We use the antivirus for FTP email scanning, attachment scanning, FTP download, HTTP download, and HTTPS download with SSL and inspection. It is also used in conjunction with the firewall gateway and security gateway.
Independent Information Technology and Services Professional at a non-profit with 1-10 employees
Antivirus with excellent performance, detailed reporting, and robust scanning features
Pros and Cons
- "The Antivirus engine's performance has been excellent."
- "More applications should be supported."
What is our primary use case?
What is most valuable?
The most valuable features include scanning, sandbox features, and antivirus reporting. The Antivirus engine's performance has been excellent.
What needs improvement?
More applications should be supported. For example, the ability to detect viruses or scan attachments within applications like Skype or similar applications could be improved.
For how long have I used the solution?
We have been using the solution for 15 years.
Buyer's Guide
Check Point Harmony Endpoint
January 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
How are customer service and support?
The customer service and support are rated highly. The overall rating for support was 9.5 out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used Symantec and ESET before switching to Check Point Antivirus. We switched due to its detection capabilities and the high reputation of Check Point for preventing breaches and antivirus protection. Symantec's performance had issues with heavy CPU and memory usage.
How was the initial setup?
The initial setup could be rated as seven or eight out of ten. For those with experience on the Check Point platform, it's easy to set up.
However, for new administrators, the setup can be confusing because it uses a separate part of the panel and offers an option for legacy setup, which opens the old Check Point Smart dashboard.
What about the implementation team?
One person handled the deployment in-house.
What's my experience with pricing, setup cost, and licensing?
On a scale of one to ten for pricing, with ten being the most expensive and one being the cheapest, Check Point Antivirus is rated as one, making it the most affordable among antivirus products.
Which other solutions did I evaluate?
We used and evaluated Symantec, ESET, Fortinet, Cisco, and Palo Alto before switching to Check Point Antivirus.
What other advice do I have?
I would definitely recommend Check Point Antivirus to others. The product is very effective and performs well without causing any significant hit on CPU or memory.
I'd rate the solution nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
A cloud solution for antivirus, device encryption and URL filtering
Pros and Cons
- "The solution offers multiple features in one solution, along with data detection."
- "Check Point should provide some technical sessions on antivirus solutions."
What is our primary use case?
We use the solution for antivirus, device encryption, file encryption, and URL filtering.
What is most valuable?
The solution offers multiple features in one solution, along with data detection.
What needs improvement?
The agent side should be less. It impacts customers' asset performance because it will be more complex for the customers.
For how long have I used the solution?
I have been using Check Point Antivirus for 6-8 months.
What do I think about the stability of the solution?
Check Point should provide some technical sessions on antivirus solutions. Then, it would be helpful to reach more customers in India.
I rate the solution’s stability a seven out of ten.
What do I think about the scalability of the solution?
The solution is scalable. We have a few customers using this solution.
How are customer service and support?
It is quite difficult to get a response from OEM. We are facing issues with all products except for email security, with the support team of the Check Point.
How was the initial setup?
The initial setup is complex, depending on the number of assets. It takes less than half an hour for a single asset. We should set up everything after deploying and testing it. Symantec takes five to ten minutes after deploying to test everything. We use manual deployment.
What was our ROI?
The solution is helpful for a particular budget. We are getting the best solution that will cover all your parameters.
What's my experience with pricing, setup cost, and licensing?
The product’s pricing is moderate.
What other advice do I have?
Every feature provided by the antivirus software is good compared to other solutions. Sandboxing is helpful for customers while downloading and detecting malicious software.
1-2 persons are required for deployment, whereas the maintenance and monitoring need a team of three to five members.
I will recommend the solution. It's a very good solution compared to other antivirus capability servers. The sandboxing technology is helpful.
We have not integrated it with any other tool set. We integrated a Check Point to get the logs or connect the data.
Overall, I rate the solution an 8 out of 10.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Check Point Harmony Endpoint
January 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
Technical Sales / Presales at a transportation company with 11-50 employees
A stable tool to secure endpoint devices and manage all devices from a centralized portal
Pros and Cons
- "It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution."
- "Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors."
What is our primary use case?
I use Check Point Harmony Endpoint in my company to secure the endpoint devices, including computers, servers, and every single endpoint in the environment.
How has it helped my organization?
Check Point Harmony Endpoint offers customers enterprise-level security for all their devices, including servers, laptops, and desktops. The IT personnel can ensure that with the product, all of the devices in an environment are protected with Check Point's enterprise-based solution. The customers who buy the product need not worry about their devices being exposed to threats. In fact, if you check the reports for Check Point in Gartner Magic Quadrant, you will see that the reports are all related to Check Point's endpoint security solutions. Customers try to get information on the value they can derive, along with the other potential prospects in the market, before trying to get or onboard Check Point Harmony Endpoint in their environment.
For IT personnel, Check Point Harmony Endpoint is easy to manage since they don't need to have any expert in order to deploy or monitor devices with the help of the product, and it also allows you to try out different actions on different devices. Whenever there is an attack on any device, Check Point Harmony Endpoint has the capability to isolate the affected device from the environment. Suppose there is an attack on one computer. In that case, the security of the other computers operating in the same environment is compromised, so Check Point Harmony Endpoint isolated the affected computer and notified the required department in the company to look into it while allowing for the other computers to work properly. The product offers good value to the companies that deploy it in their environment.
What is most valuable?
I would have to describe what I feel is valuable in Check Point as a whole. Check Point provides users with a central point from where they can manage all the devices across a workplace. Whether users use Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, they don't have to log into different portals or solutions since they can manage everything from one central point. I like the fact that products from Check Point are very easy to deploy. Even if a user has 1,000 endpoints in an environment, Check Point can take care of the deployment in minutes. Check Point Harmony Endpoint is a very easy solution to deploy and requires very little maintenance or technical expertise.
What needs improvement?
I would like to see improvements in Check Point Harmony Endpoint in general because some people use it since it is available at a competitive price. Due to the competitive pricing strategy of Check Point Harmony Endpoint, it is not considered to be a good product, like Fortinet, Palo Alto, or F5. Check Point Harmony Endpoint needs to consider that people should feel that Check Point doesn't compromise on quality even though the price at which Harmony Endpoint is offered is good. People who claim that Check Point Harmony Endpoint is a cheap product don't necessarily mean that it is not a good solution. Fortinet is a very expensive product that offers good value to its customers. If Check Point can work on the value proposition it offers to customers and make them understand that even though the solution is affordable, it is not a bad solution compared to its competitors, then it would be fantastic. The potential customers can opt for Check Point products, considering that they are offered good products at the cheapest price in its categories. It is important for Check Point to ensure that people don't have a wrong perception about the products it has launched in the market.
I don't think there are any features I would like to include, and the tool offers updates when compared with the products from competitors, which I think is a good way to do it. The only challenge is that for many organizations where there is an MDM solution in the environment and an endpoint security tool, my company needs to educate such organizations to convey the message that endpoint and MDM solutions are different products for different purposes, so they are not the same. If Check Point Harmony Endpoint can incorporate MDM into the solution, it can be a fantastic enhancement. Customers need not buy endpoint and MDM solutions if both are made available together in Check Point Harmony Endpoint. My company will have to put extra effort into educating the customers and making them understand the two different solutions. MDM is used to manage your mobile devices, and Check Point Harmony Endpoint is the security for your endpoints.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for over three years.
What do I think about the stability of the solution?
It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution.
What do I think about the scalability of the solution?
It is a very scalable solution.
How are customer service and support?
My company had to contact Check Point's technical team for the installations that my company carried out when we had to deal with around 40 devices that had firewalls from Check Point, which had reached the end of life. For Check Point Harmony Endpoint, my company never had any reason to contact Check Point's technical team.
Which solution did I use previously and why did I switch?
Starting with the pros, I would say that Check Point Harmony Endpoint provides value for money. After purchasing Check Point Harmony Endpoint, you need to consider the fact that the cost you pay for the solution and the value you derive from the product is very proportional. When it comes to Check Point Harmony Endpoint, I can say that a user does not pay high prices for a poor solution. A user pays a decent fee for a very good product. I think the first pro is that the value you get from the solution is made available at a very competitive price. The product is seamless and easy to use. With the centralized portal, a user can manage all Check Point products, including Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, from a single point, which is also a fantastic pro for Check Point. Regarding the cons of the solution, I would say that it stems from people's perception of the solution since they feel that an affordable product may not be good enough. There is a need to work around people's wrong perception of Check Point products. Still, I don't know if such a negative perception is something that is widespread across the globe or whether it is exclusive to Nigeria or the markets in Africa. Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors.
How was the initial setup?
The product's initial setup phase was straightforward. The product's deployment was done in minutes, so it didn't take long, as there was no need to do any special configurations. There was no need for the people involved in the deployment to have any special skills. The deployment process was seamless and straightforward. The product's deployment was never an issue. The IT department need not worry too much about whether they need to learn new skills to manage the product as it is easy to use and deploy and a product that can be used seamlessly. The product's deployment takes around 30 to 40 minutes.
I work with the solution's SaaS version.
What other advice do I have?
I don't think Check Point Harmony Endpoint is difficult to maintain. I think there is a possibility of scheduling your updates in Check Point Harmony Endpoint, even if you want it to happen outside your working hours, like somewhere between eight o'clock in the evening and midnight. I don't think maintenance is stressful because it can be scheduled outside of working hours.
I would recommend others to use the product since the deployment process is seamless, so you don't need any specialized skills to use the portal provided by Check Point to monitor your devices. There are no specialized skills required to support or maintain the solution. It is also very easy to implement the product. You can keep a tab using the centralized portal offered by the product. In general, the product makes the life of the IT department easier since you need not worry about a lot of the technical stuff related to the solution.
From my point of view, I need to put in extra effort to convince my company's customers to use the solution. In terms of the features and the product's ability to deliver the promised value to its customers, especially when compared to other solutions in the market, I rate the overall product an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Complaints analysis/investigation at a healthcare company with 10,001+ employees
Great features, helps with blocking unauthorized access, and protects data
Pros and Cons
- "With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access."
- "We'd like to see better integration with other security tools."
What is our primary use case?
Check Point Antivirus helps us to protect our networks and systems against computer threats such as viruses, spyware, malware, and online attacks. It helped us greatly improve the security perimeter with its advanced features, such as intrusion prevention, threat detection, and access control, which help to protect sensitive data and company information. It's helped us shrink all the security gaps and is an excellent tool for protecting all the endpoints of an organization. If the company must be audited, it helps a lot to meet many of the compliance requirements.
How has it helped my organization?
Check Point Antivirus helped us to improve in several ways. It offers advanced features such as data protection. With it, we were able to protect sensitive and confidential company data from online threats and external attacks.
We also achieved intrusion prevention using intrusion detection to prevent attacks on the company network.
With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access.
With its various features, we can enable business continuity with adequate protection while minimizing risks in operations.
What is most valuable?
Some of the Check Point Antivirus features that users may find valuable include:
The firewall helps provide protection to block unauthorized access to the network.
Intrusion prevention prevents attacks on the company network and helps companies to comply with regulatory requirements related to data protection.
It has a wide range of features that help make this tool one of the best on the market.
What needs improvement?
As with any tool, improvements can be made. Some improvements that would be useful include:
- An updated user interface to improve it to make it easier to use.
- Integration with other security tools. We'd like to see better integration with other security tools.
- They should incorporate artificial intelligence and machine learning
- Performance could be better to reduce the impact on system resources as it consumes a lot of resources from some endpoints.
For how long have I used the solution?
The solution was implemented approximately five years ago.
What do I think about the stability of the solution?
The tool was designed to be highly stable with regular software updates and proactive monitoring.
What do I think about the scalability of the solution?
It is a highly scalable tool that has centralized management, automatic updates, and load-balancing capabilities.
How are customer service and support?
They must improve support and customer service by improving response times and their SLA.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we only used an antivirus on the devices. After migrating our platform to the cloud, we needed a more robust tool and chose Check Point.
How was the initial setup?
The installation of the product is complex if you do not have any previous knowledge. Once that learning curve is overcome, the administration and configuration become easy.
What about the implementation team?
The implementation was done in conjunction with an engineer from the provider and the IT department.
What was our ROI?
It is always good to generate an implementation plan for the acquisition and company requirements to make the best purchase decision and to gain a quick return.
What's my experience with pricing, setup cost, and licensing?
The price and licenses will depend on the features and functions that need to be implemented, as well as the number of devices needed. It is easy to install, however, you must have prior knowledge of the product.
Which other solutions did I evaluate?
We evaluated several solutions on the market that met the characteristics and requirements that we needed. Some were:
- McAfee Endpoint Security
- Trend Micro OfficeScan
- Sophos Endpoint Protection
What other advice do I have?
It is always important to do a cost analysis and check requirements before making a decision.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CEO at a tech services company with 1-10 employees
Provides encryption for operating systems and protection against malware
Pros and Cons
- "It provides encryption for operating systems and protects browsers against malware."
- "The endpoint might consume excessive resources from the machine, which can impact its performance."
What is most valuable?
It provides encryption for operating systems and protects browsers against malware, benefiting both new and old customers.
What needs improvement?
When using Check Point Harmony Endpoint, performance issues may occur, although not necessarily a ransomware attack. The endpoint might consume excessive resources from the machine, which can impact its performance.
For how long have I used the solution?
We have partnered with Check Point Harmony Endpoint.
What do I think about the scalability of the solution?
We have 25 endpoints using this solution.
How are customer service and support?
Email support works fine, but it needs to be on the phone.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment is not complex if you have to manage it. The installation can be done directly if the customer has a good knowledge of Microsoft systems. However, we have to install it manually, which can be difficult, especially when replacing all the old agents.
If the customer doesn't have an IP directory, we only put one person in it. We are deploying up to 1500 endpoints with only one person, maybe in two weeks. If the customer doesn't have an active directory and has 100-200 endpoints to install, we normally have to use three security engineers.
I rate the initial setup a nine out of ten, where one is difficult and ten is easy.
What was our ROI?
We have a particular case where today's endpoint provides complete security against ransomware. It runs effectively from work. It is about eighty to ninety percent effective.
What's my experience with pricing, setup cost, and licensing?
The pricing is high because we lost several customers to Trend Micro and Symantec. Latin America and Columbia particularly have high prices. It was probably fifty percent more.
What other advice do I have?
As a partner, Check Point provides us with the best protection. We can also arrange a demo or discussion to showcase the protection features and advantages to our customers.
Overall, I rate the solution an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Manager - IT at a manufacturing company with 501-1,000 employees
Good monitoring and visibility with compliance capabilities
Pros and Cons
- "It is easy to install from the cloud."
- "Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats."
What is our primary use case?
We use this solution for our desktops, laptops, servers, and selective mobile devices. It offers real-time protection against malware and other malicious threats is superb.
Our previously used antivirus has not been able to identify certain threats. Check Point Harmony did it. That is a key highlight of this product. Check Point Harmony Endpoint includes a firewall component that allows us to enforce network security policies at the endpoint level, including application control, network segmentation, VPN enforcement, etc.
How has it helped my organization?
We can now see the performance of the computers. Previously, we used some other applications where we could see the CPU percentage go increasingly high. Compared to that, this solution is good.
Check Point Harmony Endpoint helps us ensure endpoint compliance with security policies and regulatory requirements by enforcing configuration settings.
Moreover, It provides visibility into endpoint activities and enables security teams to detect, investigate, and respond to security incidents in real-time. So business progress never gets disturbed.
What is most valuable?
It monitors endpoint behavior in real-time to identify and block suspicious activities indicative of malware or malicious behavior. This proactive approach helps us a lot.
It employs sandboxing technology to execute suspicious files in a controlled environment and analyze their behavior. This allows it to identify and block malware that may evade traditional detection methods by remaining dormant or obfuscated.
More importantly, it is easy to install from the cloud.
What needs improvement?
Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats.
Enhancements in compliance management and reporting capabilities could help organizations meet regulatory requirements more effectively and streamline audit processes.
Continuously updating and enriching threat intelligence feeds and research capabilities can improve threat detection and prevention accuracy and effectiveness.
For how long have I used the solution?
I've used the solution for over a year.
What do I think about the stability of the solution?
Check Point is a well established cybersecurity vendor with a long history of developing and maintaining security solutions. Harmony Endpoint benefits from this experience and is built on a solid foundation of technology and best practices. That i believe.
What do I think about the scalability of the solution?
The centralized management console enables efficient management of endpoint security across the entire organization, irrespective of its size. Administrators can easily configure policies, deploy updates, and monitor endpoint activities from a single interface, streamlining management at scale.
How are customer service and support?
Customer service should be improved.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Check Point Harmony has fould a suspicious file that the previous application did not discover (that file was in the system for a period as alogic bomps).
How was the initial setup?
The initial setup was straightforward and easy.
What about the implementation team?
We handled the setup in-house.
What was our ROI?
We've noted ROI in Risk Reduction and have noted:
- Productivity gains
- Compliance cost reduction
- Operational efficiency
- Security consolidation
- Incident response cost reduction
What's my experience with pricing, setup cost, and licensing?
Compared to other service providers, the price is a bit high. That said, it is worth the price.
Which other solutions did I evaluate?
We did evaluate McAfee and Norton.
What other advice do I have?
The solution is good, hence I'm more concerned about the pricing. It would be good if that can be been reduced.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Head of IT at a tech services company with 11-50 employees
A professional and enterprise grade product that secure networks and offers peace of mind
Pros and Cons
- "Check Point Antivirus ensures our organization's security posture by ensuring that everyone accessing the internet does so securely. It performs packet inspection, enabling all security blades to monitor and filter traffic constantly. This includes URL filtering to prevent access to unwanted sites and to protect against any attempts to compromise our network."
- "The product should improve its pricing."
What is our primary use case?
The solution helps to protect our networks.
What is most valuable?
Check Point Antivirus ensures our organization's security posture by ensuring that everyone accessing the internet does so securely. It performs packet inspection, enabling all security blades to monitor and filter traffic constantly. This includes URL filtering to prevent access to unwanted sites and to protect against any attempts to compromise our network.
The product streamlines security operations in our IT environment through its single configuration point, making it easy to configure all available blades. Monitoring, extracting logs from, and integrating with our Active Directory are also easy.
All of the features work in tandem for effective malware prevention.
We are quite satisfied with Check Point Antivirus, as it offers leading-edge features that other companies may not have. Despite the higher price, we carefully selected the product based on its feature set.
The sandbox technology is very useful. It operates offline in the cloud and facilitates easy replication. The tool works with our Ubiquiti switches and Active Directory.
What needs improvement?
The product should improve its pricing.
What do I think about the stability of the solution?
We have stress-tested the tool. We've pushed a lot of requests to it, and it seems to be working fine.
What do I think about the scalability of the solution?
I think we will reach a limit once we get more traffic. But we don't expect that to happen on our current network. However, we would have to move to the next version regarding scalability. They have different tiers in their models with different performance levels. So we pitch in regards to current plus fifty percent. If we exceed that, we must go to the next level and buy the next product. My company has 150-200 users. I operate this with a team of two people. One is a primary, and the other is a secondary. It's extensively used, and we're always configuring and tuning it.
How are customer service and support?
We're paying for premium support, but it's worth its weight in gold because they are very quick. They understand things easily and come back to you with solutions very quickly. They reply quickly and know their stuff, which makes them easy to work with. They help us when we have problems and ensure they understand what we need.
How was the initial setup?
The setup of Check Point Antivirus can be straightforward or complex, depending on your familiarity with the product. Once you're familiar with it, the interface is easy to configure.
The deployment process was quick for us. We configured it using configuration files. We completed the configuration within four days, including a trial version over one weekend and production the following weekend.
What about the implementation team?
We relied on our in-house expertise for the deployment. However, the support provided by Check Point Antivirus was outstanding.
What was our ROI?
The return on investment is positive. Check Point Antivirus is not only securing our network but also simplifying management and facilitating changes.
What other advice do I have?
I rate the overall product a nine out of ten. My advice is that you get what you pay for. While it may cost more, Check Point Antivirus offers a fully mature, professional-grade product. This means you can trust that it's doing its job of securing our network. With Check Point Antivirus, you have peace of mind knowing that if something goes wrong, support is available.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Business Director at a financial services firm with 201-500 employees
A comprehensive endpoint protection tool that is highly stable
Pros and Cons
- "Stability-wise, I rate the solution a ten out of ten."
- "Check Point offers solutions with only a few features for our company's customers' sites."
What is our primary use case?
My company tried Check Point Harmony Endpoint with multiple clients, but unfortunately, we could not get many clients to use the product. Currently, my company has limited clients, like ten to fifteen customers who use Check Point Harmony Endpoint.
What is most valuable?
The valuable features of Check Point Harmony Endpoint stem from the fact that it serves as a comprehensive endpoint protection product that provides users with a fast solution and complete endpoint protection while serving as a tool that offers the fastest recovery for endpoints. The tool efficiently detects, protects, and corrects vulnerabilities and patches.
What needs improvement?
Check Point offers solutions with only a few features for our company's customers' sites. My company hasn't found any bugs or didn't find the solution to be complex. Features like zero phishing, sandboxing, threat emulation and extractions, malware detection, and EDR solution capabilities need to be included in the product. My company expects more granular EDR functionalities in Check Point Harmony Endpoint.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for six months. My company has a partnership with Check Point Harmony Endpoint.
What do I think about the stability of the solution?
Stability-wise, I rate the solution a ten out of ten.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution a nine out of ten.
Check Point Harmony Endpoint is a solution used by the company's clients who operate small and medium-sized businesses.
How are customer service and support?
I rate the technical support an eight and a half out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
I rate the product's initial setup phase a nine out of ten.
The solution is deployed on an on-premises model.
The solution can be deployed within two hours.
During the deployment process of Check Point Harmony Endpoint, my company needs to install the initial client and select an agent from the settings on Windows Server, after which we need to push the solution to the client. Installing the initial client isn't something that is very easy. With all the features like signature-based detection, threat emulations, and sandboxing, users may need to be involved in the creation of a signature group.
What's my experience with pricing, setup cost, and licensing?
Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years.
What other advice do I have?
Check Point Harmony Endpoint is a well-known solution among cybersecurity companies. With Check Point Harmony Endpoint, if my company gets good profit margins along with good opportunities, then we can penetrate into the market to sell it. My company expects support from Check Point, though we don't deal in many of its solutions.
I rate the overall tool a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
HP Wolf Security
Cortex XDR by Palo Alto Networks
Microsoft Defender XDR
Elastic Security
Huntress Managed EDR
WatchGuard Firebox
Fortinet FortiClient
Trellix Endpoint Security Platform
Trend Vision One
Symantec Endpoint Security
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?


















