Try our new research platform with insights from 80,000+ expert users
it_user5520 - PeerSpot reviewer
Network Manager at a manufacturing company with 501-1,000 employees
Vendor
Apr 1, 2013
Works well unless you need to upgrade then compatibility issues may arise.

What is most valuable?

Endpoint security is a client-server managed network protection program. It blocks unauthorized software, malware, virus etc from entering the network and each client machine. Can be set up company specific to block specific file extensions or other devices from accessing the network. It provides updates based on server settings, can perform one network scan daily and can be set up to scan per client machine setting. Any machine that has the software installed on the network is protected by the endpoint security. Logs are created per client and machine settings.

What needs improvement?

Endpoint security programs can be a bit pricey, but you are receiving basically the same type of protection from each software program. To upgrade from one version to the next can get very costly providing what type of equipment you are running the program on. I did not find that endpoint security was very compatible during the upgrade. I ended up spending a lot more money than budgeted due to compatible issues.

What other advice do I have?

All in all, endpoint security does the basics of blocking unauthorized software, malware, virus, etc. It is client/server based software. Works good unless you need to upgrade then compatibility issues may arise. Would recommend for any user. Runs behind the scenes, and the scans are designed to run without effecting a user ability to work on their pc.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Tech Support Staff at a tech company with 51-200 employees
Real User
Jul 1, 2012
I would recommend endpoint security to anyone because it worked for me; no security issues with end devices for more than a year now.

Valuable Features:

Endpoint security protects networks from unauthorized programs, viruses and malware, and allows you to control the network by blocking devices that you do not want to have access to it, for example by file extensions or using the device’s ID.It also controls access and prevents theft of data by controlling access to storage devices that are portable. USB storage devices are also encrypted for security purposes.Centralized monitoring, logging and generation of reports and automatic protection of newly added computers to the network are other functions and capabilities of endpoint security.

Room for Improvement:

It took me time to learn how to configure endpoint security. Getting one for our Unix-based systems was not easy because most programs available in the market are windows-based. Implementing security on the latest endpoint devices was not easy due to compatibility issues.

Other Advice:

Endpoint security is implemented on client-server network model to ensure that end devices in the network are totally secure before having access to the network. Endpoint security can be implemented as a firewall or an anti-virus program that can be configured to include intrusion detection properties. It is also used in cloud computing and can be hosted or used on-site. It is a very flexible and efficient form of desktop security and I have used it for a very long time.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
February 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
881,757 professionals have used our research since 2012.
reviewer1638066 - PeerSpot reviewer
Technical Engineer at a tech services company with 11-50 employees
Reseller
Aug 1, 2021
A stable, well priced, easily installable solution that provides good visibility against attacks
Pros and Cons
  • "The initial setup is very easy."
  • "An additional feature I would like to see involves the VPN."

What needs improvement?

An additional feature I would like to see involves the VPN.

What do I think about the stability of the solution?

The solution is stable.

How are customer service and technical support?

I have not had experience with technical support. 

How was the initial setup?

The initial setup is very easy. 

What's my experience with pricing, setup cost, and licensing?

The price is good. 

What other advice do I have?

I am still in the initial stages of using the product, but I feel it to be very good. It satisfies all my needs and this includes the EDR, which I consider good. The solution gives good visibility when it comes to attacks. 

As the solution satisfies all my needs, I rate Check Point Harmony Endpoint as a ten out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1126782 - PeerSpot reviewer
Information Technology Security Engineer at a tech services company with 11-50 employees
Reseller
Top 5Leaderboard
Oct 30, 2024
Efficient malware protection with an easy setup and helpful support
Pros and Cons
  • "The traditional anti-malware engine is valuable."
  • "There should be an indication when you assign an endpoint to be a local proxy for other endpoints. The current system doesn't clearly indicate whether the assignment was successful."

What is our primary use case?

Check Point Harmony Endpoint is used mostly for endpoint protection.

How has it helped my organization?

It protects endpoints for our customers.

What is most valuable?

The traditional anti-malware engine is valuable.

What needs improvement?

There should be an indication when you assign an endpoint to be a local proxy for other endpoints. The current system doesn't clearly indicate whether the assignment was successful. I even talked to Check Point support about considering this as a feature request.

For how long have I used the solution?

I have been familiar with Harmony Endpoint for about two years.

What do I think about the stability of the solution?

I did not encounter any stability issues with Harmony Endpoint.

What do I think about the scalability of the solution?

I would rate the scalability as 9.5 out of ten.

How are customer service and support?

I had no problems with Check Point support. They were very helpful and competitive, and we had various calls where they connected to our implementation and provided assistance.

Which solution did I use previously and why did I switch?

Before using Harmony Endpoint, we used other similar solutions, however, I do not have a stable opinion on which one is better as these products are very different.

We previously used McAfee.

How was the initial setup?

The setup is easy when using the web console. However, for on-premises deployment, it requires additional data and configuration.

What about the implementation team?

We have a certified engineer with the necessary certifications to install, support, and troubleshoot Harmony Endpoint and Check Point firewalls.

What's my experience with pricing, setup cost, and licensing?

Pricing is not within my purview as an engineer. However, if customers purchase it, I assume the price is reasonable.

What other advice do I have?

I would recommend Harmony Endpoint to others.

I'd rate the solution eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
reviewer2300304 - PeerSpot reviewer
Virtualization & Workplace Consultant at a tech services company with 51-200 employees
User
Oct 25, 2023
Good endpoint protection with great anti-ransomware and malware protection
Pros and Cons
  • "It offers complete endpoint protection for all assets."
  • "The solution needs better reports and centralized logs."

What is our primary use case?

The experience has been fantastic when it comes to the features of the Harmony Endpoint (SandBlast agent) we have used on all devices in our environment of 1000 computers in order to have an effective level of protection and centralized management. Even more so with remote work, there have been challenges in protecting all users.                                                            

How has it helped my organization?

It came in to combat management problems and additional protection of all devices when all users went home to work. We now have a perfect idea of the state of endpoint protection. 

What is most valuable?

Features like anti-ransomware help to identify behaviors such as file encryption or attempts, malware protection to protect from web browsing or email attachments, and patch management to deploy all patches from the vendors. 

It offers complete endpoint protection for all assets.

What needs improvement?

The solution needs better reports and centralized logs. They need to take up fewer resources for consumption.

For how long have I used the solution?

I've used the solution for three years.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2026
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.