We declare this endpoint security in their device so that all the components should meet the end user device and we can protect our different vessel from the threats and control the user access.
System administrator at Digitaltrack soluctions Pvt. ltd
Protecting sensitive data transfers and managing user access has become more efficient
Pros and Cons
- "What stands out to me most about the best features Check Point Harmony Endpoint offers are the data cost management features and strong policy that empowers user devices with central management and visibility."
- "I choose nine out of ten because apart from the licensing cost, everything is great."
What is our primary use case?
What is most valuable?
What stands out to me most about the best features Check Point Harmony Endpoint offers are the data cost management features and strong policy that empowers user devices with central management and visibility.
The data processing features of Check Point Harmony Endpoint are more detailed in independent user devices, and it controls sensitive data transfer whether it is transferring data from the USB or whether an image is uploaded to the Internet. In that we get the infeasibility and the control.
Check Point Harmony Endpoint has positively impacted my organization, and after deployment resolution, we are compared to some of the cybersecurity guidelines and it has improved our work on security for the devices.
What needs improvement?
As of now, I do not see any challenge with the problem regarding how Check Point Harmony Endpoint can be improved.
I would say that the course is something that can be reduced compared to other options to make my experience with Check Point Harmony Endpoint even better.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for more than three years.
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
What other advice do I have?
I rate Check Point Harmony Endpoint a nine out of ten. I choose nine out of ten because apart from the licensing cost, everything is great. My overall review rating for Check Point Harmony Endpoint is nine.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 31, 2025
Flag as inappropriateEnterprise Network Engineer at a outsourcing company with 201-500 employees
Improved data protection and threat detection boosts user endpoint security
Pros and Cons
- "Check Point Harmony Endpoint has positively impacted my organization primarily in the protection context as we no longer face issues where data is lost because someone put it on a USB drive or encounter situations where information leaks from users inside, effectively closing off one of the threat edges."
What is our primary use case?
Our main use case for Check Point Harmony Endpoint is for posture for the user endpoints. When I say posture for user endpoints, it includes both compliance and threat detection. Compliance ensures that before users connect to network resources, whether within the organization on the switches or outside via VPN, the endpoint client must verify whether the posture is acceptable, ensuring that antivirus is running in the background without threats, and making sure that the device is secure.
How has it helped my organization?
Check Point Harmony Endpoint has positively impacted my organization primarily in the protection context.
It has helped significantly on the protection side, considering that we no longer face issues where data is lost because someone put it on a USB drive, whether they took the device home or elsewhere. We no longer encounter situations where information leaks from users inside, effectively closing off one of the threat edges.
What is most valuable?
The best features that Check Point Harmony Endpoint offers, unlike traditional endpoint solutions, focus specifically on detection and remediation even before the device has to go to the firewall. We manage it through the Infinity Portal, which helps us with the fatigue of logging into different windows.
The automated detection, which is EDR, detects any threats potentially moving from the user endpoint onto the network and possibly to the data center. Another critical feature is data protection to prevent someone from easily extracting information from the user laptop by plugging in a stray hard drive or USB.
The automated detection and EDR in Check Point Harmony Endpoint reduce administrative overhead. The agent comes with pre-installed settings to detect different threats on the endpoint. In most other solutions, you must start from scratch, which takes considerable time and troubleshooting. With Check Point Harmony Endpoint, you're basically fine-tuning because the templates are already running, and you just adjust them to fit your organizational preferences.
What needs improvement?
There are some pain points with automated rules in Check Point Harmony Endpoint. In the initial stages, you sometimes have to do fine-tuning because you get false positives, resulting in users being unable to connect. However, those issues are eventually fixed.
The pricing is a bit expensive, making it harder to maintain the licenses, and the initial setup takes a learning curve since it needs to fit into the Check Point environment and integrate with other systems.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for three years.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is stable.
What do I think about the scalability of the solution?
The scalability of Check Point Harmony Endpoint is satisfactory.
How are customer service and support?
I have interacted with Check Point Harmony Endpoint's customer support, and my experience was good.
The customer support for Check Point Harmony Endpoint deserves a rating of 10.
How would you rate customer service and support?
Positive
How was the initial setup?
My experience with pricing, setup cost, and licensing was good, primarily because of the support provided.
What was our ROI?
I have seen a return on investment from using Check Point Harmony Endpoint in terms of fewer security incidents, and the previous issue of data leaking from user devices has completely disappeared.
Which other solutions did I evaluate?
I did not evaluate other options before choosing Check Point Harmony Endpoint.
What other advice do I have?
I would encourage others looking into using Check Point Harmony Endpoint to invest in it. Protecting an organization solely with a firewall is challenging, especially in a hybrid work environment where working via VPN has become common. Therefore, investing in Check Point Harmony Endpoint ensures that the threat landscape on the user side is fully covered and protected. On a scale of 1-10, I rate Check Point Harmony Endpoint a 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
Cybersecurity Engineer at a tech services company with 11-50 employees
Check Point Antivirus
Pros and Cons
- "Checkpoint antivirus blade has improved our customers security postures by enhancing their malware detection, reduced risk of cyber attacks and also by stopping threats before they reach users by scanning files at the network gateway."
- "Inspecting HTTPS traffic requires enabling HTTPS inspection and threat emulation, which can be resource intensive, resulting in performance impact on legitimate traffic also."
What is our primary use case?
Since we are resellers of checkpoint products, We deployed checkpoint antivirus blade to our customers as a gatewaye-level malware prevention that will stop threats before they reach users by scanning files at the network level, and also most of our customers are on the banking industry. so these financial institutions need to block malware that could compromise transactions and customer information, thanks to checkpoint antivirus blade that is incorporated in checkpoint firewall blades, we just made it possible to our customers.
How has it helped my organization?
Checkpoint antivirus blade has improved our customers security postures by enhancing theirr malware detection, reduced risk of cyber attacks and also by stoping threats before they reach users by scanning files at the network gateway. Additionally checkpoint antivirus blade is keeping our customers from different known and unknown threats by its real-time security intelligence from checkpoint theartcloud.
What is most valuable?
it's gateway-level malware prevention. This feature is valuable for our customer because it stops threats before they reach users by scanning incoming files at the network gateway. And also it can work with alongside with Check Point Anti-Bot Software Blade for comprehensive security. Above aove all and the intersting one is like it can be manged centrally from single, user-friendly console. Addisionally it has low false positive rate, and effective threat mitigation. As a whole our customers are happy about this solution with these mention features.
What needs improvement?
By default the antivirus blade monitors SMTP and HTTP traffic, but inspecting HTTPS traffic requires enabling HTTPS inspection and threat emulation, which can be resource intensive. Because decrpting traffics can be resouce intensive, which results performance impact on legitmate traffics also. And also our customers have a some complain about it pricing because compared to other vendors antivirus solutions checkpoint is considered costly. Other than these the solution is a must to have in your envirinemnt.
For how long have I used the solution?
For almost more than 2 years, I worked on checkpoint products that resell and implement chech
Which solution did I use previously and why did I switch?
no
What about the implementation team?
we deployed it by our in-house team
Which other solutions did I evaluate?
Yes Fortinet, Paloalto and other vendors
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Last updated: Oct 23, 2025
Flag as inappropriateAdjunct Professor, Cybersecurity at University of the People
Offers protection against threats with data safeguarding and reliable AI-based prevention
Pros and Cons
- "It features strong AI-based threat prevention and security management, making it a solid choice for end users."
- "Check Point Antivirus is valuable due to its autonomous threat prevention system, which is consistently up-to-date and highly reliable with excellent performance at scale."
- "Check Point should improve on their patch management by releasing patches more frequently, such as on a weekly basis, to stay ahead of potential vulnerabilities."
- "Check Point should improve on their patch management by releasing patches more frequently, such as on a weekly basis, to stay ahead of potential vulnerabilities."
What is our primary use case?
I use Check Point Antivirus primarily to protect against threats, risks, and attacks. It helps guard against phishing attacks, website attacks, and potential data breaches.
How has it helped my organization?
Check Point Antivirus has been very helpful in maintaining system security, protecting against attacks, and ensuring data and information are safeguarded against vulnerabilities.
What is most valuable?
Check Point Antivirus is valuable due to its autonomous threat prevention system, which is consistently up-to-date and highly reliable with excellent performance at scale.
It features strong AI-based threat prevention and security management, making it a solid choice for end users. The SmartConsole is automatically updated with the latest patches and fixes, ensuring ongoing protection against evolving threats.
What needs improvement?
Check Point should improve on their patch management by releasing patches more frequently, such as on a weekly basis, to stay ahead of potential vulnerabilities.
For how long have I used the solution?
I have been working with Check Point Antivirus for less than a year.
What do I think about the stability of the solution?
Check Point Antivirus is consistently stable with no outages reported.
What do I think about the scalability of the solution?
The solution is highly scalable, with proactive features that help guard against data breaches and vulnerabilities, ensuring comprehensive protection.
How are customer service and support?
Check Point offers excellent customer service and technical support. They responded promptly to an issue with annual renewal and resolved it quickly.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, I used Panda, Microsoft Defender, Kaspersky, and Bitdefender. I switched to Check Point Antivirus based on positive online reviews.
How was the initial setup?
The initial setup for Check Point Antivirus was rated nine out of ten for ease. It was straightforward, as the solution is similar to plug-and-play IT solutions.
What about the implementation team?
For deployment, three people were required. However, for maintenance, only one person is necessary.
What was our ROI?
Check Point Antivirus provides robust protection against malware and viruses, preventing data loss and safeguarding important information.
What's my experience with pricing, setup cost, and licensing?
I pay ninety dollars annually for Check Point Antivirus, which is reasonably priced.
Which other solutions did I evaluate?
I evaluated alternatives by reviewing different antivirus products before choosing Check Point Antivirus.
What other advice do I have?
I would advise new users to give Check Point Antivirus a try, as it is a stable and reliable solution. It provides excellent threat prevention and cybersecurity features, ensuring confidentiality, integrity, and availability.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Manager, Information Technology Cyber At Edeltech O & M at Ezom
Audit log limitations require attention while login tracking enhances security
Pros and Cons
- "I use Check Point Harmony Endpoint because it is an easy solution to implement and a good solution overall."
- "One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days."
What is our primary use case?
I use Check Point Harmony Endpoint because it is an easy solution to implement and a good solution overall. It effectively does its work for me.
What is most valuable?
Harmony Endpoint has a geo policy that allows me to see where users log in from, enabling me to analyze if someone tries to access an account from another location. It offers a good false positive rate and provides protection across all platforms of 365.
What needs improvement?
One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days.
For how long have I used the solution?
With Harmony Endpoint, I have three years of experience. With Harmony Email and Collaboration, I have five years of experience.
What was my experience with deployment of the solution?
Deployment was easy and took less than a day, as it is a SaaS solution that partners with Check Point.
What do I think about the stability of the solution?
The stability of the tool is high, as I have not experienced any downtime.
What do I think about the scalability of the solution?
It possesses high scalability because it is a SaaS solution from the cloud, allowing expansion as needed.
How are customer service and support?
Although I have not contacted technical support recently, in the beginning, there were some issues that had to be addressed. Despite this, their support was helpful enough for me to give them a seven out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Previously, my company used a Titan solution for email and collaboration. We switched to Check Point due to better pricing and additional protection on platforms like OneDrive, Teams, and all 365 platforms.
How was the initial setup?
The initial setup was straightforward and completed within a day, which I would rate as an eight out of ten.
What about the implementation team?
As a SaaS solution, it was implemented with Check Point's partner.
What was our ROI?
There has been a good return on investment. The product is affordable and provides excellent coverage and protection across multiple platforms.
What's my experience with pricing, setup cost, and licensing?
The price for Check Point Harmony Endpoint is good considering the services it offers. It is not expensive and provides comprehensive coverage.
What other advice do I have?
I recommend Check Point Harmony Endpoint to others if they need it. It depends on the infrastructure, yet it still provides good protection. Overall, I would rate the solution a five out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director de Ingenieria at Smartelecom SA de CV
Good visibility with cloud centralized management and several layers of security
Pros and Cons
- "Information is easily managed and protected (which is particularly useful in lost or stolen endpoints)."
- "If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents."
What is our primary use case?
The main use of this product is endpoint security, it is very useful when you are trying to centralize endpoint security management and you want an easy and fast setup, I have used this product in POCs and different size deployments with different kinds of clients. Harmony offers several layers of protection and it fits well with all the Check Point "ecosystem", (It is especially useful when you are correlating security data because it can "talk" with Check Point's XDR Solution in order to get more insights).
How has it helped my organization?
There are several benefits that you can get with this solution:
1) You get centralized management of endpoints in your organization and you can be very granular in order to create endpoint security policies for different user groups. This improves overall security and visibility for IT departments.
2) Visibility also offers improvement with purchases and making decisions.
3) Information is easily managed and protected (which is particularly useful in lost or stolen endpoints).
4) It can be used with an XDR system (which is very useful with SOCs).
What is most valuable?
The most valuable aspects include:
1) Cloud Centralized management. This is particularly useful since you don't have to use any on-premise server, the cloud dashboard is activated without a minimum license number.
2) Several layers of security. It is well aligned with actual threats like ransomware and zero-day attacks and offers traditional layers of security.
3) Visibility. You have a single dashboard for all endpoint information that you need from an IT administrative perspective and in a threat incident you are properly advised.
What needs improvement?
There are some "weak points" that have to be mentioned, including:
1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents.
2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions.
3) You need a mature security team to manage this solution in order to get the most value from it.
For how long have I used the solution?
I've used this product since its release.
What do I think about the stability of the solution?
The solution is very stable in the correct context; with its cloud nature, it is unlikely to have any downtime.
What do I think about the scalability of the solution?
The solution is very scalable since the console is a cloud; you only have to buy more licenses in order to grow.
How are customer service and support?
TAC is very useful and its dashboard is very intuitive. You can get web, mail, and telephone support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used several solutions, such as Symantec, ESET, and Kaspersky.
How was the initial setup?
The initial setup is straightforward. It is very fast due to its cloud nature.
What about the implementation team?
We implemented the solution with the help of a vendor team; they have good documentation and are experts.
What was our ROI?
The ROI is very hard to measure. It is best to take a proactive posture of protecting your assets.
What's my experience with pricing, setup cost, and licensing?
It is a very good security product yet it is not the cheapest one. Licensing is very easy to understand and it includes Check Point TAC support.
Which other solutions did I evaluate?
We evaluated various solutions, including Symantec, ESET, Trellix, and Kaspersky.
What other advice do I have?
It is a very mature solution and one of the most secure that exists in the security market share.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Director at Geekz Information Technology
Well-designed for security needs and has built-in features
Pros and Cons
- "Stability is good, and the product is well-designed for security needs."
- "Endpoint protection is valuable. Stability is good, and the product is well-designed for security needs."
- "Support needs improvement."
- "Support needs improvement. Currently, support is primarily via email, which leads to longer response times."
What is our primary use case?
We work with Check Point Harmony Endpoint as partners, providing deployment services, particularly for small to medium enterprises (SMEs). We work with both small and large companies.
What is most valuable?
Endpoint protection is valuable. Stability is good, and the product is well-designed for security needs. It is scalable and offers multiple features, which justify its pricing for enterprise customers. Since security is a major concern, we do not worry about the pricing as the product has features built-in.
What needs improvement?
Support needs improvement. Currently, support is primarily via email, which leads to longer response times. Fine-tuning for applications and better support from Harmony would be helpful, especially once the environment is hardened. Better technical support would enhance the product's competitiveness.
For how long have I used the solution?
We have been working with Check Point Harmony Endpoint for almost five years.
What do I think about the stability of the solution?
Stability is fine, and the product performs well in terms of security. It is considered well and good.
What do I think about the scalability of the solution?
Check Point Harmony Endpoint is scalable, suitable for both small and large companies.
How are customer service and support?
Support service needs improvement. Only email support is available, leading to delays in getting assistance.
How would you rate customer service and support?
Negative
How was the initial setup?
Implementation is straightforward for smaller environments, however, requires significant fine-tuning for larger clients.
What about the implementation team?
We only handle deployment and do not deal with pricing, which is taken care of by another department.
What's my experience with pricing, setup cost, and licensing?
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability. It is suitable for enterprises but can be challenging to position for small to medium customers.
What other advice do I have?
We recommend Check Point Harmony Endpoint; however, support needs enhancement. With improved support, it could outperform competitors. Rating based on the alone featureset is nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
IT Manager at Bolger Brothers Inc.
Manages to capture more spam with a smaller footprint
Pros and Cons
- "This comprehensive approach can safeguard your organization from a wider range of threats, including ransomware, malware, phishing attacks, and zero-day exploits."
- "I would like to see a better UI for admin functions."
What is our primary use case?
We use Check Point to manage email security in our O365 environment. Our previous solution was unable to remove all of the email spam we had. Check Point integrates with Office 365 to provide advanced threat protection for email. It uses techniques like anti-virus, URL filtering, and threat emulation to stop known and unknown threats. It also offers goes beyond email security. It protects all aspects of Office 365 collaboration tools like SharePoint, OneDrive, and Teams. It can prevent data loss, enforce policy compliance, and block phishing attacks.
How has it helped my organization?
It manages to capture more spam with a smaller footprint. It has a single agent and management console to streamline security administration. This can save IT staff time and resources compared to managing multiple security products. The endpoint combines Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR) capabilities.
This comprehensive approach can safeguard your organization from a wider range of threats, including ransomware, malware, phishing attacks, and zero-day exploits.
What is most valuable?
Ease of setup and ability to hook into O365 directly without MX record changes. Check Point offers advanced threat prevention capabilities, including SandBlast Network Threat Emulation and Threat Extraction. These features can identify and stop even unknown threats by simulating real-world attacks in a safe environment. Check Point solutions are designed to scale to meet the needs of large organizations. They can handle high volumes of traffic without compromising performance. Check Point integrates with a wide range of third-party security solutions. This allows you to create a comprehensive security ecosystem that meets your specific needs.
What needs improvement?
I would like to see a better UI for admin functions. While CheckPoint offers threat prevention through SandBlast, some users feel even deeper integration of Machine Learning (ML) could enhance threat detection and improve automation. This could involve automating security responses and offering threat prediction capabilities. As organizations increasingly move to the cloud, Check Point could further strengthen its cloud-native security offerings. This might involve expanding support for various cloud platforms and offering more granular security controls within those environments.
For how long have I used the solution?
I have used Check Point Harmony Endpoint for six months.
What do I think about the stability of the solution?
We haven't had issues or outages so far.
What do I think about the scalability of the solution?
It seems to be able to scale to any size company.
How are customer service and support?
Their support has been very positive. It's easy to use.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Sophos was our previous vendor, we found their coverage lacking.
How was the initial setup?
The setup was straightforward, it's hands-on config.
What about the implementation team?
CDW was our MSP.
What was our ROI?
We expect to see ROI in 12-16 months.
What's my experience with pricing, setup cost, and licensing?
My advice would be to state terms upfront and always ask to haggle down.
Which other solutions did I evaluate?
We looked at Fortinet, Palo Alto, Crowdstrike, etc.
What other advice do I have?
Make sure to review your solutions every couple years as technology changes.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Cortex XDR by Palo Alto Networks
Microsoft Defender for Endpoint
SentinelOne Singularity Endpoint
IBM Security QRadar
Huntress Managed EDR
Elastic Security
HP Wolf Security
Trellix Endpoint Security Platform
Microsoft Defender XDR
WatchGuard Firebox
Fortinet FortiEDR
TrendAI Vision One
Fortinet FortiClient
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?


















