As a manufacturing firm, we deal with many vendors and customers via online portals and websites. Our users surf the internet a lot. Check Point Antivirus scans and blocks malware, including viruses, worms, Trojans, spyware, and ransomware. This helps prevent infections and limit the spread of malicious software within the network. It also performs real-time scanning of files and email attachments to detect and block malicious content before it reaches the end user.
Manager - IT at NVCL Group
Helps prevent infections and limit the spread of malicious software within the network
Pros and Cons
- "The management console could be made more intuitive and user-friendly, with simplified navigation and clearer visualizations of threat data and security statuses. Improve the performance impact on systems, especially for older hardware."
What is our primary use case?
How has it helped my organization?
Implementing Checkpoint Antivirus has significantly improved our manufacturing company’s security posture and operational efficiency. By providing robust protection against malware and other cyber threats, we have minimized the risk of production downtime caused by cyber-attacks. On the other hand, This comprehensive security solution has not only enhanced our overall cybersecurity but has also instilled greater confidence in our stakeholders, knowing that our manufacturing processes and data are well protected.
What is most valuable?
Real-time scanning is a valuable asset for our organization. Real-time scanning and behavioral analysis have ensured that both our proprietary manufacturing processes and sensitive data remain secure, preventing potential breaches that could disrupt operations or lead to intellectual property theft. The centralized management of security policies across all endpoints has streamlined our IT operations, allowing our IT team to efficiently monitor and respond to security incidents from a single dashboard
What needs improvement?
The management console could be made more intuitive and user-friendly, with simplified navigation and clearer visualizations of threat data and security statuses. Improve the performance impact on systems, especially for older hardware.
Ensuring that real-time scanning does not significantly slow down user machines would enhance overall productivity. Work on reducing the rate of false positives, which can disrupt operations and lead to unnecessary administrative overhead. As an additional feature, Integrate user behavior analytics to detect unusual patterns that could indicate insider threats or compromised accounts.
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Check Point Antivirus for more than two years.
What do I think about the stability of the solution?
The solution consistently delivers reliable performance with minimal downtime, ensuring continuous protection without disrupting business operations.
What do I think about the scalability of the solution?
Check Point Antivirus has strong scalability, making it highly suitable for organizations of various sizes, including large manufacturing companies. Its centralized management console allows administrators to efficiently manage and enforce security policies across numerous endpoints.
How are customer service and support?
Customer Service should be improved.
Which solution did I use previously and why did I switch?
Previously I was using Avast antivirus. We switched because we had many security issues. It was not meeting our requirements.
How was the initial setup?
The setup is very easy.
What about the implementation team?
We implemented it through the vendor. I would rate the experience an eight out of 10
What was our ROI?
The comprehensive protection against malware, ransomware, and other cyber threats has drastically reduced the risk of costly production downtimes and data breaches, which in turn has saved the company substantial potential losses.
What's my experience with pricing, setup cost, and licensing?
The setup cost is low but licensing is high. It's worth the cost.
Which other solutions did I evaluate?
We also looked at Kaspersky Antivirus.
What other advice do I have?
From what we have seen it is a reliable and dependable solution.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Technical Sales / Presales at Routelink Integrated Systems
A stable tool to secure endpoint devices and manage all devices from a centralized portal
Pros and Cons
- "It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution."
- "Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors."
What is our primary use case?
I use Check Point Harmony Endpoint in my company to secure the endpoint devices, including computers, servers, and every single endpoint in the environment.
How has it helped my organization?
Check Point Harmony Endpoint offers customers enterprise-level security for all their devices, including servers, laptops, and desktops. The IT personnel can ensure that with the product, all of the devices in an environment are protected with Check Point's enterprise-based solution. The customers who buy the product need not worry about their devices being exposed to threats. In fact, if you check the reports for Check Point in Gartner Magic Quadrant, you will see that the reports are all related to Check Point's endpoint security solutions. Customers try to get information on the value they can derive, along with the other potential prospects in the market, before trying to get or onboard Check Point Harmony Endpoint in their environment.
For IT personnel, Check Point Harmony Endpoint is easy to manage since they don't need to have any expert in order to deploy or monitor devices with the help of the product, and it also allows you to try out different actions on different devices. Whenever there is an attack on any device, Check Point Harmony Endpoint has the capability to isolate the affected device from the environment. Suppose there is an attack on one computer. In that case, the security of the other computers operating in the same environment is compromised, so Check Point Harmony Endpoint isolated the affected computer and notified the required department in the company to look into it while allowing for the other computers to work properly. The product offers good value to the companies that deploy it in their environment.
What is most valuable?
I would have to describe what I feel is valuable in Check Point as a whole. Check Point provides users with a central point from where they can manage all the devices across a workplace. Whether users use Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, they don't have to log into different portals or solutions since they can manage everything from one central point. I like the fact that products from Check Point are very easy to deploy. Even if a user has 1,000 endpoints in an environment, Check Point can take care of the deployment in minutes. Check Point Harmony Endpoint is a very easy solution to deploy and requires very little maintenance or technical expertise.
What needs improvement?
I would like to see improvements in Check Point Harmony Endpoint in general because some people use it since it is available at a competitive price. Due to the competitive pricing strategy of Check Point Harmony Endpoint, it is not considered to be a good product, like Fortinet, Palo Alto, or F5. Check Point Harmony Endpoint needs to consider that people should feel that Check Point doesn't compromise on quality even though the price at which Harmony Endpoint is offered is good. People who claim that Check Point Harmony Endpoint is a cheap product don't necessarily mean that it is not a good solution. Fortinet is a very expensive product that offers good value to its customers. If Check Point can work on the value proposition it offers to customers and make them understand that even though the solution is affordable, it is not a bad solution compared to its competitors, then it would be fantastic. The potential customers can opt for Check Point products, considering that they are offered good products at the cheapest price in its categories. It is important for Check Point to ensure that people don't have a wrong perception about the products it has launched in the market.
I don't think there are any features I would like to include, and the tool offers updates when compared with the products from competitors, which I think is a good way to do it. The only challenge is that for many organizations where there is an MDM solution in the environment and an endpoint security tool, my company needs to educate such organizations to convey the message that endpoint and MDM solutions are different products for different purposes, so they are not the same. If Check Point Harmony Endpoint can incorporate MDM into the solution, it can be a fantastic enhancement. Customers need not buy endpoint and MDM solutions if both are made available together in Check Point Harmony Endpoint. My company will have to put extra effort into educating the customers and making them understand the two different solutions. MDM is used to manage your mobile devices, and Check Point Harmony Endpoint is the security for your endpoints.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for over three years.
What do I think about the stability of the solution?
It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution.
What do I think about the scalability of the solution?
It is a very scalable solution.
How are customer service and support?
My company had to contact Check Point's technical team for the installations that my company carried out when we had to deal with around 40 devices that had firewalls from Check Point, which had reached the end of life. For Check Point Harmony Endpoint, my company never had any reason to contact Check Point's technical team.
Which solution did I use previously and why did I switch?
Starting with the pros, I would say that Check Point Harmony Endpoint provides value for money. After purchasing Check Point Harmony Endpoint, you need to consider the fact that the cost you pay for the solution and the value you derive from the product is very proportional. When it comes to Check Point Harmony Endpoint, I can say that a user does not pay high prices for a poor solution. A user pays a decent fee for a very good product. I think the first pro is that the value you get from the solution is made available at a very competitive price. The product is seamless and easy to use. With the centralized portal, a user can manage all Check Point products, including Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, from a single point, which is also a fantastic pro for Check Point. Regarding the cons of the solution, I would say that it stems from people's perception of the solution since they feel that an affordable product may not be good enough. There is a need to work around people's wrong perception of Check Point products. Still, I don't know if such a negative perception is something that is widespread across the globe or whether it is exclusive to Nigeria or the markets in Africa. Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors.
How was the initial setup?
The product's initial setup phase was straightforward. The product's deployment was done in minutes, so it didn't take long, as there was no need to do any special configurations. There was no need for the people involved in the deployment to have any special skills. The deployment process was seamless and straightforward. The product's deployment was never an issue. The IT department need not worry too much about whether they need to learn new skills to manage the product as it is easy to use and deploy and a product that can be used seamlessly. The product's deployment takes around 30 to 40 minutes.
I work with the solution's SaaS version.
What other advice do I have?
I don't think Check Point Harmony Endpoint is difficult to maintain. I think there is a possibility of scheduling your updates in Check Point Harmony Endpoint, even if you want it to happen outside your working hours, like somewhere between eight o'clock in the evening and midnight. I don't think maintenance is stressful because it can be scheduled outside of working hours.
I would recommend others to use the product since the deployment process is seamless, so you don't need any specialized skills to use the portal provided by Check Point to monitor your devices. There are no specialized skills required to support or maintain the solution. It is also very easy to implement the product. You can keep a tab using the centralized portal offered by the product. In general, the product makes the life of the IT department easier since you need not worry about a lot of the technical stuff related to the solution.
From my point of view, I need to put in extra effort to convince my company's customers to use the solution. In terms of the features and the product's ability to deliver the promised value to its customers, especially when compared to other solutions in the market, I rate the overall product an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
Independent Information Technology And Services Professional at a non-profit with 1-10 employees
Antivirus with excellent performance, detailed reporting, and robust scanning features
Pros and Cons
- "The Antivirus engine's performance has been excellent."
- "More applications should be supported."
What is our primary use case?
We use the antivirus for FTP email scanning, attachment scanning, FTP download, HTTP download, and HTTPS download with SSL and inspection. It is also used in conjunction with the firewall gateway and security gateway.
What is most valuable?
The most valuable features include scanning, sandbox features, and antivirus reporting. The Antivirus engine's performance has been excellent.
What needs improvement?
More applications should be supported. For example, the ability to detect viruses or scan attachments within applications like Skype or similar applications could be improved.
For how long have I used the solution?
We have been using the solution for 15 years.
How are customer service and support?
The customer service and support are rated highly. The overall rating for support was 9.5 out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used Symantec and ESET before switching to Check Point Antivirus. We switched due to its detection capabilities and the high reputation of Check Point for preventing breaches and antivirus protection. Symantec's performance had issues with heavy CPU and memory usage.
How was the initial setup?
The initial setup could be rated as seven or eight out of ten. For those with experience on the Check Point platform, it's easy to set up.
However, for new administrators, the setup can be confusing because it uses a separate part of the panel and offers an option for legacy setup, which opens the old Check Point Smart dashboard.
What about the implementation team?
One person handled the deployment in-house.
What's my experience with pricing, setup cost, and licensing?
On a scale of one to ten for pricing, with ten being the most expensive and one being the cheapest, Check Point Antivirus is rated as one, making it the most affordable among antivirus products.
Which other solutions did I evaluate?
We used and evaluated Symantec, ESET, Fortinet, Cisco, and Palo Alto before switching to Check Point Antivirus.
What other advice do I have?
I would definitely recommend Check Point Antivirus to others. The product is very effective and performs well without causing any significant hit on CPU or memory.
I'd rate the solution nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
CEO at SAFEID
Provides encryption for operating systems and protection against malware
Pros and Cons
- "It provides encryption for operating systems and protects browsers against malware."
- "The endpoint might consume excessive resources from the machine, which can impact its performance."
What is most valuable?
It provides encryption for operating systems and protects browsers against malware, benefiting both new and old customers.
What needs improvement?
When using Check Point Harmony Endpoint, performance issues may occur, although not necessarily a ransomware attack. The endpoint might consume excessive resources from the machine, which can impact its performance.
For how long have I used the solution?
We have partnered with Check Point Harmony Endpoint.
What do I think about the scalability of the solution?
We have 25 endpoints using this solution.
How are customer service and support?
Email support works fine, but it needs to be on the phone.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment is not complex if you have to manage it. The installation can be done directly if the customer has a good knowledge of Microsoft systems. However, we have to install it manually, which can be difficult, especially when replacing all the old agents.
If the customer doesn't have an IP directory, we only put one person in it. We are deploying up to 1500 endpoints with only one person, maybe in two weeks. If the customer doesn't have an active directory and has 100-200 endpoints to install, we normally have to use three security engineers.
I rate the initial setup a nine out of ten, where one is difficult and ten is easy.
What was our ROI?
We have a particular case where today's endpoint provides complete security against ransomware. It runs effectively from work. It is about eighty to ninety percent effective.
What's my experience with pricing, setup cost, and licensing?
The pricing is high because we lost several customers to Trend Micro and Symantec. Latin America and Columbia particularly have high prices. It was probably fifty percent more.
What other advice do I have?
As a partner, Check Point provides us with the best protection. We can also arrange a demo or discussion to showcase the protection features and advantages to our customers.
Overall, I rate the solution an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Business Director at One Networks
A comprehensive endpoint protection tool that is highly stable
Pros and Cons
- "Stability-wise, I rate the solution a ten out of ten."
- "Check Point offers solutions with only a few features for our company's customers' sites."
What is our primary use case?
My company tried Check Point Harmony Endpoint with multiple clients, but unfortunately, we could not get many clients to use the product. Currently, my company has limited clients, like ten to fifteen customers who use Check Point Harmony Endpoint.
What is most valuable?
The valuable features of Check Point Harmony Endpoint stem from the fact that it serves as a comprehensive endpoint protection product that provides users with a fast solution and complete endpoint protection while serving as a tool that offers the fastest recovery for endpoints. The tool efficiently detects, protects, and corrects vulnerabilities and patches.
What needs improvement?
Check Point offers solutions with only a few features for our company's customers' sites. My company hasn't found any bugs or didn't find the solution to be complex. Features like zero phishing, sandboxing, threat emulation and extractions, malware detection, and EDR solution capabilities need to be included in the product. My company expects more granular EDR functionalities in Check Point Harmony Endpoint.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for six months. My company has a partnership with Check Point Harmony Endpoint.
What do I think about the stability of the solution?
Stability-wise, I rate the solution a ten out of ten.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution a nine out of ten.
Check Point Harmony Endpoint is a solution used by the company's clients who operate small and medium-sized businesses.
How are customer service and support?
I rate the technical support an eight and a half out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
I rate the product's initial setup phase a nine out of ten.
The solution is deployed on an on-premises model.
The solution can be deployed within two hours.
During the deployment process of Check Point Harmony Endpoint, my company needs to install the initial client and select an agent from the settings on Windows Server, after which we need to push the solution to the client. Installing the initial client isn't something that is very easy. With all the features like signature-based detection, threat emulations, and sandboxing, users may need to be involved in the creation of a signature group.
What's my experience with pricing, setup cost, and licensing?
Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years.
What other advice do I have?
Check Point Harmony Endpoint is a well-known solution among cybersecurity companies. With Check Point Harmony Endpoint, if my company gets good profit margins along with good opportunities, then we can penetrate into the market to sell it. My company expects support from Check Point, though we don't deal in many of its solutions.
I rate the overall tool a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
Cloud computing at ITQS
Reliable with good protection and detailed reporting
Pros and Cons
- "It is a very reliable antivirus."
- "They must focus on performance and efficiency since this tool sometimes consumes many machine resources and leads to machine performance problems."
What is our primary use case?
The company has a large number of users in different countries and they are constantly moving from place to place since some are dedicated to sales and must be traveling or connecting to different urban and private networks where they are located. Therefore, it was necessary to have a tool that would monitor, protect, and safeguard the security of the electronic devices that our employees use for their work every day. With this solution, we manage to minimize the security impact of our company and avoid future penetrations.
How has it helped my organization?
This solution helped us keep all our devices safe from the protection of cyber threats.
It is a very reliable antivirus. It offers a wide range of security services from cyber threats such as viruses, malware, and ransomware.
In addition, its database is in real-time. It has helped our organization achieve real-time analysis efficiency, which helps to be able to have all the devices centralized and, in this way, to be able to maintain an inventory of each of the devices separately. It helps us to comply with the regulations for our organization.
What is most valuable?
This tool has a very secure and efficient centralized management. This helped us to be able to have multiple devices and systems in a centralized control panel and to be able to track them. This is very valuable for administration and supervision.
Another characteristic is the number of detailed reports and analyses of all the incidents that occur in our network.
The compliance with regulations capabilities with, for example, HIPAA and GDRP, has also helped us a lot since we constantly have internal and external audits, and it has helped us a lot to comply with the requirements we have.
What needs improvement?
Like any service, they have some deficiencies where they must improve or add some features.
They must focus on performance and efficiency since this tool sometimes consumes many machine resources and leads to machine performance problems.
They must add more techniques for detecting threats and thus reducing false positives.
They need to integrate with third-party devices such as SIEMs.
They could improve the interface so is more intuitive and easier to manage since it is very static.
For how long have I used the solution?
This solution was implemented four years ago.
What do I think about the stability of the solution?
It is very stable and is an efficient security tool.
What do I think about the scalability of the solution?
It has very good scalability and is very efficient.
How are customer service and support?
They should improve the support; it is very slow and sometimes not very efficient.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously had an antivirus. However, it was not good at providing adequate performance and protection.
How was the initial setup?
The supplier helped us a lot with the installation; the agents are easy to install.
What about the implementation team?
The suppliers helped us install the console; the other agent installations were done internally.
What was our ROI?
It is a tool that is worth the investment in since it covers a lot of security.
What's my experience with pricing, setup cost, and licensing?
The licensing all depends on the partner and where you buy it. The installation went very well for us, and the cost was optimal.
Which other solutions did I evaluate?
Many tools were evaluated such as Sophos, Avast, and Norton Antivirus, among others.
What other advice do I have?
It is an excellent excellent tool. It is very good on the market and valuable.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Head of Infrastructure and Networks at a insurance company with 51-200 employees
Excellent vulnerability scanning, rating, and remediation
Pros and Cons
- "Resource overheads have been reduced and we are overall more secure as a business."
- "There are a number of features behind paywalls which can be frustrating when you are already paying a premium."
What is our primary use case?
Check Point Harmony Endpoint Detection and Response is a very useful tool in combating vulnerabilities and threat actors. We have rolled it out across the business to all systems in our estate.
It is very easy to perform vulnerability scans, view present vulnerabilities, and understand the ratings applied by the software. This allows us to focus on which areas are most at risk across the company.
It was easy to install the agents to our physical and cloud devices and enabled targeted response to zero days.
How has it helped my organization?
As an IT infrastructure and security team we are now able to prioritize and target specific, higher-risk vulnerabilities, making our environment more secure.
The ratings allow us to get a feel for the urgency of a vulnerability and apply it to our use case. We are also able to mitigate lower-priority vulnerabilities with suggested fixes and can add exemptions for false positives or acceptable risks.
We are able to report current cyber security posture to the board and we are able to assign remediation tasks to team members.
Resource overheads have been reduced and we are overall more secure as a business.
What is most valuable?
We have found the combination of vulnerability scanning, rating, and remediation most valuable in the platform and the feature is vital to our everyday security hardening.
We can effectively target vulnerabilities with suggested fixes and automate patches where relevant.
There is a constant flow of newly added features and improved functionality is regularly made available by the Check Point team.
Customer communication around zero days and other emerging threats is a great addition to the service.
What needs improvement?
There are a number of features behind paywalls which can be frustrating when you are already paying a premium.
The support is limited at times and can be quite slow, you are often directed to articles in the support center to read solutions for yourself. As a result, a lot of time has been spent reading Check Point articles on the online platform to increase knowledge around the product and further cyber security awareness in the team. It would be good to have a more direct route to remote support and demonstration.
For how long have I used the solution?
We have been using Check Point Harmony Endpoint for around one year within our company.
What do I think about the stability of the solution?
We have had very few, if any, stability issues with the solution.
Which solution did I use previously and why did I switch?
We previously used Rapid7. It was costly and had limited agent scanning timescales.
How was the initial setup?
The setup is nice and straightforward with a lot of hand-holding from the team.
What's my experience with pricing, setup cost, and licensing?
What other advice do I have?
We would try to add exceptions for false positives or mitigate threats earlier to clean up the experience.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Information Technology at Banco Nacional de Investimento S.A.
Effective endpoint protection and includes both antivirus and firewall features
Pros and Cons
- "The initial setup is very easy."
- "I'm not very happy with the support, even in terms of the website. They don't offer much."
What is our primary use case?
Our primary use case is to protect endpoints.
What is most valuable?
The most valuable is encryption.
What needs improvement?
We have some issues with encryption. The main issue is the red screen of death. Basically, it happened in previous versions of Check Point with encryption. When you install updates, not a specific update, but some Windows updates, the computer gets stuck. And it doesn't start. We were able to contact Check Point, and as a solution, they always say to use the latest version, but we are not happy with that solution. For us, it's not like a solution.
Mostly, we work with the latest version. But that doesn't guarantee reliability.
It has another issue that we have at Check Point. Check Point has an antivirus with a Sandbox function. When you try to download some files, the sandbox gets confused with the sandblast. And sometimes you have to wait.
So, there is room for improvement in terms of updates and with Sandbox and Sandblast.
Another area of improvement is support. We faced some issues because of the language barrier.
In future releases, I would like to see a nice feature in terms of encryption. When you want to decrypt a drive, it should be a little bit more user-friendly.
For how long have I used the solution?
I have been using this solution for three years.
What do I think about the stability of the solution?
There is room for improvement in stability. The solution could be more stable.
What do I think about the scalability of the solution?
It is a scalable solution. We have around 150 end users using this solution in our organization.
How are customer service and support?
The customer service and support are really good. For basic support, it's good. But when you want expert support, it's not that good.
For basic support, you can talk to a person and understand the basics. I don't know if it's a language or a barrier issue or not. For example, you have an issue with your computer. When you call a call center, the first thing they would say is, "Turn it off and turn it on," or something like that. So, in that sense, they don't have problems. But when you want a more expert solution, like, "I'm having a problem with this specific update, and this happens. So, this sandbox issue, and this happens." They don't put you right away in contact with the experts. You have to insist a lot; at least, that was my experience.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have worked with WatchGuard Gateway AntiVirus.
How was the initial setup?
The initial setup is very easy. It was very quick; it took around five minutes.
What about the implementation team?
We deployed the solution ourselves. It is on the cloud, but the installations are made on-premises.
What's my experience with pricing, setup cost, and licensing?
The solution was a little bit expensive at the beginning, but that's not Check Point's fault. It's an issue with the taxes. When you buy a product, they have a lot of taxes. So, it becomes expensive. But they actually made very good pricing. WatchGuard also gives good prices.
We have a yearly base license. The support is included in the license costs.
What other advice do I have?
First of all, be aware of the issues like the technical support. The solution is good. The product is good, but I'm not very happy with the support, even in terms of the website. They don't offer much.
Overall, I would rate the solution an eight out of ten. It is not a ten because of the support. But if it weren't for that, it's a very, very good solution.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Cortex XDR by Palo Alto Networks
Microsoft Defender for Endpoint
SentinelOne Singularity Endpoint
IBM Security QRadar
Huntress Managed EDR
Elastic Security
HP Wolf Security
Trellix Endpoint Security Platform
Microsoft Defender XDR
WatchGuard Firebox
Fortinet FortiEDR
TrendAI Vision One
Fortinet FortiClient
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?




















