Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs OpenText Core Endpoint Protection​ comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 19, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Protection Platform (EPP)
6th
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
119
Ranking in other categories
Endpoint Detection and Response (EDR) (8th)
OpenText Core Endpoint Prot...
Ranking in Endpoint Protection Platform (EPP)
42nd
Average Rating
7.8
Reviews Sentiment
5.8
Number of Reviews
31
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of June 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Check Point Harmony Endpoint is 2.2%, down from 2.9% compared to the previous year. The mindshare of OpenText Core Endpoint Protection​ is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Nasseer Qureshi - PeerSpot reviewer
Comprehensive defensive features boost daily protection and efficiency
I see a need for improvement especially in policy management and policy customization with Check Point Harmony Endpoint. As a new user, I find it somewhat difficult to customize and apply policies due to the various options available. I would appreciate improvement in fine-tuning those policies and integrating with other tools, such as being able to send logs from Check Point to our SIM or syslog solution. The user interface is good, and I really appreciate it, but improvements are needed in policy customization and integration with third-party products. Additionally, I would prefer to see a mechanism to send agents directly from the console to an endpoint during installation.
Urs Schuerch - PeerSpot reviewer
A tool that offers good UI and documentation
Webroot Business Endpoint Protection had sent me a physical installation medium, which was very easy to obtain and deploy. It was also easy to configure, and it had a nice UI. I didn't have any problems with the product. I think that Webroot Business Endpoint Protection is very transparent about the pricing models offered to users. The tool also maintains transparency about the features and specifications. Previously, when I compared the two products with Webroot Business Endpoint Protection, I saw that with Trend Micro, it is very difficult to transparently find out what it offers and how much it charges for it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved."
"The reporting feature where we can see and monitor what happened on our client computers is useful."
"The dashboard is user-friendly and easy to understand."
"Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features."
"The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature."
"Administratively, it's easy to control."
"The most valuable feature of Check Point Harmony Endpoint is centralized management."
"We love that we don't have to upgrade it anymore. They take care of that."
"The main reason we had Webroot is that it was cost-effective for our clients."
"The feature we found most valuable is the AI functionality for maintaining endpoint security. This is very powerful."
"The Webroot cloud console is very powerful."
"We've not had any issues with scalability. If an organization needs to expand, they can do so quite easily."
"The initial setup was straightforward. It took five minutes. I installed the solution myself."
"Auto-Remediation"
"The traffic security monitoring, traffic application access feature called the agent, the main feature which is the endpoint security feature are the ones I found valuable. And it also had the in branch security in kind of SD WAN, good three hundred and sixty protection. It is specific and there is ease of deployment also present."
"There aren't any features that really stand out — I just want it to keep malware out of my system. To date, I haven't had any malware in my system."
 

Cons

"The product updates are a manual process for my administrator and can take several hours out of his day."
"The solution could be improved in the future with a way to provide online training to customers for free, as other providers do."
"They need to make the user interface on the server more intuitive and user-friendly."
"We did have some early compatibility issues, which I hope Check Point has since resolved."
"If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents."
"Endpoint vulnerability management is one of the modules I believe is missing and it is something that is required."
"There should be an indication when you assign an endpoint to be a local proxy for other endpoints. The current system doesn't clearly indicate whether the assignment was successful."
"There are still functionalities that I have not been able to fully test and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
"It would be great if there was a feature which would allow you to scan an individual file on an endpoint user's computer."
"Its detection capability for certain attacks should be improved. It should have better and wider detection for certain malware attacks. It could also have some sort of RMN."
"The only complaint I have with Webroot is its inability to prevent UoD phishing and its inability to check against bots or block anti-attacks. Plus the URL server is in zero-definition."
"They should provide more information on the type of cyber attacks."
"There should be a Webroot Business Endpoint Protection mobile app."
"Technical support is not the best. It's hard to get a hold of them if we need help. It's something that definitely needs improvement."
"Reporting system could be improved."
"It doesn't do anything proactive. The virus has to hit the machine before it detects it."
 

Pricing and Cost Advice

"There are three different licensing models including basic, advanced, and complete, and it needs to be selected according to the endpoint."
"I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high."
"Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years."
"We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it."
"The price is good."
"The licensing cost for Check Point is $3 USD or $4 USD per end-user."
"The product is averagely priced. The product price is neither very high nor too low. The tool is not really expensive."
"Check Point Harmony Endpoint is cost effective."
"I rate the product's pricing a three on a scale of one to ten, where one is cheap, and ten is expensive. There are no costs in addition to the product's standard licensing fees."
"We are on an annual subscription for the use of Webroot Business Endpoint Protection."
"With Webroot Business Endpoint Protection, I can select a yearly billing cycle."
"From a pricing standpoint, I would rate it a four out of five."
"The solution is pretty cheap, actually. At our level, which is at 2,500 endpoints, we're paying 87 cents an agent per month."
"The solution doesn't cost too much. It's about 30 Euros a year for each endpoint. It's pretty affordable for us and for many other companies."
"Our strategy was to overestimate the complexity and cost. It turned out that Webroot's assurance was justified."
"The pricing is high."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
858,038 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Manufacturing Company
8%
Financial Services Firm
7%
Comms Service Provider
7%
Computer Software Company
17%
Real Estate/Law Firm
14%
Comms Service Provider
8%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing, setup costs, and licensing reveals that while it is a bit higher than previous SMB devices, the pricing is worth it for what we are getting in terms of protection and fe...
What needs improvement with Check Point Harmony Endpoint?
Regarding improvements for Check Point Harmony Endpoint, I note that I am using the 1600 versions of the Quantum Spark, and certain options are not available in the dashboard; thus, I selected this...
What do you like most about Webroot Business Endpoint Protection?
I haven't observed any of the instabilities in the solution. It is a stable solution.
What is your experience regarding pricing and costs for Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection is probably on the cheaper side, so I would rate their pricing a one or a two out of ten.
What needs improvement with Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection needs to improve its ability to detect threats. It does not do what it's advertised to do. Real-time threat detection also doesn't work as it should.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
Webroot SecureAnywhere Business Endpoint Protection
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Mytech Partners
Find out what your peers are saying about Check Point Harmony Endpoint vs. OpenText Core Endpoint Protection​ and other solutions. Updated: June 2025.
858,038 professionals have used our research since 2012.