Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs N-able EDR comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Detection and Response (EDR)
9th
Average Rating
8.8
Reviews Sentiment
8.0
Number of Reviews
112
Ranking in other categories
Endpoint Protection Platform (EPP) (8th)
N-able EDR
Ranking in Endpoint Detection and Response (EDR)
55th
Average Rating
7.0
Reviews Sentiment
8.7
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Endpoint Detection and Response (EDR) category, the mindshare of Check Point Harmony Endpoint is 2.7%, down from 3.1% compared to the previous year. The mindshare of N-able EDR is 0.4%, down from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR)
 

Featured Reviews

Alejandro Flores. - PeerSpot reviewer
Good visibility with cloud centralized management and several layers of security
There are some "weak points" that have to be mentioned, including: 1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents. 2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions. 3) You need a mature security team to manage this solution in order to get the most value from it.
Yazan Albaw - PeerSpot reviewer
N-able EDR SentinelOne delivers advanced endpoint protection through real-time threat detection, automated response, and comprehensive visibility to safeguard against cyber threats.
N-able EDR SentinelOne is renowned for its exceptional detection and protection capabilities, ranked number one by Gartner and MITRE ATT&CK. It offers robust defense against various threats, including malware, fileless attacks, phishing, and insider threats. The solution excels in identifying suspicious behavior and promptly notifying engineers of potential threats. A key feature is its auto-response capability. You can configure automatic responses to threats, which significantly reduces the time and effort required to manage incidents. Enhanced by machine learning, these automated responses are both efficient and adaptive. Additionally, N-able EDR integrates seamlessly with RMM (Remote Monitoring and Management), allowing us to monitor EDR performance, detect failures, and oversee network performance from a single, unified dashboard. This integration streamlines management and enhances overall efficiency.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Its ease of use is the most valuable feature. We had existing endpoints and it was an easy upgrade process. The interface board is also easy to use."
"This comprehensive approach can safeguard your organization from a wider range of threats, including ransomware, malware, phishing attacks, and zero-day exploits."
"One of the strengths of Harmony is its power to detect threats and keep us safe."
"It has improved the detection of malware."
"It offers complete endpoint protection for all assets."
"Harmony Endpoint is able to detect, monitor, block, and mitigate attacks on the endpoint and it builds and maintains relevant logs for later inspection."
"The main advantage of the solution is the ability to implement complete security policies for the terminals in order to address how apps are installed on corporate devices."
"Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint."
"The most valuable feature, which I can describe as the '360 vision' of the inventory device, provides a complete view of all the devices."
"It provides visibility and a storyline to track the virus or malware's activities, showing infected processes and changes made."
"The most valuable feature, which I can describe as the '360 vision' of the inventory device, provides a complete view of all the devices."
"The most valuable features are the rollback feature, it's important for us. The AI models and are good."
 

Cons

"Check Point users a pattern-based security module, which is something that can be improved."
"An additional feature I would like to see involves the VPN."
"There needs to be compatibility with the most recent versions of the various operating systems."
"If you're using an endpoint that does not have sufficient resources, it would be very tough to use."
"The solution needs better reports and centralized logs."
"A couple of times, we experienced some sales issues."
"It gives you an alert for malicious sites, which, after searching on the Google database, don't come out to be the same."
"Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats."
"I would like to see them add support for both Android and iOS smartphones."
"We have a lot of false positives we see in the dashboard. I think this is the only problem we are facing."
"I would rate the scalability as seven out of ten. The capability is useful. Concerning the license, if I add one more device without a license, it will automatically subscribe to a license. I do not appreciate that."
"Concerning the license, if I add one more device without a license, it will automatically subscribe to a license. I do not appreciate that."
 

Pricing and Cost Advice

"Licensing comes free in that first year or is included in the base package. From a commercial point of view, it really just is the renewal cost, rather than a one-time fixed cost or buy-in."
"I rate the solution's pricing a five out of ten. It costs around ₱2,200 per endpoint."
"I bought them for 12 months and I genuinely cannot remember what I paid for them. I think it's about 100 pounds per user per year, so about 10 pounds a month per person."
"In addition to the standard licensing fees, there is a cost for support."
"Check Point Harmony Endpoint is cost effective."
"In terms of licensing, have a buffer zone around your projects in terms of the amount of endpoints that you want to have. You can always have more, but it is best to leave room for a little increase or growth."
"The product is averagely priced. The product price is neither very high nor too low. The tool is not really expensive."
"Check Point Harmony Endpoint's pricing is more competitive than any other vendor."
"The pricing is average."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
845,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Manufacturing Company
8%
Financial Services Firm
8%
Government
8%
Computer Software Company
18%
Comms Service Provider
11%
Non Profit
8%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
The price for Check Point Harmony Endpoint ( /products/check-point-harmony-endpoint-reviews ) is good considering the services it offers. It is not expensive and provides comprehensive coverage.
What needs improvement with Check Point Harmony Endpoint?
One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days.
What needs improvement with N-able EDR?
I do not have any ideas for improvement. It is a good solution, however, I am not an expert, so I do not have more ideas on this.
What is your primary use case for N-able EDR?
I use N-able EDR for monitoring the devices of my company.
What advice do you have for others considering N-able EDR?
The overall solution rating is seven out of ten. Scalability and integration could be improved, particularly with Microsoft tools.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
No data available
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Information Not Available
Find out what your peers are saying about Check Point Harmony Endpoint vs. N-able EDR and other solutions. Updated: March 2025.
845,406 professionals have used our research since 2012.