Check Point Harmony Endpoint has one of the most user-friendly dashboards I've seen.
Pre-Sales Manager at DCIPHERS IT SOLUTIONS
A consolidated security solution that is easy to implement and has a user-friendly dashboard
Pros and Cons
- "Check Point Harmony Endpoint has one of the most user-friendly dashboards I've seen."
- "Check Point Harmony Endpoint's agent is a bit heavy."
What is most valuable?
What needs improvement?
Check Point Harmony Endpoint's agent is a bit heavy.
Check Point Harmony Endpoint should probably support more in Linux as well.
For how long have I used the solution?
I have been working with Check Point Harmony Endpoint for one and a half years.
What do I think about the scalability of the solution?
Check Point Harmony Endpoint is a scalable solution.
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
What's my experience with pricing, setup cost, and licensing?
Check Point Harmony Endpoint's pricing is more competitive than any other vendor. Since it is growing, the solution gives better prices than any other in the market.
What other advice do I have?
It is easy to integrate Check Point Harmony Endpoint with other vendors.
Check Point Harmony Endpoint is easy to implement. I recommend Check Point Harmony Endpoint to other users.
Check Point Harmony Endpoint is a good product. Check Point Harmony Endpoint and SentinelOne are the only two products that can compete in the endpoint space.
Majorly, we push Check Point Harmony Endpoint to our customers. Other than Check Point, if something comes up, we go with SentinelOne. We only sell CrowdStrike when the customer asks for it. We position Check Point Harmony Endpoint and SentinelOne depending on the customer's requirement.
Sentinel One has a bit better breach prevention rate. If a customer needs a consolidated security solution and anti-ransomware protection with ransomware 2.0, then Check Point Harmony Endpoint is the best solution over SentinelOne.
Overall, I rate Check Point Harmony Endpoint ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Compatible, cost-effective, and highly customizable
Pros and Cons
- "Check Point Antivirus is a cost-effective security solution for businesses and that's why its acceptability by various other fields and organizations is humongous."
- "Check Point services and antivirus solutions can improve their customer offerings by offering various discounts in their subscription model and they can also reconsider their pricing model as well."
What is our primary use case?
Check Point Antivirus is a one-stop solution for businesses and professionals. It is one of the most advanced security solution software which helps businesses to secure their IT system and the installed software and hardware through antivirus protection riches one of the best and most affordable in the current item market.
It is one of the most stable software which is globally acceptable and has numerous capabilities and multifarious features and parameters which help businesses to secure their system inside out.
This antivirus is easily deployed and is integrated into any kind of system within a very short span of time. This antivirus software is quite compatible with various dashboards and other electronic platforms and goes well in securing the installed system in the best possible manner.
How has it helped my organization?
Check Point Antivirus has improved the security experience of our ecosystem. Due to this software, now of our workforce is more confident and carefree about any kind of threat entry into the IT system.
This antivirus software has amazing capabilities to fight any kind of malware and ransomware in the IT system.
This antivirus software has numerous features which result in wider acceptability and huge capabilities in diffusing threat attempts and hacking attempts.
Check Point Antivirus is a quite stable software in the market right now as this is one of the most mature and highly customizable security solutions for businesses.
We have been widely impressed by these amazing security features and notifications which help us to have better security compliance in place and also to have up to 100% security protection from any kind of threats and endpoints.
What is most valuable?
Check Point Antivirus has numerous features which are quite remarkable and have a greater impact on improving the performance of the business some of the features are.
Check Point Antivirus software is highly customizable in nature due to which its acceptability by the majority of the organizations like small medium and large enterprises is huge.
Check Point Antivirus is a cost-effective security solution for businesses and that's why its acceptability by various other fields and organizations is humongous.
Check Point Antivirus has a large number of good peer feedback in the public domain due to which the confidence and trust and transparency are high for this partner.
The software is quite compatible and extremely stable in any kind of IT environment.
This software is easy to integrate and deploy in any IT environment.
We are very much impressed by the business team and the tech team at Check Point who are day and night giving their best and proving their excellence in coming up with extremely viable and innovative security solutions for us.
What needs improvement?
There is a huge scope for improvement for any good product in the market.
Check Point services and antivirus solutions can improve their customer offerings by offering various discounts in their subscription model and they can also reconsider their pricing model as well. If certain cost reductions can happen and can take place, then it is going to be ultimately very good for medium enterprises like us.
Also, we are requesting the customer service and the business team of Check Point to have more and more features and improved packages to increase the customer experience.
We would be grateful to the entire Check Point team if we could get some discounts and also some extended trial periods.
For how long have I used the solution?
I've used the solution for over two years.
What do I think about the stability of the solution?
The solution has high stability.
What do I think about the scalability of the solution?
The solution has good scalability.
How are customer service and support?
Technical support has been great so far.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were using a lot of other security solutions earlier. Some of them were Trend Micros Security and McAfee as well as other enterprise security solutions from Splunk.
We realized that these solutions are not very suitable for us as we need dynamic security services since our product is highly customizable and these security solutions are not fitting into the mainstream business. Due to this, we switched ourselves to Check Point and to date, we have had an exceptional experience with this partner as they are quite customizable in nature.
How was the initial setup?
The initial setup is easy and straightforward.
What about the implementation team?
We implemented the solution through a vendor.
What was our ROI?
The ROI is great.
What's my experience with pricing, setup cost, and licensing?
The solution is easy with streamlined costing. Licensing is easy and renewal is seamless.
Which other solutions did I evaluate?
Yes we evaluated a lot of options before switching to Check Point, including:
- McAfee
- Splunk
- Kaspersky
- Trend Micro
What other advice do I have?
This is good to go security software for any kind of business today.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,311 professionals have used our research since 2012.
Senior Consultant at EY India
Cost-effective with real-time and proactive detection
Pros and Cons
- "It has zero-day attack protection."
- "Check Point Antivirus is the best antivirus tool in the market currently."
- "While features are really good and promising to use and implement, a certain level of improvement is required in terms of software deployment across different business environments."
- "While features are really good and promising to use and implement, a certain level of improvement is required in terms of software deployment across different business environments."
What is our primary use case?
Check Point Antivirus is the best antivirus tool in the market currently.
The malware and ransomware catchment rate of the software is just exceptional and worth recognizing and recommending to peers. We have been using the tool for quite some time now and must say that it's quite reliable and highly dependable. It ensures no malware or virus should make any kind of entry into the system and enables a virus-proof environment all over.
The performance efficiency is great and reduced expenses have literally attracted a lot of small and marginal organizations to adopt this software in the first place.
How has it helped my organization?
Check Point Antivirus has significantly improved the outcome and performance output of my organization. It is extremely usable across different business environments and quite compatible with all kinds of portals and dashboards.
It is highly flexible and easy to integrate, with no lags or slip-ups at all. Now, all our verticals are sharing details and working across any kind of unprotected network environment without any tension. We have 100% all-around protection, which is covered by Check Point Antivirus. We'd highly recommend it to all.
What is most valuable?
The solution offers a high malware catchment rate and increased speed, and the performance outcome efficiency is commendable.
It is a highly cost-effective antivirus software in the market compared to its competitors in the market.
The stability of the software is great and highly compatible as well.
Real-time and proactive detection of any malware or ransomware in the system means issues can be removed ASAP.
It has zero-day attack protection.
The product offers complete protection of the system from hijackers, and no phishing activity is allowed under any circumstance. It is high-grade protection with strict system security.
What needs improvement?
While features are really good and promising to use and implement, a certain level of improvement is required in terms of software deployment across different business environments. It is highly advisable to create multiple child logins to operate the running of the software across multiple interfaces in one go without any trouble. Also, it is advised to incorporate the features like round-the-clock, 24/7/365 scanning of the system in the background without disturbing the routine front-end work. This ensures no lapses or threat entry into the system at all.
For how long have I used the solution?
I've used the solution for over a year now.
What do I think about the stability of the solution?
The product is quite stable.
What do I think about the scalability of the solution?
The solution is highly scalable.
How are customer service and support?
Technical support has been great so far.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use a different solution. We started with a trial version of Check Point.
How was the initial setup?
The initial setup is straightforward and easy.
What about the implementation team?
We implemented the solution through the vendor team.
What was our ROI?
The ROI has been good.
What's my experience with pricing, setup cost, and licensing?
The setup is easy and uncomplicated and the annual renewal is quite a smooth process. It's amazingly easy to deploy. Licensing is done in one click without any hassle at all. It was an amazing experience.
Which other solutions did I evaluate?
We looked into Trend Micro, Wipro, etc.
What other advice do I have?
I'd advise others to try the solution today and improve the security system of your organization.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Manager at Agriculture Skill Council of India (ASCI)
Good advanced intelligence and threat prevention with a quick response time
Pros and Cons
- "It is one of the fastest malware prevention software with advanced upgrades to have 360-degree threat detection and system remediation."
- "Check Point Antivirus is the best-in-class security solution for all kinds of enterprises and IT servers and clouds."
- "They can improve the customization features to the greatest extent possible and also help bring automation into system security in the most unified manner possible."
- "They can improve the customization features to the greatest extent possible and also help bring automation into system security in the most unified manner possible."
What is our primary use case?
Check Point Antivirus is the best-in-class security solution for all kinds of enterprises and IT servers and clouds.
It helps in generating active threat detection intelligence responses to the system to stop the entry of virus attacks and also prevent the systems and servers from any potential harm.
It is one of the most advanced security software that helps in threat detection and its easy remediation.
It proactively stops threats and provides immediate security cover to existing infrastructure to avoid any great harm to the system and server.
How has it helped my organization?
Check Point Antivirus helped us to gain extra momentum on the security front, where every security access is now carefully monitored and checked. There is no security breach in our systems. The advanced threat detection intelligence is easy to operate, and even a person from a non-tech background can also go ahead with working with Check Point Antivirus and ensure that the system is secure from all rounds and corners.
The Antivirus can fight malware and ransomware attacks proactively and provides detailed reports through a dashboard and inbuilt reporting and monitoring system, which helps monitor the regular upgrades and progress of working.
What is most valuable?
The advanced intelligence is embedded in the software for ransomware and threat attack detection on systems and servers.
Its prevention of threat attacks and managing of the system security is in a unified manner with complete control covered by the authorization team without any security breach.
It is one of the fastest malware prevention software with advanced upgrades to have 360-degree threat detection and system remediation.
The quickest response time and quick turnaround time help curb the attack in the best possible manner without much harm to the system and servers.
What needs improvement?
They can improve the customization features to the greatest extent possible and also help bring automation into system security in the most unified manner possible.
It is still one of the most remarkable systems securing software with amazing positive rates of detecting and catching malware attacks and also preventing system and data breaches.
All the detection of threat attacks is done in real-time with round-the-clock security features like signature-based threat detection, rootkit threat detection, and many more. Users and the tech team love them.
For how long have I used the solution?
I've used the solution for over three months.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
This is a highly scalable solution.
How are customer service and support?
Technical support has been helpful and supportive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were using a Trend-branded security solution earlier, and due to a smaller response from the business team, we decided to switch and change the vendor.
How was the initial setup?
The setup is streamlined and easy.
What about the implementation team?
We used a vendor team to assist with the initial setup.
What was our ROI?
The ROI is good compared to other security software options.
What's my experience with pricing, setup cost, and licensing?
Check Point Antivirus brings trust, scalability, and advanced security solution features. It is easy to integrate and use across different business environments. The cost is significantly low presently, and utilities are wonderful and worth trying. The licensing and renewal process is also smooth and not complex at all.
Which other solutions did I evaluate?
We looked into McAfee, Avast, Norton, and Bitdefender as well.
What other advice do I have?
Try the solution and experience the best features on your own.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
IBM
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud Solutions Architect at Practice Management of America
Ensure user's machine is protected and securely connected to the network and easy to set up
Pros and Cons
- "With Check Point Antivirus, we can ensure our user's machine is protected and securely connected to the network."
- "Need more documentation."
What is our primary use case?
Our company is a global software product company with a lot of users all around the world. With Check Point Antivirus, we can protect our users' machines and securely connect to a network.
We also automate the installation of antivirus software to all our client machines by using Check Point. It is very good.
The customer support feedback from the Check Point engineer
is very good and makes us feel more confident in the cybersecurity world.
How has it helped my organization?
With Check Point Antivirus, we can ensure our user's machine is protected and securely connected to the network. This will improve the security of the internal and external network.
It has prevented ransomware.
I like the key logging and keyboard detection features.
What is most valuable?
The following is a list of the valuable features:
- Good price
- Best virus database
- It isolates the infected machine.
What needs improvement?
Improvements it should make:
- Need more document
- Need faster customer support
- The price can be better
For how long have I used the solution?
I have used this software for more than five years.
What do I think about the stability of the solution?
The stability is really good.
What do I think about the scalability of the solution?
The scalability is good.
How was the initial setup?
The initial setup was easy.
What was our ROI?
We have seen good ROI.
What's my experience with pricing, setup cost, and licensing?
It would be better if we could get a better price.
Which other solutions did I evaluate?
We also looked at Avast Antivirus.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Manager - IT at NVCL Group
Good monitoring and visibility with compliance capabilities
Pros and Cons
- "It is easy to install from the cloud."
- "Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats."
What is our primary use case?
We use this solution for our desktops, laptops, servers, and selective mobile devices. It offers real-time protection against malware and other malicious threats is superb.
Our previously used antivirus has not been able to identify certain threats. Check Point Harmony did it. That is a key highlight of this product. Check Point Harmony Endpoint includes a firewall component that allows us to enforce network security policies at the endpoint level, including application control, network segmentation, VPN enforcement, etc.
How has it helped my organization?
We can now see the performance of the computers. Previously, we used some other applications where we could see the CPU percentage go increasingly high. Compared to that, this solution is good.
Check Point Harmony Endpoint helps us ensure endpoint compliance with security policies and regulatory requirements by enforcing configuration settings.
Moreover, It provides visibility into endpoint activities and enables security teams to detect, investigate, and respond to security incidents in real-time. So business progress never gets disturbed.
What is most valuable?
It monitors endpoint behavior in real-time to identify and block suspicious activities indicative of malware or malicious behavior. This proactive approach helps us a lot.
It employs sandboxing technology to execute suspicious files in a controlled environment and analyze their behavior. This allows it to identify and block malware that may evade traditional detection methods by remaining dormant or obfuscated.
More importantly, it is easy to install from the cloud.
What needs improvement?
Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats.
Enhancements in compliance management and reporting capabilities could help organizations meet regulatory requirements more effectively and streamline audit processes.
Continuously updating and enriching threat intelligence feeds and research capabilities can improve threat detection and prevention accuracy and effectiveness.
For how long have I used the solution?
I've used the solution for over a year.
What do I think about the stability of the solution?
Check Point is a well established cybersecurity vendor with a long history of developing and maintaining security solutions. Harmony Endpoint benefits from this experience and is built on a solid foundation of technology and best practices. That i believe.
What do I think about the scalability of the solution?
The centralized management console enables efficient management of endpoint security across the entire organization, irrespective of its size. Administrators can easily configure policies, deploy updates, and monitor endpoint activities from a single interface, streamlining management at scale.
How are customer service and support?
Customer service should be improved.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Check Point Harmony has fould a suspicious file that the previous application did not discover (that file was in the system for a period as alogic bomps).
How was the initial setup?
The initial setup was straightforward and easy.
What about the implementation team?
We handled the setup in-house.
What was our ROI?
We've noted ROI in Risk Reduction and have noted:
- Productivity gains
- Compliance cost reduction
- Operational efficiency
- Security consolidation
- Incident response cost reduction
What's my experience with pricing, setup cost, and licensing?
Compared to other service providers, the price is a bit high. That said, it is worth the price.
Which other solutions did I evaluate?
We did evaluate McAfee and Norton.
What other advice do I have?
The solution is good, hence I'm more concerned about the pricing. It would be good if that can be been reduced.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Security Engineer/Architect at a tech services company with 1,001-5,000 employees
Easy to configure and detects many threats and files containing malware
Pros and Cons
- "Check Point detects files containing malware, which some users are trying to download or access. Additionally, it can consolidate multiple emails into one."
- "The antivirus could be improved in terms of the resources it consumes, particularly regarding CPU and memory usage. We've encountered issues with some of our firewalls, leading us to turn off the antivirus feature due to its heavy resource consumption."
What is our primary use case?
We use Check Point Antivirus to protect our company's perimeter. Specifically, we implement antivirus measures solely on the perimeter firewall. This strategy safeguards the company, especially considering the files accessed by employees. Check Point Antivirus shields us from malware and viruses.
How has it helped my organization?
Check Point detects files containing malware, which some users are trying to download or access. Additionally, it can consolidate multiple emails into one.
What is most valuable?
Check Point is easy to configure, and it detects many threats.
What needs improvement?
The antivirus could be improved in terms of the resources it consumes, particularly regarding CPU and memory usage. We've encountered issues with some of our firewalls, leading us to turn off the antivirus feature due to its heavy resource consumption. Enhancing its performance would allow us to run it on smaller models without overburdening the CPU.
While it is a valuable security feature, Check Point should ensure that the hardware is properly dimensioned to support the antivirus feature, providing some margin for potential resource demands. The values provided in the specifications should be realistic and adequate to support the feature effectively on the Check Point firewall.
For how long have I used the solution?
I have been using Check Point Antivirus for ten years.
What do I think about the stability of the solution?
Sometimes, Check Point Antivirus raises connection issues even when the license is valid. Consequently, we encounter difficulties installing the antivirus on various devices. Moreover, the solution isn't always stable. Occasionally, update failures occur without apparent reason, necessitating the need to open a support case.
What do I think about the scalability of the solution?
One thousand users, including the financial, IT, and HR teams, are utilizing this solution, essentially encompassing all departments in their company, as everyone uses the internet. From our experience, it's very resource-intensive and not one of our most scalable features. As I mentioned, sometimes we encounter CPU logs on some firewalls, often related to the antivirus. Therefore, sometimes, we need to turn it off or adjust its settings.
I rate the solution's scalability as seven out of ten.
How are customer service and support?
The solution should have better support from more knowledgeable engineers when opening a case rather than starting with junior engineers and escalating after one or two weeks.
How would you rate customer service and support?
Neutral
How was the initial setup?
Once the security gateway is up and running, you simply navigate to the features section, ensure you have the appropriate license, and enable the antivirus feature. Then, you can select one of the recommended profiles. Once you've chosen the profile, you're all set.
It takes one day to deploy if you have already added the firewall.
I rate the initial setup a nine out of ten, where one is difficult, and ten is easy.
What's my experience with pricing, setup cost, and licensing?
We have the license for all the other FortiGate, which comes with the IPS and antivirus. However, you need to pay for the antivirus separately. In terms of cost, it is slightly more expensive than Fortinet.
What other advice do I have?
Check Point Antivirus has helped us protect our company's security exposure. It has already detected some files that, if successfully downloaded, could pose a significant problem.
However, it consumes a lot of resources. Enabling antivirus on the Check Point firewall is one of the most resource-intensive processes you can allow, even more so than the IPS.
We requested that antivirus be enabled on three of our firewalls because the CPU usage was consistently 90%. Testing this feature has shown that some improvements in performance should reduce resource consumption.
We enable Check Point's default recommended profile. Preset profiles are already available; we choose one to help without configuring our own.
I would recommend improving the performance to reduce resource consumption and enhance stability.
In terms of security, Check Point Antivirus is practical and improves our company's security posture.
Overall, I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
A cloud solution for antivirus, device encryption and URL filtering
Pros and Cons
- "The solution offers multiple features in one solution, along with data detection."
- "Check Point should provide some technical sessions on antivirus solutions."
What is our primary use case?
We use the solution for antivirus, device encryption, file encryption, and URL filtering.
What is most valuable?
The solution offers multiple features in one solution, along with data detection.
What needs improvement?
The agent side should be less. It impacts customers' asset performance because it will be more complex for the customers.
For how long have I used the solution?
I have been using Check Point Antivirus for 6-8 months.
What do I think about the stability of the solution?
Check Point should provide some technical sessions on antivirus solutions. Then, it would be helpful to reach more customers in India.
I rate the solution’s stability a seven out of ten.
What do I think about the scalability of the solution?
The solution is scalable. We have a few customers using this solution.
How are customer service and support?
It is quite difficult to get a response from OEM. We are facing issues with all products except for email security, with the support team of the Check Point.
How was the initial setup?
The initial setup is complex, depending on the number of assets. It takes less than half an hour for a single asset. We should set up everything after deploying and testing it. Symantec takes five to ten minutes after deploying to test everything. We use manual deployment.
What was our ROI?
The solution is helpful for a particular budget. We are getting the best solution that will cover all your parameters.
What's my experience with pricing, setup cost, and licensing?
The product’s pricing is moderate.
What other advice do I have?
Every feature provided by the antivirus software is good compared to other solutions. Sandboxing is helpful for customers while downloading and detecting malicious software.
1-2 persons are required for deployment, whereas the maintenance and monitoring need a team of three to five members.
I will recommend the solution. It's a very good solution compared to other antivirus capability servers. The sandboxing technology is helpful.
We have not integrated it with any other tool set. We integrated a Check Point to get the logs or connect the data.
Overall, I rate the solution an 8 out of 10.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Cortex XDR by Palo Alto Networks
Microsoft Defender for Endpoint
SentinelOne Singularity Endpoint
IBM Security QRadar
Huntress Managed EDR
Elastic Security
HP Wolf Security
Trellix Endpoint Security Platform
Microsoft Defender XDR
WatchGuard Firebox
Fortinet FortiEDR
TrendAI Vision One
Fortinet FortiClient
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?




















