet. We don't understand why it sometimes fails."

What is our primary use case?

The Antivirus Blade is one of the Blades we always buy for all of our Check Point firewalls to protect us against virus propagation into our infrastructure. Check Point has a huge database that protects us against viruses that is especially important for the internet-facing firewalls.

What is most valuable?

The feature that we find most valuable is the easy way of configuring it via the SmartConsole on Check Point. The configuration is very straightforward and although it has some impact on the firewall CPU and memory, it doesn't impact the IPS, for example. It allows for the scanning of downloaded files from the internet. Scanning files that our users have downloaded to check if they have any virus is the most important thing. IPS and Antivirus work in conjunction. It doesn't even cross the perimeter firewall to the inside.

What needs improvement?

Sometimes the antivirus updates fail. We don't understand why because sometimes it fails but the next time you try it goes well and the firewall always has access to the internet. We don't understand why it sometimes fails.

For how long have I used the solution?

We have been using Check Point Antivirus for four years. 

What do I think about the stability of the solution?

It's very stable. The only thing is that sometimes the Antivirus Blade fails but then the next time it succeeds. We get some alerts that the Antivirus Blades fail. But it then automatically updates. Antivirus is different from IPS, it's always trying to update and it's automatic.

What do I think about the scalability of the solution?

It scales well. You can use the same profile and the same exceptions on all the firewalls on the management. It's deployed to eight firewalls. 

It takes three people to maintain the solution. They are security, engineers, and architects.

How are customer service and technical support?

Technical support is good. We were getting some logs without any information and we couldn't get to a conclusion of what that was. We gave up because it was not a big deal, but it was the only bad experience we had with them. In general, it's good.

Which solution did I use previously and why did I switch?

We also used Fortinet's Antivirus. They are equivalent from one to the other. Even the configuration is similar. There's not a big advantage to one or the other.

How was the initial setup?

The initial setup was very straightforward. If you want to block a virus, for example, the signatures have a medium or higher impact. It's very easy to create the initial profile. It's also very easy to deploy exceptions with the SmartConsole.

We could do the deployment without all of the fine-tuning in one day. 

Our implementation strategy was to start with the Blade on detection mode for at least one week, then check the box to see what would be brought in if we were on prevention mode and see if we need to do some exceptions or if there are any false positives. If not, we put it on prevention mode.

What was our ROI?

Our return of investment is to have our infrastructure protected and to see that something is a working virus that would otherwise be able to reach our infrastructure. 

What's my experience with pricing, setup cost, and licensing?

Usually, Check Point products are not cheap but compared to Fortinet, it's in line with the competition. There aren't additional fees that I'm aware of. 

What other advice do I have?

If you have Check Point firewalls on your infrastructure, this is the best solution to deploy because it's just to enable a Blade. If you don't have Check Point firewalls, you should also consider other solutions. If you already have Check Point firewalls, the traffic is already going through them so it's just a matter of enabling the Blade. 

Try to run through the manuals to see the signatures and how to deploy and to create a profile. You can install the SmartConsole and run the demo mode and you can do some simulations without having to deploy a firewall. It's also good that you can do the demo mode and try to create an exception to create a profile.

It's not very hard to have a network antivirus solution which can be very important to protect the network. It should be as important as having the antivirus on the end-user's machine.

I would rate Check Point Antivirus a nine out of ten. Not a ten because of the updates. 

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
reviewer1399449 - PeerSpot reviewer
Network and Security Engineer at Information Technology Company
Real User
Easy to use, effortless updating, and we have benefited from improved security
Pros and Cons
  • "We now feel more secure with our PCs, even more with the non-technical persons."
  • "The solution could be improved in the future with a way to provide online training to customers for free, as other providers do."

What is our primary use case?

In our environment, we didn't have an "official" security system. After implementing the Check Point SandBlast Agent system, we have benefited from getting a strong security system that gives us stability and security on our internal network.

How has it helped my organization?

Security has been improved. We now feel more secure with our PCs, even more with the non-technical persons.

What is most valuable?

The most valuable features are the availability, the ease of checking current logs of blocks,  and the option to update the system easily. 

What needs improvement?

The solution could be improved in the future with a way to provide online training to customers for free, as other providers do. Ideally, it would be not only for this solution but for all of their systems.

I found that there is no Check Point online training center and I think that is something vital for most of us as customers.

For how long have I used the solution?

I have been using the Check Point SandBlast Agent for a year and a half.

Which solution did I use previously and why did I switch?

We did not use another solution prior to this one.

Which other solutions did I evaluate?

We evaluated Symantec before selecting Check Point.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
GeraldChege - PeerSpot reviewer
GeraldChegeICT Officer at Kenyatta National Hospital
Top 20Real User

I would suggest checkpoint introduces online training and certification. This will go a long way in providing security professionals to organisations using checkpoint.

it_user1399404 - PeerSpot reviewer
Business Analyst / Developer at a tech services company
Real User
Reduces malicious attacks and restricts users from accessing sites via our network
Pros and Cons
  • "In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations."
  • "There should be some way of managing this solution outside the organization's network, possibly with some type of remote access. For example, if I'm the admin of Check Point who manages the entire network, I would like to have access on my home device or maybe a mobile app to get reports, etc."

What is our primary use case?

We use it to manage our entire network and protect network traffic in terms of files that go out and come in. This protects our network between any platform we access or interactions between our clients and us. Also, it helps to monitor and block malicious applications, then it prevents these sites from accessing our stuff.

We use it for the endpoints and all the additional points which access the network in the organization. It protects everything across the board, from the server to the many other devices, like your phones and laptops. 

How has it helped my organization?

In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations.

What is most valuable?

The sandboxing feature: I like the entire process. It's one thing for it to detect, but another thing to have a remediation plan. It actually extracts out what we need to make it a clean file. 

What needs improvement?

There should be some way of managing this solution outside the organization's network, possibly with some type of remote access. For example, if I'm the admin of Check Point who manages the entire network, I would like to have access on my home device or maybe a mobile app to get reports, etc.

For how long have I used the solution?

I have been using it since sometime from the beginning of last year.

What do I think about the stability of the solution?

It works just fine. I haven't experienced any issues.

What do I think about the scalability of the solution?

It scales well. It accommodates all the endpoints that we have in our organization. As we grow, we do plan to increase usage.

We use it in our entire organization. Every staff person and device has access to the solution. We have approximately 250 endpoints. 

We have 10 IT managers and systems engineers directly working on it. I also work with the solution as a business analyst/developer.

How are customer service and technical support?

The technical support is good. It is a straightforward solution. We have not really needed to call for anything because they train you on how to use this solution. You already have the IPS working and know how that works. It's not something that is complex.

Which solution did I use previously and why did I switch?

We were previously using Sophos. We switched to Check Point because the pricing was much cheaper (by 25 percent).

How was the initial setup?

The initial setup was straightforward. You're required to have some administrative training on how to use the solution. The deployment took between three to six months.

What about the implementation team?

We worked directly with the vendor. The vendor had a partner in my region. Therefore, we worked directly with the partner, who was also working with Check Point. So far, the experience has been great. They were efficient. We have been able to achieve the reason why we set up and procured this solution.

What was our ROI?

We have seen ROI. It reduces malicious attacks and restricts users from accessing sites via our network.

What's my experience with pricing, setup cost, and licensing?

As we grow, we've been given room to add additional licenses in terms of all our endpoints. 

In terms of licensing, have a buffer zone around your projects in terms of the amount of endpoints that you want to have. You can always have more, but it is best to leave room for a little increase or growth. 

The solution is too pricey.

Which other solutions did I evaluate?

We only evaluated Check Point and Sophos. There are only two really good cybersecurity solutions locally. You are either doing Sophos or Check Point. It is one or the other.

What other advice do I have?

It is a great fit for any organization. I would rate the solution a 10 out of 10.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
PeerSpot user
Associate Consult at Atos
Vendor
Helps us to detect running malicious activity in our network
Pros and Cons
  • "It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks."
  • "We know that Check Point has a very good database about threats even Check Point tries to make this EDR stable still there are some issues we were facing after upgrading or taking TAC to help its got resolved but Check Point really needs to work on metadata."

What is our primary use case?

Previously, one of our clients was using Symantec and we provided POV to them with Check Point SandBlast agent after that customer found that it's very easy and stable to use after E83 version released.

There were many bugs or cosmetic issues that Check Point rectified and provided the stable version.

It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks.

How has it helped my organization?

Compliance check, anti-malware, Media Encryption Full disc encryption, Forensic behavioral ransomware protection are some type of feature that Check Point provides with a single dashboard console. It gives overall host information about when any malicious activity has found and what action by which security blade has taken. So starting from firewall bladed to forensic / ransomware blade it gives us finite detail information on the host. So most of the security load has been transferring to the endpoint which is perfectly doing their work.

What is most valuable?

Most of EDR solutions which detect malware based on AI or ML. Check Point provides the most sophisticated attack vector information by combining these two. The forensic analysis gives detail information about host compromised how exact payload was executed and bots were communicating and how it prevents them.

Anti-ransomware createS a copy of your entire disk in case any suspicious activity founded then it automatically restored all files to its last backup file date so even after the system gets compromised by ransomware still we get hope to get all data safely.

What needs improvement?

Stability.

We know that Check Point has a very good database about threats even Check Point tries to make this EDR stable still there are some issues we were facing after upgrading or taking TAC to help its got resolved but Check Point really needs to work on metadata.

Check Point agent to Server communication many times got interrupted or cloud-managed infinity portal dashboard gives many issues while creating policy or installing uninstalling agent or packages.

Heavy load on the system gives issue which can be in a different manner.

For how long have I used the solution?

2 years.

What do I think about the stability of the solution?

Needs to work better.

What do I think about the scalability of the solution?

can be scaled upto high value

How are customer service and technical support?

TAC team is helpful.

Which solution did I use previously and why did I switch?

Symantec to Check Point.

How was the initial setup?

Not too easy. Need to have basic understanding and require to take local Check Point engineers to help sometimes.

What about the implementation team?

We are a vendor.

Which other solutions did I evaluate?

Cisco  AMP.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1375017 - PeerSpot reviewer
Senior Solution Architect at a comms service provider with 51-200 employees
Real User
Ensures device control and security but needs simple sandboxing for malware analysis
Pros and Cons
  • "Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum."
  • "I would like to see simple sandboxing for malware analysis."

What is our primary use case?

We mostly use Check Point Endpoint Security on-premise. But there are instances in which we use it in the cloud as well. It's mostly integrated into Microsoft Windows and that makes it really simple. They have an integration solution for the whole spectrum of endpoint features. For example, their Keystone solution. They also have a lot of other features. You can easily keep track of user access, how their device has been protected, and what software they have. We can see what processes are running and what network connections they have. We used it to control which devices can connect. It's a balance of freedom for the users and confidentiality. 

What is most valuable?

Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum.

What needs improvement?

I would like to see simple sandboxing for malware analysis. But, they are not the leaders in this market. I would like to see virtual tasking as a feature.

For how long have I used the solution?

I have been working with all products of Check Point for about 15 years. They have a strong niche in the market. They have both on-premise and cloud computing. Check Point Endpoint Security is really simple to use.

What do I think about the stability of the solution?

Check Point Endpoint Security is very stable.

What do I think about the scalability of the solution?

So it means that if you buy a firewall, and discover at the end of the day you need more traffic than what you expected. You can expand easily, and scale-out easily.

What other advice do I have?

I would rate Check Point Endpoint Security at a seven out of a scale of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
RSSI at SDIS49
Real User
Top 5
Provides good security and integrates well with other products
Pros and Cons
  • "Check Point integrates well with other security products."
  • "The initial setup and configuration should be simplified."

What is our primary use case?

We use this antivirus as part of our overall security solution. It handles the centralized investigation of internet content.

What is most valuable?

The most valuable feature is security.

Check Point integrates well with other security products.

What needs improvement?

The pricing can be improved.

The interface could be more user-friendly.

The initial setup and configuration should be simplified.

For how long have I used the solution?

We have been using Check Point Antivirus for four years.

What do I think about the stability of the solution?

This is a very stable product.

What do I think about the scalability of the solution?

We have not had the need to scale. We have about 3,000 people who are protected by Check Point, and three of them are administrators.

How are customer service and technical support?

I would say that the technical support is okay. There are two levels; there is our installer, who we have known for several years, and there is the engineer, who we do not have much contact with.  

Which solution did I use previously and why did I switch?

We use Windows Defender for our endpoint antivirus solution. For email protection, we use the FireEye Email Security solution. Our Check Point handles our central filtering and we also use some Infinity products. All of these work in combination with each other for our security.

How was the initial setup?

The initial setup is complex. For the complete installation, our deployment took a few days.

What about the implementation team?

We had the help of a Check Point specialist for our deployment.

What other advice do I have?

This is a good product and one that I recommend.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Owner and CEO at A.T.I.K. Maroc
Real User
All-in-one solution that offers the ability for users to have a different interface port per user group
Pros and Cons
  • "They have pretty much everything you can ask for as far as features are concerned. That is because they know their market. They are focused on what they do and they do only that."
  • "The pricing is really extremely high in comparison to the rest of the market."

What is our primary use case?

The main feature we use this product for is the firewall. The second thing we use it for is the secure VPN for connections to the corporate office. The third one is intrusion prevention and antivirus. It is an all-in-one solution for peace of mind.

There is really a fourth feature. The appliance has at least four interfaces. This allows users to have a different interface port per user group. It is a way of making network segmentation. There are four ports on that appliance, but there can be six or seven.

What is most valuable?

One of my favorite features is the logging. The log journal is very descriptive in what it records about the traffic. It is a good way of tracking who comes in and who goes out of your network.

What needs improvement?

I think this product is made by the market leaders. They have pretty much everything you can ask for as far as features are concerned. The pricing is high and I think it could be more competitive if it was lower. They might resolve that difference by offering even more features.

Another feature I'd like to see is a different way to handle load balancing on the firewall. Sometimes when you are using a firewall, you need another layer to properly balance your traffic. Right now that means adding more equipment, which is expensive. If Check Point could offer another option for a different way of doing load balancing, that would be a cost-savings for the client.

Another option might be offering data fusion. Sometimes you can combine the data stream. If you can and you do, you will have one stream instead of having multiple streams. That is also very cost-saving when you can fuse the data.

What do I think about the stability of the solution?

The product is stable. I'm quite satisfied with the stability.

How are customer service and technical support?

I think the technical support is very good. They know what they are talking about and I get answers when I need them.

How was the initial setup?

The setup was straightforward. The deployment took me only a couple of hours.

What about the implementation team?

I am both a consultant and at the same time a systems integrator. I do the installations.

What's my experience with pricing, setup cost, and licensing?

The pricing is really extremely high in comparison to the rest of the market. The cost for the licensing of the Check Point 3100 series is a little bit over 10,000 euros. But they also make the software subscription mandatory. That means that not only do you have to buy the appliance, but you have to also buy a subscription.

Which other solutions did I evaluate?

The other firewall solutions that my clients usually want to consider when they are looking for an anti-malware tool aside from Check Point are Fortinet (which is also a good product) and SonicWall (which is also a good product).

As far as how these products compare, I would say Fortinet has more accessibility in terms of just getting the product. Check Point is very hard to procure. You have to go through different channels, you have to follow different requirements and give a lot of private information in order to acquire it. Sometimes there are governmental laws and restrictions that affect the procurement of a product with such sophisticated encryption. It is almost like they have to clamp down on the encryption when the product is outside the US. It is like wifi. When you order wifi access points for the UK or for the US, there are different encryption algorithms. As soon as that product goes out of Europe or the US, it is illegal to keep the same encryption type. You have to lower the level of encryption for some reason. It seems very strange.

When leading countries start dictating what you should have and what you should not have, it seems like there is no justice. It should not be that you consider yourself a privileged country and you want to have a high level of encryption and not allow people in other countries to have it. If you believe in fairness, equality, and sharing — all of these values are things we hear them talking about, but that they don't allow us to experience. In just buying the goods, you have different standards for our country. The same product should be the same thing everywhere. We are on the same grounds and the same sky above you. It is not fair and even trades for everybody, but it costs the same.

What other advice do I have?

Advice that I would give to others who are looking to implement Check Point Antivirus in their organization is the same advice I would give to someone considering any solution. Before you invest any money in any product — it could be Check Point, it could be Fortinet — you have to know what you are trying to achieve. If you don't know what you are trying to achieve, there is no purpose in buying anything. It will not serve a purpose. 

First, define your parameters, understand the risk that you are up against without the solution and what the benefits are if you buy. Then after you think about it, it is time to decide if it is worth it according to your actual needs. You do not always need to go to get fancy products and an enterprise solution if the purpose and scope for your plans do not fit the model of those products. Sometimes I hear people just say they want a product because they hear it is the best name. Sometimes a choice like that is more overwhelming. It does not serve the purpose, it is more difficult to deploy and people end up not even using it. The purchase becomes an operating capital that gets burned and spent for no reason when it was money they could have invested somewhere else. They just put the money in the wrong place because they want to do like everyone else. If you are talking about a large insurance corporation, their needs are much different than if you are talking about a small or medium-sized company that does not fall under so many government restrictions.

I would recommend Check Point Antivirus for medium and enterprise-sized organizations. Not for small organizations because it would almost always be too much. 

On a scale from one to ten where one is the worst and ten is the best, I would rate Check Point Antivirus as an eight to nine. That is because they know their market. They are focused on what they do and they do only that. Their focus is not spread out so they produce the best product. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.