Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs Webroot Business Endpoint Protection comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Protection Platform (EPP)
8th
Average Rating
8.8
Reviews Sentiment
8.0
Number of Reviews
117
Ranking in other categories
Endpoint Detection and Response (EDR) (8th)
Webroot Business Endpoint P...
Ranking in Endpoint Protection Platform (EPP)
42nd
Average Rating
7.8
Reviews Sentiment
5.8
Number of Reviews
31
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Check Point Harmony Endpoint is 2.3%, down from 2.8% compared to the previous year. The mindshare of Webroot Business Endpoint Protection is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Alejandro Flores. - PeerSpot reviewer
Good visibility with cloud centralized management and several layers of security
There are some "weak points" that have to be mentioned, including: 1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents. 2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions. 3) You need a mature security team to manage this solution in order to get the most value from it.
Rick Cassel - PeerSpot reviewer
Lightweight and not hard to set up however, does not offer good reporting
We've had a couple of events both this year and last year where it just didn't seem to catch ransomware, which is impossible to do if someone has hands-on with the system. There were some things that they had or used to have or don't have that I still haven't figured out called journaling. And it was supposed to be a way to roll back changes that were made. However, they're telling me they don't have that. That's not in the system. It’s my understanding that it doesn’t actually scan any files at all. They just look at their database of files they've scanned previously, and either it matches or doesn't. That might be where the shortcoming is, is that it just can't stay up-to-date fast enough to stop new things that are coming in. It's an after-the-fact anti-virus. It doesn't do anything proactive. The virus has to hit the machine before it detects it. There is one thing that is deplorable with the product that I would change as soon as I found a better one. However, the reports are worthless. You go and look at a scan report and cannot get a log of machines. I can log into a console and see the files were scanned every day at 2:00 AM, and they all passed green or something was detected and removed. However, you have to go to the console. I don't have anything that I can send to my client on reports. What they give you is a bunch of bar graphs with no details. You can't drill down. It'll say two infections. However, it doesn't tell you what machines. You've just really got several different reports, and they're all just a bunch of graphs and wasted paper. There's nothing really substantial. The reports that I can use for client-facing, once a month, to say, "Here, we scanned all these workstations. Here are our results," don’t exist. They've got fake reports. I've screamed about that for years, and they just won't do anything. Therefore, I created my own little up-to-date or not ask fail-type report. I send that to them in place of a report directly from a product.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature."
"The most valuable feature of this solution is the VPN."
"It has improved the detection of malware."
"The tool's most valuable feature is its ability to support Windows 7 and other legacy products. We still have users for such systems in the Philippines. I also like its threat-handling and forensic capabilities. The tool is easy to navigate, read, and digest, and its detection capabilities are also good. The solution has good reports that are easy to read."
"Cost-wise it's cheaper than other options."
"It's great for securing our endpoints from any external attacks."
"Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features."
"The product is stable."
"The ease of use of the centralized admin console is its best asset."
"I rate the initial setup phase a ten on a scale of one to ten, where one is difficult, and ten is easy."
"The main reason we had Webroot is that it was cost-effective for our clients."
"Speed"
"The Webroot cloud console is very powerful."
"Probably, compared to other antivirus programs, what we like about it is it is lightweight."
"The feature we found most valuable is the AI functionality for maintaining endpoint security. This is very powerful."
"The solution is very simple and straightforward to use."
 

Cons

"This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market."
"In terms of improvement, the Endpoint Agent can be more lightweight so that older machines and laptops can easily handle its consumption, which would enhance the overall performance in our environment."
"Check Point Harmony Endpoint could improve mobile device management (MDM)."
"Check Point Harmony Endpoint's GUI is old. It needs to have a modern dashboard for logging activities. Compared to other products, the solution is slow in terms of deep scanning."
"The solution needs more alerts to warn of attacks."
"Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries."
"The only thing that our customers want, is lower prices."
"I would like to see is this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses."
"The reporting is the weakest part of the Webroot console. Frequently, I export to Excel to massage something into it to pass on to others."
"We need to have a stronger defense against CryptoLock and other attackers."
"Unified threat management (UTM) integration."
"I want Webroot to be easier to use and set up. It is not very intuitive."
"They should provide more information on the type of cyber attacks."
"Technical support is not the best. It's hard to get a hold of them if we need help. It's something that definitely needs improvement."
"Their customer support should be better. We started having some issues with it, and we didn't get the required support."
"It would be nice if it had a feature for automatically generating reports on the client end for device status, security status and backup information."
 

Pricing and Cost Advice

"The pricing is reasonable."
"The tool’s cost has increased by almost 300% in two years."
"The solution is too pricey."
"Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years."
"We implement this solution with a yearly subscription and there are no extra costs."
"Licensing comes free in that first year or is included in the base package. From a commercial point of view, it really just is the renewal cost, rather than a one-time fixed cost or buy-in."
"In comparison to other software solutions available on the market, it comes at a higher price point."
"I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high."
"With Webroot Business Endpoint Protection, I can select a yearly billing cycle."
"I rate the product's pricing a three on a scale of one to ten, where one is cheap, and ten is expensive. There are no costs in addition to the product's standard licensing fees."
"Get a trial, then a multi-year license."
"It is relatively cheap."
"We are on an annual subscription for the use of Webroot Business Endpoint Protection."
"The solution is pretty cheap, actually. At our level, which is at 2,500 endpoints, we're paying 87 cents an agent per month."
"The pricing is high."
"I can't recall the exact pricing, but I believe there is a monthly fee of $20-30 per user."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
851,604 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
8%
Government
8%
Manufacturing Company
7%
Computer Software Company
17%
Real Estate/Law Firm
13%
Comms Service Provider
8%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
We purchased Check Point directly from Check Point. We are partners. We didn't purchase it from the AWS marketplace.
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint poses a steep learning curve and has high resource consumption, requiring high-performance PCs on our endpoint site.
What do you like most about Webroot Business Endpoint Protection?
I haven't observed any of the instabilities in the solution. It is a stable solution.
What is your experience regarding pricing and costs for Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection is probably on the cheaper side, so I would rate their pricing a one or a two out of ten.
What needs improvement with Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection needs to improve its ability to detect threats. It does not do what it's advertised to do. Real-time threat detection also doesn't work as it should.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
Webroot SecureAnywhere Business Endpoint Protection
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Mytech Partners
Find out what your peers are saying about Check Point Harmony Endpoint vs. Webroot Business Endpoint Protection and other solutions. Updated: April 2025.
851,604 professionals have used our research since 2012.