Check Point Harmony Endpoint and Cisco Secure Endpoint are both leading solutions in endpoint security. Check Point Harmony Endpoint has a slight edge in support flexibility and user satisfaction, while Cisco Secure Endpoint is recognized for its comprehensive feature set and overall effectiveness.
Features: Check Point Harmony Endpoint is praised for its robust threat detection, effective remediation capabilities, and ability to pinpoint and neutralize threats. Cisco Secure Endpoint stands out with its integration features, automation capabilities, and advanced security operations that reduce manual tasks.
Room for Improvement: Users of Check Point Harmony Endpoint suggest enhancements in advanced threat protection, reducing system lag during scans, and better performance. Cisco Secure Endpoint could improve its documentation, offer more intuitive training resources, and provide quicker customer service responses.
Ease of Deployment and Customer Service: Check Point Harmony Endpoint is noted for its straightforward deployment process and responsive customer service, making it easy to implement with strong support. Cisco Secure Endpoint is praised for its deployment process but receives mixed feedback on customer service, with some users experiencing slow response times.
Pricing and ROI: Check Point Harmony Endpoint is generally perceived as affordable, offering good value and satisfactory ROI due to effective threat management. Cisco Secure Endpoint, despite its higher pricing, is considered worth the investment due to its advanced features and robust protection, which lead to notable ROI.
I have seen a return on investment with Check Point Harmony Endpoint, as it has saved money and time due to the minimum disruption of production hours, which allows users to focus on their main tasks and desired targets, avoiding downtime and contributing to business growth.
The product is affordable and provides excellent coverage and protection across multiple platforms.
The earlier EDR devices we used were more time-consuming, and deploying that particular agent on all devices took time, but the centralized management console has significantly reduced both time consumption and the extra manual efforts required.
The customer support for Check Point Harmony Endpoint is quite good; they are ready to help us.
I would rate the customer support for Check Point Harmony Endpoint an eight on a scale of 1 to 10.
Only email support is available, leading to delays in getting assistance.
Cisco has good technical support, especially considering these are newer solutions compared to traditional routing and switching products.
The scalability of Check Point Harmony Endpoint is effective, as it manages behaviors, process trees, and analysis in a centralized way.
Allowing us to add more users or endpoints for protection as our organization grows without any issues.
Check Point Harmony Endpoint scales well and meets the growing needs of our organization.
Cisco Secure Endpoint is definitely scalable.
Check Point Harmony Endpoint is stable for our organization size of 1,000 to 10,000 members.
The stability of the tool is high, as I have not experienced any downtime.
We have not encountered any problems.
The integration challenges with Check Point Harmony Endpoint involve needing support with other third-party applications that I wish it worked with more seamlessly.
Better technical support would enhance the product's competitiveness.
High resource consumption, requiring high-performance PCs on our endpoint site.
The forensic capabilities need enhancement, especially for deep forensic data collection.
It is not expensive and provides comprehensive coverage.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
My experience with pricing, setup costs, and licensing has been all good with Check Point Harmony Endpoint.
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
The AI-powered threat prevention in Check Point Harmony Endpoint helps us to detect and prevent sophisticated attacks, and its scalability means it can be deployed across various devices and environments, helping us daily.
The forensics and incident analysis features of Check Point Harmony Endpoint have helped us significantly while performing analysis over the EDR, allowing us to dig down into incidents, including the process involved and the files associated.
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet.
Check Point Harmony Endpoint integrates security solutions, allowing comprehensive protection against cyber threats. It's designed to suit enterprise-scale operations with robust features for threat prevention and management.
Check Point Harmony Endpoint offers advanced security capabilities that prioritize threat analysis, detection, and prevention. Tailored for professional environments, it provides tools to handle endpoint vulnerabilities effectively. Its user-centric design ensures that IT teams can manage network security with streamlined operations. Continuous updates and threat intelligence are offered to counter emerging threats, and its deployment is optimized for ease of use.
What are the key features of Check Point Harmony Endpoint?In specific industries like finance and healthcare, Check Point Harmony Endpoint is deployed to secure sensitive data and protect against sector-specific threats. Its flexibility allows adaptation to meet industry standards, ensuring critical infrastructures maintain operational security without hindrance.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.