Try our new research platform with insights from 80,000+ expert users
Raj Kumar07 - PeerSpot reviewer
Senior Manager at Agriculture Skill Council of India (ASCI)
User
Top 20
Good advanced intelligence and threat prevention with a quick response time
Pros and Cons
  • "It is one of the fastest malware prevention software with advanced upgrades to have 360-degree threat detection and system remediation."
  • "They can improve the customization features to the greatest extent possible and also help bring automation into system security in the most unified manner possible."

What is our primary use case?

Check Point Antivirus is the best-in-class security solution for all kinds of enterprises and IT servers and clouds. 

It helps in generating active threat detection intelligence responses to the system to stop the entry of virus attacks and also prevent the systems and servers from any potential harm. 

It is one of the most advanced security software that helps in threat detection and its easy remediation. 

It proactively stops threats and provides immediate security cover to existing infrastructure to avoid any great harm to the system and server.

How has it helped my organization?

Check Point Antivirus helped us to gain extra momentum on the security front, where every security access is now carefully monitored and checked. There is no security breach in our systems. The advanced threat detection intelligence is easy to operate, and even a person from a non-tech background can also go ahead with working with Check Point Antivirus and ensure that the system is secure from all rounds and corners.

The Antivirus can fight malware and ransomware attacks proactively and provides detailed reports through a dashboard and inbuilt reporting and monitoring system, which helps monitor the regular upgrades and progress of working.

What is most valuable?

The advanced intelligence is embedded in the software for ransomware and threat attack detection on systems and servers.

Its prevention of threat attacks and managing of the system security is in a unified manner with complete control covered by the authorization team without any security breach.

It is one of the fastest malware prevention software with advanced upgrades to have 360-degree threat detection and system remediation.

The quickest response time and quick turnaround time help curb the attack in the best possible manner without much harm to the system and servers.

What needs improvement?

They can improve the customization features to the greatest extent possible and also help bring automation into system security in the most unified manner possible. 

It is still one of the most remarkable systems securing software with amazing positive rates of detecting and catching malware attacks and also preventing system and data breaches. 

All the detection of threat attacks is done in real-time with round-the-clock security features like signature-based threat detection, rootkit threat detection, and many more. Users and the tech team love them.

Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for over three months.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

This is a highly scalable solution.

How are customer service and support?

Technical support has been helpful and supportive.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a Trend-branded security solution earlier, and due to a smaller response from the business team, we decided to switch and change the vendor.

How was the initial setup?

The setup is streamlined and easy.

What about the implementation team?

We used a vendor team to assist with the initial setup. 

What was our ROI?

The ROI is good compared to other security software options.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus brings trust, scalability, and advanced security solution features. It is easy to integrate and use across different business environments. The cost is significantly low presently, and utilities are wonderful and worth trying. The licensing and renewal process is also smooth and not complex at all. 

Which other solutions did I evaluate?

We looked into McAfee, Avast, Norton, and Bitdefender as well. 

What other advice do I have?

Try the solution and experience the best features on your own.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

IBM
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Abnet Tsegaye Belay - PeerSpot reviewer
Cybersecurity Engineer at a tech services company with 11-50 employees
Real User
Top 5Leaderboard
Deployment shows significant improvement in security posture with manageable learning curve
Pros and Cons
  • "Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks."
  • "Check Point Harmony Endpoint poses a steep learning curve and has high resource consumption, requiring high-performance PCs on our endpoint site."

What is our primary use case?

We are using Check Point Harmony Endpoint as an all-in-one solution. The agent acts for both ADR and XDR, allowing it to be installed on personal computers or desktops. This helps protect our company's data and network assets from being attacked by threats or ransomware.

How has it helped my organization?

After deploying Check Point Harmony Endpoint, there has been a significant change in our company's security posture. Check Point Harmony Endpoint has shielded us from potential threats, especially ransomware.

What is most valuable?

One of the best features of Check Point Harmony Endpoint is the portal, along with real-time threat detection and existing threat management. 

Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyberattacks. This has given us added security and peace of mind as we feel protected against ransomware threats.

Harmony can detect and display threats. It helps prevent us from clicking on threats. Any cyber attackers that attack our hosts won't get any vulnerable information. It's shielding us from ransomware. 

What needs improvement?

Check Point Harmony Endpoint poses a steep learning curve and has high resource consumption, requiring high-performance PCs on our endpoint site.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for almost eight months.

Which solution did I use previously and why did I switch?

We did not use another solution before Check Point Harmony Endpoint. Check Point Harmony Endpoint is our first time trying an endpoint solution.

How was the initial setup?

At first, I found the initial setup challenging; however, after about a week, it became straightforward. It was the first time I deployed an endpoint solution, and over time, the setup process became easy and manageable.

The deployment process was smooth, even though there was a learning curve initially. It became manageable over time. It's easy to deploy on-premises and on the cloud. We're just using the cloud. 

The configuration process gets easier over time. The first time you configure it, it's hard. 

What was our ROI?

The licensing process for Check Point Harmony Endpoint is very easy.

What's my experience with pricing, setup cost, and licensing?

We purchased Check Point directly from Check Point. We are partners. We didn't purchase it from the AWS marketplace. 

What other advice do I have?

I would rate the overall solution a five out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Works at CSIT
User
Enhances our organization's cybersecurity posture with its comprehensive set of features
Pros and Cons
  • "The Management interface of the product is relatively user-friendly and easy to navigate."

    What is our primary use case?

    Our primary use case is to enhance the organization's security posture against attacks like phishing, and malware especially zero-day threats, with low false positives. The product must be able to integrate with the existing infrastructure with relative ease. 

    We need detailed reporting and forensics analysis tools for incident response, and the management console must be user-friendly.

    We need to improve operational efficiencies in managing endpoints and thousands of users, given the increasing number of remote workforce. There should be minimal impact on endpoints.

    How has it helped my organization?

    The management interface of the product is relatively user-friendly and easy to navigate.

    The product manages to block most zero-day attacks and unknown threats in real-time, thus reducing the manual overhead by being the first layer of protection against unknown attacks, easing the workload on the monitoring team, and enabling the team to focus on other tasks simultaneously.

    Overall, the product enhances our organization's cybersecurity posture with its comprehensive set of features, supported by a leaner monitoring team.

    What is most valuable?

    The product is quite easy to configure and can be deployed in under half an hour.

    It has a centralised management console, single panel to triage, escalate, mitigate and respond.

    The agent is lightweight on the endpoints and operates seamlessly in the background with minimal impact on the performance of the endpoints.

    It has features like firewalling, removable device control, VPN, app control, DLP, file sandboxing, ransomware protection. which can be turned on or off per endpoint, groups, employees.

    What needs improvement?

    It should reduce CPU and memory usage. Its technical support could be more timely though it is still acceptable.

    It is painful to get deep informational logs to be exported to a SIEM as Check Point requires a user to use its tooling Horizon.

    At times, it repeatedly scans the same files without any effective results.

    It lacks granular management and configuration.

    Additionally, users may encounter challenges with the product's components not performing as anticipated, necessitating the manual addition of exclusions across various areas.

    For how long have I used the solution?

    We have been using Check Point Harmony Endpoint for less than three months.

    What do I think about the stability of the solution?

    The stability is acceptable.

    What do I think about the scalability of the solution?

    The scalability is okay.

    How are customer service and support?

    The support could be faster.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    The setup could be done in less than 30 minutes.

    What's my experience with pricing, setup cost, and licensing?

    The licensing is pricy, so weigh the pros and cons.

    Which other solutions did I evaluate?

    We looked at CrowdStrike and Palo Alto.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Abdul Modi - PeerSpot reviewer
    Information Technology Security Specialist at Al Muzaini Exchange Co.
    Real User
    Top 20
    Offers in-built EDR capabilities to provide better visibility of threats
    Pros and Cons
    • "Compared to its competitors, Check Point Harmony Endpoint has advantages in areas like EDR and behavioral detection."
    • "The response from the tool's support team, which starts with L1, is something my company doesn't find helpful, especially when compared to the other solutions that we use."

    What is our primary use case?

    I use the solution in my company, and it is usually deployed on all our endpoint solutions, which include workstations and servers.

    What is most valuable?

    I think the overall product is good. There is an in-built EDR in the tool, which is good because it gives users visibility into the threats coming into the environment.

    What needs improvement?

    The support from the vendor itself is the tool's weakness because we don't get good support from the vendor. The response from the tool's support team, which starts with L1, is something my company doesn't find helpful, especially when compared to the other solutions that we use. The support is one of the major issues with Check Point Harmony Endpoint.

    Apart from the support area, everything else is good in the tool.

    The tool's performance sometimes slows down the system, and I think the module itself is very heavy on the endpoints, making it an area that can be improved. In our company, we have seen Trend Micro and other solutions that have very light agents, so they do not affect the performance of the endpoints.

    For how long have I used the solution?

    I have been using Check Point Harmony Endpoint for three years. I use a standard version.

    What do I think about the stability of the solution?

    Stability-wise, I rate the solution a seven or eight out of ten.

    What do I think about the scalability of the solution?

    The tool's scalability is good. Scalability-wise, I rate the solution a seven to eight out of ten.

    My company has around 800 licenses for the product, and I think we have a couple of administrators who are or are less good and capable of managing the solution.

    My company does not plan to increase the use of the solution in the future because we have reached its maximum capacity. Even if we try to increase the capacity of the product in our company, then I don't believe that it would go beyond five to ten percent.

    How are customer service and support?

    I rate the technical support not more than four or five out of ten.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I have worked with Symantec, Trend Micro, and Sophos.

    What was our ROI?

    My company has reached a point where it has experienced a return on investment from the use of the product.

    What's my experience with pricing, setup cost, and licensing?

    The product is averagely priced. The product price is neither very high nor too low. The tool is not really expensive.

    Which other solutions did I evaluate?

    Compared to its competitors, Check Point Harmony Endpoint has advantages in areas like EDR and behavioral detection. Lately, all the solutions have improved. I think that now there are a number of solutions that come with SIEM capabilities, while in the past, around three years ago, Check Point was leading in the aforementioned area. More or less, all the products that can be compared with each other are the same if I consider the peer-to-peer node part.

    What other advice do I have?

    Two or three years ago, I would have recommended the product to others, but nowadays, there are other solutions with good capabilities that are better than Check Point. I wouldn't recommend the tool to anyone now because I have seen much better solutions lately, and the market is also changing and becoming very dynamic.

    Check Point Harmony Endpoint should learn from its competitors how to improve its agent capabilities and have a lightweight agent to provide good support. Also, some real-time detection and behavioral security checks are still missing and need to be improved.

    I rate the overall tool an eight out of ten.

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    JemAhmed - PeerSpot reviewer
    Technical Integration Engineer at Intelligent Systems (Bulgaria)
    Real User
    Top 5
    Comprehensive and reliable endpoint security with advanced threat prevention capabilities and excellent technical support
    Pros and Cons
    • "The standout features are primarily EDR and MDR."
    • "Improvements are required in two key areas: notifications and setup simplification."

    What is our primary use case?

    We primarily use it to provide security solutions for small to medium-sized companies with ten to fifty employees.

    What is most valuable?

    The standout features are primarily EDR and MDR. These functionalities are crucial because they specifically target the most common attack vectors, such as email phishing and downloading unknown software. EDR provides a solution for monitoring and responding to these threats effectively. Additionally, MDR ensures round-the-clock monitoring by skilled personnel from Check Point's team. They promptly alert us to any significant events, allowing us to take necessary actions swiftly.

    What needs improvement?

    Improvements are required in two key areas: notifications and setup simplification. Notification integration primarily relies on software, which is not commonly used by most small companies. Additionally, the setup process within the dashboard is overly complex, with numerous checkboxes and options that necessitate at least a week of training to comprehend fully. Simplifying this process through a wizard or a more intuitive interface would greatly benefit smaller companies.

    For how long have I used the solution?

    I have been working with it for several months.

    What do I think about the stability of the solution?

    It provides outstanding reliability. I would rate it ten out of ten.

    What do I think about the scalability of the solution?

    Scalability is a challenge due to the need for different appliances to accommodate varying user counts and traffic levels. When businesses experience growth or sudden increases in users, acquiring and deploying new appliance packages can be cumbersome. Availability of stock and deployment timelines vary, sometimes resulting in delays of days or even weeks to implement new hardware appliances. I would rate it six out of ten. We serve approximately five or six customers, with the largest having around fifty endpoints, which is considered small to medium-sized in scale.

    How are customer service and support?

    The technical support provided is excellent, earning a rating of ten out of ten.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The initial setup was complex, with a rating of three out of ten in terms of difficulty. Implementing the entire solution, covering everything from networking to setting up Office 365, proved to be intricate and challenging.

    What about the implementation team?

    The deployment time varies depending on the complexity of the case. For simple installations, we estimate approximately one week for completion. However, for more intricate setups involving thorough configuration and fine-tuning, the timeframe extends to three to four weeks. Our deployment process begins with in-depth analysis and discussions with the customer to understand their specific needs and infrastructure, including any special features they utilize, such as on-premise email with Exchange. We initially deploy a standard version with a standardized setup, followed by a review period to assess its effectiveness. Subsequently, we fine-tune the configuration based on feedback and requirements, which typically takes about a week. Finally, we roll out the refined setup to endpoints, servers, and other relevant components.

    What's my experience with pricing, setup cost, and licensing?

    In comparison to other software solutions available on the market, it comes at a higher price point. However, the price is justified considering the robust features it offers. I would rate it nine out of ten. They provide fixed packages based on the number of users.

    What other advice do I have?

    Overall, I would rate it eight out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
    PeerSpot user
    Ishant Gupta - PeerSpot reviewer
    Trainee - cybersecurity engineer at Integrated Tech9labs Pvt. Ltd.
    User
    Top 20
    Good threat detection with real-time scanning and automatic updates
    Pros and Cons
    • "It has significantly bolstered our overall cybersecurity posture."
    • "One aspect that could see enhancement is the user interface."

    What is our primary use case?

    In our corporate environment, the primary use case for Check Point Antivirus is to provide robust endpoint antivirus protection. 

    Our organization operates within a complex digital ecosystem, and ensuring the security of our network and devices is of utmost importance. 

    Check Point Antivirus serves as the frontline defense, guarding against a myriad of cyber threats that could compromise our sensitive data and operations. 

    Our organization operates in a dynamic and interconnected digital landscape, and ensuring the security of our network and devices is paramount

    How has it helped my organization?

    Check Point has brought about tangible improvements within our organization. It has significantly bolstered our overall cybersecurity posture. 

    We've witnessed a noticeable enhancement in our ability to detect and respond to threats promptly. 

    This solution has reduced risks and vulnerabilities, contributing to a more secure and reliable digital environment for our company. 

    However, it's worth noting that no antivirus solution is foolproof, and the effectiveness of our security measures also relies on user awareness and best practices.

    What is most valuable?

    Among the features offered by Check Point Antivirus, the real-time scanning and automatic updates stand out as the most valuable. Real-time scanning ensures that threats are detected as soon as they appear, minimizing the potential damage they can cause. Automatic updates, on the other hand, keep our antivirus protection up-to-date with the latest threat intelligence and security patches. These features combine to offer a proactive and effective defense against a constantly evolving threat landscape.

    What needs improvement?

    While we find Check Point Antivirus to be a powerful tool, there are areas where it could be improved. One aspect that could see enhancement is the user interface. A more user-friendly and intuitive interface would make it easier for our security team to navigate and manage the solution efficiently. Additionally, improvements in reporting capabilities would enable us to better analyze security incidents and fine-tune our defenses.

    Looking ahead to the next release of Check Point Antivirus, we hope to see advanced threat analytics as a part of the package. This would enable us to proactively identify emerging threats and vulnerabilities, allowing us to stay one step ahead of potential risks. 

    Furthermore, greater customization options would be valuable, as they would allow us to tailor our security measures to the specific needs of our organization. In an ever-evolving cybersecurity landscape, these features would further empower us to protect our digital assets effectively.

    For how long have I used the solution?

    We have been using this antivirus within our company for six to eight months now.

    What do I think about the stability of the solution?

    It is quite a stable product.

    What do I think about the scalability of the solution?

    It is a scalable product across your enterprise and secures you from threats.

    How are customer service and support?

    Sometimes there is a delay in customer support, however, the issue is resolved at the end.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We've used Sophos previously, however, it made our systems very slow in performance.

    How was the initial setup?

    The initial setup is straightforward.

    What about the implementation team?

    We implemented the solution with an in-house team.

    What's my experience with pricing, setup cost, and licensing?

    There is minimal effort needed for the setup and deployment.

    Which other solutions did I evaluate?

    We also evaluated Trend Micro before choosing Check Point.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Ajenthan Aiyathurai - PeerSpot reviewer
    Manager - IT at NVCL Group
    Real User
    Top 5Leaderboard
    Helps prevent infections and limit the spread of malicious software within the network
    Pros and Cons
      • "The management console could be made more intuitive and user-friendly, with simplified navigation and clearer visualizations of threat data and security statuses. Improve the performance impact on systems, especially for older hardware."

      What is our primary use case?

      As a manufacturing firm, we deal with many vendors and customers via online portals and websites. Our users surf the internet a lot. Check Point Antivirus scans and blocks malware, including viruses, worms, Trojans, spyware, and ransomware. This helps prevent infections and limit the spread of malicious software within the network. It also performs real-time scanning of files and email attachments to detect and block malicious content before it reaches the end user.

      How has it helped my organization?

      Implementing Checkpoint Antivirus has significantly improved our manufacturing company’s security posture and operational efficiency. By providing robust protection against malware and other cyber threats, we have minimized the risk of production downtime caused by cyber-attacks. On the other hand, This comprehensive security solution has not only enhanced our overall cybersecurity but has also instilled greater confidence in our stakeholders, knowing that our manufacturing processes and data are well protected.

      What is most valuable?

      Real-time scanning is a valuable asset for our organization. Real-time scanning and behavioral analysis have ensured that both our proprietary manufacturing processes and sensitive data remain secure, preventing potential breaches that could disrupt operations or lead to intellectual property theft. The centralized management of security policies across all endpoints has streamlined our IT operations, allowing our IT team to efficiently monitor and respond to security incidents from a single dashboard

      What needs improvement?

      The management console could be made more intuitive and user-friendly, with simplified navigation and clearer visualizations of threat data and security statuses. Improve the performance impact on systems, especially for older hardware. 

      Ensuring that real-time scanning does not significantly slow down user machines would enhance overall productivity. Work on reducing the rate of false positives, which can disrupt operations and lead to unnecessary administrative overhead. As an additional feature, Integrate user behavior analytics to detect unusual patterns that could indicate insider threats or compromised accounts.

      For how long have I used the solution?

      I have been using Check Point Antivirus for more than two years. 

      What do I think about the stability of the solution?

      The solution consistently delivers reliable performance with minimal downtime, ensuring continuous protection without disrupting business operations.

      What do I think about the scalability of the solution?

      Check Point Antivirus has strong scalability, making it highly suitable for organizations of various sizes, including large manufacturing companies. Its centralized management console allows administrators to efficiently manage and enforce security policies across numerous endpoints.

      How are customer service and support?

      Customer Service should be improved.

      How would you rate customer service and support?

      Positive

      Which solution did I use previously and why did I switch?

      Previously I was using Avast antivirus. We switched because we had many security issues. It was not meeting our requirements. 

      How was the initial setup?

      The setup is very easy.

      What about the implementation team?

      We implemented it through the vendor. I would rate the experience an eight out of 10

      What was our ROI?

      The comprehensive protection against malware, ransomware, and other cyber threats has drastically reduced the risk of costly production downtimes and data breaches, which in turn has saved the company substantial potential losses.

      What's my experience with pricing, setup cost, and licensing?

      The setup cost is low but licensing is high. It's worth the cost. 

      Which other solutions did I evaluate?

      We also looked at Kaspersky Antivirus.

      What other advice do I have?

      From what we have seen it is a reliable and dependable solution.

      Which deployment model are you using for this solution?

      On-premises

      If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

      Other
      Disclosure: My company does not have a business relationship with this vendor other than being a customer.
      PeerSpot user
      Technical Support at Hitachi Systems, Ltd.
      Real User
      Top 5
      Affordable, secure, and enables easy resetting of passwords with remote support
      Pros and Cons
      • "The remote support is good."
      • "The heartbeat interval must be improved."

      What is our primary use case?

      The solution is used for port protection and media encryption.

      What is most valuable?

      Our customers are satisfied with the Harmony environment. The remote support is good. If the users forget their passwords, the remote support helps them reset the password. It is a good feature. We only need an internet connection for it.

      What needs improvement?

      The heartbeat interval must be improved. Sometimes, when we change the policy in the console, it does not reflect in the endpoint. Sometimes, we find it difficult to change the policy. The tool lags sometimes.

      When we change the user password in the Infinity Portal, the password does not sync on time. There is a one-minute heartbeat interval from the server to the console. We have a graphical UI in threat hunting in which we can see the attacks. If audit logs have a similar graphical UI, it will be easier to analyze the logs.

      For how long have I used the solution?

      I have been using the solution for seven months.

      What do I think about the stability of the solution?

      I rate the tool’s stability an eight out of ten.

      What do I think about the scalability of the solution?

      The scalability and integrity are above average. I rate the scalability an eight or nine out of ten. We have deployed the product for 500 endpoints. We have deployed it on 300 to 400 endpoint machines in other places.

      How are customer service and support?

      Initially, we had some issues installing the agent on the endpoint machines. We didn't know the prerequisites of the endpoint machines. We had blue screen and red screen issues. It was new for us, and we were stuck. The support was very helpful. The team identified the issue and asked us to update Windows. We had to have the recommended version of Windows for deploying the agent. Now, we do not face any issues. If we face any problems, we easily recognize the issue. We are a bit autonomous.

      How would you rate customer service and support?

      Neutral

      How was the initial setup?

      The initial deployment was very challenging because I was new to the product. Later on, I got used to it. It was very easy. I ensured everything was according to the customers’ requirements. It took hardly two weeks to deploy.

      What's my experience with pricing, setup cost, and licensing?

      The pricing is reasonable. It is very good for security. We are focused on security. If the security is strong, we do not mind the price. The customers blindly trust the product.

      Which other solutions did I evaluate?

      Our customers were using Trend Micro.

      What other advice do I have?

      We haven’t deployed the antivirus yet. We’re trying to implement AV on Windows. Currently, AV is deployed on a Linux machine. When I implemented it, I didn't have any idea about the product. I just went through some documents. People who want to use the solution must go through the documents and understand the concepts. Overall, I rate the product a nine out of ten.

      Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
      PeerSpot user
      Buyer's Guide
      Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
      Updated: September 2025
      Buyer's Guide
      Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.