Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Tech Support Staff at a tech company with 51-200 employees
Real User
Jul 1, 2012
I would recommend endpoint security to anyone because it worked for me; no security issues with end devices for more than a year now.

What is most valuable?

Endpoint security protects networks from unauthorized programs, viruses and malware, and allows you to control the network by blocking devices that you do not want to have access to it, for example by file extensions or using the device’s ID.It also controls access and prevents theft of data by controlling access to storage devices that are portable. USB storage devices are also encrypted for security purposes.Centralized monitoring, logging and generation of reports and automatic protection of newly added computers to the network are other functions and capabilities of endpoint security.

What needs improvement?

It took me time to learn how to configure endpoint security. Getting one for our Unix-based systems was not easy because most programs available in the market are windows-based. Implementing security on the latest endpoint devices was not easy due to compatibility issues.

What other advice do I have?

Endpoint security is implemented on client-server network model to ensure that end devices in the network are totally secure before having access to the network. Endpoint security can be implemented as a firewall or an anti-virus program that can be configured to include intrusion detection properties. It is also used in cloud computing and can be hosted or used on-site. It is a very flexible and efficient form of desktop security and I have used it for a very long time.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Real User
Top 5
May 28, 2024
Easy to configure and detects many threats and files containing malware
Pros and Cons
  • "Check Point detects files containing malware, which some users are trying to download or access. Additionally, it can consolidate multiple emails into one."
  • "The antivirus could be improved in terms of the resources it consumes, particularly regarding CPU and memory usage. We've encountered issues with some of our firewalls, leading us to turn off the antivirus feature due to its heavy resource consumption."

What is our primary use case?

We use Check Point Antivirus to protect our company's perimeter. Specifically, we implement antivirus measures solely on the perimeter firewall. This strategy safeguards the company, especially considering the files accessed by employees. Check Point Antivirus shields us from malware and viruses.

How has it helped my organization?

Check Point detects files containing malware, which some users are trying to download or access. Additionally, it can consolidate multiple emails into one.

What is most valuable?

Check Point is easy to configure, and it detects many threats.

What needs improvement?

The antivirus could be improved in terms of the resources it consumes, particularly regarding CPU and memory usage. We've encountered issues with some of our firewalls, leading us to turn off the antivirus feature due to its heavy resource consumption. Enhancing its performance would allow us to run it on smaller models without overburdening the CPU.

While it is a valuable security feature, Check Point should ensure that the hardware is properly dimensioned to support the antivirus feature, providing some margin for potential resource demands. The values provided in the specifications should be realistic and adequate to support the feature effectively on the Check Point firewall.

For how long have I used the solution?

I have been using Check Point Antivirus for ten years.

What do I think about the stability of the solution?

Sometimes, Check Point Antivirus raises connection issues even when the license is valid. Consequently, we encounter difficulties installing the antivirus on various devices. Moreover, the solution isn't always stable. Occasionally, update failures occur without apparent reason, necessitating the need to open a support case.

What do I think about the scalability of the solution?

One thousand users, including the financial, IT, and HR teams, are utilizing this solution, essentially encompassing all departments in their company, as everyone uses the internet. From our experience, it's very resource-intensive and not one of our most scalable features. As I mentioned, sometimes we encounter CPU logs on some firewalls, often related to the antivirus. Therefore, sometimes, we need to turn it off or adjust its settings.

I rate the solution's scalability as seven out of ten.

How are customer service and support?

The solution should have better support from more knowledgeable engineers when opening a case rather than starting with junior engineers and escalating after one or two weeks.

How would you rate customer service and support?

Neutral

How was the initial setup?

Once the security gateway is up and running, you simply navigate to the features section, ensure you have the appropriate license, and enable the antivirus feature. Then, you can select one of the recommended profiles. Once you've chosen the profile, you're all set.

It takes one day to deploy if you have already added the firewall.

I rate the initial setup a nine out of ten, where one is difficult, and ten is easy.

What's my experience with pricing, setup cost, and licensing?

We have the license for all the other FortiGate, which comes with the IPS and antivirus. However, you need to pay for the antivirus separately. In terms of cost, it is slightly more expensive than Fortinet.

What other advice do I have?

Check Point Antivirus has helped us protect our company's security exposure. It has already detected some files that, if successfully downloaded, could pose a significant problem.

However, it consumes a lot of resources. Enabling antivirus on the Check Point firewall is one of the most resource-intensive processes you can allow, even more so than the IPS.

We requested that antivirus be enabled on three of our firewalls because the CPU usage was consistently 90%. Testing this feature has shown that some improvements in performance should reduce resource consumption.

We enable Check Point's default recommended profile. Preset profiles are already available; we choose one to help without configuring our own.

I would recommend improving the performance to reduce resource consumption and enhance stability.

In terms of security, Check Point Antivirus is practical and improves our company's security posture.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
January 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
reviewer1638066 - PeerSpot reviewer
Technical Engineer at a tech services company with 11-50 employees
Reseller
Aug 1, 2021
A stable, well priced, easily installable solution that provides good visibility against attacks
Pros and Cons
  • "The initial setup is very easy."
  • "An additional feature I would like to see involves the VPN."

What needs improvement?

An additional feature I would like to see involves the VPN.

What do I think about the stability of the solution?

The solution is stable.

How are customer service and technical support?

I have not had experience with technical support. 

How was the initial setup?

The initial setup is very easy. 

What's my experience with pricing, setup cost, and licensing?

The price is good. 

What other advice do I have?

I am still in the initial stages of using the product, but I feel it to be very good. It satisfies all my needs and this includes the EDR, which I consider good. The solution gives good visibility when it comes to attacks. 

As the solution satisfies all my needs, I rate Check Point Harmony Endpoint as a ten out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1126782 - PeerSpot reviewer
Information Technology Security Engineer at a tech services company with 11-50 employees
Reseller
Top 5Leaderboard
Oct 30, 2024
Efficient malware protection with an easy setup and helpful support
Pros and Cons
  • "The traditional anti-malware engine is valuable."
  • "There should be an indication when you assign an endpoint to be a local proxy for other endpoints. The current system doesn't clearly indicate whether the assignment was successful."

What is our primary use case?

Check Point Harmony Endpoint is used mostly for endpoint protection.

How has it helped my organization?

It protects endpoints for our customers.

What is most valuable?

The traditional anti-malware engine is valuable.

What needs improvement?

There should be an indication when you assign an endpoint to be a local proxy for other endpoints. The current system doesn't clearly indicate whether the assignment was successful. I even talked to Check Point support about considering this as a feature request.

For how long have I used the solution?

I have been familiar with Harmony Endpoint for about two years.

What do I think about the stability of the solution?

I did not encounter any stability issues with Harmony Endpoint.

What do I think about the scalability of the solution?

I would rate the scalability as 9.5 out of ten.

How are customer service and support?

I had no problems with Check Point support. They were very helpful and competitive, and we had various calls where they connected to our implementation and provided assistance.

Which solution did I use previously and why did I switch?

Before using Harmony Endpoint, we used other similar solutions, however, I do not have a stable opinion on which one is better as these products are very different.

We previously used McAfee.

How was the initial setup?

The setup is easy when using the web console. However, for on-premises deployment, it requires additional data and configuration.

What about the implementation team?

We have a certified engineer with the necessary certifications to install, support, and troubleshoot Harmony Endpoint and Check Point firewalls.

What's my experience with pricing, setup cost, and licensing?

Pricing is not within my purview as an engineer. However, if customers purchase it, I assume the price is reasonable.

What other advice do I have?

I would recommend Harmony Endpoint to others.

I'd rate the solution eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
reviewer2300304 - PeerSpot reviewer
Virtualization & Workplace Consultant at a tech services company with 51-200 employees
User
Oct 25, 2023
Good endpoint protection with great anti-ransomware and malware protection
Pros and Cons
  • "It offers complete endpoint protection for all assets."
  • "The solution needs better reports and centralized logs."

What is our primary use case?

The experience has been fantastic when it comes to the features of the Harmony Endpoint (SandBlast agent) we have used on all devices in our environment of 1000 computers in order to have an effective level of protection and centralized management. Even more so with remote work, there have been challenges in protecting all users.                                                            

How has it helped my organization?

It came in to combat management problems and additional protection of all devices when all users went home to work. We now have a perfect idea of the state of endpoint protection. 

What is most valuable?

Features like anti-ransomware help to identify behaviors such as file encryption or attempts, malware protection to protect from web browsing or email attachments, and patch management to deploy all patches from the vendors. 

It offers complete endpoint protection for all assets.

What needs improvement?

The solution needs better reports and centralized logs. They need to take up fewer resources for consumption.

For how long have I used the solution?

I've used the solution for three years.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.