Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs Zscaler Client Connector comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 1, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Detection and Response (EDR)
7th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
108
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Check Point Harmony Endpoint
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
205
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Anti-Malware Tools (3rd)
Zscaler Client Connector
Ranking in Endpoint Detection and Response (EDR)
32nd
Average Rating
8.8
Reviews Sentiment
5.9
Number of Reviews
6
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.4%, down from 4.0% compared to the previous year. The mindshare of Check Point Harmony Endpoint is 2.5%, down from 2.8% compared to the previous year. The mindshare of Zscaler Client Connector is 0.6%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Mindshare Distribution
ProductMindshare (%)
Check Point Harmony Endpoint2.5%
Cortex XDR by Palo Alto Networks3.4%
Zscaler Client Connector0.6%
Other93.5%
Endpoint Detection and Response (EDR)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
GR
Support at a security firm with 51-200 employees
Remote Access Security Reinforced with Real-Time Device Protection
Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility. It would be helpful to tailor views for different roles, such as IT or security support. Regarding needed improvements, custom report building could be enhanced. Current reports are informative, and a drag-and-drop builder would allow teams to create tailored views for compliance, executive summaries, or operational metrics. For further improvements, enhancing threat simulation and testing would be valuable. Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
DA
IT Support Admin at Kuehne+Nagel
Client activity has been monitored efficiently through in-depth log analysis and traffic filtering
I use the Zscaler speed test, and it is very nice. We use some logs from Zscaler Client Connector to collect data and see what is happening, such as if there is an interruption or something. There is a specific tunnel version that we have to use because, depending on the internet provider, some of them have lower speed, so we have some issues. This is because of the provider, not from Zscaler. We use Office 365 services and Office applications, and because some connections are slow and they do not have full coverage from the internet provider, we have some issues. If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down. This may be because they put some policy. Of course, if you use Office 365 services such as Outlook, the minimum bandwidth is 5 megabits and more, so this causes issues if the users do not have a good remote connection. This depends on the companies and the users, so they need to fix it. This is not from us or our company. It is very useful, and the logs are very helpful. When we go to logs, we understand what is happening.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution's most valuable feature is its ability to rapidly detect certain hardware files."
"Its interface and pricing are most valuable. It is better than other vendors in terms of security."
"After installing this solution, it identified, blocked, and provided the complete attack chain, which was very helpful."
"Stability is one of the features we like the most."
"Traps is quite a stable product. Once it was properly deployed and configured, you have nothing to be worried about."
"It integrates well into the environment."
"The solution's stability is generally good."
"Their XDR agent and their behavioral indicators of compromise (BIOC) are pretty nice. Their managed threat hunting is also pretty nice. They also have WildFire, which is a service for actively looking for malware. It's quite useful."
"The solution offers multiple features in one solution, along with data detection."
"Thanks to Check Point Harmony Endpoint, the threat was immediately detected and contained before it could spread or compromise any data."
"It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks."
"Resource overheads have been reduced and we are overall more secure as a business."
"The most valuable feature is the Zero-day protection, which covers our on-premises users, and well as those users who are outside of our network."
"The centralized management and AI protection of Check Point Harmony Endpoint help us to easily deploy all the endpoints, new endpoints, centrally monitor them, policy enforcement, and everything."
"The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists."
"We find the zero-day protection to be an extremely valuable feature of this solution."
"Zscaler Client Connector has eliminated VPN bottlenecks and outages, improved user productivity with instant secure access, and reduced help desk tickets related to VPN issues, overcoming 60% of VPN-related problems while allowing faster onboarding of remote users and better enforcement of zero-trust security policies."
"The best features of Zscaler Client Connector are that it gives the client a much more transparent experience, as they don't have to worry about connecting to a VPN."
"The solution operates in the background seamlessly without the user noticing."
"Zscaler Client Connector is quite scalable, and I would rate its scalability as nine or ten out of ten."
"The real-time analytics feature in Zscaler Client Connector is another valuable feature called Digital Experience, or ZDX, which can easily identify the root cause of issues accessing public or internal resources and provide good analysis so relevant teams can quickly resolve them, making it a very good tool that helps customers."
"It is very important to see what is happening between the user and the applications that we have, and to filter the traffic from outbound traffic and inside traffic."
"I'd rate the solution nine out of ten."
"It is very useful, and the logs are very helpful; when we go to logs, we understand what is happening."
 

Cons

"Cortex does not offer an on-premises solution. However, some customers would prefer not to be on the cloud. It would be ideal if it could offer something on-prem as well."
"The solution needs better reports. I think they should let the customer go in and customize the reports."
"Product might have some bugs."
"It'll help if customization was easier."
"The complexity and confusion regarding product variants, such as XDR, Forexiant, and Forexon, must be addressed."
"I don't like that they have different types of licenses. For example, if users select a license, they think they will have all the platforms they need to improve their network or security. But after some time, Palo Alto Networks changed their licensing, and some of the features that, for example, were free at the beginning now have a cost. I think the integration can be improved. For example, a lot of tools are just integrated through APIs."
"It should support more mobile operating systems. That is one of the cons of their infrastructure right now."
"There are some default policies which sometimes affect our applications and cause them to run around."
"I think the documentation for Check Point Harmony Endpoint is a little thin because it is not really intuitive."
"There could be more additions to the compatible systems and applications for integration purposes."
"Reporting and management could be improved."
"It took me time to learn how to configure endpoint security."
"Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors."
"It may be interesting to improve this solution against zero-day attacks, as they happen very frequently and are clearly a severe threat."
"The remote deployment with Check Point Endpoint Security requires improvement. We have to depend on some of their deployment tools."
"This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market."
"There is room for improvement regarding the price of Zscaler Client Connector, as it is one of the most expensive solutions available."
"I rate this product nine out of ten because I have seen some minor instability issues after updates and some room for UI improvement for deeper analytics, with instances of major issues after updating the GCC that required rollbacks."
"If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down."
"If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down."
"There is a hard learning curve for Zscaler Client Connector; their support isn't the greatest all the time."
"There is room for improvement regarding the price of Zscaler Client Connector, as it is one of the most expensive solutions available."
"If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down."
"If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down."
 

Pricing and Cost Advice

"The price of the solution could be reduced. I have customers that have voiced that the solution is good for the value but if I want to sell more of the solution the price reduction would help."
"The pricing is okay, although direct support can be expensive."
"The price is on the higher side, but it's okay."
"This is an expensive solution."
"Cortex XDR by Palo Alto Networks is quite an expensive solution."
"It's way too expensive, but security is expensive. You pay for your licensing, and then you pay for someone to monitor the stuff."
"It's about $55 per license on a yearly basis."
"The pricing is a little high. It is per user per year."
"We are paying 2,50,000 Sri Lankan Rupees annually which is the fixed charge."
"We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it."
"Initial monies replacing all AVs with a single product is about £10k."
"We pay roughly 80,000 Swedish krona per year. When it comes to the firewall, it's roughly 150,000 Swedish krona yearly. There's also maintenance, of course, which is roughly 10,000 krona per month."
"The pricing is reasonable."
"The price of Check Point Harmony Endpoint is comparable to SonicWall. The price could be a bit lower."
"In addition to the standard licensing fees, there is a cost for support."
"I bought them for 12 months and I genuinely cannot remember what I paid for them. I think it's about 100 pounds per user per year, so about 10 pounds a month per person."
Information not available
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
9%
Manufacturing Company
9%
Financial Services Firm
9%
Comms Service Provider
7%
Computer Software Company
10%
Manufacturing Company
9%
Outsourcing Company
8%
Comms Service Provider
6%
Manufacturing Company
23%
Government
12%
Comms Service Provider
7%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
By reviewers
Company SizeCount
Small Business133
Midsize Enterprise70
Large Enterprise75
By reviewers
Company SizeCount
Small Business2
Large Enterprise5
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VP...
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Har...
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint works well overall, but one area I would like to see improved is the reporting and dashb...
What is your experience regarding pricing and costs for Zscaler Client Connector?
Zscaler Client Connector is notably costly, with pricing rated at five out of ten in terms of affordability, reflecti...
What needs improvement with Zscaler Client Connector?
Zscaler continues to strengthen the Zscaler Client Connector by introducing new features and expanding the platform’s...
What is your primary use case for Zscaler Client Connector?
I’m not working directly for Zscaler; I work with a partner organization as a Systems Integrator. Our work is not lim...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent, Check Point Antivirus
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Information Not Available
Find out what your peers are saying about Check Point Harmony Endpoint vs. Zscaler Client Connector and other solutions. Updated: March 2026.
884,933 professionals have used our research since 2012.