Try our new research platform with insights from 80,000+ expert users
reviewer1822314 - PeerSpot reviewer
Head of Infrastructure and Networks at a insurance company with 51-200 employees
User
Top 10
Excellent vulnerability scanning, rating, and remediation
Pros and Cons
  • "Resource overheads have been reduced and we are overall more secure as a business."
  • "There are a number of features behind paywalls which can be frustrating when you are already paying a premium."

What is our primary use case?

Check Point Harmony Endpoint Detection and Response is a very useful tool in combating vulnerabilities and threat actors. We have rolled it out across the business to all systems in our estate. 

It is very easy to perform vulnerability scans, view present vulnerabilities, and understand the ratings applied by the software. This allows us to focus on which areas are most at risk across the company. 

It was easy to install the agents to our physical and cloud devices and enabled targeted response to zero days.

How has it helped my organization?

As an IT infrastructure and security team we are now able to prioritize and target specific, higher-risk vulnerabilities, making our environment more secure. 

The ratings allow us to get a feel for the urgency of a vulnerability and apply it to our use case. We are also able to mitigate lower-priority vulnerabilities with suggested fixes and can add exemptions for false positives or acceptable risks. 

We are able to report current cyber security posture to the board and we are able to assign remediation tasks to team members. 

Resource overheads have been reduced and we are overall more secure as a business.  

What is most valuable?

We have found the combination of vulnerability scanning, rating, and remediation most valuable in the platform and the feature is vital to our everyday security hardening. 

We can effectively target vulnerabilities with suggested fixes and automate patches where relevant. 

There is a constant flow of newly added features and improved functionality is regularly made available by the Check Point team. 

Customer communication around zero days and other emerging threats is a great addition to the service.  

What needs improvement?

There are a number of features behind paywalls which can be frustrating when you are already paying a premium. 

The support is limited at times and can be quite slow, you are often directed to articles in the support center to read solutions for yourself. As a result, a lot of time has been spent reading Check Point articles on the online platform to increase knowledge around the product and further cyber security awareness in the team. It would be good to have a more direct route to remote support and demonstration.  

Buyer's Guide
Check Point Harmony Endpoint
August 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.

For how long have I used the solution?

We have been using Check Point Harmony Endpoint for around one year within our company. 

What do I think about the stability of the solution?

We have had very few, if any, stability issues with the solution.

Which solution did I use previously and why did I switch?

We previously used Rapid7. It was costly and had limited agent scanning timescales.

How was the initial setup?

The setup is nice and straightforward with a lot of hand-holding from the team.

What's my experience with pricing, setup cost, and licensing?


What other advice do I have?

We would try to add exceptions for false positives or mitigate threats earlier to clean up the experience.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edson  Duarte - PeerSpot reviewer
Information Technology at Banco Nacional de Investimento S.A.
Real User
Top 10
Effective endpoint protection and includes both antivirus and firewall features
Pros and Cons
  • "The initial setup is very easy."
  • "I'm not very happy with the support, even in terms of the website. They don't offer much."

What is our primary use case?

Our primary use case is to protect endpoints.

What is most valuable?

The most valuable is encryption. 

What needs improvement?

We have some issues with encryption. The main issue is the red screen of death. Basically, it happened in previous versions of Check Point with encryption. When you install updates, not a specific update, but some Windows updates, the computer gets stuck. And it doesn't start. We were able to contact Check Point, and as a solution, they always say to use the latest version, but we are not happy with that solution. For us, it's not like a solution. 

Mostly, we work with the latest version. But that doesn't guarantee reliability.

It has another issue that we have at Check Point. Check Point has an antivirus with a Sandbox function. When you try to download some files, the sandbox gets confused with the sandblast. And sometimes you have to wait. 

So, there is room for improvement in terms of updates and with Sandbox and Sandblast. 

Another area of improvement is support. We faced some issues because of the language barrier. 

In future releases, I would like to see a nice feature in terms of encryption. When you want to decrypt a drive, it should be a little bit more user-friendly.

For how long have I used the solution?

I have been using this solution for three years. 

What do I think about the stability of the solution?

There is room for improvement in stability. The solution could be more stable. 

What do I think about the scalability of the solution?

It is a scalable solution. We have around 150 end users using this solution in our organization. 

How are customer service and support?

The customer service and support are really good. For basic support, it's good. But when you want expert support, it's not that good.

For basic support, you can talk to a person and understand the basics. I don't know if it's a language or a barrier issue or not. For example, you have an issue with your computer. When you call a call center, the first thing they would say is, "Turn it off and turn it on," or something like that. So, in that sense, they don't have problems. But when you want a more expert solution, like, "I'm having a problem with this specific update, and this happens. So, this sandbox issue, and this happens." They don't put you right away in contact with the experts. You have to insist a lot; at least, that was my experience.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have worked with WatchGuard Gateway AntiVirus. 

How was the initial setup?

The initial setup is very easy. It was very quick; it took around five minutes. 

What about the implementation team?

We deployed the solution ourselves. It is on the cloud, but the installations are made on-premises.

What's my experience with pricing, setup cost, and licensing?

The solution was a little bit expensive at the beginning, but that's not Check Point's fault. It's an issue with the taxes. When you buy a product, they have a lot of taxes. So, it becomes expensive. But they actually made very good pricing. WatchGuard also gives good prices.

We have a yearly base license. The support is included in the license costs. 

What other advice do I have?

First of all, be aware of the issues like the technical support. The solution is good. The product is good, but I'm not very happy with the support, even in terms of the website. They don't offer much.

Overall, I would rate the solution an eight out of ten. It is not a ten because of the support. But if it weren't for that, it's a very, very good solution.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
August 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
Anuj V - PeerSpot reviewer
Manager-BIU at Bajaj Markets
User
Compatible, cost-effective, and highly customizable
Pros and Cons
  • "Check Point Antivirus is a cost-effective security solution for businesses and that's why its acceptability by various other fields and organizations is humongous."
  • "Check Point services and antivirus solutions can improve their customer offerings by offering various discounts in their subscription model and they can also reconsider their pricing model as well."

What is our primary use case?

Check Point Antivirus is a one-stop solution for businesses and professionals. It is one of the most advanced security solution software which helps businesses to secure their IT system and the installed software and hardware through antivirus protection riches one of the best and most affordable in the current item market. 

It is one of the most stable software which is globally acceptable and has numerous capabilities and multifarious features and parameters which help businesses to secure their system inside out. 

This antivirus is easily deployed and is integrated into any kind of system within a very short span of time. This antivirus software is quite compatible with various dashboards and other electronic platforms and goes well in securing the installed system in the best possible manner.

How has it helped my organization?

Check Point Antivirus has improved the security experience of our ecosystem. Due to this software, now of our workforce is more confident and carefree about any kind of threat entry into the IT system. 

This antivirus software has amazing capabilities to fight any kind of malware and ransomware in the IT system. 

This antivirus software has numerous features which result in wider acceptability and huge capabilities in diffusing threat attempts and hacking attempts.

Check Point Antivirus is a quite stable software in the market right now as this is one of the most mature and highly customizable security solutions for businesses. 

We have been widely impressed by these amazing security features and notifications which help us to have better security compliance in place and also to have up to 100% security protection from any kind of threats and endpoints.

What is most valuable?

Check Point Antivirus has numerous features which are quite remarkable and have a greater impact on improving the performance of the business some of the features are.

Check Point Antivirus software is highly customizable in nature due to which its acceptability by the majority of the organizations like small medium and large enterprises is huge.

Check Point Antivirus is a cost-effective security solution for businesses and that's why its acceptability by various other fields and organizations is humongous.

Check Point Antivirus has a large number of good peer feedback in the public domain due to which the confidence and trust and transparency are high for this partner.

The software is quite compatible and extremely stable in any kind of IT environment.

This software is easy to integrate and deploy in any IT environment.

We are very much impressed by the business team and the tech team at Check Point who are day and night giving their best and proving their excellence in coming up with extremely viable and innovative security solutions for us.

What needs improvement?

There is a huge scope for improvement for any good product in the market.

Check Point services and antivirus solutions can improve their customer offerings by offering various discounts in their subscription model and they can also reconsider their pricing model as well. If certain cost reductions can happen and can take place, then it is going to be ultimately very good for medium enterprises like us.

Also, we are requesting the customer service and the business team of Check Point to have more and more features and improved packages to increase the customer experience.

We would be grateful to the entire Check Point team if we could get some discounts and also some extended trial periods. 

For how long have I used the solution?

I've used the solution for over two years.

What do I think about the stability of the solution?

The solution has high stability.

What do I think about the scalability of the solution?

The solution has good scalability.

How are customer service and support?

Technical support has been great so far.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a lot of other security solutions earlier. Some of them were Trend Micros Security and McAfee as well as other enterprise security solutions from Splunk.

We realized that these solutions are not very suitable for us as we need dynamic security services since our product is highly customizable and these security solutions are not fitting into the mainstream business. Due to this, we switched ourselves to Check Point and to date, we have had an exceptional experience with this partner as they are quite customizable in nature.

How was the initial setup?

The initial setup is easy and straightforward.

What about the implementation team?

We implemented the solution through a vendor.

What was our ROI?

The ROI is great.

What's my experience with pricing, setup cost, and licensing?

The solution is easy with streamlined costing. Licensing is easy and renewal is seamless.

Which other solutions did I evaluate?

Yes we evaluated a lot of options before switching to Check Point, including:

  • McAfee 
  • Splunk 
  • Kaspersky
  • Trend Micro 

What other advice do I have?

This is good to go security software for any kind of business today.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Shyam Lal Navatiya - PeerSpot reviewer
Senior Consultant at EY India
User
Cost-effective with real-time and proactive detection
Pros and Cons
  • "It has zero-day attack protection."
  • "While features are really good and promising to use and implement, a certain level of improvement is required in terms of software deployment across different business environments."

What is our primary use case?

Check Point Antivirus is the best antivirus tool in the market currently. 

The malware and ransomware catchment rate of the software is just exceptional and worth recognizing and recommending to peers. We have been using the tool for quite some time now and must say that it's quite reliable and highly dependable. It ensures no malware or virus should make any kind of entry into the system and enables a virus-proof environment all over.

The performance efficiency is great and reduced expenses have literally attracted a lot of small and marginal organizations to adopt this software in the first place.

How has it helped my organization?

Check Point Antivirus has significantly improved the outcome and performance output of my organization. It is extremely usable across different business environments and quite compatible with all kinds of portals and dashboards. 

It is highly flexible and easy to integrate, with no lags or slip-ups at all. Now, all our verticals are sharing details and working across any kind of unprotected network environment without any tension. We have 100% all-around protection, which is covered by Check Point Antivirus. We'd highly recommend it to all. 

What is most valuable?

The solution offers a high malware catchment rate and increased speed, and the performance outcome efficiency is commendable.

It is a highly cost-effective antivirus software in the market compared to its competitors in the market.

The stability of the software is great and highly compatible as well.

Real-time and proactive detection of any malware or ransomware in the system means issues can be removed ASAP.

It has zero-day attack protection.

The product offers complete protection of the system from hijackers, and no phishing activity is allowed under any circumstance. It is high-grade protection with strict system security.

What needs improvement?

While features are really good and promising to use and implement, a certain level of improvement is required in terms of software deployment across different business environments. It is highly advisable to create multiple child logins to operate the running of the software across multiple interfaces in one go without any trouble. Also, it is advised to incorporate the features like round-the-clock, 24/7/365 scanning of the system in the background without disturbing the routine front-end work. This ensures no lapses or threat entry into the system at all.

For how long have I used the solution?

I've used the solution for over a year now.

What do I think about the stability of the solution?

The product is quite stable.

What do I think about the scalability of the solution?

The solution is highly scalable.

How are customer service and support?

Technical support has been great so far.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution. We started with a trial version of Check Point. 

How was the initial setup?

The initial setup is straightforward and easy.

What about the implementation team?

We implemented the solution through the vendor team.

What was our ROI?

The ROI has been good.

What's my experience with pricing, setup cost, and licensing?

The setup is easy and uncomplicated and the annual renewal is quite a smooth process. It's amazingly easy to deploy. Licensing is done in one click without any hassle at all. It was an amazing experience.

Which other solutions did I evaluate?

We looked into Trend Micro, Wipro, etc.

What other advice do I have?

I'd advise others to try the solution today and improve the security system of your organization.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Raj Kumar07 - PeerSpot reviewer
Senior Manager at Agriculture Skill Council of India (ASCI)
User
Top 20
Good advanced intelligence and threat prevention with a quick response time
Pros and Cons
  • "It is one of the fastest malware prevention software with advanced upgrades to have 360-degree threat detection and system remediation."
  • "They can improve the customization features to the greatest extent possible and also help bring automation into system security in the most unified manner possible."

What is our primary use case?

Check Point Antivirus is the best-in-class security solution for all kinds of enterprises and IT servers and clouds. 

It helps in generating active threat detection intelligence responses to the system to stop the entry of virus attacks and also prevent the systems and servers from any potential harm. 

It is one of the most advanced security software that helps in threat detection and its easy remediation. 

It proactively stops threats and provides immediate security cover to existing infrastructure to avoid any great harm to the system and server.

How has it helped my organization?

Check Point Antivirus helped us to gain extra momentum on the security front, where every security access is now carefully monitored and checked. There is no security breach in our systems. The advanced threat detection intelligence is easy to operate, and even a person from a non-tech background can also go ahead with working with Check Point Antivirus and ensure that the system is secure from all rounds and corners.

The Antivirus can fight malware and ransomware attacks proactively and provides detailed reports through a dashboard and inbuilt reporting and monitoring system, which helps monitor the regular upgrades and progress of working.

What is most valuable?

The advanced intelligence is embedded in the software for ransomware and threat attack detection on systems and servers.

Its prevention of threat attacks and managing of the system security is in a unified manner with complete control covered by the authorization team without any security breach.

It is one of the fastest malware prevention software with advanced upgrades to have 360-degree threat detection and system remediation.

The quickest response time and quick turnaround time help curb the attack in the best possible manner without much harm to the system and servers.

What needs improvement?

They can improve the customization features to the greatest extent possible and also help bring automation into system security in the most unified manner possible. 

It is still one of the most remarkable systems securing software with amazing positive rates of detecting and catching malware attacks and also preventing system and data breaches. 

All the detection of threat attacks is done in real-time with round-the-clock security features like signature-based threat detection, rootkit threat detection, and many more. Users and the tech team love them.

For how long have I used the solution?

I've used the solution for over three months.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

This is a highly scalable solution.

How are customer service and support?

Technical support has been helpful and supportive.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a Trend-branded security solution earlier, and due to a smaller response from the business team, we decided to switch and change the vendor.

How was the initial setup?

The setup is streamlined and easy.

What about the implementation team?

We used a vendor team to assist with the initial setup. 

What was our ROI?

The ROI is good compared to other security software options.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus brings trust, scalability, and advanced security solution features. It is easy to integrate and use across different business environments. The cost is significantly low presently, and utilities are wonderful and worth trying. The licensing and renewal process is also smooth and not complex at all. 

Which other solutions did I evaluate?

We looked into McAfee, Avast, Norton, and Bitdefender as well. 

What other advice do I have?

Try the solution and experience the best features on your own.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

IBM
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Works at CSIT
User
Enhances our organization's cybersecurity posture with its comprehensive set of features
Pros and Cons
  • "The Management interface of the product is relatively user-friendly and easy to navigate."

    What is our primary use case?

    Our primary use case is to enhance the organization's security posture against attacks like phishing, and malware especially zero-day threats, with low false positives. The product must be able to integrate with the existing infrastructure with relative ease. 

    We need detailed reporting and forensics analysis tools for incident response, and the management console must be user-friendly.

    We need to improve operational efficiencies in managing endpoints and thousands of users, given the increasing number of remote workforce. There should be minimal impact on endpoints.

    How has it helped my organization?

    The management interface of the product is relatively user-friendly and easy to navigate.

    The product manages to block most zero-day attacks and unknown threats in real-time, thus reducing the manual overhead by being the first layer of protection against unknown attacks, easing the workload on the monitoring team, and enabling the team to focus on other tasks simultaneously.

    Overall, the product enhances our organization's cybersecurity posture with its comprehensive set of features, supported by a leaner monitoring team.

    What is most valuable?

    The product is quite easy to configure and can be deployed in under half an hour.

    It has a centralised management console, single panel to triage, escalate, mitigate and respond.

    The agent is lightweight on the endpoints and operates seamlessly in the background with minimal impact on the performance of the endpoints.

    It has features like firewalling, removable device control, VPN, app control, DLP, file sandboxing, ransomware protection. which can be turned on or off per endpoint, groups, employees.

    What needs improvement?

    It should reduce CPU and memory usage. Its technical support could be more timely though it is still acceptable.

    It is painful to get deep informational logs to be exported to a SIEM as Check Point requires a user to use its tooling Horizon.

    At times, it repeatedly scans the same files without any effective results.

    It lacks granular management and configuration.

    Additionally, users may encounter challenges with the product's components not performing as anticipated, necessitating the manual addition of exclusions across various areas.

    For how long have I used the solution?

    We have been using Check Point Harmony Endpoint for less than three months.

    What do I think about the stability of the solution?

    The stability is acceptable.

    What do I think about the scalability of the solution?

    The scalability is okay.

    How are customer service and support?

    The support could be faster.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    The setup could be done in less than 30 minutes.

    What's my experience with pricing, setup cost, and licensing?

    The licensing is pricy, so weigh the pros and cons.

    Which other solutions did I evaluate?

    We looked at CrowdStrike and Palo Alto.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Abdul Modi - PeerSpot reviewer
    Information Technology Security Specialist at Al Muzaini Exchange Co.
    Real User
    Top 20
    Offers in-built EDR capabilities to provide better visibility of threats
    Pros and Cons
    • "Compared to its competitors, Check Point Harmony Endpoint has advantages in areas like EDR and behavioral detection."
    • "The response from the tool's support team, which starts with L1, is something my company doesn't find helpful, especially when compared to the other solutions that we use."

    What is our primary use case?

    I use the solution in my company, and it is usually deployed on all our endpoint solutions, which include workstations and servers.

    What is most valuable?

    I think the overall product is good. There is an in-built EDR in the tool, which is good because it gives users visibility into the threats coming into the environment.

    What needs improvement?

    The support from the vendor itself is the tool's weakness because we don't get good support from the vendor. The response from the tool's support team, which starts with L1, is something my company doesn't find helpful, especially when compared to the other solutions that we use. The support is one of the major issues with Check Point Harmony Endpoint.

    Apart from the support area, everything else is good in the tool.

    The tool's performance sometimes slows down the system, and I think the module itself is very heavy on the endpoints, making it an area that can be improved. In our company, we have seen Trend Micro and other solutions that have very light agents, so they do not affect the performance of the endpoints.

    For how long have I used the solution?

    I have been using Check Point Harmony Endpoint for three years. I use a standard version.

    What do I think about the stability of the solution?

    Stability-wise, I rate the solution a seven or eight out of ten.

    What do I think about the scalability of the solution?

    The tool's scalability is good. Scalability-wise, I rate the solution a seven to eight out of ten.

    My company has around 800 licenses for the product, and I think we have a couple of administrators who are or are less good and capable of managing the solution.

    My company does not plan to increase the use of the solution in the future because we have reached its maximum capacity. Even if we try to increase the capacity of the product in our company, then I don't believe that it would go beyond five to ten percent.

    How are customer service and support?

    I rate the technical support not more than four or five out of ten.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I have worked with Symantec, Trend Micro, and Sophos.

    What was our ROI?

    My company has reached a point where it has experienced a return on investment from the use of the product.

    What's my experience with pricing, setup cost, and licensing?

    The product is averagely priced. The product price is neither very high nor too low. The tool is not really expensive.

    Which other solutions did I evaluate?

    Compared to its competitors, Check Point Harmony Endpoint has advantages in areas like EDR and behavioral detection. Lately, all the solutions have improved. I think that now there are a number of solutions that come with SIEM capabilities, while in the past, around three years ago, Check Point was leading in the aforementioned area. More or less, all the products that can be compared with each other are the same if I consider the peer-to-peer node part.

    What other advice do I have?

    Two or three years ago, I would have recommended the product to others, but nowadays, there are other solutions with good capabilities that are better than Check Point. I wouldn't recommend the tool to anyone now because I have seen much better solutions lately, and the market is also changing and becoming very dynamic.

    Check Point Harmony Endpoint should learn from its competitors how to improve its agent capabilities and have a lightweight agent to provide good support. Also, some real-time detection and behavioral security checks are still missing and need to be improved.

    I rate the overall tool an eight out of ten.

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    JemAhmed - PeerSpot reviewer
    Technical Integration Engineer at Intelligent Systems (Bulgaria)
    Real User
    Top 5
    Comprehensive and reliable endpoint security with advanced threat prevention capabilities and excellent technical support
    Pros and Cons
    • "The standout features are primarily EDR and MDR."
    • "Improvements are required in two key areas: notifications and setup simplification."

    What is our primary use case?

    We primarily use it to provide security solutions for small to medium-sized companies with ten to fifty employees.

    What is most valuable?

    The standout features are primarily EDR and MDR. These functionalities are crucial because they specifically target the most common attack vectors, such as email phishing and downloading unknown software. EDR provides a solution for monitoring and responding to these threats effectively. Additionally, MDR ensures round-the-clock monitoring by skilled personnel from Check Point's team. They promptly alert us to any significant events, allowing us to take necessary actions swiftly.

    What needs improvement?

    Improvements are required in two key areas: notifications and setup simplification. Notification integration primarily relies on software, which is not commonly used by most small companies. Additionally, the setup process within the dashboard is overly complex, with numerous checkboxes and options that necessitate at least a week of training to comprehend fully. Simplifying this process through a wizard or a more intuitive interface would greatly benefit smaller companies.

    For how long have I used the solution?

    I have been working with it for several months.

    What do I think about the stability of the solution?

    It provides outstanding reliability. I would rate it ten out of ten.

    What do I think about the scalability of the solution?

    Scalability is a challenge due to the need for different appliances to accommodate varying user counts and traffic levels. When businesses experience growth or sudden increases in users, acquiring and deploying new appliance packages can be cumbersome. Availability of stock and deployment timelines vary, sometimes resulting in delays of days or even weeks to implement new hardware appliances. I would rate it six out of ten. We serve approximately five or six customers, with the largest having around fifty endpoints, which is considered small to medium-sized in scale.

    How are customer service and support?

    The technical support provided is excellent, earning a rating of ten out of ten.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The initial setup was complex, with a rating of three out of ten in terms of difficulty. Implementing the entire solution, covering everything from networking to setting up Office 365, proved to be intricate and challenging.

    What about the implementation team?

    The deployment time varies depending on the complexity of the case. For simple installations, we estimate approximately one week for completion. However, for more intricate setups involving thorough configuration and fine-tuning, the timeframe extends to three to four weeks. Our deployment process begins with in-depth analysis and discussions with the customer to understand their specific needs and infrastructure, including any special features they utilize, such as on-premise email with Exchange. We initially deploy a standard version with a standardized setup, followed by a review period to assess its effectiveness. Subsequently, we fine-tune the configuration based on feedback and requirements, which typically takes about a week. Finally, we roll out the refined setup to endpoints, servers, and other relevant components.

    What's my experience with pricing, setup cost, and licensing?

    In comparison to other software solutions available on the market, it comes at a higher price point. However, the price is justified considering the robust features it offers. I would rate it nine out of ten. They provide fixed packages based on the number of users.

    What other advice do I have?

    Overall, I would rate it eight out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
    Updated: August 2025
    Buyer's Guide
    Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.