Try our new research platform with insights from 80,000+ expert users
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle
User
Helpful support, good scanning capabilities and has a nice, modern dashboard
Pros and Cons
  • "It has blocked many malware attacks aiming to corrupt and damage company data."
  • "The automatic updates use my internet during downloads before I authorize them."

What is our primary use case?

This antivirus has powerful security features that online threats cannot compromise. It protects all the company's computational devices from ransomware attacks. 

It gives me confidence when browsing the internet with advanced data analytics. 

It has blocked many malware attacks aiming to corrupt and damage company data. 

The solution detects unsafe files and downloads from the internet that are not safe. When doing my research, it gives a warning in advance before I run unsafe links and visit insecure sites.

How has it helped my organization?

I have used this antivirus on both desktop and mobile devices, and it has really helped me from engaging with unsafe content. 

It ensures that we publish excellent articles that meet international policies. 

It is simple to use this software, and we can set it up on any device. It has prevented the company systems from facing interruptions from external viruses that can harm confidential information.

The dashboard is modern and very robust when it comes to data visualization. 

It cleans files that are contaminated before sharing them with my colleagues.

What is most valuable?

Threat detection and response have been a great contribution to our daily programs. 

It provides daily reports on the status of the device and notifications when there are looming data threats. 

It has deployed firewalls that safeguard devices from any cyber attacks that can negatively affect workflows. When working with this antivirus, it does not affect operations in any way. 

Scanning files and data before sharing has reduced the chances of spreading viruses among the members. 

This tool has been stable and has highly improved the security status of the applications.

What needs improvement?

The automatic updates use my internet during downloads before I authorize them. 

This slows down processing power affecting the speed of operations. Integration with outdated systems is impossible. Reporting sometimes is delayed catching the user unaware of virus threats that may affect performance. 

Most features have been working effectively since I deployed this software. I have experienced very few cases of downtime. 

The customer support staff has been working 24/7/365 to ensure the system functions excellently.

Buyer's Guide
Check Point Antivirus
March 2025
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,651 professionals have used our research since 2012.

For how long have I used the solution?

I've been using the solution for eight months.

What do I think about the stability of the solution?

The performance of this tool is good, and I recommend it to other business enterprises.

What do I think about the scalability of the solution?

Check Point Antivirus has provided comprehensive digital security.

How are customer service and support?

I have been working closely with customer service and their work is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used REVE Antivirus. However, It was very heavy, and it sometimes affected browsing.

How was the initial setup?

The setup was not complex at all.

What about the implementation team?

The implementation was done by the vendor team.

What was our ROI?

The recorded ROI has increased from 20% in the past six months to 50%.

What's my experience with pricing, setup cost, and licensing?

The setup process is simple, and it is easy to learn how it works.

Which other solutions did I evaluate?

I evaluated Powertech's Antivirus. The cost and functionalities were not efficient, however.

What other advice do I have?

This is a great antivirus that has given us a secure space for safe browsing and protection from online theft.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Shrinkhala Jain - PeerSpot reviewer
Project Consultant at a consultancy with 10,001+ employees
User
Quick to deploy with a threat catchment rate and good security
Pros and Cons
  • "It is a great, cost-effective, and stable security solution to opt for."
  • "More posting of user feedback is requested across all websites and Google so that more traction can be attained. Seeing reviews helps create more confidence with clients and partners."

What is our primary use case?

This is the best security software for all organizations to have. It restricts 100% entry of all malicious files and prevents any threatening attacks from the system. 

It's one of the best software to have and increases the security checks for various verticals. 

It removes any unwanted and malicious files and folders and ensures round-the-clock protection from any threat sources. 

It came highly recommended by peers in different fields. 

Their business and tech team is highly competent and gives the best solution to users instantly without any challenges. They are highly ethical and quite professional in how they see things.

How has it helped my organization?

Check Point Antivirus is a good security software for businesses to prevent systems and their components from any ransomware and malware threat attempts. 

Also, it is one of the best solutions to counter threat sources and threat attacks through global scanning and cloud integration with third-party secure portals. It ensures complete end-to-end security of information flows throughout. It is quite a customizable solution and meets all kinds of demands in a much more streamlined manner without any hiccups. 

It is a great, cost-effective, and stable security solution to opt for.

What is most valuable?

The solution offers a quick deployment without any issues. 

The threat catchment rate of the software is very high and quite impressive. 

It is easy to integrate with all kinds of other software and hardware and works with cloud integration. We have no more tension around compatibility parameters as the software is quite stable and works efficiently across varied business environments. 

It is quick and agile and, with global scanning, it scans with great speed and works flawlessly in the background of the system without interrupting the front-end work

What needs improvement?

They could improve across many areas, like bringing in more customization and reducing the cost further. The price can be a restraining factor for many to adopt a new solution and leave an old option behind. 

More posting of user feedback is requested across all websites and Google so that more traction can be attained. Seeing reviews helps create more confidence with clients and partners. 

We demand more training orientation and quick upgrades in security parameters and utility features to have better exposure end to end.

For how long have I used the solution?

I've been using the solution for over 1.5 years now.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is completely scalable.

How are customer service and support?

Technical support is good so far.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a localized solution from one of our partners.

How was the initial setup?

The initial setup is easygoing. We've had no pain at all.

What about the implementation team?

We implemented the product using an in-house team.

What was our ROI?

The ROI is great.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is one of the best and fastest virus-scanning software in the market and you will not be disappointed at all. It's easy to deploy and integration is great. The pricing is also quite affordable. They offer easy renewal and signing of SLAs, which are hassle-free.

Which other solutions did I evaluate?

We looked at a lot of different options. We tried ESET, Norton, Kaspersky, etc.

What other advice do I have?

Try this security solution. Millions of like us are choosing this option. It's the best solution.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Antivirus
March 2025
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,651 professionals have used our research since 2012.
Assistant Manager at ASCI
User
Great support, good threat detection, and high customization
Pros and Cons
  • "Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users."
  • "Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner."

What is our primary use case?

Check Point Antivirus software is highly reliable and dependable security software that restricts malware entry into our IT system and keeps secure our IT system at its best. It is the most advanced security solution which enables the IT system to scan all the system components effortlessly and do proactive threat detection onto the system to identify any incumbent threats. 

It helps run the scanning on integrated system components and the cloud server with fewer false negative cases to ensure the system's performance at its best. It provides the system with foolproof security and ensures high customer satisfaction always.

How has it helped my organization?

This security solution is one of the best so far. It enables IT professionals and businesses to work carefree with internal and external stakeholders and their IT systems and exchange information securely without any data theft or leakage. It is highly advised to incorporate this solution at all the critical windows and stages of system flow so that no malware attack can come inside the system under any circumstance.

It has improved the turnaround time for our project completion and system integration activities as it's the need of the hour for all the stakeholders in today's world.

It has lead to improved positive performance outcomes with high-end productivity. There are no more system issues, and complaints as IT does not bother us now.

What is most valuable?

Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users. 

The Check Point Partner keeps updating its EDR system and ensures no lapses occurred during the operating time. The entire team of Check Point is quite agile and proactive in terms of their advanced product development and their reaction time to any issue or complexity is just fantastic which ensures no deep damage to the system from threats.

EDR improvement checks system security and a proactive business and tech team improves customer interaction in the greatest manner possible.

What needs improvement?

Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner. This will ensure more credibility and confidence in customers and helps relationships last longer. High-end wonderful experiences for clientele will result in peer recommendations, which will certainly enhance the customer base for Check Point.

Keep improving your business offerings and go for an extension of the trial version for a longer period so that everyone can be benefitted from the same.

For how long have I used the solution?

It's been over six months now since we started using the product. It's one of the best available solutions so far.

What do I think about the stability of the solution?

The product offers high stability and flexibility.

What do I think about the scalability of the solution?

The product is quite scalable and replicable across all kinds of IT environments 

How are customer service and support?

Support is wonderful and we highly recommend them. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a few peer-recommended security solutions earlier.

How was the initial setup?

The setup is not complicated at all. We had smooth onboarding and easy deployment.

What about the implementation team?

We implemented it through a vendor.

What was our ROI?

We've seen over 75% ROI.

What's my experience with pricing, setup cost, and licensing?

It's cheap and quite low presently, and the room for customization is humongous currently. High time to go for these solutions as they are accelerating with great performance and pace.

Which other solutions did I evaluate?

We looked at McAfee and Kaspersky. They were evaluated thoroughly by our business and tech teams.

What other advice do I have?

I strongly recommend this solution to all IT businesses and professionals. This is a one-stop solution for all your security woes. Go for its trial today and experience the new age security utilities on your own.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Filters websites well, has good phishing protection, and is reasonably priced
Pros and Cons
  • "Check Point offers a comprehensive solution that will not only create a firewall but will also protect the traffic of data from an application usage standpoint."
  • "Filtering the websites that can be visited is important also as there's always a chance to come by sites that, just by clicking, will download malicious threats."

What is our primary use case?

I wanted to protect my system from threats as sensitive business information was being stored in it, understanding that keeping the hardware in a secure location won't be enough measure to protect all the data in it. I went over different options in the market as Kaspersky Lab, ESET, Symantec, and Check Point of course, and spoke to a representative and did my own investigations. I came to the realization that this was the best solution for the need and the budget I had available and it hasn't disappointed me since.

How has it helped my organization?

Given the fact that threats are evolving every day, it is really important to have a solution that's ahead of transforming viruses that can leak in multiple forms and channels. Check Point offers a comprehensive solution that will not only create a firewall but will also protect the traffic of data from an application usage standpoint. It also provides email protection and detects threats in the public networks you're trying to connect your device to.

What is most valuable?

Phishing is an issue that is affecting a lot of businesses given the huge email traffic in businesses. Sometimes the server security firewalls won't detect threats from coming into the endpoints, so email protection is definitely one of them that's helpful. 

Filtering the websites that can be visited is important also as there's always a chance to come by sites that, just by clicking, will download malicious threats. Even when you are on secure sites, you will see that, with Check Point, some ads and advertising will be blocked as they could be potential viruses.

What needs improvement?

We've noticed that the management console has some limitations as it's managed through the browser. Despite being user-friendly it could definitely include a wider range of security measurements that can make it more customizable depending on the end-user interests. If the end-user happens to want a Linux OS it can't access the smart console as it's .exe and only supported through Windows. This means they'll have to use a virtual PC to access the .exe which just makes it a bit of a hassle for these end-users.

For how long have I used the solution?

I've been using the solution for over seven years.

Which solution did I use previously and why did I switch?

We did use Kaspersky and switched as there were security concerns around the privacy of the data.

What's my experience with pricing, setup cost, and licensing?

Check Point's price point was right in the middle. It's not the cheapest and not the most expensive and offers a good cost/benefit ratio.

Which other solutions did I evaluate?

We looked at Kaspersky, ESET, Symantec, BitDefender, and McAfee.

What other advice do I have?

Overall I am very satisfied.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IdoSarusi - PeerSpot reviewer
Developer at Shavit-security
Reseller
Top 5Leaderboard
Has an efficient sandboxing feature, but the malware detection capabilities need improvement
Pros and Cons
  • "The initial setup was straightforward."
  • "There is room for improvement in detecting more sophisticated and emerging threats."

What is our primary use case?

We primarily install Check Point Antivirus on company computers and laptops to prevent malware infections, particularly focusing on protecting against phishing attacks and malicious downloads by employees.

How has it helped my organization?

The platform has significantly improved our organization's cybersecurity posture by effectively detecting and containing malware threats. 

What is most valuable?

The product's sandboxing feature is valuable as it runs suspicious files in a virtual environment. It helps us analyze their behavior without risking the main system.

What needs improvement?

The platform's malware detection capabilities could be enhanced. There is room for improvement in detecting more sophisticated and emerging threats.

Additionally, including AI-driven features that can automatically generate and optimize security policies based on the organization's specific needs and threats would be beneficial.

For how long have I used the solution?

I have been using Check Point Antivirus for about two to three years.

What do I think about the stability of the solution?

The platform has proven to be very stable. We have not encountered any major issues or downtime related to its operation.

What do I think about the scalability of the solution?

The product seamlessly scales from small to large deployments without any noticeable performance degradation. I rate the scalability a ten. 

How are customer service and support?

I have heard positive feedback regarding the technical support team's responsiveness and expertise.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup was straightforward. Installing agents and deploying the software on devices was simple, although configuring detailed security policies required some cybersecurity knowledge.

What other advice do I have?

I rate Check Point Antivirus a seven out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Good security features and excellent protection from malware and ransomware
Pros and Cons
  • "One of the characteristics of this antivirus that is valuable is the detection of ransomware."
  • "We'd like them to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident."

What is our primary use case?

We had an absence of an antivirus utility that would give us protection inside and outside the organization. This tool integrated into several Check Point solutions helped us remedy this need. Starting from there, we have been applying this feature to meet the need and keep our users safe and secure. 

This solution is consistently implemented as part of the organization's endpoint security solution, combining global threat intelligence and next-generation advanced threat prevention engines. 

How has it helped my organization?

The endpoint security features are great. You not only have a solution that manages your computer but also protects you from malware, ransomware, and also from any other virus. You can do so from wherever you are and connect your computer to the internet. This feature learns well and is supported by global threat intelligence and zero-day threat prevention engines and many of the new generation. 

For us, it is important to have solutions that always protect and innovate the security of users and above all security and protection in real time. 

What is most valuable?

One of the characteristics of this antivirus that is valuable is the detection of ransomware. I can detect viruses that have done the most damage in recent years. I can protect users from damages and total or partial loss of information. We're being well protected. This protection feeds on databases that are constantly updated, giving greater security. It is worth using, and having in our organization is one of the products that will make the difference during an attack and will safeguard the security of the equipment.

What needs improvement?

I would like to see, in the future, this virus emulation feature deployed to endpoint security where it sends the virus found in sandboxing and emulates the attack, notifying administrators via a portal so that they can find out and learn from the attack that they are having.  

Another point to consider is the ability to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the scalability of the solution?

It is easy to configure and is not very invasive with users, which makes it very practical to use.

What's my experience with pricing, setup cost, and licensing?

Their service in Spanish is something that we need. We've had a bad taste based on this part of the service. We need more attention to our language. 

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1678761 - PeerSpot reviewer
Assistant Manager at CIANS ANALYTICS PVT. LTD
User
A good antivirus with excellent email alerts but needs better technical support
Pros and Cons
  • "We like the sandbox feature."
  • "Technical support could be better."

What is our primary use case?

We primarily use the solution as an antivirus. We want to protect our systems from malware and viruses.

We are still doing work from home and we are not sure how long this will last. Before Check Point Harmony software, we depended on Windows Defender Antivirus, but we realized that it was not so good. We wanted some good AV so that users who are working on a VPN would have an antivirus installed on their system. 

Also, we wanted a sandbox feature so that, if any machine got infected, we can automatically isolate it from the network.

How has it helped my organization?

When starting, we faced many issues. It was due to a partner mistake, however. The partner gave us the wrong setup which caused laptops to crash and it lowered the efficiency. We escalated to our Check Point sales account manager. He immediately set us up with some other partner and tried to resolve the issue. He found the root cause, but still, we needed to format the system. It has been more than 3 months, and now the user's system is working fine. 

We always receive alert emails from Check Point regarding malware or virus status, which is helpful.

What is most valuable?

We like the sandbox feature. If any machine got infected, it would get automatically isolated from the network. As such, we haven't faced any issues. We like that we have an option to isolate. 

The alert email from Check Point is also very valuable. If any machine didn't get a scan or has a virus due to visiting various websites on a browser, it automatically sends us an email to warn us. Accordingly, we can take action on that particular machine. 

Overall, the antivirus is good.

What needs improvement?

Technical support could be better. When we register a complaint, we need to register it via the portal only, which is atime consuming.

When we register the complaint, it says there's a minimum of four hours of turnaround time which is high. It should be a minimum of 60 minutes. 

The GUI of Harmony is very slow to upload. I'm not sure if it is due to the internet, but still, at times, we found that when we click on any tab, it takes a minimum of five seconds to get it open.

All other things are okay from our end.

One feature we want to add is an EDR/XDR into this antivirus module.

For how long have I used the solution?

I've been using the solution for 4 months.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

I found the solution to be okay. I'm not sure how others are providing the support as we haven't checked that.

How are customer service and technical support?

Technical support is good.

Which solution did I use previously and why did I switch?

No, we haven't used any other antivirus. It was by default in Windows.

How was the initial setup?

The initial setup was okay.

What about the implementation team?

We implement it through a vendor. 

I would rate their level of service at a 2 out of 5 where 1 is lowest and 5 is best.

What was our ROI?

If we talk about ROI, then the solution is good, as we are getting a sandbox feature in it plus the VPN licenses if we have the Check Point firewall.

What's my experience with pricing, setup cost, and licensing?

The setup is okay depending on the partner and what the relationship is with you and your partner. The pricing is okay.

Which other solutions did I evaluate?

Yes, we have evaluated other options. For example, we've evaluated Sophos.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Regularly updated and has good event visibility and logging
Pros and Cons
  • "There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives."
  • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point Antivirus software blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of scanning files that are traversing the network for the presence of viruses or other malicious software.

How has it helped my organization?

The Check Point HA Clusters are used to protect our company's datacenter, located in Asia (Taiwan). This software blade, the Check Point Antivirus, is activated in conjunction with the others and serves to scan the files traversing via the network. They may be in the form of email attachments or via HTTP/S.

Such files are scanned for the presence of known viruses and malware with the help of the built-in database. The database is updated as per schedule, which for us is four times per day.

The software is quite simple to use, yet still efficient. The antivirus scans are the basic security mechanism, which should be implemented on all the levels. In my opinion, the Check Point Antivirus does its job just right.

What is most valuable?

  1. The Antivirus software blade is part of the Next Generation Threat Prevention license bundle.
  2. The Antivirus is able to scan files downloaded from the internet or traversing the network via Check Point Gateways/Clusters.
  3. The Antivirus software blade is configured via the Unified Threat Prevention policy in the Smart Console (at least for R80.10, the version we use).
  4. There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives.
  5. The updates for the blade are downloaded every two hours.
  6. As with the other Check Point blades, the visibility and logging of events are outstanding.

What needs improvement?

I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

We also had several support cases opened for software issues, but none of them were connected with the Check Point Antivirus software blade.

For how long have I used the solution?

We have been using this product for about three years, starting in late 2017.

What do I think about the stability of the solution?

The Check Point Antivirus software blade is stable and we haven't faced any issues with it.

What do I think about the scalability of the solution?

The Check Point Antivirus software blade scales well with the gateways we use, since it doesn't affect the overall performance much after activation.

How are customer service and technical support?

We have had several support cases opened, but none of them were connected with the Check Point Mobile Access Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

The longest issue took about one month to be resolved, which we consider too long.

Which solution did I use previously and why did I switch?

No, we didn't previously use another network antivirus solution.

How was the initial setup?

The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

What about the implementation team?

Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

What's my experience with pricing, setup cost, and licensing?

Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

Which other solutions did I evaluate?

No, since we had Check Point NGFWs implemented, we just enabled the new software blade.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2025
Product Categories
Anti-Malware Tools
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.