Try our new research platform with insights from 80,000+ expert users
Muhammed Basheer - PeerSpot reviewer
Territory Manager at a tech services company with 501-1,000 employees
Real User
Aug 20, 2022
Reliable, easy initial setup, and excellent support
Pros and Cons
  • "The most valuable feature of Check Point Harmony Endpoint is it can be used for all kinds of endpoints, including mobile phones."
  • "The most valuable feature of Check Point Harmony Endpoint is it can be used for all kinds of endpoints, including mobile phones."
  • "Check Point Harmony Endpoint could improve mobile device management (MDM)."
  • "Check Point Harmony Endpoint could improve mobile device management (MDM)."

What is our primary use case?

Check Point Harmony Endpoint is used for protection.

What is most valuable?

The most valuable feature of Check Point Harmony Endpoint is it can be used for all kinds of endpoints, including mobile phones.

What needs improvement?

Check Point Harmony Endpoint could improve mobile device management (MDM).

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for approximately one year.

Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.

What do I think about the stability of the solution?

The stability of Check Point Harmony Endpoint is good.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint is scalable.

How are customer service and support?

The support from Check Point Harmony Endpoint is excellent.

I rate the support from Check Point Harmony Endpoint a five out of five.

How was the initial setup?

The initial setup of Check Point Harmony Endpoint is easy.

What about the implementation team?

For 100 users of Check Point Harmony Endpoint, we only need one person for maintenance.

What's my experience with pricing, setup cost, and licensing?

The price of Check Point Harmony Endpoint is comparable to SonicWall. The price could be a bit lower.

I rate the price of Check Point Harmony Endpoint a four out of five.

What other advice do I have?

I rate Check Point Harmony Endpoint an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
reviewer1866651 - PeerSpot reviewer
Brand Manager at Corporation Sekiura S.A.C.E.I.
User
May 24, 2022
Excellent anti-ransomware, anti-bot and anti-exploit features
Pros and Cons
  • "It has improved the detection of malware."
  • "Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle."

What is our primary use case?

The first use case is to detect malware as well as advanced threat protection for known, unknown, and zero-day malware, sandbox emulation and extraction, and enhanced by automated endpoint forensics analysis. 

Zero-day attacks are a risk for the company which seemed very important to us, plus the sandbox in the cloud. We have a cloud console that is easy to use and easy to monitor.

The details of our environment are Harmony Endpoint Advanced for 100 on-premise users with cloud managment console, and support for one year.

How has it helped my organization?

It has improved the detection of malware. We are very satisfied with the friendly and easy-to-monitor console. We chose the advanced version as it seemed very important to have advanced threat protection for known, unknown, and zero-day malware plus sandbox emulation and extraction, enhanced by automated endpoint forensics analysis.

At the moment we are very satisfied and confident with Check Point.

What is most valuable?

All of these features quoted below are valuable for us, as the set of solutions is what makes the solution really valuable. 

  • Endpoint Threat Prevention features
  • Web Protection (malicious sites/URL Filtering)
  • Anti-Ransomware
  • Anti-Bot
  • Anti-Exploit
  • NGAV
  • Anti-Virus
  • Forensic collection and automated reports
  • Threat Hunting
  • Sandbox Emulation and Extraction (CDR)
  • Endpoint Access Control Features
  • Endpoint Firewall
  • Application Control
  • Port Protection
  • Endpoint Compliance
  • Remote Access VPN

If we had to choose one, we really like the EDR included.

What needs improvement?

The Check Point Harmony Endpoint is a very complete solution. Even in the most basic version, it already includes EDR, which today is very important and something that all endpoint solutions should consider having from the most basic versions. We would like to have one more step and that's to give and have full-disk encryption.

Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle. We could have it with Check Point Endpoint, mobile, cloud, or firewall. An all-in-one console would be great.

For how long have I used the solution?

I've been using the solution for six months.

What do I think about the stability of the solution?

The stability has been positive.

What do I think about the scalability of the solution?

The scalability has been positive.

How are customer service and support?

We did not have any problems. We got good solution training

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not previously use the solution.

What about the implementation team?

We had a positive experience with the implementation via a vendor. 

What was our ROI?

Our ROI has been positive.

What's my experience with pricing, setup cost, and licensing?

If you need the on-premise management console, you have to pay an additional cost. It's not much, however, it's good to ask for a quote.

Which other solutions did I evaluate?

We also looked into Sophos.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. The company want to keep anonymity.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.
reviewer1821144 - PeerSpot reviewer
IT Security Officer at a tech services company with 1,001-5,000 employees
Real User
Mar 30, 2022
Easy to use with good application control and great endpoint protection
Pros and Cons
  • "It is quite easy to use and deploy the agent on endpoints to protect them from bad actors."
  • "Sometimes the portal loads slowly which should be improved."

What is our primary use case?

We primarily use the solution for protecting our endpoints from malware. We've provided features to group the endpoints and apply specific policies by including or excluding them in a certain policy group. 

It's great for endpoint security and protection. We are using the VPN feature as well to connect to the corporate network of our organization, which is a good feature. It's used for scanning malware and other malicious files on endpoints which greatly enhances our security posture for endpoints, including Windows and Macs and other operating systems as well. 

How has it helped my organization?

Check Point Harmony Endpoint benefits a lot to organizations by providing endpoint protection. There is centralized management through the Harmony portal, which is really nice. 

It is quite easy to use and deploy the agent on endpoints to protect them from bad actors. 

Daily signatures updates are really good and helpful in protecting against zero day vulnerabilities and exploits. 

The firewall and application control greatly improves our security posture. End users are unable to install any suspicious or malicious apps in our environment. 

What is most valuable?

The sandblast agent, policies implementation, and logs are quite valuable aspects of the solution. 

Threat emulation and anti-exploits are great features to protect the endpoints. 

The remote access VPN within the endpoint agent is quite easy to set up and use. 

The Harmony portal allows us to do a single sign-on using our active directory which makes the life of admins easy. 

Harmony Endpoint scans all website before opening and also scans fields on the website that protects from XSS and CSRF attacks which is really an advanced level feature. 

The endpoint scanning tools are quite enhanced and detect most malicious files. 

What needs improvement?

Sometimes the portal loads slowly which should be improved. 

There should be an easy option for the administrator to turn off or disable malware protection on a specific asset or computer instead of adding a specific asset in a Disable group as that will make it easy for the admin to disable if and when required for some testing purpose. I would like this feature to be added. 

Logs searching also needs to be more quick and enhanced and more metadata should be stored in the logs for Endpoint for a better view for admins. 

For how long have I used the solution?

I've been using the solution for two years.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cybersecurity Architect at a computer software company with 201-500 employees
MSP
Jan 10, 2022
Effective zero phishing and sandboxing, but support needs improvement
Pros and Cons
  • "I have found the Zero phishing and IPS features the most useful in Check Point Harmony Endpoint. Additionally, threat emulation sandboxing is effective."
  • "The management in Check Point Harmony Endpoint could be improved."

What is most valuable?

I have found the Zero phishing and IPS features the most useful in Check Point Harmony Endpoint. Additionally, threat emulation sandboxing is effective.

What needs improvement?

The management in Check Point Harmony Endpoint could be improved.

In a future release, the solution could add more threat intelligence features.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for approximately three years.

What do I think about the stability of the solution?

The solution is approximately 80 percent stable. It can have some bugs at times and can show very unexpected behaviors.

How are customer service and support?

The support could improve, there are long wait times, and the agents are not properly trained. The troubleshooting is complex.

How was the initial setup?

There are a lot of complications in the implementation. There are a few bugs and there is not enough documentation.

What other advice do I have?

My advice to others is they need to have Check Point expertise internally, if they don't have any in-house Check Point expertise, I wouldn't recommend this product.

I rate Check Point Harmony Endpoint a six out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Support Manager at Sefisa
MSP
Nov 18, 2021
Stable with great centralization and continuous innovation
Pros and Cons
  • "They have a great knowledge base that you can leverage as a user."
  • "The only thing that our customers want, is lower prices."

What is our primary use case?

We use the solution for many things. We don't only use it as an Endpoint client for antivirus. It is used for our next-generation antivirus. We are also using Harmony on other things, for example, our email. There's a Harmony email and office solution, which we also are using in order to protect our email.

What is most valuable?

The fact that everything is centralized is great. For example, the management is centralized on one portal in the cloud. 

We like the fact that we have a lot of visibility with this solution and the protection is very good. I have seen cases where customers, get attacked by ransomware and it is very easy for Check Point to restore a file that has been compromised with ransomware. It's 100% effective. 

They are developing new technologies. For example, they added SASE to their portfolio with Harmony. They also have Infinity SOC. If one of the Harmony Endpoints gets compromised, Check Point Infinity SOC is going to see it, and it's going to highlight that.

They're on the very edge of technology and are very fast with implementing new technologies. 

The solution is very stable.

They have a great knowledge base that you can leverage as a user.

The product scales well. 

Technical support is knowledgeable and responsive.

Every now and then, every vendor does have a vulnerability that is discovered. For example, when many vendors were using open SSL, they had to do some fixes on their software in order to fix that particular vulnerability. Check Point was the first one to fix that. It's clear that, unlike the competition, it is always keeping up with the patching of its own software.

What needs improvement?

We'd like it if the solution continued to add new features. For example, what would be specifically useful to us is a feature that allows threat hunting. They may be already working on that or have something available, however, we need something robust and effective.

I'm not sure if they need to improve anything right now. They are already developing new aspects that are quite innovative. 

The only thing that our customers want, is lower prices. 

For how long have I used the solution?

I've been using Check Point for 18 years.

What do I think about the stability of the solution?

The product is very stable. There are no bugs or glitches. It doesn't crash or freeze. It's reliable. 

What do I think about the scalability of the solution?

We have found the solution to be very easy to scale. If you need to expand it you can do so.

How are customer service and support?

They have good technical support. They have very knowledgeable people, depending on the solution. Some specialize in Harmony Endpoint. It's very good.

How was the initial setup?

The initial setup is very easy. The management is on the cloud, and therefore, you practically don't have to do any installation. You only log in and then you begin to use it and you begin to deploy on your network, the endpoints. The time it takes to deploy depends on the size of endpoints you have. With a small network, such as 100 endpoints, you can do it in one day or a couple of hours. 

What's my experience with pricing, setup cost, and licensing?

But they are a leader in detecting threat, therefore, it's reasonable that they are a little more expensive than some other competitors. However, customers always want to pay a bit less.

What other advice do I have?

We are a reseller.

My advice to new users would be to reconsider installing administration servers on-premise. The cloud solution can do it. It's going to lower the maintenance costs. Also, if you are on-premises, you often need some sort of expert on-side, whether it's a vendor or someone else - especially if you are upgrading. That requires knowledge. In contrast, on the cloud, everything is done for you. They have a high availability network so that when you upgrade the servers can keep up. You can upgrade without downtime if you choose the cloud. 

I would rate the solution at a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1601424 - PeerSpot reviewer
Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees
Real User
Oct 20, 2021
Easy to use, very effective, and scales well
Pros and Cons
  • "We have found the stability to be very reliable."
  • "The product has been proven 100% effective with us; we haven't had anything related to any threats passing to us for the past five years."
  • "Technical support can be a bit slow at times."
  • "Technical support can be a bit slow at times."

What is our primary use case?

We have this at an enterprise level and we have it for all our endpoints. We use the product for disk encryption, anti-malware, and BPM blades.

What is most valuable?

The solution offers disk encryption, anti-malware, and BPM blades. For example, the Disc Encryption Software Blade is actually a part of this endpoint security solution. The whole thing is good for us.

The product has been proven 100% effective with us. We haven't had anything related to any threats passing to us for the past five years.

The solution is easy to use. It is self updated when there's a new version. It updates seamlessly, no matter what features you have. However, depending on what we use, there are some features that they will not apply in the clinics. We don't have the preview screen. We can customize it in a way that it doesn't disrupt our operation depending on if it is a laptop, it is a desktop.

The security is very good.

The solution is very straightforward.

The solution scales well.

We have found the stability to be very reliable. 

What needs improvement?

The solution is mostly very good. The reason why I'm trying to compare it with FireEye is due to the fact that it's supposed to be a mandate by the State. We are trying to justify the fact that we don't need to change our environment. For example, if the only thing that they want is to provide reports for the State, then that's a different story. We can customize the reports based on what they're asking for. We don't need to change or want to, however, the State may require us to.

Technical support can be a bit slow at times. 

For how long have I used the solution?

We've dealt with the solution for ten years.

What do I think about the stability of the solution?

The solution is very stable. There are no bugs or glitches. Its performance is good. It doesn't crash or freeze.

What do I think about the scalability of the solution?

The scalability of the product is very good.

How are customer service and support?

The solution offers very good technical support. While they may be a bit slow, they always come through with a solution. 

How was the initial setup?

The initial setup is very straightforward. It's not a problem at all. 

What's my experience with pricing, setup cost, and licensing?

I have no information in terms of the pricing. I'm not involved with neither the purchase, maintenance, contract, or anything that has to do with licensing.

Which other solutions did I evaluate?

The company may be interested in trying to change to FireEye. I'm looking at it now to see what differences and advantages are at play. 

What other advice do I have?

We're just a customer and an end-user.

I'd rate the solution at a ten out of ten. We've had no problems with it at all.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user1626762 - PeerSpot reviewer
Assitant Manager - IT Support at a outsourcing company with 1,001-5,000 employees
User
Jul 17, 2021
Great for securing endpoints with good anti-malware and port protection
Pros and Cons
  • "It's great for securing our endpoints from any external attacks."
  • "It's great for securing our endpoints from any external attacks."
  • "Tech Support must be better."
  • "Tech Support must be better."

What is our primary use case?

We use it for multiple purposes. It's for securing the endpoints. We have about 200 endpoints added to this solution and being maintained. Its server is cloud-based and here our in-house IT team takes care of the installation and configuration on endpoints. We are required to secure our endpoint from any external attacks. It's also well controlled so that only required access is to be given to end-users. Whether it's about blocking unwanted websites or port blocking, we use the solution to manage everything.

What is most valuable?

The anti-malware and port protection, etc., are good. We have about 200 endpoints on this solution being maintained. We like that its server is cloud-based and that our in-house IT team can handle the installation and configuration on endpoints. It's great for securing our endpoints from any external attacks. We can control access to end-users. 

What needs improvement?

Tech Support must be better. Whenever we log a case for any issue it takes too much time to get it sorted. There should be escalation by default. If the case is not being sorted quickly, it must get internally escalated to the team who are experts and they should be empowered to jump in to get the issue fixed. Many times, we have to be on it for weeks to come to a proper resolution. 

Website blocking and endpoint levels are still a challenge and there needs to be a more sophisticated solution. We are looking forward to having this product work more efficiently.

For how long have I used the solution?

We have been using Harmony Endpoint for over six Months.

How are customer service and technical support?

Tech Support needs improvement.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1597644 - PeerSpot reviewer
Chief Technology Officer at a tech services company with 11-50 employees
Real User
Jun 18, 2021
Is easy to deploy, cost effective, stable, scalable, and more secure
Pros and Cons
  • "Check Point Harmony Endpoint can be easily deployed and is cost effective and more secure."
  • "My customers choose Check Point Harmony Endpoint because deployment is easier and because it's cost effective and more secure."
  • "Technical support needs to be improved, along with the response time."
  • "Technical support needs to be improved, along with the response time."

What is our primary use case?

Check Point Harmony Endpoint is antimalware and antivirus software, and it also has features such as in firewall autoresponse and autonotification, autoprotection, definition updates, and policies that we can apply.

We have medium-sized companies who use this solution.

What is most valuable?

My customers choose Check Point Harmony Endpoint because deployment is easier and because it's cost effective and more secure.

It is also a stable and scalable solution.

What needs improvement?

Technical support needs to be improved, along with the response time. The technical team or any product team should liaise with us and help to deploy the solution to the first few customers so that we can roll out to the rest of the customers.

They need to improve the licensing process as well so that it is easier for the end user. At present, we have to wait one to two weeks to get a license, which is not productive. The process is not very smooth or convenient for the end user because Check Point Harmony Endpoint provides two login portals. One is for licensing, and the other is for management.

In the future, I would like to the management portal and the licensing portal be integrated or changed to a single sign-on because that will be good for both the panel and the user. If they can make it very convenient for deployment and monitoring, it would be good.

If we could get technical support in Singapore, then it will be helpful for our customers.

For how long have I used the solution?

I've been dealing with this solution for two months.

It's deployed both on cloud and on-premises.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

This solution is scalable. If you have a server or any software deployment tools, you can just push from the server so that the users don't even need to install it on their machines.

How are customer service and technical support?

Technical support needs to improve. Their response time needs to improve too. Also, the only way to contact technical support is through email or international phone calls (for us in Singapore).

How was the initial setup?

The initial setup is much easier compared to that of other solutions because it involves emailing and letting the agent download and then deploy the solution. It's lightweight, not using a lot of system resources compared to the rest of the products. It is the next generation of endpoint agents.

The deployment itself can take a day.

Maintenance is not required because it depends on the policy that you apply on the Check Point portal itself.

What's my experience with pricing, setup cost, and licensing?

Compared to the cost of other solutions, Check Point Harmony Endpoint is cost effective. The cost is not very cheap, but it's fair.

The licensing process is not smooth and can take one to two weeks.

What other advice do I have?

I would recommend this solution because the protection works well, and it is cost is effective.

They also have cloud-based management, so it is like a SaaS service, and we don't need to buy a server to host it and to implement any hardware just for running the management of Check Point Harmony Endpoint.

On a scale from one to ten, I would rate this solution at eight.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.