Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs OpenText Core Endpoint Protection​ comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 23, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Protection Platform (EPP)
4th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
205
Ranking in other categories
Anti-Malware Tools (3rd), Endpoint Detection and Response (EDR) (6th)
OpenText Core Endpoint Prot...
Ranking in Endpoint Protection Platform (EPP)
50th
Average Rating
7.8
Reviews Sentiment
5.8
Number of Reviews
31
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2026, in the Endpoint Protection Platform (EPP) category, the mindshare of Check Point Harmony Endpoint is 2.2%, down from 2.7% compared to the previous year. The mindshare of OpenText Core Endpoint Protection​ is 1.2%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
Check Point Harmony Endpoint2.2%
OpenText Core Endpoint Protection​1.2%
Other96.6%
Endpoint Protection Platform (EPP)
 

Featured Reviews

GR
Support at a security firm with 51-200 employees
Remote Access Security Reinforced with Real-Time Device Protection
Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility. It would be helpful to tailor views for different roles, such as IT or security support. Regarding needed improvements, custom report building could be enhanced. Current reports are informative, and a drag-and-drop builder would allow teams to create tailored views for compliance, executive summaries, or operational metrics. For further improvements, enhancing threat simulation and testing would be valuable. Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
reviewer2584380 - PeerSpot reviewer
vCIO At Grove Networks Inc. at a computer software company with 11-50 employees
Improving threat detection is critical for enhanced protection
We use Webroot Business Endpoint Protection as a NextGen antivirus solution for our clients. It's included in the contract we have with our clients as a cost-effective option for antivirus protection Webroot Business Endpoint Protection is cost-effective for rolling it out to all of our clients,…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"When we provision new laptops for remote employees, Check Point Harmony Endpoint automatically applies our security configurations the moment the device connects to the network, which includes anti-ransomware protections, firewall rules, and web filtering."
"Check Point Harmony Endpoint has positively impacted the organization by allowing policies to be configured and enforced from the central console, eliminating the need to manage multiple branches separately."
"Check Point Harmony Endpoint has positively impacted my organization; we have significantly fewer false positives, it has reduced the number of confirmed infections we deal with, and it has given us better insight into endpoint activity so we now catch more threats at the point of entry."
"It generates enough visibility in terms of what happens on our equipment."
"Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks."
"We love the reports and monitoring they provide."
"It is very easy to manage the Antivirus blade, even for newcomers in our technical support team, which is a key area of interest for us."
"Since we started using it, we've seen fewer security incidents, faster response times, and better protection against ransomware."
"I rate the initial setup phase a ten on a scale of one to ten, where one is difficult, and ten is easy."
"Doesn't consume resources or affect the computer performance at all."
"Low performance requirements."
"The initial setup was straightforward. It took five minutes. I installed the solution myself."
"The solution is very simple and straightforward to use."
"Speed"
"The feature we found most valuable is the AI functionality for maintaining endpoint security. This is very powerful."
"Their policy management, their cloud-based dashboard and user interface are very easy to navigate."
 

Cons

"Support's service and the response times can be improved. The triaging of the tickets takes a long time and the tickets are only resolved with escalations."
"They could be focused on the analysis of USB devices."
"The management in Check Point Harmony Endpoint could be improved."
"For the future, I would like to see maybe a content-filtering emulation feature in Harmony Endpoint."
"We need a higher maximum file size in the sandboxing feature."
"They should also add new functions such as threat hunting."
"Check Point users a pattern-based security module, which is something that can be improved."
"The documentation of Check Point Harmony Endpoint needs improvement because it is very hard to find on the internet and it is not intuitive."
"It would be great if there was a feature which would allow you to scan an individual file on an endpoint user's computer."
"Since they're dealing with multi-core environments now, the best option would be for them to enhance the product so that the product can automatically do an assessment on the machine."
"It doesn't do anything proactive. The virus has to hit the machine before it detects it."
"I want Webroot to be easier to use and set up. It is not very intuitive."
"I did notice that my OS slowed down, but I don't know if that's due to Webroot."
"I'm not happy with Webroot Business Endpoint Protection, for only one reason. It seems that it slows down my interface when I'm doing programming in Microsoft Access, tremendously."
"Usually, when it comes to reliability, McAfee and Norton are at 99 percent. Webroot's percentage is lower. It is 94% reliable in terms of what it catches, but you're trading that percentage for customer satisfaction because your computer isn't being constantly told that it just blocked something, or it just did something."
"Webroot Business Endpoint Protection needs to improve its ability to detect threats."
 

Pricing and Cost Advice

"I bought them for 12 months and I genuinely cannot remember what I paid for them. I think it's about 100 pounds per user per year, so about 10 pounds a month per person."
"The product is averagely priced. The product price is neither very high nor too low. The tool is not really expensive."
"Check Point Harmony Endpoint is cost effective."
"The price is good."
"In addition to the standard licensing fees, there is a cost for support."
"The cost is huge compared to other products that are available on market."
"Check Point Antivirus is an expensive solution, especially for clients that don't have as many endpoints. Check Point Antivirus has a free trial for one month, and within the trial period, there's no limit to the number of endpoints it can support, but when the trial expires, you'll have to buy the license, which covers one year. You can't buy a license for the solution without being a Check Point partner first."
"I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high."
"If you purchase for clients, then you are the managing billing entity. It's better to either get a monthly subscription check from your clients, or to prepay for the year (so as to not keep cash in reserve to pay the bill each month) IMHO."
"With Webroot Business Endpoint Protection, I can select a yearly billing cycle."
"Get a trial, then a multi-year license."
"Its cost is not much per month. Our price is a couple of bucks a user."
"We are on an annual subscription for the use of Webroot Business Endpoint Protection."
"I think the price is fairly reasonable. I was really prepared to pay more, but the price is fine."
"Webroot is less expensive than SentinelOne."
"From a pricing standpoint, I would rate it a four out of five."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
881,757 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Manufacturing Company
9%
Outsourcing Company
7%
Comms Service Provider
6%
Computer Software Company
10%
Performing Arts
8%
Manufacturing Company
8%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business133
Midsize Enterprise70
Large Enterprise75
By reviewers
Company SizeCount
Small Business35
Midsize Enterprise2
Large Enterprise2
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Harmony Endpoint offered competitive pricing for small user counts such as thirty-f...
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint works well overall, but one area I would like to see improved is the reporting and dashboard experience. Sometimes the alerts are clear, but digging into historical dat...
What is your experience regarding pricing and costs for Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection is probably on the cheaper side, so I would rate their pricing a one or a two out of ten.
What needs improvement with Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection needs to improve its ability to detect threats. It does not do what it's advertised to do. Real-time threat detection also doesn't work as it should.
What is your primary use case for Webroot Business Endpoint Protection?
We use Webroot Business Endpoint Protection as a NextGen antivirus solution for our clients. It's included in the contract we have with our clients as a cost-effective option for antivirus protection.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent, Check Point Antivirus
Webroot SecureAnywhere Business Endpoint Protection
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Mytech Partners
Find out what your peers are saying about Check Point Harmony Endpoint vs. OpenText Core Endpoint Protection​ and other solutions. Updated: February 2026.
881,757 professionals have used our research since 2012.