From my point of view, the use cases involved strategy and business opportunities.
Sales ManagerService Delivery at a tech services company with 11-50 employees
Great security and mobile device encryption and is easy to manage
Pros and Cons
- "It's easy to scale as needed."
- "We did have some early compatibility issues, which I hope Check Point has since resolved."
What is our primary use case?
What is most valuable?
The solution is easy to use and easy to manage.
The security in regards to phishing, viruses, and so on, is very powerful.
For mobile devices, encryption is excellent.
From our point of view, Check Point is really easy to implement and really easy to manage. From the customer's point of view, the main reason was that the Check Point is the best brand, one of the best brands in our region. When they evaluate in comparison to competitors it comes out on top.
The solution is stable.
It's easy to scale as needed.
Check Point Harmony covers everything.
What needs improvement?
We did have some early compatibility issues, which I hope Check Point has since resolved.
As each project varies, anything that may be missing, in terms of features, would become obvious during a POC. Check Point has pretty much everything, however, it could be better in terms of working with Mac products. However, this is typical of other solutions and Apple.
For how long have I used the solution?
I started working with the solution approximately one year ago. We implemented it primarily for the endpoints.
A large company in our area opened the discussion about endpoint security. During the discussion, we looked at Check Point products as our company at this moment was a distributor for Check Point products.
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
883,824 professionals have used our research since 2012.
What do I think about the stability of the solution?
The solution is very stable and reliable. There are no bugs or glitches and it doesn't crash or freeze. Its performance is good.
What do I think about the scalability of the solution?
Users can scale the product very easily. If you need more parts from the products added to the running environment, you can buy some more licensing. For the administrators, it is very easy to implement as scalability is one of the strongest parts of Check Point.
How are customer service and support?
Technical support is very good from the vendor. We find that to be very important.
How would you rate customer service and support?
Positive
How was the initial setup?
I can't speak to the details around deployment or implementation as I was in pre-sales.
What about the implementation team?
We are able to implement the solution for our client. While we have four people involved in pre-sales activity, we have another team that handles the implementation.
What was our ROI?
Users can observe an ROI. We worked with the client for a very short time and therefore had no time to calculate the ROI, however, it is my understanding it is there and quite good.
What's my experience with pricing, setup cost, and licensing?
We had special licensing for a rather sizable project. The project was prepared by Check Point directly and the client had a special negotiated rate.
What other advice do I have?
My previous company was a partner of Check Point. I no longer work there.
I was involved in pre-sales activities with the client who uses the product. We're a distributor of Check Point.
I'd rate the solution nine out of ten. We had some problems with implementations during proof of concept with a particular customer with a lot of Apple products, however, it is a small number of problems.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Engineer at a tech services company with 11-50 employees
Powerful with a great browser plugin and responsive technical support
Pros and Cons
- "It is very powerful tooling that can be tuned a lot."
- "It would be useful if you could also mark blocks as safe from a client. Now users always have to ask an admin to make exclusions."
What is our primary use case?
We resell Harmony Endpoint to many of our SMB customers and also use the product ourselves. It concerns environments of endpoints only, as well as (terminal) servers and a mix of these.
Our customers range from one to two endpoints to 100+ endpoints. In addition, as mentioned above, there are also customers where we deploy the Harmony Endpoint tooling on the servers. This also varies from customers with one or two servers to ten or more servers.
Both we and the customers are very satisfied with the use and functioning of the antivirus.
How has it helped my organization?
It is very powerful tooling that can be tuned a lot. It gives a lot of insight via Threat Hunting and stops things that other antivirus packages just let through.
Previous antivirus packages that we used and our customers used did not include a browser plugin. Now that users see that the endpoint really does scan everything on the browser page (such as username and password fields) they also see the added value of an antivirus package on the computer. Since users themselves see this added value, they also understand that they sometimes have to wait a little longer (for example, when downloading files, these are also scanned first).
What is most valuable?
The Harmony Endpoint browser plugin is powerful tooling that is visibly present and doing its job.
Previous antivirus packages that we used and our customers used did not include a browser plugin. Now that users see that the endpoint really does scan everything on the browser page (such as username and password fields) they also see the added value of an antivirus package on the computer.
What needs improvement?
It would be useful if you could also mark blocks as safe from a client. Now users always have to ask an admin to make exclusions.
In addition, it is also very desirable that there is support for Windows Server core machines.
In addition, it would also be useful if administrators could create exclusions directly from logging into the admin portal, instead of only being told where and how to add the exclusion. This will save work.
It would also perhaps be useful if you could connect from one endpoint directly to another tenant. Instead of having to roll out the endpoint again.
For how long have I used the solution?
I've used the solution for one year.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
The management portal could be a bit faster. Sometimes we are waiting for pages.
How are customer service and support?
It's very easy to create a support ticket and they always provide quick answers.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Trend Micro and ESET. We couldn't manage the endpoints of multiple customers centrally.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
We handled the implementation in-house.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to buy a bundle with more Check Point products in it to better secure their organization and save money.
Which other solutions did I evaluate?
We did not evaluate other options. We use more Check Point products and are very happy about it.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Endpoint
March 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
883,824 professionals have used our research since 2012.
Senior Security Specialist at a computer software company with 10,001+ employees
Good ransomware protection and URL filtering but support needs to be more knowledgable
Pros and Cons
- "It prevents the most imminent threats to the endpoint such as ransomware, phishing or drive-by malware, while quickly minimizing breach impact with autonomous detection and response."
- "The solution has limitations if it's hosted on-prem or as a SaaS."
What is our primary use case?
The solution is primarily used for protecting endpoints.
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s complex threat landscape.
It prevents the most imminent threats to the endpoint such as ransomware, phishing or drive-by malware, while quickly minimizing breach impact with autonomous detection and response. This way, your organization gets all the endpoint protection it needs, at the quality it deserves, in a single, efficient, and cost-effective solution and able to detect/block/monitor and response to any malicious activity happening on the endpoint. With the single agent deployed on the endpoint, it's able to provide complete EDPR functionality with help of multiple security features/modules.
How has it helped my organization?
Harmony Endpoint provides complete EDPR functionality using multiple modules/features which are available with the solution such as Compliance, Anti-Malware, Media Encryption and Port Protection, Firewall and Application Control, Full Disk Encryption, Remote access VPN, Capsule DOC, URL Filtering. Anti-Bot, Anti-Ransomware, Behaviour Guard, Forensic, Threat Emulation, and Anit-Exploit.
We are able to protect endpoints from any next generation of attack and modules can be enabled/disabled based on organization requirements. Harmony Endpoint is able to detect/block/monitor and mitigate attacks at an endpoint using logs which is been captured by an agent installed on the endpoint.
Agents send telemetry/metadata to a centralized console for forensic purposes. Policies for the endpoints can be created based on the user name or endpoint.
Integration with a threat intel platform for blocking any attack at an early stage is great. The complete solution can be hosted on-prem or via SaaS - a cloud remote access VPN is provided as default in base licence.
Different policy servers can be configured and hosted at each location so the agent does not have to reach a central location to take policy updates. Policy servers are created using OVF file which can be installed on any virtual platform such as VMware. This offers a more secure way of communication between the policy server and the management console (using certificate/SIC communication).
Agent footprints are low on endpoints and integration with other security solutions is great for sharing threat intel within an organizational network or over the cloud. Anti-ransomware modules are very strong and are able to detect any ransomware attacks at a very early stage.
The host-based firewall policy configuration is simple.
What is most valuable?
- Host Firewall
- Application Control
- Compliance NGAV: Prevent Attacks Before They Run
- Anti-Malware
- ML based NGAV
GAV: Runtime Detection and Protection- Anti-Ransomware
- Behavioral Guard
- Anti-Bot
- Anti-Exploit
Web Protection- Zero-day Phishing site protection
- Corporate Password Reuse Protection
- URL Filtering
- Malicious site protection
Attack Investigation and Response- Forensics collection and detection
- Forensics report – incident visibility, MITRE mapping
- Automated attack chain full sterilization
- Ransomware encrypted files restoration
- Threat Hunting
Data Protection- Host Encryption
- Media encryption and port protection
Mobile Protection- iOS Protection
- Android Protection
Centralized Management- Cloud Management
- On-Prem Management
The solution allows us to reduce the attack surface via:
What needs improvement?
The solution has limitations if it's hosted on-premise or as a SaaS. You need to plan accordingly on the model that suits the organization. On-Premise, for example, does not support threat hunting. Hosting on the cloud will have an impact on the user who is connecting to a central location for internet access as it will add infra cost.
We also need to look over the expertise of the support executives who require more training and focus as well in this service area and if we can think over the cost of the product.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CEO at a real estate/law firm with 1,001-5,000 employees
Good technical support with constant updating of the EDR and good overall security
Pros and Cons
- "New viruses emerge day after day, and this EDR system helps action be taken before viruses affect the internal system."
- "Currently, you can only have general reports of the threats removed and the behavior of the database. You cannot get separate reports of the Check Point service-linked devices."
What is our primary use case?
Check Point Antivirus is being used with integrations in all our company software and also with connections to all the computers that we use in our work sectors. All areas of our company such as sales, marketing, or finance have Check Point Antivirus implemented.
This antivirus is capable of monitoring the state of the network and knowing if there is any threat in our business network while being able to clean it up immediately.
All departments within the company have been kept safe since day one of using Check Point. In order to connect all the computers and monitor them in real-time from the Check Point application, we use an app. From this app, you can see the status of all computers, restore them, and eliminate threats from a single panel.
How has it helped my organization?
Previously, we had trouble detecting data leaks and protecting the services we used in our business. Financial and marketing software services were the main affected areas.
After the implementation of Check Point, our computers have remained connected to a secure network where threats are prevented from entering thanks to the EDR system, and systems have been restored to a stable state where there are no threats.
We have kept our files safe and restored them to an original state before being affected by a threat thanks to the system recovery system.
We are very grateful for the results obtained in recent years. Our computers (the main source of work) have remained secure. Our employees can manage online campaigns and control the flow of clients without fear of being affected by any threat; it has a system of anti-malware and anti-phishing to detect threats in time.
What is most valuable?
The main valuable feature of Check Point is the constant updating of the EDR database in order to detect new threats.
This update system is responsible for inserting new viruses into a database so that it is easier to detect and eliminate them despite the fact that constant notifications are sent when the virus database is updated, I have no complaints about this feature as it has helped me to restrict the passage of new threats.
New viruses emerge day after day, and this EDR system helps action be taken before viruses affect the internal system.
Another of the striking functions is that Check Point monitors the online activity of each user, ensuring that they do not access websites that have a suspicious encryption code or that have an unusual certificate; this has helped us to navigate calmly and detect pages that might put our work integrity at risk.
What needs improvement?
One of the features that should be improved in Check Point is when it comes to obtaining reports on computer behavior. Currently, you can only have general reports of the threats removed and the behavior of the database. You cannot get separate reports of the Check Point service-linked devices. I would like to obtain separate reports for each computer, to see the behavior of the threats and be able to take action in time.
It does not need any other function, it is a fairly complete antivirus service that helps protect business networks on time.
For how long have I used the solution?
We have been using this solution for about two years. We did not expect such precise and potential results and our security service has been maintained in the long term thanks to this general security on all types of devices.
What do I think about the stability of the solution?
It turned out to be an antivirus that exceeded my expectations in the long run.
During the use that we have had in these last two years, our computers have remained protected 24 hours a day and seven days a week. On some occasions, threats have entered our computers, however, the system restore system has counteracted this without any problem.
It has been a stable antivirus, without any real problems.
What do I think about the scalability of the solution?
The process of scaling, implementation and use went quite well; it took approximately two software engineers and three cyber security experts to successfully implement the service. They were in charge of configuring the real-time monitoring system for computers and updating the status of viruses.
How are customer service and support?
Customer service was satisfactory.
During our implementation process, several questions arose about how the data leak detection system should be configured. All of these questions were answered immediately in a live chat with the Check Point team.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, I used the Microsoft service, however, it was not able to protect all the threats trying to get into our business computers.
One of the main reasons why I stopped using the Microsoft Antivirus service, is due to the fact that it was consuming a lot of resources on the computers while it was running and while the EDR database was being updated. This directly affects the experience of our employees on the computer and limited them at work. Since we implemented the Check Point service, the consumption of resources decreased on a large scale and we managed to obtain better analysis and virus detection.
How was the initial setup?
Setting up the system was somewhat complicated, requiring several of our engineers and cyber experts to successfully implement the antivirus service.
The initial implementation took approximately one week to set up all the company's computers and synchronize them on the same protected network.
What about the implementation team?
The implementation was done with an internal team in our company; there was no involvement of a vendor team.
What was our ROI?
Our return on investment has been the protection of the entire work structure, our administrative processes have been protected by this great EDR system, and all the devices used in our company are monitored by a system that is responsible for eliminating threats before they react.
We are happy with the money spent on this great security software; our computers have been more protected.
What's my experience with pricing, setup cost, and licensing?
I would recommend that you have a good amount of capital to access a considerably good protection plan from Check Point.
Currently, the prices for installation and configuration are a bit high, and small or medium-sized companies could not afford these prices.
You need a trained team to implement the Antivirus system as quickly as possible since it is a bit difficult to configure.
What other advice do I have?
In a solution that is undoubtedly worthwhile, it has a perfect methodology for finding viruses before they react to the computer's files.
It has a very good interface, is easy to handle, and protects all kinds of services that are being used.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Chief Information Security Officer at a financial services firm with 10,001+ employees
Good logging facilitates forensics, but policy configuration and deployment are complex
Pros and Cons
- "Harmony Endpoint is able to detect, monitor, block, and mitigate attacks on the endpoint and it builds and maintains relevant logs for later inspection."
- "The application control and URL filtering features are not very strong."
What is our primary use case?
The solution should be able to provide next-generation security for endpoints and should be able to monitor, detect, mitigate, and block attacks, as well as provide complete visibility in terms of the chain of events so that forensics can be performed accordingly.
All of the security features should be provided on a single agent and it should be lightweight and should not have a performance impact on the endpoint.
Provide required/relevant logs on the console and also should be able to forward to the SIEM solution. So accordingly, a use case can be created.
The agent should be tamperproof and the admin should not be able to shut down or stop services without the security team concerned, or by using a password.
We should be able to integrate and share IOC with other security devices.
How has it helped my organization?
The Check Point SandBlast solution, also known as Harmony Endpoint, is able to detect, block, monitor, and respond to any malicious activity that happens on the endpoint. With a single agent deployed on the endpoint, it's able to provide complete EDPR functionality, with help of multiple security features and modules.
This agent can be pushed either from the Check Point management console or by using other patch management solutions such as SCCM.
It is able to provide a consolidated security posture for all Windows endpoints on a single dashboard and also provide threat hunter visibility for any security threat on the endpoint, and able to mitigate the same.
Provide capability of reproducing any security threat and also provide RCA/attack tree.
File/hash can be swiped across the network using the security console, which provides visibility on the endpoint according to its priority.
What is most valuable?
Harmony Endpoint provides complete EDPR functionality using multiple modules and features that are available with the solution. These include Compliance, Anti-Malware, Media Encryption, Port Protection, Firewall, Application Control, Full Disk Encryption, Remote access VPN, Capsule DOC, URL Filtering, Anti-Bot, Anti-Ransomware, Behaviour Guard, Forensics, Threat Emulation, and Anit-Exploit. This group of features is able to protect the endpoint from any next-generation attack. Any of the modules can be enabled or disabled based on the organization's requirements.
Harmony Endpoint is able to detect, monitor, block, and mitigate attacks on the endpoint and it builds and maintains relevant logs for later inspection. The agent sends telemetry/metadata to the centralized console for forensic purposes.
Policies for endpoints can be created based on the username or endpoint.
Integration with the Threat intel platform is helpful for blocking any attack at an early stage.
The complete solution can be hosted on-premises or SaaS on the cloud.
Remote access VPN is provided as default in the base license.
A different Policy Server can be configured and hosted at each location so that the agent does not have to reach a central location to receive policy updates. Policy servers are created using an OVF file, which can be installed on any Virtual Platform such as VMware.
It has secure communication between the Policy Server and the Management Console using Certificate/SIC communication.
The agent footprint is small on the endpoint.
It supports integration with other security solutions for sharing threat intel within an organization or over the cloud.
The anti-ransomware module is very strong; it's able to detect any ransomware attack at a very early stage.
Host-based firewall policy configuration is simple, which helps to access an endpoint if the machine is not in the organization's network.
What needs improvement?
The Threat Hunting module is not available for on-premises deployment.
The user has to connect using the VPN to take Policy Server updates when the solution is hosted on-premises. This adds overhead, as the user has to connect to the corporate network to get the policy.
In the case of a hybrid setup where the Policy and Management Server is on the cloud, the Sandbox appliance has to be on-premises.
Policy configuration and deployment are complex.
The application control and URL filtering features are not very strong.
Application Control databases are generated locally and it does not provide any visibility to the admin on which applications are installed on the endpoint.
The solution is supported only on Windows and MAC and not any other platform.
What do I think about the stability of the solution?
So far, the solution is stable.
What do I think about the scalability of the solution?
The solution is scalable we can add multiple policy servers based on requirement and it will be integrated with the central management server (Primary/Secondary).
In the case of the SaaS offering, it is managed by Check Point.
How are customer service and technical support?
Technical support is excellent.
Which solution did I use previously and why did I switch?
We used McAfee AV but it was not able to provide the next-generation capability that we were looking for.
How was the initial setup?
The solution required the Management Console and Policy server for initial setup and it can be increased based on the requirements.
What about the implementation team?
We had assistance from the vendor during deployment and the service is excellent.
What's my experience with pricing, setup cost, and licensing?
There are three different licensing models including basic, advanced, and complete, and it needs to be selected according to the endpoint. For example, it matters whether it is only required for a Windows endpoint as opposed to providing support for BYOD/Mobile devices.
Which other solutions did I evaluate?
We evaluated Windows ATP and CrowdStrike.
What other advice do I have?
In case you want to set up the solution on-premises and you want to deploy multiple policy servers, it is complicated. You will need an OVF to be deployed at each location and sometimes, organizations don't have the compute or supporting platform for deployment.
Also, for connecting remote users there is a dependency on the VPN, hence it's again a challenge for users to connect to the policy server for updates.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Protects against malware, phishing, DDoS and MITM attacks
Pros and Cons
- "SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth."
- "It needs more documentation and better ease of deployment. For documentation, it needs more information about integrating the endpoints on SandBlast Agent mobile as well as on desktop platforms."
What is our primary use case?
Our use case for SandBlast Agent is that our team is set up in multiple geographies, such as, India, Sri Lanka, UK, North America, and Australia (where we have a bit of business). We have courses for an educational client which need go to market, schools, instructors for hire, and students. Given that there was COVID-19 and a lockdown, there was an increase in the digital demand for learning courses. So, we wanted to secure our courses from cyber attacks. Thus, we wanted an end-to-end security system in place that would prevent/save us from cyber attacks and protect our sensitive data.
Systems can be accessed on multiple devices, whether they be laptops, Macs, Windows, or mobile devices. Those devices could be connected to a home or public network on a platform, like a Chrome browser, Mozilla Firefox, or Safari. We have been able to track this through reports by seeing how vulnerable those agents are to attacks. Then, we determine how they can become more secure, so we can stay on the cloud and mobile devices. These are the areas where we are trying to use their reports and tighten our security, putting more systems in place to prevent attacks.
How has it helped my organization?
Cognizant had a malware attack recently, as the threat of cyber attacks has increased, and a lot of customer data was compromised. However, because this Check Point SandBlast technology was there in place, we were able to thwart the cyber attacks that were attempted. Most of the time, these attacks are college kids trying to do some phishing attacks or look into sensitive data. With SandBlast, it is possible to identify those attacks at the very source, preventing those attacks and keeping us secure.
Going forward, we are planning to extend it to authors and professors who are helping us author our content. For example, if there is an author who will be taking help from various professors in university or instructors in schools, then they will need to get their inputs. What happens is they expose their course to those authors on their networks, devices, laptops, mobiles, or tablets. They access the course through an application. Now, those authors and professors don't have an app login because they might be a third-party vendor. So, we are trying to have the SandBlast Mobile version on this site as well, based on the impressive performance of SandBlast, so our data remains secure and more users are able to utilize our systems and access our data. This will make it more valuable for our end users.
On the coverage part, there are malware, phishing, operating system exploitations, denial-of-service attacks, and man-in-the-middle attacks (MITM), so we have classified the attacks that can happen on a learning, educational system, like ours into five to six categories. With SandBlast Agent deployed in the cloud, we have good coverage to cover these attacks, as it is very extensive. The best part is (through our reports) we were able to identify the type of attacks. So far, our security has been 100 percent. We have not felt that a data breach has happened, so we are pretty happy with SandBlast Agent.
What is most valuable?
SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth.
We set up reports, which were weekly or biweekly. Then, our admins, who are mainly working with SandBlast Agent, were able to look at daily reports or even more granular reports, hourly or daily, based on their customizations.
The automated part keeps it running in the background. It only gives us notifications when there have been major attempts to breach data. We also have reports that show logs for what external, unauthorized systems tried to access the data. Through those reports, which are automated in the background, we are able to do what we want in order to keep our systems secure. We feel the automation part is pretty good with this application.
What needs improvement?
It needs more documentation and better ease of deployment. For documentation, it needs more information about integrating the endpoints on SandBlast Agent mobile as well as on desktop platforms.
For how long have I used the solution?
I have been using this solution for six to eight months.
What do I think about the stability of the solution?
The SandBlast Agent is stable. Our users can work on a laptop, remote device, or tablet with this app running in the background. If an attack event is triggered, then the user and administrator both get alerts. The impact of this application running in the background on the battery life or on any other application is negligible; the battery performance is not impacted. It is such a digital world. Users are always now online and on social media, so they need to feel that their personal data is also not compromised.
Our key 15 users maintain the solution.
What do I think about the scalability of the solution?
We have around 15 key users, but it is being used to monitor over 1,000 users across the globe. We are planning to scale it up to 1,500 users/authors in North America alone for Q4. We have also certain authors who are coming up in Sri Lanka and Australia.
We are looking to scale this up on mobile devices and tablets. We want to see how the performance will be there. With portable devices, people are sitting in a Starbucks, cafeteria, or in a public area, and we want to see how the security is established on a public network. So far, we have seen that it has been quite good during these COVID lockdowns. People who have been working from home have it also installed on shared networks with two neighbors or a group of people, which is prone to attacks. So far, it has been good, but we want to see the performance when we roll out to more users.
Which solution did I use previously and why did I switch?
We had a legacy system in place before using SandBlast Agent. The features, efficiency, and our pre-existing relationship with Check Point drove us to going with SandBlast Agent.
How was the initial setup?
When we were working with their team, it was easy to go ahead with the setup. However, once we started doing it for our users on our own, we found it to be a little complex and needed more help. So, we came back to the SandBlast support team for help.
When we had to do a second deployment, including the next 10 members from the team of 15, we found that the documentation for the initial setup wasn't thorough. Our team had to reach out to the customer support, and they were good. However, from a deployment point of view, a little more documentation would have been helpful.
The deployment took approximately three months.
Our deployment strategy was that we wanted to be digital and do things on the cloud.
What about the implementation team?
We worked with the SandBlast team for deployment and that was completed in under three months. We had our initial trial period for two weeks. We had a team of four to five members who worked with the SandBlast teams from a deployment point of view. Everything went pretty smoothly.
Our experience with the Check Point support team was pretty good. They were able to help us with the deployment and integration for collaboration apps, like Slack, Microsoft Teams, or Jira. They also were able to help us with internal apps. So, they were able to help us with all those integration points, which was really helpful.
The staff involved was four to five members. However, we felt that if the SandBlast team was onboard, then we didn't need that many people. We could do the deployment with two members from our side and somebody helping from the SandBlast side.
What was our ROI?
If we have to look in terms of qualitative value, there has been good ROI. That is why we are planning to go ahead with the scaling of bringing more users onboard and having our security being taken care by SandBlast.
The solution has reduced the number of security analysts we have needed, enabling them to work on things they didn’t have time for before. From the automated reports point of view, we always used to feel that for whatever legacy system that we had in place we had to do more work to capture the area we wanted in our reports. With SandBlast Agent, we are able to do that through automated reports and its inbuilt functionality for reporting.
Due to a combination of factors, we now have three security analysts instead of six. So, we are almost down to 50 percent of team strength from the point when we started using SandBlast Agent. We have been able to cut down the cost after starting to use this platform.
What's my experience with pricing, setup cost, and licensing?
One of the key factors that made us go with this solution was the pricing.
On the licensing part, there was an initial complementary set of licenses offered in the initial onboarding package, either 15 or 20. Then, we had some complementary licenses in the initial purchase of the package. That was pretty useful.
Which other solutions did I evaluate?
We did explore one more option, which was an offering from Microsoft. The features, efficiency, price point, and pre-existing relationship that we had with Check Point made us go with SandBlast Agent.
Some of SandBlast's features include ease of deployment on cloud and mobile device coverage, which is our future coverage area. We found that it gave us good operational efficiency on mobile devices. It runs in the background, providing coverage for various parameters in the logs and triggering alerts to users and administration only when there is an attack. Otherwise, it is able to block the attack, URL, or user in the background before notifying them. These are some of the features that stood out and differentiated it from Microsoft Windows Defender.
What other advice do I have?
In this digital ecosystem, we need to secure our data at every moment and have something in place, like SandBlast, to keep our networks scanned at each moment. You never know where the next attack is coming from: malware, phishing, denial-of-service attacks, man-in-the-middle attacks, etc. Therefore, we need to be on the lookout for these type of attacks and any other unauthorized URLs trying to get into our systems to access data for any purpose.
Have a system in place to keep your data secure. You should definitely give SandBlast Agent a try. It is worth it. The solution is very secure and has very impressive features.
I would rate this solution as an eight out of 10. We are very impressed and happy with the features, its stability, reports, and the parameters covered in the reports.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
Smarter Endpoint Security – Powered by Harmony
Pros and Cons
- "We love the reports and monitoring they provide."
- "Infinity Portal sometimes requires more performance."
What is our primary use case?
Check Point Harmony Mobile was provided through an installed agent which has very light protection against malware and ransomware, among others.
In our country, many ransomware threats have been generated at the country level, for which it was worrying that we had kidnapping or encryption of our data. At the management level, the request was given to provide additional security to protect us. The tool has been very good.
We tested this Check Point tool to assess the performance of our endpoints, and shield them safely while increasing the protection of our platforms.
How has it helped my organization?
Our company was looking to strengthen endpoint security with an additional layer of protection. Since we already manage various Check Point solutions across our infrastructure — with consistently positive results — we decided to evaluate Harmony Endpoint as part of our strategy.
After thorough validation, Harmony Endpoint has proven to be highly effective in safeguarding our endpoint devices. It’s been running smoothly, and the performance has met our expectations.
We’ve observed detailed reports of attempted attacks, and thanks to the platform’s visibility and control, we’ve been able to respond quickly and mitigate vulnerabilities. The presence of malware in our environment has significantly decreased.
Overall, Harmony Endpoint offers strong features and reliable protection, making it a valuable component of our security ecosystem.
What is most valuable?
The characteristic that most attracts our attention is the administration portal. It doesn't require a management server since its licensing and management are through the Check Point Infinity Portal. It is very intuitive and easy to implement.
The way in which the agent is installed on the computers is very easy, it does not consume almost any performance of the server or final computers, in this way there is no need to worry about increasing resources to be able to protect them with Check Point Harmony Endpoint.
We love the reports and monitoring they provide. It helps us quickly see what vulnerabilities we have on our endpoints.
What needs improvement?
We have few disadvantages or improvement points. However, the Infinity Portal sometimes requires more performance. It is a small detail. However, it could be improved.
On the other hand, it is also essential that the manufacturer improves the public documentation so that users can better understand how it can be implemented with best practices.
Finally, at the support level, we believe that Check Point can improve. Sometimes the answers are provided at dawn, which makes it more challenging to solve.
For how long have I used the solution?
We’ve been using Check Point Harmony Endpoint for over three years now, and the results have consistently exceeded our expectations. From day one, it’s provided solid endpoint protection across our organization, adapting seamlessly as our infrastructure evolved.
What do I think about the stability of the solution?
yes
What do I think about the scalability of the solution?
yes
How are customer service and support?
Very Good Experience
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously we only had or used Microsoft's antivirus or endpoint, however, we had all non-centralized security. Through this tool, we can centralize everything in the Infinity Check Point Portal.
What's my experience with pricing, setup cost, and licensing?
Licensing is per endpoint, which is why we think is good. The cost is competitive, and its features are very good.
Which other solutions did I evaluate?
We validated several manufacturers, however, we did not want to have separate solutions. It seems to us a better option to have only Check Point.
What other advice do I have?
I recommend this security tool, it is always important to test the tool at the test level to decide if it is what you are looking for.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 29, 2025
Flag as inappropriateEngineer at a consultancy with 201-500 employees
Offers broader visibility in the environment
Pros and Cons
- "The insight and visibility of the detection is good."
- "The services of EDR consumption should be reduced and the support needs to be improved."
What is our primary use case?
My primary use case for Check Point Harmony EDR would be to get broader visibility in the environment. For instance, a pre-detection was done by Check Point Harmony when there was an attack happening. It pre-detected and remediated immediately before it got spread in the environment. The best part is the system was not in the office network but still got detected and remediated automatically.
What is most valuable?
The insight and visibility of the detection is good.
What needs improvement?
As such there is nothing I can think of additional features.
The services of EDR consumption should be reduced and the support needs to be improved.
For how long have I used the solution?
I have using Harmony for the past two years.
What do I think about the stability of the solution?
Stability is impressive.
What do I think about the scalability of the solution?
Scalability is good.
How are customer service and support?
Support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup was straightforward.
What about the implementation team?
The implementation happened in-house team.
What's my experience with pricing, setup cost, and licensing?
The licensing and costs are good.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
SentinelOne Singularity Complete
Fortinet FortiEDR
Cortex XDR by Palo Alto Networks
HP Wolf Security
Huntress Managed EDR
Microsoft Defender XDR
Elastic Security
WatchGuard Firebox
Trellix Endpoint Security Platform
TrendAI Vision One
Fortinet FortiClient
Symantec Endpoint Security
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?

















