Try our new research platform with insights from 80,000+ expert users
Rakesh Jadhav - PeerSpot reviewer
Sr. Technical Consultant - Presales at Ivalue Infosolution
User
Easy to set up with helpful support and great flexibility
Pros and Cons
  • "It has extended OS support to ensure your legacy endpoints also have zero-day protection."
  • "They need to focus on more scalability (as much as possible) so that the solution can run across all supported OS."

What is our primary use case?

This solution can provide you with robust endpoint security and has the ability to give deep-level forensics because of EDR capability. 

The solution can offer you value-added features with the EPP-EDR platform to ensure complaint and posture management, category-based web access, disk encryption, password protection, and DLP over endpoint channels.

The primary key use cases for Check Point are:

1. Single console across multiple Check Point solutions using the Infinity Portal

2. Flexible deployment architecture

3. OS support

4. Rich threat intel to mitigate known/unknown attacks

5. Flexibility to bundle multiple value-added additional modules/features with the EPP platform

How has it helped my organization?

By using Harmony, you can provide 100 % security to the endpoints along with compliance and management features. This has a flexible deployment method. 

It has extended OS support to ensure your legacy endpoints also have zero-day protection. 

Using add-ons such as posture management, organizations can manage OS-level vulnerability and get rid of unwanted beaches. 

Check Point Harmony also protects you from web-based attacks along with category-based restrictions to ensure the end user gets the required access. 

What is most valuable?

Integration of the Check Point Threat intel cloud with the EPP-EDR platform, which is enhancing and providing efficient DB for threat hunting and preventing zero-day using an anti-exploit platform. 

Apart from the EPP and EDR capability, Check Point Harmony can integrate using API with 3rd party vendors; Azure AD integration makes the whole deployment and management easy for the administrator.

Multiple endpoint protection packages are available for organizations. Also, it is an MSSP-compatible platform.

What needs improvement?

With Check Point, you will get your all required value-added features as per your requirements. That said, they need to focus on more scalability (as much as possible) so that the solution can run across all supported OS. 

There are legacy OS concerns. It would be really helpful for them if legacy OS support could be extended up to Windows XP. 

Aside from that, Check Point Harmony will be a suitable option for any type of organization.

Buyer's Guide
Check Point Harmony Endpoint
February 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.

For how long have I used the solution?

I have been closely working on this solution in my organization over the last year. 

What do I think about the stability of the solution?

Using rich threat intel and robust endpoint security, the solution ensures protection against known and unknown attacks.

What do I think about the scalability of the solution?

The solution offers a flexible deployment and easy management through a consolidated console. 

How are customer service and support?

Support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously I worked with Cylance AV. Considering all value-added features along with the robust endpoint solution and threat intel, Check Point Harmony is the better choice. 

How was the initial setup?

The initial setup is very simple.

What about the implementation team?

We handled the implementation in-house.

What was our ROI?


What's my experience with pricing, setup cost, and licensing?

The pricing is really competitive when you consider other known vendors in the market.

Which other solutions did I evaluate?

We explored some traditional solutions as well.

What other advice do I have?

Check Point Harmony is feature-rich and robust, with great endpoint detection and response capabilities to ensure deep forensic understanding across incidents. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Afeez Adeyemo - PeerSpot reviewer
Technical Sales / Presales at Routelink Integrated Systems
Reseller
Top 5Leaderboard
A stable tool to secure endpoint devices and manage all devices from a centralized portal
Pros and Cons
  • "It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution."
  • "Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors."

What is our primary use case?

I use Check Point Harmony Endpoint in my company to secure the endpoint devices, including computers, servers, and every single endpoint in the environment.

How has it helped my organization?

Check Point Harmony Endpoint offers customers enterprise-level security for all their devices, including servers, laptops, and desktops. The IT personnel can ensure that with the product, all of the devices in an environment are protected with Check Point's enterprise-based solution. The customers who buy the product need not worry about their devices being exposed to threats. In fact, if you check the reports for Check Point in Gartner Magic Quadrant, you will see that the reports are all related to Check Point's endpoint security solutions. Customers try to get information on the value they can derive, along with the other potential prospects in the market, before trying to get or onboard Check Point Harmony Endpoint in their environment.

For IT personnel, Check Point Harmony Endpoint is easy to manage since they don't need to have any expert in order to deploy or monitor devices with the help of the product, and it also allows you to try out different actions on different devices. Whenever there is an attack on any device, Check Point Harmony Endpoint has the capability to isolate the affected device from the environment. Suppose there is an attack on one computer. In that case, the security of the other computers operating in the same environment is compromised, so Check Point Harmony Endpoint isolated the affected computer and notified the required department in the company to look into it while allowing for the other computers to work properly. The product offers good value to the companies that deploy it in their environment.

What is most valuable?

I would have to describe what I feel is valuable in Check Point as a whole. Check Point provides users with a central point from where they can manage all the devices across a workplace. Whether users use Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, they don't have to log into different portals or solutions since they can manage everything from one central point. I like the fact that products from Check Point are very easy to deploy. Even if a user has 1,000 endpoints in an environment, Check Point can take care of the deployment in minutes. Check Point Harmony Endpoint is a very easy solution to deploy and requires very little maintenance or technical expertise.

What needs improvement?

I would like to see improvements in Check Point Harmony Endpoint in general because some people use it since it is available at a competitive price. Due to the competitive pricing strategy of Check Point Harmony Endpoint, it is not considered to be a good product, like Fortinet, Palo Alto, or F5. Check Point Harmony Endpoint needs to consider that people should feel that Check Point doesn't compromise on quality even though the price at which Harmony Endpoint is offered is good. People who claim that Check Point Harmony Endpoint is a cheap product don't necessarily mean that it is not a good solution. Fortinet is a very expensive product that offers good value to its customers. If Check Point can work on the value proposition it offers to customers and make them understand that even though the solution is affordable, it is not a bad solution compared to its competitors, then it would be fantastic. The potential customers can opt for Check Point products, considering that they are offered good products at the cheapest price in its categories. It is important for Check Point to ensure that people don't have a wrong perception about the products it has launched in the market.

I don't think there are any features I would like to include, and the tool offers updates when compared with the products from competitors, which I think is a good way to do it. The only challenge is that for many organizations where there is an MDM solution in the environment and an endpoint security tool, my company needs to educate such organizations to convey the message that endpoint and MDM solutions are different products for different purposes, so they are not the same. If Check Point Harmony Endpoint can incorporate MDM into the solution, it can be a fantastic enhancement. Customers need not buy endpoint and MDM solutions if both are made available together in Check Point Harmony Endpoint. My company will have to put extra effort into educating the customers and making them understand the two different solutions. MDM is used to manage your mobile devices, and Check Point Harmony Endpoint is the security for your endpoints.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for over three years.

What do I think about the stability of the solution?

It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution.

What do I think about the scalability of the solution?

It is a very scalable solution.

How are customer service and support?

My company had to contact Check Point's technical team for the installations that my company carried out when we had to deal with around 40 devices that had firewalls from Check Point, which had reached the end of life. For Check Point Harmony Endpoint, my company never had any reason to contact Check Point's technical team.

Which solution did I use previously and why did I switch?

Starting with the pros, I would say that Check Point Harmony Endpoint provides value for money. After purchasing Check Point Harmony Endpoint, you need to consider the fact that the cost you pay for the solution and the value you derive from the product is very proportional. When it comes to Check Point Harmony Endpoint, I can say that a user does not pay high prices for a poor solution. A user pays a decent fee for a very good product. I think the first pro is that the value you get from the solution is made available at a very competitive price. The product is seamless and easy to use. With the centralized portal, a user can manage all Check Point products, including Check Point Harmony, Check Point Quantum, or Check Point CloudGuard, from a single point, which is also a fantastic pro for Check Point. Regarding the cons of the solution, I would say that it stems from people's perception of the solution since they feel that an affordable product may not be good enough. There is a need to work around people's wrong perception of Check Point products. Still, I don't know if such a negative perception is something that is widespread across the globe or whether it is exclusive to Nigeria or the markets in Africa. Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors.

How was the initial setup?

The product's initial setup phase was straightforward. The product's deployment was done in minutes, so it didn't take long, as there was no need to do any special configurations. There was no need for the people involved in the deployment to have any special skills. The deployment process was seamless and straightforward. The product's deployment was never an issue. The IT department need not worry too much about whether they need to learn new skills to manage the product as it is easy to use and deploy and a product that can be used seamlessly. The product's deployment takes around 30 to 40 minutes.

I work with the solution's SaaS version.

What other advice do I have?

I don't think Check Point Harmony Endpoint is difficult to maintain. I think there is a possibility of scheduling your updates in Check Point Harmony Endpoint, even if you want it to happen outside your working hours, like somewhere between eight o'clock in the evening and midnight. I don't think maintenance is stressful because it can be scheduled outside of working hours.

I would recommend others to use the product since the deployment process is seamless, so you don't need any specialized skills to use the portal provided by Check Point to monitor your devices. There are no specialized skills required to support or maintain the solution. It is also very easy to implement the product. You can keep a tab using the centralized portal offered by the product. In general, the product makes the life of the IT department easier since you need not worry about a lot of the technical stuff related to the solution.

From my point of view, I need to put in extra effort to convince my company's customers to use the solution. In terms of the features and the product's ability to deliver the promised value to its customers, especially when compared to other solutions in the market, I rate the overall product an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
February 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
Rahul Kamble. - PeerSpot reviewer
Business Director at One Networks
Reseller
Top 5
A comprehensive endpoint protection tool that is highly stable
Pros and Cons
  • "Stability-wise, I rate the solution a ten out of ten."
  • "Check Point offers solutions with only a few features for our company's customers' sites."

What is our primary use case?

My company tried Check Point Harmony Endpoint with multiple clients, but unfortunately, we could not get many clients to use the product. Currently, my company has limited clients, like ten to fifteen customers who use Check Point Harmony Endpoint.

What is most valuable?

The valuable features of Check Point Harmony Endpoint stem from the fact that it serves as a comprehensive endpoint protection product that provides users with a fast solution and complete endpoint protection while serving as a tool that offers the fastest recovery for endpoints. The tool efficiently detects, protects, and corrects vulnerabilities and patches.

What needs improvement?

Check Point offers solutions with only a few features for our company's customers' sites. My company hasn't found any bugs or didn't find the solution to be complex. Features like zero phishing, sandboxing, threat emulation and extractions, malware detection, and EDR solution capabilities need to be included in the product. My company expects more granular EDR functionalities in Check Point Harmony Endpoint.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for six months. My company has a partnership with Check Point Harmony Endpoint.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a nine out of ten.

Check Point Harmony Endpoint is a solution used by the company's clients who operate small and medium-sized businesses.

How are customer service and support?

I rate the technical support an eight and a half out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

I rate the product's initial setup phase a nine out of ten.

The solution is deployed on an on-premises model.

The solution can be deployed within two hours.

During the deployment process of Check Point Harmony Endpoint, my company needs to install the initial client and select an agent from the settings on Windows Server, after which we need to push the solution to the client. Installing the initial client isn't something that is very easy. With all the features like signature-based detection, threat emulations, and sandboxing, users may need to be involved in the creation of a signature group.

What's my experience with pricing, setup cost, and licensing?

Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years.

What other advice do I have?

Check Point Harmony Endpoint is a well-known solution among cybersecurity companies. With Check Point Harmony Endpoint, if my company gets good profit margins along with good opportunities, then we can penetrate into the market to sell it. My company expects support from Check Point, though we don't deal in many of its solutions.

I rate the overall tool a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Sales Manager, Checkpoint at South Asian Technologies
Reseller
Top 10
A solution with a number of valuable blades that make it competitive
Pros and Cons
  • "With the prevention blade, Harmony scales higher than many other solutions."
  • "I have a few issues when attempting to install Harmony on some of the machines."

What is our primary use case?

I handle Check Point SMB along with Check Point Harmony Endpoint, and I have recently provided around 400 endpoints to a construction company in Sri Lanka.

What is most valuable?

The Rollback feature is valuable because ransomware attacks are very familiar nowadays, and anti-phishing and anti-ransomware blades are required by many of our customers. Other features, like prevention blades, are also okay, where you get threat extraction and evaluation. Likewise, the forensic report is also very important.

With the prevention blade, Harmony scales higher than many other solutions. Even CrowdStrike has technical problems when you're offline. But Harmony is not like that. Even if I don't have Internet connectivity, I have seen how remediation and rollback happen. All the encrypted files come to a state where it works with micro-backups.

Customers would like to have a very advanced endpoint to protect themselves from anti-phishing, especially ransomware.

What needs improvement?

I have clients who use very old Windows versions, so I have a few issues when attempting to install Harmony on some of the machines. At times, even with the latest Windows versions, the machines' performance gets slower. We still don't have a clear idea of what has been happening. If you take 100 PCs, two, three, or four are still troublesome when you attempt to install Harmony.

Also, the price could come down slightly, and I am not saying by a huge gap, but slightly. Even Sri Lanka's smaller customers have to buy a minimum quantity, and with Harmony Connect, they have to buy 50 licenses at once. If they could come down to 20, 30, or something like that, I should be able to sell much more. Some customers would like to have Harmony, but they have to buy a minimum quantity of 50. That's a bit troublesome for me as a salesperson.

For how long have I used the solution?

I have worked with Checkpoint Harmony Endpoint for almost one year now.

What do I think about the stability of the solution?

I rate the solution's stability a nine out of ten.

What do I think about the scalability of the solution?

I highly rate the solution's scalability.

How are customer service and support?

We have a set of engineers who specialize in Harmony Endpoint and Harmony Connect.

How would you rate customer service and support?

Positive

How was the initial setup?

The deployment takes one or two weeks. The deployer always creates a tenant, through which they install the solution. They also trained customers and end users to install Harmony, and they managed to install the entire license.

What's my experience with pricing, setup cost, and licensing?

I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high.

What other advice do I have?

Features like factory remediation, basically callback, are getting familiarized by Sri Lankan customers. Many have bought Harmony endpoints, so many customers have been considering Harmony Connect. This will lead to it having a good future.

When speaking to customers, I first communicate what ThreatCloud is all about. ThreatCloud is shared by other solutions like CloudGuard, Quantum, and Quantum Spark. It's very common to them. This means you will get the prevention blade, not the detection blade. Whenever you have phishing attacks, malware attacks, DDoS attacks, and even zero-day attacks, they are all always prevented by Check Point Harmony and Check Point products.

I always advise people to go for an advanced endpoint because IT managers have less of a hassle when using products like Check Point.

I have been facing lots of competition with CrowdStrike and Kaspersky. I don't think other products should compete with Check Point Harmony Endpoint because it is a different level endpoint altogether. I want to give them competition with the pricing.

I rate Check Point a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Abdul Modi - PeerSpot reviewer
Information Technology Security Specialist at Al Muzaini Exchange Co.
Real User
Top 20
Offers in-built EDR capabilities to provide better visibility of threats
Pros and Cons
  • "Compared to its competitors, Check Point Harmony Endpoint has advantages in areas like EDR and behavioral detection."
  • "The response from the tool's support team, which starts with L1, is something my company doesn't find helpful, especially when compared to the other solutions that we use."

What is our primary use case?

I use the solution in my company, and it is usually deployed on all our endpoint solutions, which include workstations and servers.

What is most valuable?

I think the overall product is good. There is an in-built EDR in the tool, which is good because it gives users visibility into the threats coming into the environment.

What needs improvement?

The support from the vendor itself is the tool's weakness because we don't get good support from the vendor. The response from the tool's support team, which starts with L1, is something my company doesn't find helpful, especially when compared to the other solutions that we use. The support is one of the major issues with Check Point Harmony Endpoint.

Apart from the support area, everything else is good in the tool.

The tool's performance sometimes slows down the system, and I think the module itself is very heavy on the endpoints, making it an area that can be improved. In our company, we have seen Trend Micro and other solutions that have very light agents, so they do not affect the performance of the endpoints.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for three years. I use a standard version.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a seven or eight out of ten.

What do I think about the scalability of the solution?

The tool's scalability is good. Scalability-wise, I rate the solution a seven to eight out of ten.

My company has around 800 licenses for the product, and I think we have a couple of administrators who are or are less good and capable of managing the solution.

My company does not plan to increase the use of the solution in the future because we have reached its maximum capacity. Even if we try to increase the capacity of the product in our company, then I don't believe that it would go beyond five to ten percent.

How are customer service and support?

I rate the technical support not more than four or five out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have worked with Symantec, Trend Micro, and Sophos.

What was our ROI?

My company has reached a point where it has experienced a return on investment from the use of the product.

What's my experience with pricing, setup cost, and licensing?

The product is averagely priced. The product price is neither very high nor too low. The tool is not really expensive.

Which other solutions did I evaluate?

Compared to its competitors, Check Point Harmony Endpoint has advantages in areas like EDR and behavioral detection. Lately, all the solutions have improved. I think that now there are a number of solutions that come with SIEM capabilities, while in the past, around three years ago, Check Point was leading in the aforementioned area. More or less, all the products that can be compared with each other are the same if I consider the peer-to-peer node part.

What other advice do I have?

Two or three years ago, I would have recommended the product to others, but nowadays, there are other solutions with good capabilities that are better than Check Point. I wouldn't recommend the tool to anyone now because I have seen much better solutions lately, and the market is also changing and becoming very dynamic.

Check Point Harmony Endpoint should learn from its competitors how to improve its agent capabilities and have a lightweight agent to provide good support. Also, some real-time detection and behavioral security checks are still missing and need to be improved.

I rate the overall tool an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Works at CSIT
User
Enhances our organization's cybersecurity posture with its comprehensive set of features
Pros and Cons
  • "The Management interface of the product is relatively user-friendly and easy to navigate."

    What is our primary use case?

    Our primary use case is to enhance the organization's security posture against attacks like phishing, and malware especially zero-day threats, with low false positives. The product must be able to integrate with the existing infrastructure with relative ease. 

    We need detailed reporting and forensics analysis tools for incident response, and the management console must be user-friendly.

    We need to improve operational efficiencies in managing endpoints and thousands of users, given the increasing number of remote workforce. There should be minimal impact on endpoints.

    How has it helped my organization?

    The management interface of the product is relatively user-friendly and easy to navigate.

    The product manages to block most zero-day attacks and unknown threats in real-time, thus reducing the manual overhead by being the first layer of protection against unknown attacks, easing the workload on the monitoring team, and enabling the team to focus on other tasks simultaneously.

    Overall, the product enhances our organization's cybersecurity posture with its comprehensive set of features, supported by a leaner monitoring team.

    What is most valuable?

    The product is quite easy to configure and can be deployed in under half an hour.

    It has a centralised management console, single panel to triage, escalate, mitigate and respond.

    The agent is lightweight on the endpoints and operates seamlessly in the background with minimal impact on the performance of the endpoints.

    It has features like firewalling, removable device control, VPN, app control, DLP, file sandboxing, ransomware protection. which can be turned on or off per endpoint, groups, employees.

    What needs improvement?

    It should reduce CPU and memory usage. Its technical support could be more timely though it is still acceptable.

    It is painful to get deep informational logs to be exported to a SIEM as Check Point requires a user to use its tooling Horizon.

    At times, it repeatedly scans the same files without any effective results.

    It lacks granular management and configuration.

    Additionally, users may encounter challenges with the product's components not performing as anticipated, necessitating the manual addition of exclusions across various areas.

    For how long have I used the solution?

    We have been using Check Point Harmony Endpoint for less than three months.

    What do I think about the stability of the solution?

    The stability is acceptable.

    What do I think about the scalability of the solution?

    The scalability is okay.

    How are customer service and support?

    The support could be faster.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    The setup could be done in less than 30 minutes.

    What's my experience with pricing, setup cost, and licensing?

    The licensing is pricy, so weigh the pros and cons.

    Which other solutions did I evaluate?

    We looked at CrowdStrike and Palo Alto.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    JemAhmed - PeerSpot reviewer
    Technical Integration Engineer at Intelligent Systems (Bulgaria)
    Real User
    Top 5
    Comprehensive and reliable endpoint security with advanced threat prevention capabilities and excellent technical support
    Pros and Cons
    • "The standout features are primarily EDR and MDR."
    • "Improvements are required in two key areas: notifications and setup simplification."

    What is our primary use case?

    We primarily use it to provide security solutions for small to medium-sized companies with ten to fifty employees.

    What is most valuable?

    The standout features are primarily EDR and MDR. These functionalities are crucial because they specifically target the most common attack vectors, such as email phishing and downloading unknown software. EDR provides a solution for monitoring and responding to these threats effectively. Additionally, MDR ensures round-the-clock monitoring by skilled personnel from Check Point's team. They promptly alert us to any significant events, allowing us to take necessary actions swiftly.

    What needs improvement?

    Improvements are required in two key areas: notifications and setup simplification. Notification integration primarily relies on software, which is not commonly used by most small companies. Additionally, the setup process within the dashboard is overly complex, with numerous checkboxes and options that necessitate at least a week of training to comprehend fully. Simplifying this process through a wizard or a more intuitive interface would greatly benefit smaller companies.

    For how long have I used the solution?

    I have been working with it for several months.

    What do I think about the stability of the solution?

    It provides outstanding reliability. I would rate it ten out of ten.

    What do I think about the scalability of the solution?

    Scalability is a challenge due to the need for different appliances to accommodate varying user counts and traffic levels. When businesses experience growth or sudden increases in users, acquiring and deploying new appliance packages can be cumbersome. Availability of stock and deployment timelines vary, sometimes resulting in delays of days or even weeks to implement new hardware appliances. I would rate it six out of ten. We serve approximately five or six customers, with the largest having around fifty endpoints, which is considered small to medium-sized in scale.

    How are customer service and support?

    The technical support provided is excellent, earning a rating of ten out of ten.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The initial setup was complex, with a rating of three out of ten in terms of difficulty. Implementing the entire solution, covering everything from networking to setting up Office 365, proved to be intricate and challenging.

    What about the implementation team?

    The deployment time varies depending on the complexity of the case. For simple installations, we estimate approximately one week for completion. However, for more intricate setups involving thorough configuration and fine-tuning, the timeframe extends to three to four weeks. Our deployment process begins with in-depth analysis and discussions with the customer to understand their specific needs and infrastructure, including any special features they utilize, such as on-premise email with Exchange. We initially deploy a standard version with a standardized setup, followed by a review period to assess its effectiveness. Subsequently, we fine-tune the configuration based on feedback and requirements, which typically takes about a week. Finally, we roll out the refined setup to endpoints, servers, and other relevant components.

    What's my experience with pricing, setup cost, and licensing?

    In comparison to other software solutions available on the market, it comes at a higher price point. However, the price is justified considering the robust features it offers. I would rate it nine out of ten. They provide fixed packages based on the number of users.

    What other advice do I have?

    Overall, I would rate it eight out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
    PeerSpot user
    Amber Mishra - PeerSpot reviewer
    Pre-Sales Manager at DCIPHERS IT SOLUTIONS
    Reseller
    Top 5
    A consolidated security solution that is easy to implement and has a user-friendly dashboard
    Pros and Cons
    • "Check Point Harmony Endpoint has one of the most user-friendly dashboards I've seen."
    • "Check Point Harmony Endpoint's agent is a bit heavy."

    What is most valuable?

    Check Point Harmony Endpoint has one of the most user-friendly dashboards I've seen.

    What needs improvement?

    Check Point Harmony Endpoint's agent is a bit heavy.

    Check Point Harmony Endpoint should probably support more in Linux as well.

    For how long have I used the solution?

    I have been working with Check Point Harmony Endpoint for one and a half years.

    What do I think about the scalability of the solution?

    Check Point Harmony Endpoint is a scalable solution.

    What's my experience with pricing, setup cost, and licensing?

    Check Point Harmony Endpoint's pricing is more competitive than any other vendor. Since it is growing, the solution gives better prices than any other in the market.

    What other advice do I have?

    It is easy to integrate Check Point Harmony Endpoint with other vendors.

    Check Point Harmony Endpoint is easy to implement. I recommend Check Point Harmony Endpoint to other users.

    Check Point Harmony Endpoint is a good product. Check Point Harmony Endpoint and SentinelOne are the only two products that can compete in the endpoint space.

    Majorly, we push Check Point Harmony Endpoint to our customers. Other than Check Point, if something comes up, we go with SentinelOne. We only sell CrowdStrike when the customer asks for it. We position Check Point Harmony Endpoint and SentinelOne depending on the customer's requirement.

    Sentinel One has a bit better breach prevention rate. If a customer needs a consolidated security solution and anti-ransomware protection with ransomware 2.0, then Check Point Harmony Endpoint is the best solution over SentinelOne.

    Overall, I rate Check Point Harmony Endpoint ten out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
    Updated: February 2025
    Buyer's Guide
    Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.