My main use case for Check Point Harmony Endpoint is to protect employee devices from malware, ransomware, and phishing attacks. It's another feature I need to use, around the different features in Check Point, and I search for complete protection with Check Point.
IT Cloud Learder at a security firm with 51-200 employees
Has significantly reduced ransomware incidents and improved threat response times
Pros and Cons
- "Since we started using it, we've seen fewer security incidents, faster response times, and better protection against ransomware."
- "While the platform is powerful, the user interface of Check Point Harmony Endpoint could be more intuitive for non-technical users."
What is our primary use case?
What is most valuable?
The best feature of Check Point Harmony Endpoint is the ransomware protection in this case.
What makes the ransomware protection stand out is how fast and accurate ransomware detection is. It blocks threats in real time before they spread, and the automated response makes it easy to contain incidents without manual efforts.
Check Point Harmony Endpoint has had a strong positive impact on my organization. Since we started using it, we've seen fewer security incidents, faster response times, and better protection against ransomware. Our response times to threats have improved by at least 50% compared to before. Manual investigation and containment could take hours, but now, automated alerts and remediation let us act within minutes. For example, a recent malware attempt was blocked and isolated in under five minutes without needing manual intervention.
The reporting feature in Check Point Harmony Endpoint is great as it is necessary for normative governance and audits. Harmony Endpoint integrates well with other existing security tools, such as the SIEM in Azure, specifically Azure Sentinel.
What needs improvement?
Check Point Harmony Endpoint could improve with more flexible pricing options, faster updates, and better threat intelligence. Better documentation and more intuitive UI tweaks would also help streamline deployment and daily management.
While the platform is powerful, the user interface of Check Point Harmony Endpoint could be more intuitive for non-technical users. Sometimes it takes extra clicks to find key settings or reports, and while support is responsive, faster resolution time would help during urgent incidents.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for around three years.
Buyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
892,868 professionals have used our research since 2012.
What other advice do I have?
Check Point Harmony Endpoint gives us peace of mind. It's reliably effective and fits well into our security strategy.
I prefer Check Point as my provider and do not have any advice for others looking into using Check Point Harmony Endpoint.
I do not have any advice for others who are considering using Check Point Harmony Endpoint.
On a scale of one to ten, I rate Check Point Harmony Endpoint an eight.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 13, 2025
Flag as inappropriateSecurity Support at a non-tech company with 201-500 employees
Safeguarding Remote Devices with Proactive Ransomware Prevention
Pros and Cons
- "The best features of Check Point Harmony Endpoint that stand out the most for me include the anti-ransomware protection, which detects abnormal encryption behavior, stops it instantly, and restores affected files, preventing downtime for the users."
- "I think the documentation for Check Point Harmony Endpoint is a little thin because it is not really intuitive."
What is our primary use case?
My main use case for Check Point Harmony Endpoint is to enforce and ensure the laptops and tablets in my company because the users, when they need to get out and visit different clients and connect in different sites, need to see corporate data, so I need to create powerful security.
A quick example of how I use Check Point Harmony Endpoint for this purpose is when one of our employees accidentally tried to download a file from a phishing email that looked like a legitimate invoice. In this case, Check Point Harmony Endpoint immediately flagged the file as malicious, quarantined it, and blocked the execution before it could run on the device.
Another scenario where Check Point Harmony Endpoint has been especially useful is in securing remote workers when our team shifted to hybrid work. We need to ensure the laptops connecting from home networks were just as protected as those inside the office, and Check Point Harmony Endpoint gave us consistent protection by enforcing policies such as blocking unauthorized USB devices and preventing data from being copied to personal drives.
What is most valuable?
The best features of Check Point Harmony Endpoint that stand out the most for me include the anti-ransomware protection, which detects abnormal encryption behavior, stops it instantly, and restores affected files, preventing downtime for the users.
The anti-ransomware feature of Check Point Harmony Endpoint works quietly in the background every day, monitoring for suspicious encryption activity or unusual file behavior, and it does not just rely on signatures; it looks for patterns that resemble ransomware attacks, such as rapid file changes or attempts to lock large volumes of data.
One very useful feature of Check Point Harmony Endpoint that I have not mentioned yet is its forensics and incident analysis capability, because after a threat is detected and blocked, the system provides detailed insights into how the attack started.
Check Point Harmony Endpoint has positively impacted my organization by strengthening endpoint security, and as a result, we have reduced the workload on our IT team, including reduced ransomware risk. For example, the anti-ransomware feature stopped an attempted attack by detecting abnormal file encryption and restored affected files, preventing downtime, which allows the users to have more free time.
What needs improvement?
I think the documentation for Check Point Harmony Endpoint is a little thin because it is not really intuitive.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for six years.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is very stable in all tools.
What do I think about the scalability of the solution?
The scalability of Check Point Harmony Endpoint is very good; it is very scalable.
How are customer service and support?
The customer support for Check Point Harmony Endpoint is very great.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
yes
How was the initial setup?
Check Point Harmony Endpoint was deployed in my organization using a hybrid cloud.
What was our ROI?
I have seen specific outcomes or metrics with Check Point Harmony Endpoint, such as saving about 20% a month in manual incident handling.
What's my experience with pricing, setup cost, and licensing?
My experience with the pricing, setup cost, and licensing of Check Point Harmony Endpoint is favorable for me; I have no problem with the license.
What other advice do I have?
I save time in the IT team due to Check Point Harmony Endpoint.
I recommend Check Point Harmony Endpoint to others looking into using it because it is a very complete security tool.
Check Point Harmony Endpoint is a great tool for people trying to enforce their companies with excellent security. I have rated this review nine out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Dec 30, 2025
Flag as inappropriateBuyer's Guide
Check Point Harmony Endpoint
May 2026
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
892,868 professionals have used our research since 2012.
Administrador De Redes at a financial services firm with 501-1,000 employees
Endpoint threats have been contained immediately and security actions now run automatically across all devices
Pros and Cons
- "During a ransomware attack that targeted several laptops, Check Point Harmony Endpoint immediately isolated the affected device and blocked the malicious process before it could spread."
- "The interface can feel complex at times; a simplified navigation would make daily use easier."
What is our primary use case?
Check Point Harmony Endpoint protects device endpoints, specifically laptops, when people need to work outside of the office.
How has it helped my organization?
The best features Check Point Harmony Endpoint offers include strong ransomware protection and the ability to isolate compromised devices instantly.
These features work well for us because they combine prevention, detection, and response in one platform. For example, ransomware protection isolates devices instantly, which is faster than other tools we have used that required manual intervention. The central management console also stands out since it lets us apply policies across all endpoints at once, while other solutions needed separate configuration.
One feature that has proven very valuable in Check Point Harmony Endpoint is the forensics analysis capability. After an incident, it provides detailed reports on how the attack was attempted and what actions were taken to block it.
What is most valuable?
Check Point Harmony Endpoint helped our team when an employee connected from an unsecured public Wi-Fi during travel. The solution automatically enforced the VPN access and endpoint protection, which prevented exposure to potential threats. It also detected and blocked a suspicious download before it could impact the device.
During a ransomware attack that targeted several laptops, Check Point Harmony Endpoint immediately isolated the affected device and blocked the malicious process before it could spread. At the same time, the central console alerted us and allowed quick remediation without disturbing other users. This proactive response saved us from potential downtime and data loss and showed the value of having endpoint protection tightly integrated with our overall security framework.
What needs improvement?
Check Point Harmony Endpoint is strong overall, but there are areas that could be improved. The interface can feel complex at times; a simplified navigation would make daily use easier. Reporting and analysis could also be more customizable with clearer dashboards to match different business needs.
Documentation and customer support could be enhanced because support is only available in English.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for around four years.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is very stable.
What do I think about the scalability of the solution?
Check Point Harmony Endpoint's scalability is good.
How are customer service and support?
Customer support is very fast.
How would you rate customer service and support?
Positive
What was our ROI?
I have seen a return on investment in terms of time saved.
Before we implemented Check Point Harmony Endpoint, isolating a compromised device could take one to two hours due to manual checks and coordination. Now, the system automatically detects and isolates endpoints within minutes. This has significantly reduced downtime and allows our team to focus on other remediations or tasks.
What other advice do I have?
Check Point Harmony Endpoint is a faster application for security on your device, and it is excellent for protecting your organization. I would rate Check Point Harmony Endpoint a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 21, 2025
Flag as inappropriatePre-sales Consultant at Velocis Systems
Visibility across all endpoints has helped save time by avoiding manual tracking
Pros and Cons
- "The best features Check Point Harmony Endpoint offers include complete visibility and a single dashboard where I can see everything for all employees."
- "Check Point Harmony Endpoint can be improved by having the capability to integrate with other solutions, as no one has the complete Check Point solution, so integration with other OEMs would be beneficial."
What is our primary use case?
My main use case for Check Point Harmony Endpoint is to ensure that endpoints are secured, such as laptops and mobile devices.
A specific example of how I use Check Point Harmony Endpoint to secure laptops and mobile devices is when employees leave the company and download third-party applications. Sometimes they share data via mobile, and in such cases, Check Point Harmony Endpoint helps to secure the data.
This is something we are currently using as our main use case with Check Point Harmony Endpoint.
What is most valuable?
The best features Check Point Harmony Endpoint offers include complete visibility and a single dashboard where I can see everything for all employees.
Having complete visibility and a unified dashboard helps me day-to-day as it makes my job easier because I can see everything on a single dashboard, and it also saves me time since at a granular level, I can see it on my dashboard without having to go in-depth and search desk to desk.
Check Point Harmony Endpoint has positively impacted my organization through visibility over the employees' use cases.
The visibility helps us identify what data should be given access on mobile, such as email services or any other services, and how much data should be traveled through mobile. We are currently figuring this out and will keep everything on-premises in the company with less data shared via endpoints.
What needs improvement?
Check Point Harmony Endpoint can be improved by having the capability to integrate with other solutions, as no one has the complete Check Point solution, so integration with other OEMs would be beneficial.
If Check Point Harmony Endpoint can improve from a costing perspective, it would be easier for us.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for around eight months.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is stable and has been stable to date.
What do I think about the scalability of the solution?
The scalability of Check Point Harmony Endpoint is good.
How are customer service and support?
I have not yet used customer support for Check Point Harmony Endpoint.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
How was the initial setup?
I am not certain if we purchased Check Point Harmony Endpoint through the AWS Marketplace, as the company made the purchase.
What was our ROI?
I have seen a return on investment in terms of time saved because I get visibility, so time saved is something I can definitely mention.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing indicates it is on a higher side.
Which other solutions did I evaluate?
I did not evaluate other options before choosing Check Point Harmony Endpoint.
What other advice do I have?
I would rate Check Point Harmony Endpoint an eight out of ten.
I chose eight out of ten because I have been using it for eight months and have more to explore with it, and to date, all of my use cases have been accomplished.
My advice to others looking into using Check Point Harmony Endpoint is that they should at least try it for a proof of concept, as it is a good product.
I do not have any additional thoughts about Check Point Harmony Endpoint before we wrap up.
My overall review rating for Check Point Harmony Endpoint is eight.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 31, 2025
Flag as inappropriateCloud network engineer at a manufacturing company with 10,001+ employees
Comprehensive and proactive protection enhances operational efficiency with agility
Pros and Cons
- "The best features Check Point Harmony Endpoint offers are its comprehensive and proactive approach; these features stand out because it's very lightweight and has very good anti-ransomware protection."
- "Check Point Harmony Endpoint can be improved as it is a bit clunky and not intuitive, especially when navigating around the more advanced settings or trying to interpret the logs, and the agent is resource intensive on some occasions."
What is our primary use case?
My main use case for Check Point Harmony Endpoint is office advanced endpoint protection, so our users can navigate safely on the internet.
What is most valuable?
The best features Check Point Harmony Endpoint offers are its comprehensive and proactive approach; these features stand out because it's very lightweight and has very good anti-ransomware protection.
Check Point Harmony Endpoint has positively impacted my organization by enhancing business process agility and user protection, resulting in more operational efficiency.
What needs improvement?
Check Point Harmony Endpoint can be improved as it is a bit clunky and not intuitive, especially when navigating around the more advanced settings or trying to interpret the logs, and the agent is resource intensive on some occasions.
With the advanced settings or logs, there is an overall bad experience, as there are particular settings and log types that are confusing and hard to use. More improvements are required in these areas.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for six months.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is stable.
What do I think about the scalability of the solution?
Check Point Harmony Endpoint is very scalable.
How are customer service and support?
The customer support is pretty good.
I would rate the customer support an eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Before choosing Check Point Harmony Endpoint, I evaluated other options, namely Fortinet and Palo Alto.
What was our ROI?
Since implementing Check Point Harmony Endpoint, I've saved time due to operational efficiency, but there are no specific metrics I can share.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing was not good.
The experience was negative primarily due to the cost related to the pricing and the setup process.
What other advice do I have?
My advice to others looking into using Check Point Harmony Endpoint is to evaluate the cost and POC of the product first. I rate Check Point Harmony Endpoint eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Aug 26, 2025
Flag as inappropriateInformation Technology Engineer at ZAVASI TECHNOLOGIES PVT LTD
Endpoint security has strengthened data protection and now stops phishing and ransomware
Pros and Cons
- "Check Point Harmony Endpoint has positively impacted our organization by improving our security, preventing issues such as phishing, ransomware, and malware, and offering URL protection that filters downloads from browsers to stop any malicious files before they are downloaded."
- "To improve Check Point Harmony Endpoint, I believe the DLP feature needs enhancement because many SMB customers seek a single solution that includes both EDR and DLP to meet regulations."
What is our primary use case?
My main use case for Check Point Harmony Endpoint involves its endpoint protection as well as full disk encryption with the EDR solutions, Endpoint Detection and Response.
A specific example of how I use the endpoint protection or disk encryption in my daily work includes using disk encryption such as BitLocker, along with two encryption types: FileVault and Check Point encryption. The encryption keys are stored in the Check Point Harmony Endpoint console.
The main point I want to add about my primary use case is that the basic license includes an EDR license, Endpoint Detection and Response, which is a major highlight for Check Point Harmony Endpoint.
What is most valuable?
The best features that Check Point Harmony Endpoint offers for me and my team include Application Control, Device Control, SandBlasting, and the basic DLP.
Application Control and Device Control have helped my organization by allowing us to block applications, such as inbuilt agents installed on user devices, while using Check Point Harmony Endpoint Application Control features. With Device Control, we can impose restrictions on users, preventing them from copying organization data from pen drives or external drives such as Bluetooth. We can control accessories, keyboards, and mice, either blocking or allowing them as needed.
Check Point Harmony Endpoint has positively impacted our organization by improving our security, preventing issues such as phishing, ransomware, and malware. It also offers URL protection, filtering downloads from browsers to stop any malicious files before they are downloaded.
What needs improvement?
Regarding the features, I want to add that DLP, in my opinion, is not full-fledged; it only provides features at the web browser level.
To improve Check Point Harmony Endpoint, I believe the DLP feature needs enhancement because many SMB customers seek a single solution that includes both EDR and DLP to meet regulations. While EDR has no drawbacks, we often have to look for other DLP solutions due to the limited DLP features in Check Point Harmony Endpoint.
Beyond the DLP concerns, I feel that everything else works well. Features such as encryption, SandBlasting, patch management, and vulnerability management are available in Check Point Harmony Endpoint. The only notable drawback for me is the DLP feature, and if we receive more use cases from customers, we can provide updates on that.
For how long have I used the solution?
I have been working in my current field for the past three years and four months.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is stable in my experience.
What do I think about the scalability of the solution?
Regarding scalability, I would like to provide a specific rating, but I am unsure how to articulate that clearly.
Which solution did I use previously and why did I switch?
Before using Check Point Harmony Endpoint, we had alternatives in place but I cannot specify which ones at this moment.
We evaluated other options, specifically Kaspersky, which offers a single solution encompassing email gateway and patch management alongside endpoint security. We assessed that offering in comparison.
What was our ROI?
In terms of return on investment, I cannot quantify savings because of the numerous variables involved.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Harmony Endpoint offered competitive pricing for small user counts such as thirty-five, but they have raised the minimum entry level to one hundred users. While the prices are higher than those of other solutions, the features justify the investment for customers.
What other advice do I have?
While we did not actively track metrics, I can share that when we downloaded a third-party KMS tool considered an activation tool, Check Point Harmony Endpoint detected it as malicious and blocked the EXE file during the download process.
My advice for those considering Check Point Harmony Endpoint is to pursue it for its better features, particularly the EDR licensing available even in the basic package, unlike some competitors that reserve it for advanced or complete solution packages. SandBlasting is a standout feature that I recommend highlighting to customers. I would rate this product nine out of ten.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Dec 9, 2025
Flag as inappropriateBusiness Development Manager at Digitaltrack
Has improved end-user security and provided centralized control over device access
Pros and Cons
- "Check Point Harmony Endpoint provides greater security as it is impacting positively and has reduced incidents and saved many malicious threats since implementation."
- "The agent's size is very heavy, so it could be reduced to a lighter version for Check Point Harmony Endpoint."
What is our primary use case?
Check Point Harmony Endpoint is used to manage endpoint user devices, which includes laptops, desktops, and mobile devices, to control their access and secure the end-user devices.
Check Point Harmony Endpoint provides a central management console from where security policies are applied and enforced to end-user devices as the Harmony Endpoint agent is installed on the user device. Whenever any policy like USB block or any particular category are blocked, users cannot access those resources through the internet, and all security features are enforced from Check Point Harmony Endpoint.
Multiple users are not allowed to reach particular websites or applications with Check Point Harmony Endpoint, so policies are enforced so that they cannot run particular category applications or particular URL categories, or anything from the internet. All of this is controlled from Check Point Harmony Endpoint, and proper visibility is obtained of which user accessed what and at what time, with all logging received from centralized management.
What is most valuable?
Check Point Harmony Endpoint's antivirus, anti-malware capabilities, and device control and visibility collectively provide great control and great security to the organization's compliance.
Check Point Harmony Endpoint provides greater security as it is impacting positively and has reduced incidents and saved many malicious threats since implementation.
Fewer incidents are occurring and time is being saved by using Check Point Harmony Endpoint.
What needs improvement?
The agent's size is very heavy, so it could be reduced to a lighter version for Check Point Harmony Endpoint.
For how long have I used the solution?
The reviewer has been working in the current field for more than six years.
Check Point Harmony Endpoint has been used for almost three years.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is stable.
What do I think about the scalability of the solution?
Scalability-wise, Check Point Harmony Endpoint is outstanding. As of now, scalability issues are not being faced, but if major growth happens, additional licenses would need to be purchased from Check Point.
How are customer service and support?
Check Point support is supportive and capable of troubleshooting conflicts and issues with Check Point Harmony Endpoint.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Check Point Harmony Endpoint is the only solution being used. CrowdStrike Endpoint Security was evaluated before choosing Check Point Harmony Endpoint.
How was the initial setup?
The reviewer was not part of the team that handled the setup process, pricing, or the licensing part for Check Point Harmony Endpoint.
What about the implementation team?
The organization is a partner with Check Point.
What other advice do I have?
Check Point Harmony Endpoint receives an overall rating of nine out of ten. Everything looks perfect with Check Point Harmony Endpoint, providing great security and visibility, but since the solution has space to improve, a rating of nine out of ten is given. Customer support for Check Point Harmony Endpoint also receives a rating of nine out of ten. The recommendation to others looking into using Check Point Harmony Endpoint for securing their employees' end-user devices is to consider Check Point Harmony Endpoint as one of the best security solutions available to protect security.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 30, 2025
Flag as inappropriateTeam Lead – Cyber Security at Digitaltrack
Has improved device security and reduced administrator time through centralized control
Pros and Cons
- "The best features Check Point Harmony Endpoint offers include outstanding visibility and user's control over the endpoint devices."
- "Check Point Harmony Endpoint can be improved because sometimes the agent feels heavy, causing slowness in our PC, so that can be improved."
What is our primary use case?
My main use case for Check Point Harmony Endpoint is managing the endpoint devices whether it is like a desktop or. A quick specific example of using Check Point Harmony Endpoint is that any user can connect a USB to their endpoint devices and can access any files or share any files through other users, and now we have defined the policy so they are protected from any malicious threats, and we are getting centralized visibility.
What is most valuable?
The best features Check Point Harmony Endpoint offers include outstanding visibility and user's control over the endpoint devices. The visibility and control features of Check Point Harmony Endpoint help my organization by allowing us to push a centralized policy through a central management console, and we are getting full visibility from the individual device's health and security relations, so all this information we are getting in a centralized console.
What needs improvement?
Check Point Harmony Endpoint can be improved because sometimes the agent feels heavy, causing slowness in our PC, so that can be improved.
For how long have I used the solution?
I have been using Check Point Harmony Endpoint for more than three years.
What do I think about the stability of the solution?
Check Point Harmony Endpoint is stable.
What do I think about the scalability of the solution?
The scalability of Check Point Harmony Endpoint is excellent.
How are customer service and support?
The customer support for Check Point Harmony Endpoint is excellent.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are using the same solution and did not previously use a different one before Check Point Harmony Endpoint.
What was our ROI?
I can say I have seen a return on investment with Check Point Harmony Endpoint in terms of money saved.
What other advice do I have?
Check Point Harmony Endpoint has positively impacted my organization because previously, we were not getting alerted due to malicious files or threats. The positive outcomes I've seen from Check Point Harmony Endpoint include improved overall condition of security and saving our time. Specifically, I have noticed our administrator's time is spending less time on managing the endpoint devices. I would rate Check Point Harmony Endpoint nine out of ten. I gave it a nine because of the heavy endpoint agent. For anyone looking for a solution in endpoint security, they can consider Check Point Harmony Endpoint as an excellent security solution currently present in our security room.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 29, 2025
Flag as inappropriateBuyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2026
Product Categories
Endpoint Protection Platform (EPP) Anti-Malware Tools Endpoint Detection and Response (EDR)Popular Comparisons
CrowdStrike Falcon
Cortex XDR by Palo Alto Networks
Microsoft Defender for Endpoint
SentinelOne Singularity Endpoint
IBM Security QRadar
Huntress Managed EDR
Elastic Security
HP Wolf Security
Trellix Endpoint Security Platform
Microsoft Defender XDR
WatchGuard Firebox
Fortinet FortiEDR
TrendAI Vision One
Fortinet FortiClient
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What is the pricing for Check Point software?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?




















