

Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP).
Initially, we spent two to three days on the investigation process, but now we are able to investigate alerts in only half a day, which has really boosted our performance and shown a return on investment.
Now, the system automatically detects and isolates endpoints within minutes.
The product is affordable and provides excellent coverage and protection across multiple platforms.
The management console is very useful and easy to operate, allowing policy deployment in a minimal amount of time.
It adds value by providing centralized control over servers and endpoints.
If the customer is interested in technical capabilities, we demonstrate the tools, setup, implementation, and their working.
The customer support for Check Point Harmony Endpoint deserves a rating of 10.
We use premium support, and it is beneficial as 24/7 support is available.
I have opened several cases and they were handled very efficiently and quickly.
Whenever I raise a ticket, whether critical or high priority, their team responds immediately, often over calls, and works towards closing the request with the highest priority.
They have very professional engineers, and they often respond effectively.
A dedicated support engineer will come in within three hours.
We initially purchased only 100 licenses and as we grew, we acquired many more licenses without encountering any issues.
The single agent works for multiple operating systems and endpoint types, providing elastic growth and reducing the overall number of components.
Proactive features help guard against data breaches and vulnerabilities.
Trend Micro Deep Security is highly scalable.
In most organizations, they are using a mix of these security solutions.
You can install it on a script basis for Linux and Windows.
Check Point Harmony Endpoint is very stable in our experience, with few crashes or disruptions in daily use.
The stability of the tool is high, as I have not experienced any downtime.
Occasionally, there are some backend issues where the tenant is down, but apart from that, Check Point Harmony Endpoint is stable and working effectively.
It has been extremely stable throughout our usage, with no major disturbances.
Trend Micro Deep Security is very stable and provides protection at all times without issues.
We believe that software works fine until it is patched, managed, or monitored by the IT teams.
Principally regarding the system performance, Check Point Harmony Endpoint impacts us significantly, and addressing this issue would make a substantial difference.
Extending that window would help security teams conduct deeper forensic investigations and meet compliance requirements more easily.
Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
User experience improvement is most crucial, along with enhancements in policy management and the accuracy of the IPS, IDS features for real-time protection.
Additionally, the product is overpriced, which makes it difficult to sell to many customers.
The user interface could be more user-friendly, as navigation sometimes requires familiarity with the console.
It is not expensive and provides comprehensive coverage.
While the prices are higher than those of other solutions, the features justify the investment for customers.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
We give a fair comparison of all the products, and give them clear insights of the products, which makes it helpful for the customer to make a final decision to purchase the license or product.
Trend Micro Deep Security is considered overpriced, which poses a challenge in selling it to many customers.
The pricing is moderate, not expensive or very cheap.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
This feature is valuable for our customer because it stops threats before they reach users by scanning incoming files at the network gateway.
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
It has multiple security layers, including anti-malware, intrusion prevention, integrity monitoring, web reputation, application control, firewall, and log inspection.
Patching allows us to virtually patch servers without downtime, which is critical given our limited patching windows, and helps prevent servers from being exploited.
The IPS module offers virtual patches to resolve issues immediately, making it an excellent product that I recommend for anyone with servers.
| Product | Market Share (%) |
|---|---|
| Check Point Harmony Endpoint | 2.2% |
| Microsoft Defender for Endpoint | 7.8% |
| CrowdStrike Falcon | 6.7% |
| Other | 83.3% |
| Product | Market Share (%) |
|---|---|
| Trend Micro Deep Security | 38.5% |
| Juniper vSRX | 19.1% |
| Sophos Virtualization Security | 18.9% |
| Other | 23.5% |
| Company Size | Count |
|---|---|
| Small Business | 133 |
| Midsize Enterprise | 70 |
| Large Enterprise | 75 |
| Company Size | Count |
|---|---|
| Small Business | 36 |
| Midsize Enterprise | 24 |
| Large Enterprise | 46 |
Check Point Harmony Endpoint provides advanced threat prevention with centralized management and seamless integration, safeguarding networks through robust security features and real-time threat detection. It excels at ransomware prevention, encryption protection, and detailed threat analysis.
Check Point Harmony Endpoint is renowned for its comprehensive security features, including anti-ransomware capabilities and centralized management. It integrates seamlessly with existing systems, enhancing network protection through features like SandBlast Agent and threat emulation. Organizations benefit from significant incident reductions, utilizing its powerful threat detection, forensics, VPN capabilities, and robust encryption measures. Centralized management during remote work setups and enhanced security through URL filtering and rollback mechanisms further solidify its efficiency. Despite its high resource consumption and configuration challenges, it remains a preferred choice among enterprises aiming to enhance cybersecurity measures.
What Key Features Does Check Point Harmony Endpoint Offer?In sectors such as finance and healthcare, Check Point Harmony Endpoint is crucial for maintaining data security and regulatory compliance. Its features cater to endpoint protection requirements across industries, providing reliable solutions for encryption and cybersecurity challenges. The tool's deployment across diverse environments secures endpoint systems effectively, ensuring uninterrupted operations amid evolving threats.
Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing.
The solution is easy to use, scalable, stable, and reliable, with good technical support. It has helped organizations perform well against malware and vulnerabilities, provide patching from the Protection Cloud, and improve their security posture.
Trend Micro Deep Security Features
Trend Micro Deep Security has many valuable key features. Some of the most useful ones include:
Reviews from Real Users
Trend Micro Deep Security stands out among its competitors for a number of reasons. Two major ones are its robust data and loss prevention feature and its patch management, which saves users money. PeerSpot users take note of the advantages of these features in their reviews:
One PeerSpot reviewer, a Senior Security Advisor at a healthcare company, writes, “DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good.”
Nadeem S., CEO at Haniya Technologies, notes of the solution, “Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost.”
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.