We are using Check Point Harmony Endpoint as an all-in-one solution. The agent acts for both ADR and XDR, allowing it to be installed on personal computers or desktops. This helps protect our company's data and network assets from being attacked by threats or ransomware.
Cyber Security Engineer at a tech services company with 11-50 employees
Deployment shows significant improvement in security posture with manageable learning curve
Pros and Cons
- "Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks."
- "Check Point Harmony Endpoint poses a steep learning curve and has high resource consumption, requiring high-performance PCs on our endpoint site."
What is our primary use case?
How has it helped my organization?
After deploying Check Point Harmony Endpoint, there has been a significant change in our company's security posture. Check Point Harmony Endpoint has shielded us from potential threats, especially ransomware.
What is most valuable?
One of the best features of Check Point Harmony Endpoint is the portal, along with real-time threat detection and existing threat management.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyberattacks. This has given us added security and peace of mind as we feel protected against ransomware threats.
Harmony can detect and display threats. It helps prevent us from clicking on threats. Any cyber attackers that attack our hosts won't get any vulnerable information. It's shielding us from ransomware.
What needs improvement?
Check Point Harmony Endpoint poses a steep learning curve and has high resource consumption, requiring high-performance PCs on our endpoint site.
Buyer's Guide
Check Point Harmony Endpoint
June 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for almost eight months.
Which solution did I use previously and why did I switch?
We did not use another solution before Check Point Harmony Endpoint. Check Point Harmony Endpoint is our first time trying an endpoint solution.
How was the initial setup?
At first, I found the initial setup challenging; however, after about a week, it became straightforward. It was the first time I deployed an endpoint solution, and over time, the setup process became easy and manageable.
The deployment process was smooth, even though there was a learning curve initially. It became manageable over time. It's easy to deploy on-premises and on the cloud. We're just using the cloud.
The configuration process gets easier over time. The first time you configure it, it's hard.
What was our ROI?
The licensing process for Check Point Harmony Endpoint is very easy.
What's my experience with pricing, setup cost, and licensing?
We purchased Check Point directly from Check Point. We are partners. We didn't purchase it from the AWS marketplace.
What other advice do I have?
I would rate the overall solution a five out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 4, 2025
Flag as inappropriate
Manager - IT at NVCL Group
Good monitoring and visibility with compliance capabilities
Pros and Cons
- "It is easy to install from the cloud."
- "Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats."
What is our primary use case?
We use this solution for our desktops, laptops, servers, and selective mobile devices. It offers real-time protection against malware and other malicious threats is superb.
Our previously used antivirus has not been able to identify certain threats. Check Point Harmony did it. That is a key highlight of this product. Check Point Harmony Endpoint includes a firewall component that allows us to enforce network security policies at the endpoint level, including application control, network segmentation, VPN enforcement, etc.
How has it helped my organization?
We can now see the performance of the computers. Previously, we used some other applications where we could see the CPU percentage go increasingly high. Compared to that, this solution is good.
Check Point Harmony Endpoint helps us ensure endpoint compliance with security policies and regulatory requirements by enforcing configuration settings.
Moreover, It provides visibility into endpoint activities and enables security teams to detect, investigate, and respond to security incidents in real-time. So business progress never gets disturbed.
What is most valuable?
It monitors endpoint behavior in real-time to identify and block suspicious activities indicative of malware or malicious behavior. This proactive approach helps us a lot.
It employs sandboxing technology to execute suspicious files in a controlled environment and analyze their behavior. This allows it to identify and block malware that may evade traditional detection methods by remaining dormant or obfuscated.
More importantly, it is easy to install from the cloud.
What needs improvement?
Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats.
Enhancements in compliance management and reporting capabilities could help organizations meet regulatory requirements more effectively and streamline audit processes.
Continuously updating and enriching threat intelligence feeds and research capabilities can improve threat detection and prevention accuracy and effectiveness.
For how long have I used the solution?
I've used the solution for over a year.
What do I think about the stability of the solution?
Check Point is a well established cybersecurity vendor with a long history of developing and maintaining security solutions. Harmony Endpoint benefits from this experience and is built on a solid foundation of technology and best practices. That i believe.
What do I think about the scalability of the solution?
The centralized management console enables efficient management of endpoint security across the entire organization, irrespective of its size. Administrators can easily configure policies, deploy updates, and monitor endpoint activities from a single interface, streamlining management at scale.
How are customer service and support?
Customer service should be improved.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Check Point Harmony has fould a suspicious file that the previous application did not discover (that file was in the system for a period as alogic bomps).
How was the initial setup?
The initial setup was straightforward and easy.
What about the implementation team?
We handled the setup in-house.
What was our ROI?
We've noted ROI in Risk Reduction and have noted:
- Productivity gains
- Compliance cost reduction
- Operational efficiency
- Security consolidation
- Incident response cost reduction
What's my experience with pricing, setup cost, and licensing?
Compared to other service providers, the price is a bit high. That said, it is worth the price.
Which other solutions did I evaluate?
We did evaluate McAfee and Norton.
What other advice do I have?
The solution is good, hence I'm more concerned about the pricing. It would be good if that can be been reduced.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
June 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Technical Support Engineer at Hildes Technologies
Offers a single agent, handles heavy performance well and integrates with third-party servers
Pros and Cons
- "Its stability during any heavy performance activity is excellent."
- "The solution can be made lightweight in order to keep the systems more effective during the background operations of the scanning and security checks."
What is our primary use case?
There are many factors that make Check Point Harmony Endpoint as the main solution for our end-to-end system and data security of the organization.
The primary use case of Check Point Harmony Endpoint, in our case, is to monitor every node against viruses and digital vulnerabilities, which keeps a 24/7 check over the happenings and keep us alerted against any unforeseen.
The most important benefit of this solution has a single agent for security purposes and offers great stability during any heavy performance activity.
How has it helped my organization?
It has improved the overall security of our organizational digital well-being and made things and monitoring processes a lot easier and more straightforward.
Integration with third-party servers and data endpoints and 24/7 background security checks are very useful for us and has been very instrumental phenomena in keeping things simple and secure for us.
It has the ability to configure with any type of system and operating environment, which is great and makes it a more useful product for multiple business entities.
What is most valuable?
The most important benefit of this solution is having a single agent for security purposes.
Its stability during any heavy performance activity is excellent.
It has improved the overall security of our organizational digital well-being and made things and monitoring processes a lot easier and more straightforward.
Integration with third-party servers and data endpoints and 24/7 background security checks are very useful for us and has been very instrumental phenomena in keeping things simple and secure for us.
It has the ability to configure with any type of system and operating environment, which is great and makes it a more useful product for multiple purposes.
What needs improvement?
Overall, my experience with the product is great, and it's a perfect endpoint solution for multiple purposes.
The solution can be made lightweight in order to keep the systems more effective during the background operations of the scanning and security checks.
The user interface of reporting dashboard needs to improve for a better understanding of the end users and the administrators.
The pricing of Check Point Harmony Endpoint can also be reduced. They are quite expensive at the moment.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
We found it to be 99% stable and smoothly runs in the background.
What do I think about the scalability of the solution?
It is a scalable solution and everything can be easily monitored, and data can be maintained.
How are customer service and support?
Customer service is great and always helping us with quick solutions.
How would you rate customer service and support?
Positive
How was the initial setup?
It was straightforward to set up and deployed over the cloud.
What about the implementation team?
We implemented the solution via in-house teams.
What was our ROI?
We've witnessed a positive ROI.
What's my experience with pricing, setup cost, and licensing?
It is a great cost with high-end Check Point features within reasonable cost brackets. You must try it.
What other advice do I have?
Overall this is a great solution with a lot of benefits and ease of use.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Profesional Gestión Informática 2 - Especialista en Sistemas de Información at CompuGuana
Secures equipment, integrates with the cloud, and offers real-time filtering
Pros and Cons
- "It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks."
- "For the future, I would like to see maybe a content-filtering emulation feature in Harmony Endpoint."
What is our primary use case?
We had the need for every employee to be protected inside and outside of the organization and mainly the sales areas, which often are exposed yet constantly have the greatest mobility within our organization. There were uncertainties and needs for security. We have been testing solutions that will allow us to complete this requirement. We opted for and used the Check Point Harmony Endpoint, which gave us easy administration and management of the equipment, ensuring safety in the best possible way.
How has it helped my organization?
Check Point Harmony Endpoint gives our organization and us a solution that we could manage while complying with internal and external policies and regulations. It's been a great ally in the security and internal strategies of our organization. After testing and using it, we have realized that its capacity is not only to secure the devices. It also gives added value in its way of managing and allows us to have control over inventory and management of the equipment that we have.
What is most valuable?
The best feature is that it can secure the equipment. It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks. It has detection management with all types of computing power used in the equipment and outside of it in the cloud to which it is connected. This comes to give us a complete solution.
What needs improvement?
For the future, I would like to see maybe a content-filtering emulation feature in Harmony Endpoint. It would already be cataloged in the app. It would help filter other types of characteristics that we have in our equipment, and allow us to see the ones that are also very vulnerable. We'd like to have everything integrated into a single solution that communicates with the cloud.
For how long have I used the solution?
I've used the solution for a full year.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Soporte técnico superior at Acobo
Minimally invasive, good for securing devices of remote users, and does not slow performance
Pros and Cons
- "It is minimally invasive. From a single installer, the equipment is protected and secured."
- "This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market."
What is our primary use case?
We were having several difficulties when we were presented with the design that we had to implement for the teams and personnel that had to work outside of the organization due to the pandemic.
As a result of all this and all these uncertainties, the need to secure the equipment was the reason we adopted the Harmony endpoint solution. It came to protect us inside and outside the institution. The equipment itself does not need to be connected and secured by the perimeter area of our organization.
How has it helped my organization?
We have adopted this solution in a quick, simple way. It integrated well based on these three characteristics:
1. It is minimally invasive. From a single installer, the equipment is protected and secured.
2. The solution is really not burdened with the need for computing power for the local management of the device, which will prevent the teams from slowing down.
3. It is integrated with a cloud administration which makes it easy, fast, and simple to manage each of your policies for the security of the equipment.
What is most valuable?
Its most outstanding feature is the power to manage everything from a dashboard, a window that is in the cloud, which allows us to manage it from anywhere in the world through any browser, from anywhere. This is a feature that came to give administrators the possibility to work from home. Today many of us are remote workers who are not at the company, on-site. We are not in a single site, and yet we manage well and have the capacity and the assurance of managing everything easily, quickly, and simply.
What needs improvement?
This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market.
I would very much like to have the opportunity to see applications access at the web level and have applications from different brands and devices give simplicity to the management that we are going to need in the future.
For how long have I used the solution?
I've used the solution for about two years.
What do I think about the stability of the solution?
The solution is really stable. I have had the opportunity to try it on Mac and to try it on Windows. Its functionality, filtering, and execution have been really stable.
What do I think about the scalability of the solution?
It is a fairly scalable solution that is simple to use and quick to install on the devices of each user, that is, on their computers.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Manager at First National Bank in Philip
Easy to install and deploy with great threat mitigation
Pros and Cons
- "Deploying new versions of the endpoint are easy."
- "The Infinity Portal login is "iffy" at times."
What is our primary use case?
Endpoints have always been a network's weak point, as they are the main interface users use daily. A good endpoint security product must be able to be flexible in both deployments and across multiple OS versions.
Check Point Harmony Endpoint does that for us. With multiple blades that add security to these weak points, I can be assured that threats are being mitigated in real-time. Also, Harmony Endpoint works seamlessly with Check Point's new MDR product, so logging, detecting, and responding couldn't be easier.
How has it helped my organization?
With the new Harmony interface, I don't have to worry about a local endpoint management server anymore, making my deployments and updating of endpoints so much easier across the board.
I haven't had issues with anti-malware updates anymore, and I can manage my endpoints from one Infinity Cloud portal.
Being short-staffed in my department, this solution has absorbed some of the daily tasks of monitoring endpoint products to ensure they are up and running. Also, reporting services/blades that aren't running lets me use my time more freely.
What is most valuable?
Deploying new versions of the endpoint are easy. It was a hassle before with a local management server, and now it's as easy as selecting the version you want from a drop-down menu.
The options for removing/adding blades with the click of a button from the portal are great. The built-in VPN blade makes it so easy to deploy on my endpoints if I need employee remote access to my LAN.
The installation is so easy with the simple MSI deployment packages, and I can watch the deployment process in real-time from the Cloud Portal.
What needs improvement?
The Infinity Portal login is "iffy" at times. I would like to restrict it to only US traffic, however, due to the hosting in the cloud, it sometimes retrieves data from the EU and across seas.
Also, if there was a way to simplify the SmartConsole login more, there could be an opportunity to take away some clicks to log in. Navigating back to the browser to log in through that portal site just makes for a more extended login transition. Just have the MFA capability right there on the local application and be done with it.
For how long have I used the solution?
I've been using Check Point's endpoint solution for five years, however, just recently moved to the Harmony interface this summer.
What do I think about the stability of the solution?
The stability makes it easy to move up or down.
What do I think about the scalability of the solution?
The scalability makes it easy to move up or down.
How are customer service and support?
Support could be improved. I'd give them a 7/10 before COVID, and maybe a 5/10 post-COVID. If you know who to ask for, it's more an 8/10.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We did not use a different solution previously.
How was the initial setup?
The setup is straightforward. Check Point assists the whole way, so it was very easy.
What about the implementation team?
I handled the deployment in-house, myself.
What was our ROI?
I'm not sure if we have seen an ROI.
What's my experience with pricing, setup cost, and licensing?
Our rep has been great to work with concerning quotes/licensing. The setup is relatively easy, being in the cloud. A new customer could be up and running on a new Harmony install within days.
Which other solutions did I evaluate?
CrowdStrike was the main one we evaluated against this product.
What other advice do I have?
It is a great product. Check Point could work on their Technical Assistance Center (TAC) to assist customers, however, they usually get the job done in the end.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Technology Security Consultant at Sify Technologies
Easy to set up and implement with good functionality
Pros and Cons
- "The product is stable."
- "Legacy VPNs and digital footprints should be minimized."
What is our primary use case?
The major use was to provide protection to the mobile workforce. It gives elaborated insight about what is happening, what kind of particular applications we have installed, and what particular application they are using, and protecting them from online phishing, and random virus attacks also.
What is most valuable?
The functionality is quite good. It can run well on mobile devices.
You can also create profiles for individual mobile devices.
It is easy to set up and implement.
The product is stable.
It's very scalable.
What needs improvement?
Mobile users are reluctant to actually use the solution.
Check Point should focus on providing more compliant solutions, such as compliant for cloud-specific solutions. The digital footprint can be minimized, and then the Legacy VPNs can also be streamlined. As of now, most of the connectivity partners use Legacy VPNs to connect to their DC or their service partners. Legacy VPNs and digital footprints should be minimized.
For how long have I used the solution?
I've been dealing with the solution for a couple of months at this point. My first project was last September and then I did another last December.
What do I think about the stability of the solution?
The product has been stable and reliable. There are no bugs or glitches and it doesn't crash or freeze.
They've been delivering solutions for 15 to 20 years and I can attest to, over the last ten years, never run into any issues in terms of stability.
What do I think about the scalability of the solution?
The solution is very scalable. If a company needs to expand, it can do so - especially if a company is using a cloud-based deployment.
So far, we have delivered two projects to clients.
How are customer service and support?
Technical support is good. We are satisfied with the level of support on offer.
Which solution did I use previously and why did I switch?
I've also worked with CrowdStrike, which I also like very much.
How was the initial setup?
The initial setup is straightforward. You simply need to deploy the agents onto mobile devices. The enrollment process would happen on the device.
It's very flexible in that it can be a hybrid. It supports on-premises and cloud devices.
In terms of the size of the team a company would need to deploy and maintain the solution, it all depends on the timelines that you have. A single guy, if everything is being managed, a single guy can deploy at least 50 to 100 Harmony Endpoint agents in a day. And if things are not going well, it may require more people.
What's my experience with pricing, setup cost, and licensing?
We have different products in our portfolio and they all have their own specific costs. They also vary according to size and parameters.
What other advice do I have?
The solution is automatically updated and therefore we're always using the most updated product.
I'd recommend the solution to others. They're one of the leading security solutions providers in the world.
I'd rate the solution eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
Sales ManagerService Delivery at K_CORP
Great security and mobile device encryption and is easy to manage
Pros and Cons
- "It's easy to scale as needed."
- "We did have some early compatibility issues, which I hope Check Point has since resolved."
What is our primary use case?
From my point of view, the use cases involved strategy and business opportunities.
What is most valuable?
The solution is easy to use and easy to manage.
The security in regards to phishing, viruses, and so on, is very powerful.
For mobile devices, encryption is excellent.
From our point of view, Check Point is really easy to implement and really easy to manage. From the customer's point of view, the main reason was that the Check Point is the best brand, one of the best brands in our region. When they evaluate in comparison to competitors it comes out on top.
The solution is stable.
It's easy to scale as needed.
Check Point Harmony covers everything.
What needs improvement?
We did have some early compatibility issues, which I hope Check Point has since resolved.
As each project varies, anything that may be missing, in terms of features, would become obvious during a POC. Check Point has pretty much everything, however, it could be better in terms of working with Mac products. However, this is typical of other solutions and Apple.
For how long have I used the solution?
I started working with the solution approximately one year ago. We implemented it primarily for the endpoints.
A large company in our area opened the discussion about endpoint security. During the discussion, we looked at Check Point products as our company at this moment was a distributor for Check Point products.
What do I think about the stability of the solution?
The solution is very stable and reliable. There are no bugs or glitches and it doesn't crash or freeze. Its performance is good.
What do I think about the scalability of the solution?
Users can scale the product very easily. If you need more parts from the products added to the running environment, you can buy some more licensing. For the administrators, it is very easy to implement as scalability is one of the strongest parts of Check Point.
How are customer service and support?
Technical support is very good from the vendor. We find that to be very important.
How would you rate customer service and support?
Positive
How was the initial setup?
I can't speak to the details around deployment or implementation as I was in pre-sales.
What about the implementation team?
We are able to implement the solution for our client. While we have four people involved in pre-sales activity, we have another team that handles the implementation.
What was our ROI?
Users can observe an ROI. We worked with the client for a very short time and therefore had no time to calculate the ROI, however, it is my understanding it is there and quite good.
What's my experience with pricing, setup cost, and licensing?
We had special licensing for a rather sizable project. The project was prepared by Check Point directly and the client had a special negotiated rate.
What other advice do I have?
My previous company was a partner of Check Point. I no longer work there.
I was involved in pre-sales activities with the client who uses the product. We're a distributor of Check Point.
I'd rate the solution nine out of ten. We had some problems with implementations during proof of concept with a particular customer with a lot of Apple products, however, it is a small number of problems.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
Microsoft Defender XDR
Cortex XDR by Palo Alto Networks
Fortinet FortiClient
HP Wolf Security
Elastic Security
Trellix Endpoint Security Platform
Symantec Endpoint Security
Kaspersky Endpoint Security for Business
Trend Vision One Endpoint Security
Huntress Managed EDR
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?