


Check Point Harmony Endpoint and Jamf Protect are leading solutions in the endpoint protection sector. Check Point Harmony Endpoint appears to offer a broader feature set suitable for diverse environments, giving it an advantage for organizations with varied operational needs.
Features: Check Point Harmony Endpoint provides advanced threat prevention, sandboxing, and anti-ransomware solutions. It supports multi-environment deployments, including on-premises and cloud, and emphasizes centralized management. Jamf Protect is geared towards macOS environments, integrating seamlessly with Jamf Pro and offering robust macOS threat detection.
Room for Improvement: Check Point Harmony Endpoint could benefit from enhanced third-party product integration, reduced resource usage, and a simplified user interface. Jamf Protect needs improvements in its pricing strategy, integration beyond macOS, and more comprehensive documentation to assist new users.
Ease of Deployment and Customer Service: Check Point Harmony Endpoint offers on-premises, cloud, and hybrid deployment options, though users find the setup process complex. Customer support has received mixed reviews, particularly regarding response times. Jamf Protect is easier to deploy within macOS environments and integrates well with Jamf Pro, but documentation and training could improve for new administrators.
Pricing and ROI: Check Point Harmony Endpoint is priced at a premium, justified by its extensive feature set and effective threat prevention. It offers a solid return on investment by reducing incidents and operational costs. Jamf Protect is costly compared to prior solutions but offers savings per endpoint for macOS-focused clients due to its efficient integration with Apple products.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
Initially, we spent two to three days on the investigation process, but now we are able to investigate alerts in only half a day, which has really boosted our performance and shown a return on investment.
Now, the system automatically detects and isolates endpoints within minutes.
The product is affordable and provides excellent coverage and protection across multiple platforms.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
The customer support for Check Point Harmony Endpoint deserves a rating of 10.
We use premium support, and it is beneficial as 24/7 support is available.
I have opened several cases and they were handled very efficiently and quickly.
The customer support is very proactive, helpful, and knowledgeable.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Activating the newly purchased licenses is instantaneous, allowing installations without adjustments since it's cloud-based.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
We initially purchased only 100 licenses and as we grew, we acquired many more licenses without encountering any issues.
The single agent works for multiple operating systems and endpoint types, providing elastic growth and reducing the overall number of components.
Proactive features help guard against data breaches and vulnerabilities.
Jamf Protect is very scalable, enabling me to manage a large number of devices seamlessly and easily.
I believe Jamf Protect's scalability is effective because we have been using it in our organization since the start, and our numbers have recently risen by a large amount, so we are still using it.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
Check Point Harmony Endpoint is very stable in our experience, with few crashes or disruptions in daily use.
The stability of the tool is high, as I have not experienced any downtime.
Occasionally, there are some backend issues where the tenant is down, but apart from that, Check Point Harmony Endpoint is stable and working effectively.
In the alpha phase, we found out that it was taking twenty to thirty percent of CPU usage, and in some of the Macs, it was taking even more than seventy percent of CPU usage.
Jamf Protect is very stable, and I have not seen any downtime.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
Principally regarding the system performance, Check Point Harmony Endpoint impacts us significantly, and addressing this issue would make a substantial difference.
Extending that window would help security teams conduct deeper forensic investigations and meet compliance requirements more easily.
Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
If they could be flagged the moment I visit them, that would be great because I would know exactly which website was causing the warnings.
Expanding out-of-the-box support for additional SIEMs.
I just want them to streamline everything into Jamf Pro so I can use one portal for everything rather than going to three or four different portals.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
It is not expensive and provides comprehensive coverage.
While the prices are higher than those of other solutions, the features justify the investment for customers.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
Jamf Protect includes a number of features that other EDR solutions charge additional fees for, such as compliance and device control.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
This feature is valuable for our customer because it stops threats before they reach users by scanning incoming files at the network gateway.
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
I can think of having a general sense that Jamf Protect makes me and my team feel more secure because I have not noticed or seen any security-related breaches with me or with any of my other colleagues.
Jamf Protect offers good telemetry and auditing capabilities.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.6% |
| Check Point Harmony Endpoint | 2.1% |
| Jamf Protect | 0.9% |
| Other | 93.4% |


| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 21 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 135 |
| Midsize Enterprise | 68 |
| Large Enterprise | 75 |
| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 4 |
| Large Enterprise | 11 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Check Point Harmony Endpoint provides advanced threat prevention with centralized management and seamless integration, safeguarding networks through robust security features and real-time threat detection. It excels at ransomware prevention, encryption protection, and detailed threat analysis.
Check Point Harmony Endpoint is renowned for its comprehensive security features, including anti-ransomware capabilities and centralized management. It integrates seamlessly with existing systems, enhancing network protection through features like SandBlast Agent and threat emulation. Organizations benefit from significant incident reductions, utilizing its powerful threat detection, forensics, VPN capabilities, and robust encryption measures. Centralized management during remote work setups and enhanced security through URL filtering and rollback mechanisms further solidify its efficiency. Despite its high resource consumption and configuration challenges, it remains a preferred choice among enterprises aiming to enhance cybersecurity measures.
What Key Features Does Check Point Harmony Endpoint Offer?In sectors such as finance and healthcare, Check Point Harmony Endpoint is crucial for maintaining data security and regulatory compliance. Its features cater to endpoint protection requirements across industries, providing reliable solutions for encryption and cybersecurity challenges. The tool's deployment across diverse environments secures endpoint systems effectively, ensuring uninterrupted operations amid evolving threats.
Jamf Protect provides comprehensive security for Apple devices, aiding in malware protection, threat prevention, CIS benchmarks, and USB blockages while supporting local accounts and password sync.
Designed for managing Apple devices, Jamf Protect offers robust security features, such as malware detection and prevention, unauthorized data transfer blocks, and enhanced security profiles. It allows seamless deployment and upgrades of applications, coupled with efficient endpoint management. The tool ensures zero performance impact while providing real-time notifications for password updates and comprehensive data protection across all Mac OS versions.
What are Jamf Protect's most notable features?Industries such as education, healthcare, and finance leverage Jamf Protect to maintain stringent security standards, streamline application deployment, and ensure devices meet compliance requirements. They benefit from real-time threat alerts, comprehensive data protection, and zero-touch integration, enhancing overall operational efficiency.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.