Try our new research platform with insights from 80,000+ expert users
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Great security, reliability, and offers a centralized administration of unified services
Pros and Cons
  • "Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard."
  • "I would like to see is this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses."

What is our primary use case?

We had to protect our equipment inside and outside the perimeter network, regardless of where we were. Due to this need, we came to use Check Point Harmony Endpoint, which was extremely easy to deploy from the moment we logged in to the website. 

This solution is very user-friendly. After the Check Point tenant is created, it allows us to download the application for iOS or Windows, and it is only a matter of installing it so that the teams can start reporting to the Harmony Endpoint cloud. 

How has it helped my organization?

It came to provide us with security, reliability, and a centralized administration of unified services. It works regardless of whether you work on Mac or Windows systems, which are among the equipment we have in our organization. Today, our equipment is very diverse. However, we have managed to protect everyone with this solution. Check Point Harmony Endpoint provides support within the new organizational disruption trend of teleworking. With it, we manage to protect and manage all teams from a centralized policy. 

What is most valuable?

Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard. We are achieving uniform work that is easy to manage if any changes are necessary. Being able to give us an inventory of the equipment and the health status of everything from a single place has been great. This solution has become a great ally for the prevention of threats and security problems caused by viruses such as ransomware, and we are protected against threats, which is of great value. 

What needs improvement?

I would like to see this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses. We'd like to be able to integrate several products and services into one to be more efficient and user-friendly within the infrastructure. 

Buyer's Guide
Check Point Harmony Endpoint
March 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
845,040 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.

PeerSpot user
Rich text editor
    reviewer1866651 - PeerSpot reviewer
    Brand Manager at Corporation Sekiura S.A.C.E.I.
    User
    Excellent anti-ransomware, anti-bot and anti-exploit features
    Pros and Cons
    • "It has improved the detection of malware."
    • "Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle."

    What is our primary use case?

    The first use case is to detect malware as well as advanced threat protection for known, unknown, and zero-day malware, sandbox emulation and extraction, and enhanced by automated endpoint forensics analysis. 

    Zero-day attacks are a risk for the company which seemed very important to us, plus the sandbox in the cloud. We have a cloud console that is easy to use and easy to monitor.

    The details of our environment are Harmony Endpoint Advanced for 100 on-premise users with cloud managment console, and support for one year.

    How has it helped my organization?

    It has improved the detection of malware. We are very satisfied with the friendly and easy-to-monitor console. We chose the advanced version as it seemed very important to have advanced threat protection for known, unknown, and zero-day malware plus sandbox emulation and extraction, enhanced by automated endpoint forensics analysis.

    At the moment we are very satisfied and confident with Check Point.

    What is most valuable?

    All of these features quoted below are valuable for us, as the set of solutions is what makes the solution really valuable. 

    • Endpoint Threat Prevention features
    • Web Protection (malicious sites/URL Filtering)
    • Anti-Ransomware
    • Anti-Bot
    • Anti-Exploit
    • NGAV
    • Anti-Virus
    • Forensic collection and automated reports
    • Threat Hunting
    • Sandbox Emulation and Extraction (CDR)
    • Endpoint Access Control Features
    • Endpoint Firewall
    • Application Control
    • Port Protection
    • Endpoint Compliance
    • Remote Access VPN

    If we had to choose one, we really like the EDR included.

    What needs improvement?

    The Check Point Harmony Endpoint is a very complete solution. Even in the most basic version, it already includes EDR, which today is very important and something that all endpoint solutions should consider having from the most basic versions. We would like to have one more step and that's to give and have full-disk encryption.

    Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle. We could have it with Check Point Endpoint, mobile, cloud, or firewall. An all-in-one console would be great.

    For how long have I used the solution?

    I've been using the solution for six months.

    What do I think about the stability of the solution?

    The stability has been positive.

    What do I think about the scalability of the solution?

    The scalability has been positive.

    How are customer service and support?

    We did not have any problems. We got good solution training

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We did not previously use the solution.

    What about the implementation team?

    We had a positive experience with the implementation via a vendor. 

    What was our ROI?

    Our ROI has been positive.

    What's my experience with pricing, setup cost, and licensing?

    If you need the on-premise management console, you have to pay an additional cost. It's not much, however, it's good to ask for a quote.

    Which other solutions did I evaluate?

    We also looked into Sophos.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: The company want to keep anonymity.

    PeerSpot user
    Rich text editor
      Buyer's Guide
      Check Point Harmony Endpoint
      March 2025
      Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
      845,040 professionals have used our research since 2012.
      reviewer1601424 - PeerSpot reviewer
      Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees
      Real User
      Easy to use, very effective, and scales well
      Pros and Cons
      • "We have found the stability to be very reliable."
      • "Technical support can be a bit slow at times."

      What is our primary use case?

      We have this at an enterprise level and we have it for all our endpoints. We use the product for disk encryption, anti-malware, and BPM blades.

      What is most valuable?

      The solution offers disk encryption, anti-malware, and BPM blades. For example, the Disc Encryption Software Blade is actually a part of this endpoint security solution. The whole thing is good for us.

      The product has been proven 100% effective with us. We haven't had anything related to any threats passing to us for the past five years.

      The solution is easy to use. It is self updated when there's a new version. It updates seamlessly, no matter what features you have. However, depending on what we use, there are some features that they will not apply in the clinics. We don't have the preview screen. We can customize it in a way that it doesn't disrupt our operation depending on if it is a laptop, it is a desktop.

      The security is very good.

      The solution is very straightforward.

      The solution scales well.

      We have found the stability to be very reliable. 

      What needs improvement?

      The solution is mostly very good. The reason why I'm trying to compare it with FireEye is due to the fact that it's supposed to be a mandate by the State. We are trying to justify the fact that we don't need to change our environment. For example, if the only thing that they want is to provide reports for the State, then that's a different story. We can customize the reports based on what they're asking for. We don't need to change or want to, however, the State may require us to.

      Technical support can be a bit slow at times. 

      For how long have I used the solution?

      We've dealt with the solution for ten years.

      What do I think about the stability of the solution?

      The solution is very stable. There are no bugs or glitches. Its performance is good. It doesn't crash or freeze.

      What do I think about the scalability of the solution?

      The scalability of the product is very good.

      How are customer service and support?

      The solution offers very good technical support. While they may be a bit slow, they always come through with a solution. 

      How was the initial setup?

      The initial setup is very straightforward. It's not a problem at all. 

      What's my experience with pricing, setup cost, and licensing?

      I have no information in terms of the pricing. I'm not involved with neither the purchase, maintenance, contract, or anything that has to do with licensing.

      Which other solutions did I evaluate?

      The company may be interested in trying to change to FireEye. I'm looking at it now to see what differences and advantages are at play. 

      What other advice do I have?

      We're just a customer and an end-user.

      I'd rate the solution at a ten out of ten. We've had no problems with it at all.

      Disclosure: I am a real user, and this review is based on my own experience and opinions.

      PeerSpot user
      Rich text editor
        reviewer1626762 - PeerSpot reviewer
        Assitant Manager - IT Support at a outsourcing company with 1,001-5,000 employees
        User
        Great for securing endpoints with good anti-malware and port protection
        Pros and Cons
        • "It's great for securing our endpoints from any external attacks."
        • "Tech Support must be better."

        What is our primary use case?

        We use it for multiple purposes. It's for securing the endpoints. We have about 200 endpoints added to this solution and being maintained. Its server is cloud-based and here our in-house IT team takes care of the installation and configuration on endpoints. We are required to secure our endpoint from any external attacks. It's also well controlled so that only required access is to be given to end-users. Whether it's about blocking unwanted websites or port blocking, we use the solution to manage everything.

        What is most valuable?

        The anti-malware and port protection, etc., are good. We have about 200 endpoints on this solution being maintained. We like that its server is cloud-based and that our in-house IT team can handle the installation and configuration on endpoints. It's great for securing our endpoints from any external attacks. We can control access to end-users. 

        What needs improvement?

        Tech Support must be better. Whenever we log a case for any issue it takes too much time to get it sorted. There should be escalation by default. If the case is not being sorted quickly, it must get internally escalated to the team who are experts and they should be empowered to jump in to get the issue fixed. Many times, we have to be on it for weeks to come to a proper resolution. 

        Website blocking and endpoint levels are still a challenge and there needs to be a more sophisticated solution. We are looking forward to having this product work more efficiently.

        For how long have I used the solution?

        We have been using Harmony Endpoint for over six Months.

        How are customer service and technical support?

        Tech Support needs improvement.

        Disclosure: I am a real user, and this review is based on my own experience and opinions.

        PeerSpot user
        Rich text editor
          Lead547e - PeerSpot reviewer
          Lead at a financial services firm with 10,001+ employees
          Real User
          It provides remote access for the staff, but we have experienced some sales issues
          Pros and Cons
          • "It provides remote access for the staff and increases their productivity."
          • "A couple of times, we experienced some sales issues."

          What is our primary use case?

          The primary use case is VPN.

          How has it helped my organization?

          It provides remote access for the staff and increases their productivity.

          What is most valuable?

          • Certificate management
          • VPN

          How are customer service and technical support?

          A couple of times, we experienced some sales issues.

          The technical support is good.

          How was the initial setup?

          The initial setup was moderately complex. We had to wait for it to do a few runs, back and forth, until it was solid.

          What about the implementation team?

          We did the deployment in-house.

          What was our ROI?

          We have seen a measurable decrease in the hang times of the detector responses by five percent.

          Disclosure: I am a real user, and this review is based on my own experience and opinions.

          PeerSpot user
          Rich text editor
            Support Manager at Sefisa
            MSP
            Stable with great centralization and continuous innovation
            Pros and Cons
            • "They have a great knowledge base that you can leverage as a user."
            • "The only thing that our customers want, is lower prices."

            What is our primary use case?

            We use the solution for many things. We don't only use it as an Endpoint client for antivirus. It is used for our next-generation antivirus. We are also using Harmony on other things, for example, our email. There's a Harmony email and office solution, which we also are using in order to protect our email.

            What is most valuable?

            The fact that everything is centralized is great. For example, the management is centralized on one portal in the cloud. 

            We like the fact that we have a lot of visibility with this solution and the protection is very good. I have seen cases where customers, get attacked by ransomware and it is very easy for Check Point to restore a file that has been compromised with ransomware. It's 100% effective. 

            They are developing new technologies. For example, they added SASE to their portfolio with Harmony. They also have Infinity SOC. If one of the Harmony Endpoints gets compromised, Check Point Infinity SOC is going to see it, and it's going to highlight that.

            They're on the very edge of technology and are very fast with implementing new technologies. 

            The solution is very stable.

            They have a great knowledge base that you can leverage as a user.

            The product scales well. 

            Technical support is knowledgeable and responsive.

            Every now and then, every vendor does have a vulnerability that is discovered. For example, when many vendors were using open SSL, they had to do some fixes on their software in order to fix that particular vulnerability. Check Point was the first one to fix that. It's clear that, unlike the competition, it is always keeping up with the patching of its own software.

            What needs improvement?

            We'd like it if the solution continued to add new features. For example, what would be specifically useful to us is a feature that allows threat hunting. They may be already working on that or have something available, however, we need something robust and effective.

            I'm not sure if they need to improve anything right now. They are already developing new aspects that are quite innovative. 

            The only thing that our customers want, is lower prices. 

            For how long have I used the solution?

            I've been using Check Point for 18 years.

            What do I think about the stability of the solution?

            The product is very stable. There are no bugs or glitches. It doesn't crash or freeze. It's reliable. 

            What do I think about the scalability of the solution?

            We have found the solution to be very easy to scale. If you need to expand it you can do so.

            How are customer service and support?

            They have good technical support. They have very knowledgeable people, depending on the solution. Some specialize in Harmony Endpoint. It's very good.

            How was the initial setup?

            The initial setup is very easy. The management is on the cloud, and therefore, you practically don't have to do any installation. You only log in and then you begin to use it and you begin to deploy on your network, the endpoints. The time it takes to deploy depends on the size of endpoints you have. With a small network, such as 100 endpoints, you can do it in one day or a couple of hours. 

            What's my experience with pricing, setup cost, and licensing?

            But they are a leader in detecting threat, therefore, it's reasonable that they are a little more expensive than some other competitors. However, customers always want to pay a bit less.

            What other advice do I have?

            We are a reseller.

            My advice to new users would be to reconsider installing administration servers on-premise. The cloud solution can do it. It's going to lower the maintenance costs. Also, if you are on-premises, you often need some sort of expert on-side, whether it's a vendor or someone else - especially if you are upgrading. That requires knowledge. In contrast, on the cloud, everything is done for you. They have a high availability network so that when you upgrade the servers can keep up. You can upgrade without downtime if you choose the cloud. 

            I would rate the solution at a ten out of ten.

            Which deployment model are you using for this solution?

            On-premises
            Disclosure: My company has a business relationship with this vendor other than being a customer:

            PeerSpot user
            Rich text editor
              it_user8688 - PeerSpot reviewer
              IT Administrator at a healthcare company with 1,001-5,000 employees
              Real User
              When we have reached out to support, they have been quick to respond

              We use Checkpoint here, and are currently in the process of planning a major from the standalone client to the full console version.

              They had some issues in the past with the OS X and Windows versions not being in sync, but with the latest release E80 release, the clients are identical.

              There are still a few gaps, such as not supporting Fusion drives, but overall, things have been great.

              Deployment has been simple: We create a composer package that pushes the installer and our installation profile onto the client, and then call a script to run through the pkg installer. It has worked flawlessly for us.

              As far as management goes, the reason we are moving to the console version is to have better reporting. Currently, the encryption files are written to a File share, and that is all the logging we get. We use the JSS' EA to get a more up to date picture, but with the Console version, it allows for more "real-time" updates (1-2 minutes).

              The stability has been great for us. We have found a few iMacs that shipped to us with bad blocks/sectors that were not picked up by any of our HD diagnostics.

              When we have reached out to support, they have been quick to respond. Like I said above, I definitely suggest the web chat as the best option.

              Reliability has been pretty good. We saw an uptick in "black screens" that leave the machines in an un-bootable state, but that is more due to the fact that these drives have been encrypted for 4-5 years, and are used 24/7.

              As far as performance goes, we have noticed that with Checkpoint we are getting about a 1-2% performance hit over FileVault, but nothing that has cause major issues.

              Disclosure: I am a real user, and this review is based on my own experience and opinions.

              PeerSpot user
              Rich text editor
                Head of IT Director at Cosyn Limited
                Real User
                Covers firewall, availability, VPN, IP security, IPS, application control, URL filtering, antibot, antivirus, anti-spam, and sandblast threat emulation and extraction.

                What is our primary use case?

                We use it for government utility billing, with all of our systems located in different places, working remotely as well. We also have an on-prem data center here in India. We have Check Point to cover all these things.

                What is most valuable?

                We used to have Fortigate, the firewall, and endpoints were only protected by an antivirus. We did not have threat management or ransomware protection. We upgraded to Check Point to get this kind of protection at the endpoint level. It covers firewall, availability, VPN, IP security, IPS, application control, URL filtering, antibot, antivirus, anti-spam, and sandblast threat emulation and extraction.

                What needs improvement?

                The entire industry may move to the cloud, where we don't have to worry.

                For how long have I used the solution?

                Less than one year.

                What do I think about the stability of the solution?

                The stability is good.

                What do I think about the scalability of the solution?

                The scalability is there.

                How are customer service and technical support?

                Their technical support is good.

                Which solution did I use previously and why did I switch?

                We changed from Fortigate because we deal with public data, government data, utility billing. It is very important to maintain security to the greatest extent possible. We can't afford to lose data.

                Our billing cycle that takes place periodically. If we miss something, lose data due to ransomware or the like, we are totally out or operation. We can't again continue the billing cycle in such a situation. It is subject to penalties imposed by the local state government.

                How was the initial setup?

                The deployment was very simple. It took about 20 days.

                What about the implementation team?

                We had help from a Check Point solution partner.

                What's my experience with pricing, setup cost, and licensing?

                Check Point offered very good pricing through negotiation. The licensing is done yearly. We have a three-year subscription, including premium, direct support; the Next Generation and SandBlast are for two years. Our cost, including everything, is 18 lakh rupees.

                Which other solutions did I evaluate?

                Symantec is expensive so we did not go for it. Many solutions are equally good, you could go for any of them. Check Point offered competitive pricing and additional features. Symantec may be suitable for certain applications and certain data centers. But what we found over a period of time Check Point suits our purpose.

                What other advice do I have?

                If you have a medium-size environment like ours, this solution should serve the purpose, although you may need different things. In security, one thing cannot suit everybody.

                We have about 500 users of the solution. We don't have any immediate plans to increase our usage. Any increase would be at least two to three years in the future, given the type of environment and workloads that we have. 

                Disclosure: I am a real user, and this review is based on my own experience and opinions.

                PeerSpot user
                Rich text editor
                  Buyer's Guide
                  Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
                  Updated: March 2025
                  Buyer's Guide
                  Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
                  ...
                  ...