Try our new research platform with insights from 80,000+ expert users
Ricardosilva Silva - PeerSpot reviewer
system administrator at a outsourcing company with 51-200 employees
Real User
Top 5
Dec 11, 2025
Improved endpoint protection has reduced infections and enables faster threat investigations
Pros and Cons
  • "Check Point Harmony Endpoint has positively impacted my organization; we have significantly fewer false positives, it has reduced the number of confirmed infections we deal with, and it has given us better insight into endpoint activity so we now catch more threats at the point of entry."
  • "The dashboarding for Check Point Harmony Endpoint could be improved."

What is our primary use case?

I mainly use Check Point Harmony Endpoint for endpoint protection and threat prevention. Most often, it is for blocking malware, managing device posture, and keeping user machines compliant.

Check Point Harmony Endpoint helps with routine monitoring. I check the dashboard to spot machines that drift out of compliance and push fixes quickly. It also streamlines investigations because the event timeline shows exactly what happened.

What is most valuable?

The best features Check Point Harmony Endpoint offers are its protection, which is very good. The real-time malware blocking, behavior-based threat detection, and device posture compliance checks have been the most valuable in my experience.

The behavior-based threat detection in Check Point Harmony Endpoint has been good at catching suspicious activity that traditional signature-based tools might miss. For example, it has flagged unusual process behavior on a machine before any known malware signature existed, allowing me to isolate and investigate it early.

Check Point Harmony Endpoint has positively impacted my organization. We have significantly fewer false positives. It has reduced the number of confirmed infections we deal with and has given us better insight into endpoint activity. We now catch more threats at the point of entry.

What needs improvement?

The dashboarding for Check Point Harmony Endpoint could be improved. A smoother and faster management console would be beneficial, especially when checking a large number of endpoints.

More flexibility in customizing reports and a lighter footprint during scans for Check Point Harmony Endpoint would also be beneficial.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for over one year.

Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,310 professionals have used our research since 2012.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is very stable.

What do I think about the scalability of the solution?

The scalability of Check Point Harmony Endpoint is very strong. We did not have problems adding more machines. It scales well as the number of endpoints grows, in my opinion.

How are customer service and support?

The customer support for Check Point Harmony Endpoint is very good. I would say it is very fast and very responsive.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

We used Defender before Check Point Harmony Endpoint, but Defender was very poor with Linux machines.

What was our ROI?

We have seen a return on investment with Check Point Harmony Endpoint. The biggest gains come from reducing infections and shortening investigations. The time saved across the teams adds up to several hours a week.

What other advice do I have?

I would say to others looking into using Check Point Harmony Endpoint to set clear posture and policy baselines early on. Doing that up front makes ongoing management easier and helps the threat prevention features work more effectively.

Check Point Harmony Endpoint is a very good tool and very flexible, and everyone should use it. I would rate this product an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Dec 11, 2025
Flag as inappropriate
PeerSpot user
Sr. VP of Creative & Development at a non-tech company with 51-200 employees
Real User
Top 5
Dec 26, 2025
Advanced protection has prevented phishing and ransomware while saving investigation time
Pros and Cons
  • "Check Point Harmony Endpoint has positively impacted our organization by both improving efficiency and reducing incidents."
  • "I think Check Point Harmony Endpoint could be improved, as the documentation is not intuitive."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is to protect devices across the organization with consistent security controls, helping us prevent malware, ransomware, or phishing attacks by applying advanced threat prevention directly on laptops or desktops.

A specific example of how I have used Check Point Harmony Endpoint to protect devices is when it blocked a ransomware attack on a remote employee's laptop. The user had clicked on what looked like a legitimate invoice attachment, but the endpoint agent immediately detected the malicious behavior and isolated the file before it could encrypt anything.

Check Point Harmony Endpoint really helped our team during a wave of phishing emails that tried to trick users into entering credentials on a fake login page. Even though some employees clicked the link, Check Point Harmony Endpoint blocked the malicious site from loading and prevented any data from being exposed.

How has it helped my organization?

yes

What is most valuable?

The best feature Check Point Harmony Endpoint offers is the advanced threat prevention, as it blocks malware, ransomware, phishing, and zero-day attacks using Check Point ThreatCloud AI intelligence.

The advanced threat prevention feature has made a big difference for us by reducing both the number and severity of incidents. Before, our team had to spend a lot of time manually investigating suspicious files or links.

Check Point Harmony Endpoint has positively impacted our organization by both improving efficiency and reducing incidents. With advanced threat prevention running directly on devices, we have seen a noticeable drop in malware and phishing cases reaching users.

What needs improvement?

I think Check Point Harmony Endpoint could be improved, as the documentation is not intuitive.

The documentation could be clearer when people need to deploy for the first time or for advanced configurations.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for around six years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is very stable.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint is very scalable. All SaaS solutions are very scalable.

How are customer service and support?

The customer support for Check Point Harmony Endpoint is excellent.

I would rate the customer support for Check Point Harmony Endpoint a 10.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

How was the initial setup?

I purchased Check Point Harmony Endpoint through the Azure Marketplace, and it was a great experience.

What about the implementation team?

My company does not have a business relationship with this vendor other than being a customer.

What was our ROI?

I have seen a return on investment with Check Point Harmony Endpoint, and for me, it is time saved.

Security incidents have dropped by roughly 20 to 30%, especially around phishing and malware attempts, because the system blocks most threats before they reach users. On the efficiency side, our team now spends far less time chasing false positives or manually correlating logs.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Check Point Harmony Endpoint is that the pricing is normal.

Which other solutions did I evaluate?

Before choosing Check Point Harmony Endpoint, I did not evaluate other options.

What other advice do I have?

My advice to others looking into using Check Point Harmony Endpoint is that it is an excellent solution for laptops or endpoints. It is excellent and centralized, and it is a modern solution for security. I would rate this product a 10.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Dec 26, 2025
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,310 professionals have used our research since 2012.
Engineer Cyber Security at a computer software company with 201-500 employees
Real User
Top 5Leaderboard
Sep 19, 2025
Has improved threat detection and accelerated incident response across all endpoints
Pros and Cons
  • "After using Check Point Harmony Endpoint, we saw a 40% reduction in security incidents, especially phishing and malware attacks, and the response times to threats improved by around 30%, thanks to the faster alerts and automation."
  • "Some users have reported high resource consumption, leading to performance issues on devices with limited hardware capability."

What is our primary use case?

The main use case for Check Point Harmony Endpoint is to protect my device from virus, malware, and online threats. I use it mostly for keeping my computer secure while browsing and working.

One time I was downloading a file that had malware hidden inside, so Check Point Harmony Endpoint detected and blocked the threat before it could harm my device and kept my data safe.

What is most valuable?

The best feature of Check Point Harmony Endpoint is threat prevention, providing comprehensive protection against ransomware, phishing, and malware through advanced EDR, XDR capability. Additionally, the second standout feature is the unified management console, which offers a single interface for managing policy and alerts across the workplace, simplifying the security operation.

The unified management console has significantly streamlined our security operation by consolidating policy management, threat monitoring, and incident response into a single interface. We have reduced the complexity of managing multiple security tools, and this integration has led to fast detection and remediation of threats, allowing our IT team to respond more effectively and maintaining a consistent security posture across all endpoints.

Since implementing Check Point Harmony Endpoint, our organization has experienced significant improvement in cyber security. The solution's centralized management has streamlined our security operation, allowing our IT team to efficiently monitor and respond to the threats across all endpoints.

After using Check Point Harmony Endpoint, we saw a 40% reduction in security incidents, especially phishing and malware attacks. Also, the response times to threats improved by around 30%, thanks to the faster alerts and automation.

What needs improvement?

There are areas where Check Point Harmony Endpoint could improve to enhance our experience, such as performance optimization. Some users have reported high resource consumption, leading to performance issues on devices with limited hardware capability. Simplifying policy management is another area, as the current policy management system can be complex, and simplifying it could make configuration more intuitive. Better integration with third-party applications and tools could also streamline workflow and reduce capability challenges.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for the last one year.

How are customer service and support?

They provide a positive experience. Some users have reported prompt and helpful support, particularly during critical incidents.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup was manageable and the license options offer flexibility to scale as needed.

What was our ROI?

We have seen a clear return on investment since deploying Check Point Harmony Endpoint. We have reduced security incidents by 35%, which saves us time and money on incident response, allowing our IT team to focus more on strategic tasks instead of constant firefighting.

What's my experience with pricing, setup cost, and licensing?

The pricing and the license for Check Point Harmony Endpoint are reasonable and competitive.

What other advice do I have?

My advice is to take advantage of the unified management console to simplify security operations, whether it is on-prem, cloud, or hybrid, for best performance. Also, keeping your software up to date regularly helps benefit from the latest protection features.

On a scale of one to ten, I rate Check Point Harmony Endpoint a nine out of ten.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Sep 19, 2025
Flag as inappropriate
PeerSpot user
Jitendra_Sharma - PeerSpot reviewer
Network Security Engineer at a tech services company with 51-200 employees
Real User
Top 5
Jun 21, 2025
Centralized management enhances security and reporting efficiency
Pros and Cons
  • "Security has improved after we started using Check Point Harmony Endpoint, and we can manage all the systems and machines through a centralized portal called Check Point Infinity portal."
  • "Sometimes the Check Point Harmony Endpoint performance slows down when we use scanning and update sessions."

What is our primary use case?

Statistics wise, it is currently difficult for me to provide specific details, but each prevented malware infection saves costs in cleanup, downtime, productivity loss, and reduced data breaches and compliance violation penalties.

At this moment, I am not able to remember any specific use cases that provide reasons.

We are testing Check Point Harmony Endpoint on a few testing group systems. I cannot provide any specific use cases at this moment, but once the trial period is over, we will definitely use it with our users, which is almost 500 users, and then I will be able to mention exact use cases.

What is most valuable?

The best part of Check Point Harmony Endpoint is that it is delivered as software agents deployed to endpoints and connected to centralized security analytics and management control for desktops, laptops, and server systems.

Security has improved after we started using Check Point Harmony Endpoint, and we can manage all the systems and machines through a centralized portal called Check Point Infinity portal. Through these portals, we can push the agents to the end machines as well as servers, and we can also manage and control these systems.

We can find all kinds of reports related to endpoints, such as information about different operating systems on the internal network, issued systems, malware-infected systems, and problematic systems through Anti-Malware in a centralized single plane.

What needs improvement?

Check Point Harmony Endpoint can be improved performance-wise.

Sometimes the Check Point Harmony Endpoint performance slows down when we use scanning and update sessions. During these activities, the performance impact on endpoints decreases. This aspect can be improved.

For how long have I used the solution?

We have been using Check Point Harmony Endpoint for a few months as our Endpoint Security solution. We are currently using it as a test on a group of testing machines, approximately 10 to 15 machines.

How are customer service and support?

Customer support was good. We haven't reached out to the customer support portal specifically for issues, but we are also using Check Point firewall for our gateway security.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We had other solutions in mind before using Check Point Harmony Endpoint. We were considering Sophos Endpoint Security.

What was our ROI?

Statistics wise, it is currently difficult for me to provide exact figures, but each prevented malware infection saves costs in cleanup, downtime, productivity loss, and reduced data breaches and compliance violation penalties. The return on investment and the benefit over a period of time is high.

It saves costs in terms of cleanup, downtime, and productivity issues. It reduces the possibilities of data breaches and helps us reduce compliance violation penalties. These are the main return on investment points that can be mentioned.

What other advice do I have?

My advice would be to take the time to carefully plan and test your policy configuration on a small test group first, before full deployment, as I have done in my network. On a scale of 1-10, I rate Check Point Harmony Endpoint a 10 out of 10.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jun 21, 2025
Flag as inappropriate
PeerSpot user
Senior Solution Consultant at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
May 16, 2025
Provides top-tier security leading to reduced incident duration and improved compliance
Pros and Cons
  • "Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features."
  • "The integration challenges with Check Point Harmony Endpoint involve needing support with other third-party applications that I wish it worked with more seamlessly."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is that we use it as an EDR solution for all our endpoints.

My team uses Check Point Harmony Endpoint primarily as an EDR solution focused on threat detection and incident response.

What is most valuable?

Check Point provides zero-day protection, which helps us significantly with our security regarding our main use case.

Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features.

The AI-powered threat prevention in Check Point Harmony Endpoint helps us to detect and prevent sophisticated attacks, and its scalability means it can be deployed across various devices and environments, helping us daily.

Check Point Harmony Endpoint has positively impacted our organization by providing shorter incidents and better compliance.

Our incident response has increased by 5 to 10%, which showcases specifics on how much the incident duration has decreased and how compliance has improved.

What needs improvement?

Check Point Harmony Endpoint could be improved by integrating with multiple other security solutions.

The integration challenges with Check Point Harmony Endpoint involve needing support with other third-party applications that I wish it worked with more seamlessly.

That is my main concern regarding needed improvements to Check Point Harmony Endpoint.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for almost three years.

How are customer service and support?

The customer support for Check Point Harmony Endpoint is good.

I would rate the customer support for Check Point Harmony Endpoint an eight on a scale of 1 to 10.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Broadcom earlier before Check Point Harmony Endpoint and switched because it is a better solution than Broadcom.

How was the initial setup?

The initial setup with Check Point Harmony Endpoint was straightforward.

What was our ROI?

I have seen a return on investment as fewer employees are required to manage the solution.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup costs, and licensing has been all good with Check Point Harmony Endpoint.

Which other solutions did I evaluate?

Before choosing Check Point Harmony Endpoint, I evaluated other options, which included Palo Alto and SentinelOne.

What other advice do I have?

Check Point Harmony Endpoint is stable.

Check Point Harmony Endpoint's scalability is very good.

My advice to others looking into using Check Point Harmony Endpoint is to go for it; it is the best solution.

I give Check Point Harmony Endpoint a rating of nine out of ten because I am getting good compliance and fewer incident responses.

I do not have any additional thoughts about Check Point Harmony Endpoint as of now.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 16, 2025
Flag as inappropriate
PeerSpot user
Technical Specialist at a computer software company with 201-500 employees
Real User
Top 5Leaderboard
May 13, 2025
Endpoint protection greatly improves security measures and reduces successful attacks
Pros and Cons
  • "Since implementing Check Point Harmony Endpoint, I have noticed a positive impact on our organization as we receive multiple detections of attack activities in the log section, showing how the solution protects our network."
  • "In terms of improvement, the Endpoint Agent can be more lightweight so that older machines and laptops can easily handle its consumption, which would enhance the overall performance in our environment."

What is our primary use case?

The main use case for Check Point Harmony Endpoint in our organization is to use it with the Check Point NGX Firewall for a unified threat prevention strategy, with approximately around 2000 users and multiple endpoints across multiple branches, ensuring safety from advanced protection against malware, phishing, ransomware, and zero-day attacks. Our environment includes both Windows and macOS, with central management done via cloud hosted Infinity Portal to protect our endpoints.

How has it helped my organization?

Since implementing Check Point Harmony Endpoint, I have noticed a positive impact on our organization as we receive multiple detections of attack activities in the log section, showing how the solution protects our network. This allows users to stay focused on their work without disruption from attacks, ultimately saving time and enhancing productivity.

What is most valuable?

The best features of Check Point Harmony Endpoint that stand out are anti-ransomware and threat emulation, which are crucial for protecting and blocking unwanted malicious threats and ransomware before they can execute anything on the user's system, along with Zero Phishing Protection, real-time URL filtering, and an anti-phishing mechanism that has greatly reduced the number of successful phishing attacks on our users' systems.

Centralized management via Infinity Portal is user-friendly and allows central policy management, while the detailed telemetry of forensic insights helps the SOC team identify attack vectors and understand what executes on the system during malicious content attempts, making it overall effective in protecting endpoints in various aspects.

The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.

What needs improvement?

In terms of improvement, the Endpoint Agent can be more lightweight so that older machines and laptops can easily handle its consumption, which would enhance the overall performance in our environment.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for more than one and a half years.

What do I think about the stability of the solution?

In my experience, Check Point Harmony Endpoint is stable and works well.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint is easily scalable in accordance with the license type based on user or device-based metrics, allowing us to add more users or endpoints for protection as our organization grows without any issues.

How are customer service and support?

The customer support for Check Point Harmony Endpoint is quite good; they are ready to help us, although there can be delays in response sometimes.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not previously used a different solution before Check Point Harmony Endpoint.

How was the initial setup?

The initial setup of Check Point Harmony Endpoint is straightforward and easy to implement; you just need a good understanding of how it works and how to implement it effectively.

What was our ROI?

I have seen a return on investment with Check Point Harmony Endpoint, as it has saved money and time due to the minimum disruption of production hours, which allows users to focus on their main tasks and desired targets, avoiding downtime and contributing to business growth.

Which other solutions did I evaluate?

Before choosing Check Point Harmony Endpoint, I evaluated other options such as Trellix, which is also good, but since we already have Check Point in our environment, it made sense to stick with an ecosystem that works well for us.

What other advice do I have?

I find that pricing is competitive compared to others, and if you already have Check Point in your environment, having invested in the Check Point ecosystem makes it easier to work with.

I recommend others looking into using Check Point Harmony Endpoint to conduct a POC to evaluate the product in their environment, test it on a few systems, and check if their use cases and expectations are met before making a decision.

On a scale of 1 to 10, I would rate the customer support a nine.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 13, 2025
Flag as inappropriate
PeerSpot user
Senior Security Analyst at a tech services company with 201-500 employees
Real User
Top 5
May 15, 2025
Proactive threat prevention strengthens security for remote and hybrid environments
Pros and Cons
  • "Check Point Harmony Endpoint has positively impacted our organization by significantly improving our security posture, especially for remote and hybrid users."
  • "While using Check Point Harmony Endpoint, I find that the initial deployment can be a bit complex, especially for large or distributed environments, requiring proper planning and familiarity with the Check Point ecosystem."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is to secure laptops and desktops across our organization, including remote endpoints, providing layered defense against malware, zero-day attacks, phishing, and data loss, making it a critical part of our endpoint security stack.

How has it helped my organization?

Check Point Harmony Endpoint has positively impacted our organization by significantly improving our security posture, especially for remote and hybrid users, with approximately 400 out of our 500 members working from home, leading to almost 90% of security being handled by this product. It helps protect endpoints from advanced threats through behavioral analysis, real-time threat protection, and simplified endpoint management through the cloud-based console. The solution has also improved compliance and risk management to ensure endpoints meet security standards even outside the corporate network.

What is most valuable?

Check Point Harmony Endpoint offers robust protection against malware, ransomware, and phishing attacks, and I particularly appreciate its behavioral analysis and anti-ransomware capabilities, with the central management console being integrative and making policy management easy across devices.

My advice for others looking into using Check Point Harmony Endpoint is to allocate time for proper configuration and policy tuning during the initial steps and to take advantage of Check Point's documentation and support resources. This will be helpful during integration or initiation of the setup, especially if they already have other Check Point devices, which would enhance their security posture and streamline management.

What needs improvement?

While using Check Point Harmony Endpoint, I find that the initial deployment can be a bit complex, especially for large or distributed environments, requiring proper planning and familiarity with the Check Point ecosystem. There can be occasional false positives that need to be manually reviewed and whitelisted.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for almost one or two years.

What was my experience with deployment of the solution?

From my perspective as a user, it was moderately easy but not overly complicated to deploy Check Point Harmony Endpoint in our environment.

My experience with the configuration process of Check Point Harmony Endpoint was easy.

What do I think about the stability of the solution?

In my experience, Check Point Harmony Endpoint is absolutely stable.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint scales well and meets the growing needs of our organization.

How are customer service and support?

My experience with Check Point Harmony Endpoint's customer support has been positive. I had an issue while installing the agent on a device and would rate their support four out of five.

Which solution did I use previously and why did I switch?

We use AWS as our cloud provider because Check Point's cloud-based management is managed on AWS infrastructure in various regions for our customers.

How was the initial setup?

The initial setup with Check Point Harmony Endpoint for my team was straightforward.

What was our ROI?

I have indeed seen a return on investment from Check Point Harmony Endpoint, as it has been really helpful. The earlier EDR devices we used were more time-consuming, and deploying that particular agent on all devices took time, but the centralized management console has significantly reduced both time consumption and the extra manual efforts required.

Which other solutions did I evaluate?

Before choosing Check Point Harmony Endpoint, I evaluated other options, specifically CrowdStrike.

What other advice do I have?

For protecting remote endpoints using Check Point Harmony Endpoint, I deploy security policies that ensure protection for users even when they are outside the corporate network, such as working from home or on public Wi-Fi. This includes cloud-based management where policy updates are pushed via Infinity Portal allowing centralized management for remote devices, implementing antivirus and anti-malware components with real-time scanning and cloud-based signature updates, alongside policies that block or control the copy-paste or upload of sensitive data to unmanaged networks.

I haven't performed any type of integration with other AWS services, as my role is as a user observing the monitoring perspective of the alerts and analyzing incidents on the console itself.

On a scale of 1-10, I rate Check Point Harmony Endpoint a 9.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 15, 2025
Flag as inappropriate
PeerSpot user
Sr. Technical Support Executive at a outsourcing company with 11-50 employees
Real User
Top 5
Oct 29, 2025
Has improved threat prevention with centralized policy control and USB data protection
Pros and Cons
  • "The best features that Check Point Harmony Endpoint offers are the central management and its ThreatCloud intelligence that provides good protection from threats and real-time updates on new threat attacks worldwide."
  • "One thing I can suggest for Check Point Harmony Endpoint is that the endpoint agent is very heavy, and sometimes it feels like due to the heavy endpoint size, our PC is slow, so that can be improved."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is for threat prevention and also protecting from ransomware attacks.

How has it helped my organization?

Check Point Harmony Endpoint has positively impacted my organization because, with the help of this solution, we are able to control the devices. With the feature to prevent data loss, no one can connect any device and transfer any data. For example, we have disabled USB, so when the USB drive is connected, the user cannot transfer or copy any documents or files. It also provides full disk encryption, so if any device is lost or the drive is stolen, no one can decrypt them and take data.

What is most valuable?

Check Point Harmony Endpoint provides multiple key features against threats, like the threat emulation and anti-ransomware mechanism. It can also do forensic and root cause analysis of the attack, and we can control the usages of the device, like connecting to the USB drive.

The best features that Check Point Harmony Endpoint offers are the central management and its ThreatCloud intelligence that provides good protection from threats and real-time updates on new threat attacks worldwide. We have the ZTNA.

With the help of central management in Check Point Harmony Endpoint, there is a single console from where we can enforce any security policies in the network, which really simplifies our work while creating endpoint security policies or monitoring or reporting.

What needs improvement?

One thing I can suggest for Check Point Harmony Endpoint is that the endpoint agent is very heavy, and sometimes it feels like due to the heavy endpoint size, our PC is slow, so that can be improved.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for more than three years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is stable in my experience.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint's scalability can handle some extent of growth, but for major growth, then we have to purchase more licenses from them.

How are customer service and support?

The customer support for Check Point Harmony Endpoint is very supportive and good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

From the start, we have been using Check Point Harmony Endpoint and did not use a different solution before.

What was our ROI?

I can say we have seen a return on investment with Check Point Harmony Endpoint because we are getting good security from this solution, which saves us time.

Which other solutions did I evaluate?

Before choosing Check Point Harmony Endpoint, we had evaluated CrowdStrike.

What other advice do I have?

On a scale of 1 to 10, I would rate Check Point Harmony Endpoint an eight. I chose eight out of ten because, as I said, due to the heavy agent file on the device, it feels like it is being slow, which is why I've chosen eight out of ten.

If others are looking for an endpoint security solution, they can consider Check Point Harmony Endpoint as one of the outstanding solutions for security. We are a partner of Check Point Harmony Endpoint. The review rating for Check Point Harmony Endpoint is 8 out of 10.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 29, 2025
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.