No more typing reviews! Try our Samantha, our new voice AI agent.

Blackberry Dynamics Apps vs Check Point Harmony Endpoint comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 1, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Blackberry Dynamics Apps
Ranking in Endpoint Detection and Response (EDR)
67th
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
2
Ranking in other categories
No ranking in other categories
Check Point Harmony Endpoint
Ranking in Endpoint Detection and Response (EDR)
7th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
202
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Anti-Malware Tools (3rd)
 

Mindshare comparison

As of May 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.4%, down from 4.0% compared to the previous year. The mindshare of Blackberry Dynamics Apps is 0.5%, up from 0.0% compared to the previous year. The mindshare of Check Point Harmony Endpoint is 2.2%, down from 2.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.4%
Check Point Harmony Endpoint2.2%
Blackberry Dynamics Apps0.5%
Other93.9%
Endpoint Detection and Response (EDR)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Sukkanta Banerjee - PeerSpot reviewer
Senior Software Engineer at a tech vendor with 10,001+ employees
A way for users to manage their credentials on the go using a stable, and scalable app
I give the solution an eight out of ten. It's hard to comment on the number of users because the feature is completely for corporate employees who have Blackberry devices, so it's hard to track how many users there are. I advise making your decision to use the solution based on the usage in the company or the demand of the business, which you are running based on the demand.
GR
Support at a security firm with 51-200 employees
Remote Access Security Reinforced with Real-Time Device Protection
Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility. It would be helpful to tailor views for different roles, such as IT or security support. Regarding needed improvements, custom report building could be enhanced. Current reports are informative, and a drag-and-drop builder would allow teams to create tailored views for compliance, executive summaries, or operational metrics. For further improvements, enhancing threat simulation and testing would be valuable. Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"My advice for anybody who is considering Cortex XDR is that it is a complete solution, and has very good features."
"After deploying Traps, we saw the performance of the network improve by 65 to 70 percent."
"If any application performs suspicious activities, such as changing registries or modifying other applications, Cortex XDR detects and blocks the entire application."
"The positive impacts I see from Cortex XDR by Palo Alto Networks include a complete 360-degree view of our security posture altogether, being a uniform platform where we are ingesting logs from multiple resources."
"From a single pane of glass, you can easily manage all of your endpoints."
"Has great threat detection capabilities."
"It is a simple platform to use."
"The anti-exploit is impenetrable. We chose Traps because it is the only product that we were not able to get anything past."
"Their technical support is actually quite good."
"The mail is without a doubt the most valuable."
"The solution is very easy to set up."
"The resetting option and creating a password is a very useful on-the-go feature, which gives a user a good experience, obviously a hassle-free experience."
"We are able to manage all our endpoints from a single cloud console."
"Endpoint security is a client-server managed network protection program that blocks unauthorized software, malware, and viruses from entering the network and each client machine and can be set up company specific to block specific file extensions or other devices from accessing the network."
"A good endpoint security product must be able to be flexible in both deployments and across multiple OS versions, and Check Point Harmony Endpoint does that for us."
"The product has been stable and reliable."
"Check Point Harmony Endpoint has positively impacted my organization; we have significantly fewer false positives, it has reduced the number of confirmed infections we deal with, and it has given us better insight into endpoint activity so we now catch more threats at the point of entry."
"When we provision new laptops for remote employees, Check Point Harmony Endpoint automatically applies our security configurations the moment the device connects to the network, which includes anti-ransomware protections, firewall rules, and web filtering."
"We can say that Check Point Harmony Endpoint is a fast solution, easy to install, simple to manage, and, above all, when in use, it is not very intrusive with users' daily activities."
"SandBlast was able to catch it, stop it, and change the files back, and we then got a forensics report to determine what happened with it."
 

Cons

"When it comes to core analysis and security analysis, Cortex needs to provide more information."
"I have seen lagging with Cortex XDR by Palo Alto Networks. There was one time when we faced a threat actor trying to gain access to our system. When our team utilized the tool, we were all on the same dashboard and we faced a lag issue at that time of around five minutes, which was quite significant."
"Limited remote connection."
"Basically, they don't provide customer support tools just to investigate the logs."
"Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth."
"It is not a suitable solution if you are looking for a single product with multiple features such as DLP, encryption, rollback, etc."
"The downside to the solution is that there are a large number of false positives."
"It'll help if customization was easier."
"The user interface could be improved. It was clunky at times."
"The user interface could be improved. It was clunky at times."
"The solution can be improved by adding more features in which the content could be synced."
"The solution can be improved by adding more features in which the content could be synced."
"One of the features that we could use in the future, or would be something additional that we as users and network administrators would want to see, is the ability to integrate this solution with the other existing solutions, such as Harmony."
"One area that could be improved about Check Point Harmony Endpoint is the user interface for policy management. It is functional, but not very intuitive, especially when trying to set granular rules or exceptions."
"Sometimes, with a lot of clients (1,000) the UI is a bit sluggish."
"It's not easy to investigate an incident that you find in the company. Users often face trouble when downloading files, so it is very slow in terms of how it works."
"One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously."
"The price of the product could be more friendly."
"Endpoint vulnerability management is one of the modules I believe is missing and it is something that is required."
"There are still functionalities that I have not been able to fully test and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
 

Pricing and Cost Advice

"The price was fine."
"The return on investment is from the user side because we have seen the performance of it increase the delivery time of the product if we are using too many web-based and on-premise applications. In indirect ways, we saw the return of investment in terms of performance and user satisfaction increase."
"I don't have any issues with the pricing. We are satisfied with the price."
"If one wishes to work with another team or large number of users at a future point, he must purchase a license for them."
"It has reasonable pricing for the use cases it provides to the company."
"The pricing is okay, although direct support can be expensive."
"It's the most expensive solution, but features-wise, it's quite strong. It's very good for protection, so the results are very good in the case of protection. I would rate it a two out of ten in terms of pricing."
"The pricing is a little high. It is per user per year."
"We had a licensing package of $500,000 for three years."
"I am not able to remember the amount, but users have to subscribe for a certain amount, so once they subscribe, the amount gets sent."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"I rate the product price a four on a scale of one to ten, where one is low, and ten is high."
"There are three different licensing models including basic, advanced, and complete, and it needs to be selected according to the endpoint."
"The licensing cost for Check Point is $3 USD or $4 USD per end-user."
"The solution is too pricey."
"We implement this solution with a yearly subscription and there are no extra costs."
"In comparison to other software solutions available on the market, it comes at a higher price point."
"One of the key factors that made us go with this solution was the pricing. On the licensing part, there was an initial complementary set of licenses offered in the initial onboarding package, either 15 or 20. Then, we had some complementary licenses in the initial purchase of the package. That was pretty useful."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
No data available
Computer Software Company
9%
Financial Services Firm
9%
Outsourcing Company
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise21
Large Enterprise48
No data available
By reviewers
Company SizeCount
Small Business135
Midsize Enterprise68
Large Enterprise75
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Har...
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint works well overall, but one area I would like to see improved is the reporting and dashb...
What is your primary use case for Check Point Harmony Endpoint?
Check Point Harmony Endpoint helps to secure our devices as my main use case for this product. When users need to acc...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
No data available
Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent, Check Point Antivirus
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Information Not Available
Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Find out what your peers are saying about Blackberry Dynamics Apps vs. Check Point Harmony Endpoint and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.