My primary use case for Check Point Harmony EDR would be to get broader visibility in the environment. For instance, a pre-detection was done by Check Point Harmony when there was an attack happening. It pre-detected and remediated immediately before it got spread in the environment. The best part is the system was not in the office network but still got detected and remediated automatically.
Engineer at Digitaltrack
Offers broader visibility in the environment
Pros and Cons
- "The insight and visibility of the detection is good."
- "The services of EDR consumption should be reduced and the support needs to be improved."
What is our primary use case?
What is most valuable?
The insight and visibility of the detection is good.
What needs improvement?
As such there is nothing I can think of additional features.
The services of EDR consumption should be reduced and the support needs to be improved.
For how long have I used the solution?
I have using Harmony for the past two years.
Buyer's Guide
Check Point Harmony Endpoint
June 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
What do I think about the stability of the solution?
Stability is impressive.
What do I think about the scalability of the solution?
Scalability is good.
How are customer service and support?
Support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup was straightforward.
What about the implementation team?
The implementation happened in-house team.
What's my experience with pricing, setup cost, and licensing?
The licensing and costs are good.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

ICT Officer at Kenyatta National Hospital
Flexible, supports most of the operating systems, and provides good threat intelligence features
Pros and Cons
- "The solution has good threat intelligence features."
- "The network monitoring features must be improved."
What is our primary use case?
We use the product at the perimeter. Since we do not have a branch, only one area is protected by the solution. The networks we have are in a compact area.
What is most valuable?
I love the product’s flexibility. We can manage the blade without changing the protocols. It is easy to manage how the tool runs the network. The product is easy to deploy. It’s a good firewall. It supports most of our OS, such as Linux and Windows. We can use it even on mobile devices. The browser and data protection are good. The solution has good threat intelligence features.
What needs improvement?
The network monitoring features must be improved. If my ISP says that they gave me 300 Mbps, I would like to see where the network is used the most and where we are underutilizing it. I need features to monitor the bandwidth. I want features to monitor the upload and download speeds.
For how long have I used the solution?
I have been using the solution for the last three years.
How are customer service and support?
The technical support is good. I was working on some backups of a hospital management system to the cloud. Check Point provided us with very good support.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
The pricing is very high. The tool’s cost has increased by almost 300% in two years.
What other advice do I have?
I will recommend the tool to others. Overall, I rate the solution eight and a half out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
June 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Affordable, secure, and enables easy resetting of passwords with remote support
Pros and Cons
- "The remote support is good."
- "The heartbeat interval must be improved."
What is our primary use case?
The solution is used for port protection and media encryption.
What is most valuable?
Our customers are satisfied with the Harmony environment. The remote support is good. If the users forget their passwords, the remote support helps them reset the password. It is a good feature. We only need an internet connection for it.
What needs improvement?
The heartbeat interval must be improved. Sometimes, when we change the policy in the console, it does not reflect in the endpoint. Sometimes, we find it difficult to change the policy. The tool lags sometimes.
When we change the user password in the Infinity Portal, the password does not sync on time. There is a one-minute heartbeat interval from the server to the console. We have a graphical UI in threat hunting in which we can see the attacks. If audit logs have a similar graphical UI, it will be easier to analyze the logs.
For how long have I used the solution?
I have been using the solution for seven months.
What do I think about the stability of the solution?
I rate the tool’s stability an eight out of ten.
What do I think about the scalability of the solution?
The scalability and integrity are above average. I rate the scalability an eight or nine out of ten. We have deployed the product for 500 endpoints. We have deployed it on 300 to 400 endpoint machines in other places.
How are customer service and support?
Initially, we had some issues installing the agent on the endpoint machines. We didn't know the prerequisites of the endpoint machines. We had blue screen and red screen issues. It was new for us, and we were stuck. The support was very helpful. The team identified the issue and asked us to update Windows. We had to have the recommended version of Windows for deploying the agent. Now, we do not face any issues. If we face any problems, we easily recognize the issue. We are a bit autonomous.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial deployment was very challenging because I was new to the product. Later on, I got used to it. It was very easy. I ensured everything was according to the customers’ requirements. It took hardly two weeks to deploy.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable. It is very good for security. We are focused on security. If the security is strong, we do not mind the price. The customers blindly trust the product.
Which other solutions did I evaluate?
Our customers were using Trend Micro.
What other advice do I have?
We haven’t deployed the antivirus yet. We’re trying to implement AV on Windows. Currently, AV is deployed on a Linux machine. When I implemented it, I didn't have any idea about the product. I just went through some documents. People who want to use the solution must go through the documents and understand the concepts. Overall, I rate the product a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Developer at Shavit-security
Incorporates security AI features and effectively manages bandwidth with its DRS capabilities, but the software could be more resource-efficient
Pros and Cons
- "This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities."
- "The software requires considerable resources and can strain less powerful computers."
What is our primary use case?
We continue to offer our support solutions to other companies as requested. I focus on cyber security, specifically specializing in detecting malware in text and searching for remote access or reverse channels on computers.
What is most valuable?
This software incorporates security AI features and effectively manages bandwidth with its DRS capabilities. However, there's still room for improvement and the addition of more features. Nevertheless, in the broader market landscape, it's considered one of the leading products. While there might be some competition from others like Cisco, it remains a strong choice. The feature lies in mapping and providing top-notch malware protection.
What needs improvement?
Perhaps the software could be made more resource-efficient. While many improvements come to mind, I don't have them readily available. Essentially, I aim to enhance the software's efficiency so that it places fewer demands on computer resources.
For how long have I used the solution?
I have been working with Check Point Harmony Endpoint for the past two years.
What do I think about the stability of the solution?
It is a stable solution and I would rate it seven out of ten.
What do I think about the scalability of the solution?
It isn’t very scalable since I wasn't able to bypass the security a couple of times. I would rate it a six out of ten.
How was the initial setup?
I would rate it a six out of ten because it could have been easier. It might be somewhat challenging due to the numerous policies in place. For instance, it's more straightforward for me when users can easily set up policies because they come built-in. However, with Check Point, you do have the option to create custom policies. I'm not entirely certain if it's a strict either/or situation, as there might be some flexibility. Nonetheless, having a predefined "zero one" option can make it easier for users, as they don't necessarily have to customize policies themselves.
The deployment takes long enough.
What other advice do I have?
Currently, this software stands out as one of the top choices in the field. It's undoubtedly a strong contender for enhancing computer security, and while there are various other products available, this one ranks among the best.
I recommend the solution, but I would rate it a six out of ten, mainly because the software requires considerable resources and can strain less powerful computers. It tends to impact system efficiency, especially on computers with weaker hardware, causing frequent restarts and putting a significant load on the CPU and memory.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.
Software Engineer at Doddle
Great support with faster data processing capabilities and a high level of security
Pros and Cons
- "Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information."
- "It blocks safe URLs sometimes when there are network interruptions."
What is our primary use case?
We deployed this product to harmonize our products and have one central access point.
It helps us to set security features that protect the computing devices from malware attacks.
It gives me an opportunity to manage applications that works on various workflows centrally.
Integration with all employee devices has enabled my team to monitor the security situation and put in place emergency measures in case of any threat.
Team members can connect their working devices from a central networking connection that is secure and reliable.
How has it helped my organization?
The high-level security provided by Check Point Harmony Endpoint has given my team all the required tools for setting up a central network control platform. It provides solutions to challenges that affect workflows slowing down performance.
There is improved business work processes agility that keeps all the sectors functional.
There has been improved security compliance and risk management in all the business transactions that we undertake since we deployed this application.
Laptops and mobile devices that operate within the enterprise have been secured, and teams can easily focus on more productive roles without fear of being attacked.
What is most valuable?
Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information.
The cloud management system provides security to hybrid information and saved files.
The customer support services are efficient and always reliable when reached for any consultation.
It supports operating systems that are deployed in computers and mobile devices.
New users familiarize themselves easily with the operation of UI since it has flexible dashboards.
The faster data processing capability saves time and costs for accomplishing given tasks.
What needs improvement?
It has full performance capability to execute the given duties.
It blocks safe URLs sometimes when there are network interruptions.
The cost of deployment varies with the existing working conditions and the organization's size.
The cloud networking infrastructure can be attacked if there are limited security features and poor monitoring capacity from the IT team.
The overall performance impressed my team. Check Point Harmony Endpoint is the sure deal for enterprise security coverage and computing device control.
For how long have I used the solution?
I've used the solution for ten months.
What do I think about the stability of the solution?
It is stable in the provision of reliable security.
What do I think about the scalability of the solution?
I am impressed by the performance of this product.
How are customer service and support?
The customer support staff is ever supportive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not used a similar solution previously.
How was the initial setup?
The initial setup procedure was straightforward.
What about the implementation team?
There was high-level expertise from the vendor team during implementation.
What was our ROI?
There has been a positive ROI since we deployed it.
What's my experience with pricing, setup cost, and licensing?
The setup cost and licensing terms vary according to enterprise size.
Which other solutions did I evaluate?
I evaluated several options. This platform was the best.
What other advice do I have?
I recommend the implementation of this platform in other organizations.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Project Manager at Digitas APAC
Timely updates, comprehensive data management features, and good monitoring
Pros and Cons
- "It monitors data flow across the networking system to enhance comprehensive workflow infrastructure."
- "The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis."
What is our primary use case?
Harmony Endpoint helps the company to protect devices from phishing attacks.
It offers instant notification when it senses any form of external threat that can compromise data.
It can be easily deployed on both mobile and desktop devices.
The product has saved my team a lot of time and resources during the project implementation process.
It responds quickly to data threats that can leak internal information into an unsafe environment. We have accomplished many projects and submitted them successfully to our clients without any challenges since deploying Harmony Endpoint.
How has it helped my organization?
This solution provides threat intelligence to all sectors to enhance effective planning and decision-making before we get into trouble.
It monitors data flow across the networking system to enhance comprehensive workflow infrastructure.
Real-time monitoring provides essential tools for security configurations that cannot be interfered with by ransomware attacks easily. This is the best solution, far from other related software in attack prediction and threat analysis. It is cloud-based, and teams across the organization find it to be more flexible for real-time analytics.
What is most valuable?
Network monitoring provides the best reports based on real-time performance, which helps our members locate any drawbacks across the workflow system.
The threat response system from the user dashboard blocks malware attacks that can affect email and the flow of information among colleagues.
Endpoint protection is fundamental in security enhancement; it's effectively protecting our devices from internet viruses.
The application investigation system enables the IT team to come up with reliable reports on the cause and prevention measures that can be adapted to prevent any future attacks.
What needs improvement?
The system has comprehensive data management features that have saved us from incurring unplanned losses.
Timely updates and suitable configurations can block malware attacks and provide effective reports on security situations.
The setup process was complicated, however, when the customer service team came in, they provided productive guidelines that have kept the system working efficiently.
The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis.
For how long have I used the solution?
I've used the solution for 18 months.
What do I think about the stability of the solution?
This platform is highly stable, and the performance is awesome.
What do I think about the scalability of the solution?
The scalability has impressed all relevant teams.
How are customer service and support?
The customer service team is passionate about their work, and they provide timely responses.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not worked with other related products.
How was the initial setup?
The setup was straightforward. We had assistance from the customer support team.
What about the implementation team?
implementation took place through the vendor team.
What was our ROI?
The targeted ROI has been achieved since we deployed the application.
What's my experience with pricing, setup cost, and licensing?
The setup and cost depend on the number of devices that have to be secured.
Which other solutions did I evaluate?
I evaluated Intercept X Endpoint. However, it did not impress the entire team.
What other advice do I have?
I am satisfied with the current performance and I thoroughly recommend Harmony Endpoint to other business enterprises.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Supervisor Tecnico at M.Coutinho Douro - ComÉrcio De AutomÓveis, S.A.
Good URL filtering and application control with useful dick encryption
Pros and Cons
- "The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options."
- "Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant."
What is our primary use case?
We're using this for our endpoint protection in terms of antivirus and malware protection, disk encryption, and URL and application filtering on our client computers.
We integrate the VPN feature with Check Point's firewall allowing our clients to access internal resources with security policies enforced and controlled.
The reports given by the software are also a benefit since it allows better management and control of access to all our client computers at any time from anywhere.
The web console is also nice.
How has it helped my organization?
We have all our information and policies on one platform for all the features, and we can assign our technicians' several permissions and roles on the product.
Our customers are also better protected, and we can guarantee that security policies are enforced and compliant in each one of them.
Security has been a significant focus for us, and Harmony Endpoint, together with the entire Check Point ecosystem, made it easy for our organization to enforce such policies.
We value the URL and app filtering of the platform.
What is most valuable?
The URL filtering and application control are very helpful since it's typically hard to block productivity loss apps/URLs on clients when abroad. Harmony made it easy to control the usage of the company resources and bandwidth.
Disk encryption is a nice feature if you don't have other systems. However, since we've already had BitLocker deployed, we saved a few dollars on this licensing type.
The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options.
What needs improvement?
Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant. URL filtering should allow for time-based rules, for example, don't allow media streaming during work hours yet allow it on weekends.
The same applies to application control. When in our headquarters, we can solve this on the Check Point Firewall. However, the Harmony client does not support this type of condition, and we had to find a "middle ground" between policies and usability for our clients.
For how long have I used the solution?
We've been using this solution for two years.
Which solution did I use previously and why did I switch?
We did use Microsoft Defender. It lacked features, and therefore we moved away from the solution.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to try to implement BitLocker for disk encryption since it's free.
Which other solutions did I evaluate?
We did not evaluate other options.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Digital Coordinator at Modis
Blocks phishing, identifies ransomeware, and helps quash security threats
Pros and Cons
- "When sending emails to my colleagues, it detects any virus and blocks any spam that may be shared."
- "Configuration with some applications did not take place effectively due to setup complications."
What is our primary use case?
This software enhances the security of our remote workforce. It creates safe collaboration routes that cyber attacks cannot compromise. Data safety and communication infrastructure have been well maintained since we deployed this software.
Endpoint protection has enabled teams to complete projects faster and monitor workflows efficiently.
It has automated security protocols to cover the wide networking area in the enterprise. Check Point Harmony Endpoint has deployed comprehensive security that prevents any external attacks that may be a threat to our internal policies.
How has it helped my organization?
This software has quashed many security threats that could affect operations and slow down production.
When sending emails to my colleagues, it detects any virus and blocks any spam that may be shared. It is flexible and gives the IT team full access and control during deployment.
We have been able to attain security compliance and requirements for an excellent working environment.
The entire organization has been doing well since we deployed this software due to safe collaboration channels and improved security data awareness.
What is most valuable?
The total cost of ownership has enabled the company's teams to identify any areas with security weaknesses and appropriately assign security models.
The log4j-related attacks blocking system detects any vulnerable endpoints in advance.
Identifying ransomware behaviors has upgraded the security monitoring system and put measures in place to curb such threats.
When browsing, it blocks phishing sites that may hack personal data and leak to internet cyber criminals.
The endpoint behavioral guard identifies online threats that easily prevent credential theft that may lead to funding theft.
What needs improvement?
The current performance of Check Point Harmony Endpoint has impressed all the sectors in the organization.
Configuration with some applications did not take place effectively due to setup complications.
Interpreting the threat intelligence sensors may lead to poor data tabulation and slow performance.
The cost of deployment and maintenance is high, and many small enterprises may not be able to afford premium subscriptions.
The set security enhancement objectives have been achieved, and internet threats have been blocked effectively. I totally recommend this software to other organizations for reliable endpoint protection.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
This software offers a stable performance.
What do I think about the scalability of the solution?
The performance is good, and I am impressed by the overall output.
How are customer service and support?
We have been served well by customer service since we started engaging them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have no experience with any other product.
How was the initial setup?
The setup was straightforward.
What about the implementation team?
Deployment was done by the vendor team.
What was our ROI?
The targeted ROI has been achieved, and there is increasing growth.
What's my experience with pricing, setup cost, and licensing?
The setup and pricing are flexible depending on company size and security demands.
Which other solutions did I evaluate?
I have only worked with Check Point Harmony Endpoint.
What other advice do I have?
Comprehensive security for the company's network infrastructure is essential, and this is what this platform has provided.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
Microsoft Defender XDR
Cortex XDR by Palo Alto Networks
Fortinet FortiClient
HP Wolf Security
Elastic Security
Trellix Endpoint Security Platform
Symantec Endpoint Security
Kaspersky Endpoint Security for Business
Trend Vision One Endpoint Security
Huntress Managed EDR
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?