With the changes produced by the pandemic, we needed to secure the equipment inside and outside the organization. That is why we looked for a solution that would protect business equipment, providing a robust security line and where perimeter protection for users is established. Those working from home or anywhere else are not compromised with this product on-side, and these users are connecting easily. By having the experience of using the tool, we realize that it secures and protects us from all kinds of attacks.
Cloud Engineer at ITQS
A fast solution that is easy to install and simple to manage
Pros and Cons
- "Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint."
- "Its guides are identical to the existing ones. These guides should be updated and they should improve their design."
What is our primary use case?
How has it helped my organization?
We have realized that it helps us with the prevention of ransomware, malware and identification of suspicious connections. It allowed us to have a centralized administration panel which makes it easier for us to view and manage each of the devices and the alerts found or notified by each of them. devices, creating rules and allowing us to protect the activities carried out by users. We can say that Check Point Harmony Endpoint is a fast solution, easy to install, simple to manage, and, above all, when in use, it is not very intrusive with users' daily activities.
What is most valuable?
One of the characteristics is the detection of anti-ransomware, which helps us to protect our equipment and data against any eventuality. This solution detects and analyzes any attempt to encrypt the data. If they are encrypted, the same solution stores and restores a version of the compromised data.
Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint. Among other features, this Endpoint Behavioral Guard identifies families of malware, file-less attacks, and other generic malicious behaviors that are the most common attacks when you are in unsafe networks without a protection solution.
What needs improvement?
It is one of the best, however, with respect to its support on iOS and Android, it can improve a little more.
Something worth mentioning is the need for support in Spanish and better representation for teams in the Latin American area, where there is a growing demand for these IT services and new technologies.
Its guides are identical to the existing ones. These guides should be updated, and they should improve their design.
Let people try it, and it will quickly remote users.
Buyer's Guide
Check Point Harmony Endpoint
June 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the scalability of the solution?
It is quick to configure and easy to manage. Therefore it is really scalable.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
What's my experience with pricing, setup cost, and licensing?
The issue of licensing is something that I don't like. The licenses are per package, not per unit, and that in some cases affects the acquisition of the solution.
Which other solutions did I evaluate?
We did not evaluate other options.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Network and Security Engineer at a consultancy with 10,001+ employees
Great anti-malware, anti-phishing and anti-ransomware capabilities
Pros and Cons
- "The main advantage of the solution is the ability to implement complete security policies for the terminals in order to address how apps are installed on corporate devices."
- "The solution needs more alerts to warn of attacks."
What is our primary use case?
In our organization, we are creating Trusted, Untrusted, and DMZ zones.
We use URL filtering, antivirus and threat prevention, as well as detect and monitoring of all the outside traffic that enters the organization.
It downloads the latest signature from the Check Point database for anti-malware and it keeps my laptop clear from malware files and attacks.
We are now able to regularly scan after implementing this product and now we feel happy. In many ways, it made us feel safe.
We have installed this tool for every user.
How has it helped my organization?
The Harmony vendor is excellent at providing various features and updates regularly.
The main advantage of the solution is the ability to implement complete security policies for the terminals in order to address how apps are installed on corporate devices.
It secures our organization from attacks from ransomware, malware, et cetera.
The most important feature is the file scan capability. It saves us from attacks by modified files. In this way, we secure our internal traffic from outside attackers.
What is most valuable?
The below features are most valuable:
1) Anti-malware
2) Threat protection with signature
3) Anti-ransomware
4) Anti-phishing (support for all leading browsers)
1) Anti-malware (to detect and prevent malicious activity)
2) Threat protection with signatures to prevent the threat on the basis of a signature. Signatures are stored in the database.
What needs improvement?
I would suggest that the Check Point team always allocates an SME to all the vendors before implementation. This will help when the endpoint agent cannot integrate with another product or third party. It could expand the functionalities too. In addition to security functionality, they could incorporate Mobile Device Management (MDM) functionalities such as remote device management, administration of installed applications, et cetera.
The solution needs more alerts to warn of attacks.
For how long have I used the solution?
I have used this product for the last two years.
Which solution did I use previously and why did I switch?
We did not use a different solution previously.
How was the initial setup?
The setup is somewhat complex the first time, however, it is not too complicated or difficult.
What about the implementation team?
We implemented this product as per the organization's requirements. We did it ourselves.
What was our ROI?
Our ROI has definitely improved after installing this product.
What's my experience with pricing, setup cost, and licensing?
It is a fair price and according to the quality of the product offered.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
June 2025

Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Protects against malware, phishing, DDoS and MITM attacks
Pros and Cons
- "SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth."
- "It needs more documentation and better ease of deployment. For documentation, it needs more information about integrating the endpoints on SandBlast Agent mobile as well as on desktop platforms."
What is our primary use case?
Our use case for SandBlast Agent is that our team is set up in multiple geographies, such as, India, Sri Lanka, UK, North America, and Australia (where we have a bit of business). We have courses for an educational client which need go to market, schools, instructors for hire, and students. Given that there was COVID-19 and a lockdown, there was an increase in the digital demand for learning courses. So, we wanted to secure our courses from cyber attacks. Thus, we wanted an end-to-end security system in place that would prevent/save us from cyber attacks and protect our sensitive data.
Systems can be accessed on multiple devices, whether they be laptops, Macs, Windows, or mobile devices. Those devices could be connected to a home or public network on a platform, like a Chrome browser, Mozilla Firefox, or Safari. We have been able to track this through reports by seeing how vulnerable those agents are to attacks. Then, we determine how they can become more secure, so we can stay on the cloud and mobile devices. These are the areas where we are trying to use their reports and tighten our security, putting more systems in place to prevent attacks.
How has it helped my organization?
Cognizant had a malware attack recently, as the threat of cyber attacks has increased, and a lot of customer data was compromised. However, because this Check Point SandBlast technology was there in place, we were able to thwart the cyber attacks that were attempted. Most of the time, these attacks are college kids trying to do some phishing attacks or look into sensitive data. With SandBlast, it is possible to identify those attacks at the very source, preventing those attacks and keeping us secure.
Going forward, we are planning to extend it to authors and professors who are helping us author our content. For example, if there is an author who will be taking help from various professors in university or instructors in schools, then they will need to get their inputs. What happens is they expose their course to those authors on their networks, devices, laptops, mobiles, or tablets. They access the course through an application. Now, those authors and professors don't have an app login because they might be a third-party vendor. So, we are trying to have the SandBlast Mobile version on this site as well, based on the impressive performance of SandBlast, so our data remains secure and more users are able to utilize our systems and access our data. This will make it more valuable for our end users.
On the coverage part, there are malware, phishing, operating system exploitations, denial-of-service attacks, and man-in-the-middle attacks (MITM), so we have classified the attacks that can happen on a learning, educational system, like ours into five to six categories. With SandBlast Agent deployed in the cloud, we have good coverage to cover these attacks, as it is very extensive. The best part is (through our reports) we were able to identify the type of attacks. So far, our security has been 100 percent. We have not felt that a data breach has happened, so we are pretty happy with SandBlast Agent.
What is most valuable?
SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth.
We set up reports, which were weekly or biweekly. Then, our admins, who are mainly working with SandBlast Agent, were able to look at daily reports or even more granular reports, hourly or daily, based on their customizations.
The automated part keeps it running in the background. It only gives us notifications when there have been major attempts to breach data. We also have reports that show logs for what external, unauthorized systems tried to access the data. Through those reports, which are automated in the background, we are able to do what we want in order to keep our systems secure. We feel the automation part is pretty good with this application.
What needs improvement?
It needs more documentation and better ease of deployment. For documentation, it needs more information about integrating the endpoints on SandBlast Agent mobile as well as on desktop platforms.
For how long have I used the solution?
I have been using this solution for six to eight months.
What do I think about the stability of the solution?
The SandBlast Agent is stable. Our users can work on a laptop, remote device, or tablet with this app running in the background. If an attack event is triggered, then the user and administrator both get alerts. The impact of this application running in the background on the battery life or on any other application is negligible; the battery performance is not impacted. It is such a digital world. Users are always now online and on social media, so they need to feel that their personal data is also not compromised.
Our key 15 users maintain the solution.
What do I think about the scalability of the solution?
We have around 15 key users, but it is being used to monitor over 1,000 users across the globe. We are planning to scale it up to 1,500 users/authors in North America alone for Q4. We have also certain authors who are coming up in Sri Lanka and Australia.
We are looking to scale this up on mobile devices and tablets. We want to see how the performance will be there. With portable devices, people are sitting in a Starbucks, cafeteria, or in a public area, and we want to see how the security is established on a public network. So far, we have seen that it has been quite good during these COVID lockdowns. People who have been working from home have it also installed on shared networks with two neighbors or a group of people, which is prone to attacks. So far, it has been good, but we want to see the performance when we roll out to more users.
Which solution did I use previously and why did I switch?
We had a legacy system in place before using SandBlast Agent. The features, efficiency, and our pre-existing relationship with Check Point drove us to going with SandBlast Agent.
How was the initial setup?
When we were working with their team, it was easy to go ahead with the setup. However, once we started doing it for our users on our own, we found it to be a little complex and needed more help. So, we came back to the SandBlast support team for help.
When we had to do a second deployment, including the next 10 members from the team of 15, we found that the documentation for the initial setup wasn't thorough. Our team had to reach out to the customer support, and they were good. However, from a deployment point of view, a little more documentation would have been helpful.
The deployment took approximately three months.
Our deployment strategy was that we wanted to be digital and do things on the cloud.
What about the implementation team?
We worked with the SandBlast team for deployment and that was completed in under three months. We had our initial trial period for two weeks. We had a team of four to five members who worked with the SandBlast teams from a deployment point of view. Everything went pretty smoothly.
Our experience with the Check Point support team was pretty good. They were able to help us with the deployment and integration for collaboration apps, like Slack, Microsoft Teams, or Jira. They also were able to help us with internal apps. So, they were able to help us with all those integration points, which was really helpful.
The staff involved was four to five members. However, we felt that if the SandBlast team was onboard, then we didn't need that many people. We could do the deployment with two members from our side and somebody helping from the SandBlast side.
What was our ROI?
If we have to look in terms of qualitative value, there has been good ROI. That is why we are planning to go ahead with the scaling of bringing more users onboard and having our security being taken care by SandBlast.
The solution has reduced the number of security analysts we have needed, enabling them to work on things they didn’t have time for before. From the automated reports point of view, we always used to feel that for whatever legacy system that we had in place we had to do more work to capture the area we wanted in our reports. With SandBlast Agent, we are able to do that through automated reports and its inbuilt functionality for reporting.
Due to a combination of factors, we now have three security analysts instead of six. So, we are almost down to 50 percent of team strength from the point when we started using SandBlast Agent. We have been able to cut down the cost after starting to use this platform.
What's my experience with pricing, setup cost, and licensing?
One of the key factors that made us go with this solution was the pricing.
On the licensing part, there was an initial complementary set of licenses offered in the initial onboarding package, either 15 or 20. Then, we had some complementary licenses in the initial purchase of the package. That was pretty useful.
Which other solutions did I evaluate?
We did explore one more option, which was an offering from Microsoft. The features, efficiency, price point, and pre-existing relationship that we had with Check Point made us go with SandBlast Agent.
Some of SandBlast's features include ease of deployment on cloud and mobile device coverage, which is our future coverage area. We found that it gave us good operational efficiency on mobile devices. It runs in the background, providing coverage for various parameters in the logs and triggering alerts to users and administration only when there is an attack. Otherwise, it is able to block the attack, URL, or user in the background before notifying them. These are some of the features that stood out and differentiated it from Microsoft Windows Defender.
What other advice do I have?
In this digital ecosystem, we need to secure our data at every moment and have something in place, like SandBlast, to keep our networks scanned at each moment. You never know where the next attack is coming from: malware, phishing, denial-of-service attacks, man-in-the-middle attacks, etc. Therefore, we need to be on the lookout for these type of attacks and any other unauthorized URLs trying to get into our systems to access data for any purpose.
Have a system in place to keep your data secure. You should definitely give SandBlast Agent a try. It is worth it. The solution is very secure and has very impressive features.
I would rate this solution as an eight out of 10. We are very impressed and happy with the features, its stability, reports, and the parameters covered in the reports.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
Project Manager at a outsourcing company with 1,001-5,000 employees
Easy-to-integrate product with a valuable feature for building API
Pros and Cons
- "The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client."
- "From an improvement perspective, the major challenge we've faced with Harmony is the support."
What is most valuable?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client. Both features offer significant advantages from different perspectives.
What needs improvement?
From an improvement perspective, the major challenge we've faced with Harmony is the support. While the technical features and xRail-based aspects are good, support still needs to be improved. However, this concern could be addressed effectively if they focus on improving support.
For how long have I used the solution?
We have been using Check Point Harmony Endpoint for the last three or four years.
What do I think about the scalability of the solution?
The product is scalable.
How are customer service and support?
Overall, technical support for all Check Point products has been a concern, but improvements have occurred recently. They are making significant changes, and the support is now more stable.
Which solution did I use previously and why did I switch?
Before implementing Check Point Harmony Endpoint, we used a similar solution called Trend Micro SMAX.
What other advice do I have?
Check Point Harmony Endpoint is easy to integrate with any Avaya platform. The interface is very user-friendly. In terms of promotions, the product is visible in the market.
I rate it a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant at ITQS
Good threat extraction, reduces malicious attacks, and offers great features
Pros and Cons
- "Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner."
- "They should also add new functions such as threat hunting."
What is our primary use case?
The implementation of Check Point Harmony Endpoint has provided great improvements in the functioning of our organization. Therefore, we wanted to protect our courses from cyber attacks and required an end-to-end security system that could prevent/save us from cyber attacks and protect our sensitive data.
The advantages that it presents is that you can access the systems on multiple devices, be it laptops, Mac, Windows or mobile devices and this is a great benefit. It provides reports where it brings the details of vulnerabilities.
How has it helped my organization?
Check Point Harmony Endpoint was implemented due to the fact that malware and cyber-attacks have been steadily increasing lately and we needed a tool that would prevent cyber-attacks. With Harmony Endpoint, it is possible to identify those attacks and prevent them. It has also given us the possibility to qualify all these possible attacks and thus take into account where and how they want to penetrate our network.
This implementation provided a fully functional antivirus solution that gave the company the ability to defend against almost all threats occurring inside or outside the network.
What is most valuable?
Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner.
The threat extraction and threat emulation have been a great benefit to give more autonomy to users.
On the other hand, it cannot be left out that it reduces the number of malicious attacks. It has helped us to properly monitor what has been happening with our network traffic and prevent individual attacks from accessing certain sites where we want to have restrictions or limitations.
What needs improvement?
Some problems that I have had with this and other Check Point tools in the cloud is when entering the portal since it stops responding or takes a long time to process a query and this causes delays and efficiency.
They should also add new functions such as threat hunting.
Finally, it should be able to implement with and have a good integration and interaction with Azure in the management of vulnerabilities, and data management that between the two can be integrated 100% with Check Point Harmony Endpoint and thus be able to make good automated management.
For how long have I used the solution?
It was implemented approximately 2 years ago
What do I think about the stability of the solution?
The product is very stable. It has some problems in the cloud where the access is stuck, however, nothing has caused improper functioning.
What do I think about the scalability of the solution?
Check Point Harmony Endpoint is an easy to scale tool.
How are customer service and support?
We have had good experiences. The cases have been successfully concluded.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Nothing was implemented that was similar to this type of tool.
How was the initial setup?
As mentioned before, the configuration of this tool is very simple and interactive.
What about the implementation team?
When the installation was done, a vendor helped us and explained how it worked.
What was our ROI?
With this tool, you can be sure of and have confidence that the investment made will protect the company's complete information.
What's my experience with pricing, setup cost, and licensing?
Check Point Harmony Endpoint is a tool that I highly recommend. Its implementation is very easy, as is its configuration.
Which other solutions did I evaluate?
Several tools were taken into account, however, Check Point was chosen as we have already used several tools and it has given us confidence and solidity.
What other advice do I have?
It is an excellent tool in the management of vulnerabilities.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cyber Security Specialist at a tech services company with 11-50 employees
Has a great encapsulation system but could use better support ticketing
Pros and Cons
- "The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists."
- "In terms of improvement, the ticketing system could be better. It is a little tricky to try to open a case and give it to an engineer."
What is our primary use case?
Our company uses Harmony Endpoint for encryption and encapsulation. Our clients use it for data encryption.
What is most valuable?
The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists.
What needs improvement?
In terms of improvement, the ticketing system could be better.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for about three months.
What do I think about the stability of the solution?
In terms of stability, I would rate it an eight out of ten.
What do I think about the scalability of the solution?
I would rate the scalability of the solution a solid eight out of ten. It could be slightly improved. Approximately 1000 people use Harmony Endpoint at our company. The maintenance is done once a week by a team of three engineers.
How are customer service and support?
In the Harmony series, the products are linked to each other. It is a little tricky when you try to open a case and give it to an engineer because, in our custom environment, we have to access it from their devices. For example, in Harmony Mobile, their Android or iPhone devices have to be used. All of that takes time and it would be good if Check Point could find a better solution to this and create a feature to help us collect logs for the cases. I would rate the support a six out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I'm currently working with Cisco Secure Endpoint and Palo Alto Cortex XDR.
How was the initial setup?
We use both the cloud and on-premise solutions. The initial setup is simple and creating a profile with the agents is easy. We only create agents and direct them to versions of the agents while we integrate them with the process. It only takes about five minutes to deploy one mission.
What was our ROI?
We have seen good results with the solution. If it is used with Linux or Mac, it provides better performance.
What's my experience with pricing, setup cost, and licensing?
Check Point Harmony Endpoint is a subscription-based solution and the pricing is quite reasonable when compared to other solutions on the market. I would give it a nine out of ten in terms of affordability.
What other advice do I have?
My advice to people who are considering using Check Point Harmony Endpoint is to be careful of which version you choose while deploying the solution. You should get the recommended versions for the agents. Otherwise, there will be a lot of problems and soft ticketing. Overall, I would rate Harmony Endpoint a seven out of ten.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer.
Security IT at a tech services company with 51-200 employees
Harmony Endpoint - modern app security in infinity portal
Pros and Cons
- "The most important characteristic of our requirements was the implementation of disk encryption."
- "We would like to make the documentation for more modern solutions like the Harmony family easier to find."
What is our primary use case?
Within the company, some departments, including the IT department, require their users to be connected from anywhere. In order to provide security to their teams, whether they were inside or outside the company, it was necessary to be able to implement a robust solution that would help us with access, equipment security, and reliability both for the protection of equipment information and to avoid vulnerabilities through applications to which users have access with credentials and administrator permissions.
How has it helped my organization?
This "Harmony Endpoint" tool is a modern solution from the Check Point Harmony family and has helped us improve the company's security with anti-malware protection, ransomware, among others, real-time protection, monitoring, and review of logs from the Check Point Infinity Portal.
Thanks to these characteristics, we have gained control over the equipment to avoid data loss. For example, with the encryption of the device units, we can avoid loss of the equipment, as well as access protection and application control policies, among other options that were enabled. It's leveraged to improve security.
What is most valuable?
The most important characteristic of our requirements was the implementation of disk encryption. It's necessary to avoid loss or theft of the equipment and, therefore, loss of data from the equipment. It can be applied to all the equipment from the portal or segments.
Another advantage is the control of applications and access policies that can be carried out in a granular manner for different company profiles. It works very well.
It offers secure administration from Check Point Infinity Portal. It is a security center where many of the Check Point solutions are located.
What needs improvement?
The improvements that can be mentioned are few. The solution and its architecture are very well done.
The Check Point Infinity Portal sometimes has some latency or performance issues that are slightly worse, affecting user management. It cannot be improved by the customer.
We would also like to make the documentation for more modern solutions like the Harmony family easier to find. That way, we can implement these solutions with the best practices recommended by the manufacturer.
For how long have I used the solution?
The solution has been used for more than two years for our portable devices with high mobility.
Which solution did I use previously and why did I switch?
Previously we used ESET at endpoints, however a site once had a ransomware attack and the solution was not able to solve the problem, so it was decided to change.
What's my experience with pricing, setup cost, and licensing?
The costs are per user. It is a good option for covering company equipment.
I recommend finding a partner that can help you with the costs for this and any other Check Point solution.
What other advice do I have?
This solution is very good and complete. I recommend it. You should try it and decide.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Its a nice administrative portal, In Infinity centralize and easy
Pros and Cons
- "We love the reports and monitoring they provide."
- "Infinity Portal sometimes requires more performance."
What is our primary use case?
Check Point Harmony Mobile was provided through an installed agent which has very light protection against malware and ransomware, among others.
In our country, many ransomware threats have been generated at the country level, for which it was worrying that we had kidnapping or encryption of our data. At the management level, the request was given to provide additional security to protect us. The tool has been very good.
We tested this Check Point tool to assess the performance of our endpoints, and shield them safely while increasing the protection of our platforms.
How has it helped my organization?
Our company wanted to provide an additional layer of security for our endpoints. We already manage Check Point with different tools, We have done very well with them and we have validated how Check Point Harmony Endpoint works to protect our endpoint equipment. So far, it works quite well.
We have seen the reports of attempted attacks and we have been able to provide a solution to these vulnerabilities. There is less malware in our infrastructure.
Its characteristics are quite good.
What is most valuable?
The characteristic that most attracts our attention is the administration portal. It doesn't require a management server since its licensing and management are through the Check Point Infinity Portal. It is very intuitive and easy to implement.
The way in which the agent is installed on the computers is very easy, it does not consume almost any performance of the server or final computers, in this way there is no need to worry about increasing resources to be able to protect them with Check Point Harmony Endpoint.
We love the reports and monitoring they provide. It helps us quickly see what vulnerabilities we have on our endpoints.
What needs improvement?
We have few disadvantages or improvement points. However, the Infinity Portal sometimes requires more performance. It is a small detail. However, it could be improved.
On the other hand, it is also essential that the manufacturer improves the public documentation so that users can better understand how it can be implemented with best practices.
Finally, at the support level, we believe that Check Point can improve. Sometimes the answers are provided at dawn, which makes it more challenging to solve.
For how long have I used the solution?
The solution is a very good security tool. It was used this year at a test level and everything works very well.
Which solution did I use previously and why did I switch?
Previously we only had or used Microsoft's antivirus or endpoint, however, we had all non-centralized security. Through this tool, we can centralize everything in the Infinity Check Point Portal.
What's my experience with pricing, setup cost, and licensing?
Licensing is per endpoint, which is why we think is good. The cost is competitive, and its features are very good.
Which other solutions did I evaluate?
We validated several manufacturers, however, we did not want to have separate solutions. It seems to us a better option to have only Check Point.
What other advice do I have?
I recommend this security tool, it is always important to test the tool at the test level to decide if it is what you are looking for.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
Microsoft Defender XDR
Cortex XDR by Palo Alto Networks
Fortinet FortiClient
HP Wolf Security
Elastic Security
Trellix Endpoint Security Platform
Symantec Endpoint Security
Kaspersky Endpoint Security for Business
Trend Vision One Endpoint Security
Huntress Managed EDR
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?