Try our new research platform with insights from 80,000+ expert users
IT at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Dec 31, 2025
Real-Time Blocking Stops Phishing and Speeds Incident Response
Pros and Cons
  • "The real-time threat detection in Check Point Harmony Endpoint helped us catch a ransomware attack early; a user downloaded a file from a spoofed site, and Check Point Harmony Endpoint immediately flagged it, quarantined the file, and alerted our support team, preventing the malware from spreading and saving us from a large downtime."
  • "Creating tailored reports for different departments or compliance needs in Check Point Harmony Endpoint takes extra effort."

What is our primary use case?

Check Point Harmony Endpoint is mainly used to protect laptops from malware, phishing, and ransomware. It serves as a frontline defense for remote workers and ensures secure access to corporate resources.

One of our users clicked a link in a phishing email to log in, and Check Point Harmony Endpoint instantly flagged the site as malicious and blocked access, alerting our support team. It was a very quick response that prevented credential theft and a potential breach.

Check Point Harmony Endpoint is also used to control USB access and enforce encryption on devices, which is a common requirement.

How has it helped my organization?

Check Point Harmony Endpoint has positively impacted our organization.

A significant positive impact on our organization is that I win more time for other support tasks because Check Point Harmony Endpoint protects more easily than support agents can.

We track some key metrics since we deployed Check Point Harmony Endpoint, and it reduced incidents and saved time for our security team.

What is most valuable?

The best feature Check Point Harmony Endpoint offers is ransomware rollback. If an attack slips through, Check Point Harmony Endpoint can roll back affected files to a safe state, minimizing damage.

The real-time threat detection in Check Point Harmony Endpoint helped us catch a ransomware attack early. A user downloaded a file from a spoofed site, and Check Point Harmony Endpoint immediately flagged it, quarantined the file, and alerted our support team. The quick action prevented the malware from spreading and saved us from a large downtime.

Check Point Harmony Endpoint is a very centralized tool, and the reporting is really well done.

What needs improvement?

Creating tailored reports for different departments or compliance needs in Check Point Harmony Endpoint takes extra effort. More flexible templates or drag-and-drop options would be a great addition for better report checking.

Better integration with third-party tools would be beneficial. It works, but sometimes it takes extra effort to connect with the platforms used daily for Check Point Harmony Endpoint. Support is helpful, but responds only in English.

Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for around two years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is really stable.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint is very scalable and definitely meets our needs.

How are customer service and support?

Customer support for Check Point Harmony Endpoint is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used Microsoft Endpoint Security in the past.

I switched from Microsoft Endpoint Security to Check Point Harmony Endpoint because I think that Check Point is better than Microsoft.

What was our ROI?

In my case with Check Point Harmony Endpoint, the time saved for our employees represents the return on investment.

What's my experience with pricing, setup cost, and licensing?

Pricing and licensing for Check Point Harmony Endpoint were fair, but not exactly budget-friendly. The setup cost was manageable, though it depends on how many endpoints you are protecting. Licensing is flexible, but if you are a smaller team or not using all the features, it can feel as though you are paying for more than you need.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Check Point Harmony Endpoint.

What other advice do I have?

For others looking into using Check Point Harmony Endpoint, I would advise starting by clearly defining your security needs and the type of devices you want to protect. Check Point Harmony Endpoint offers a lot of features, but it is most effective when tailored to your environment. I would rate Check Point Harmony Endpoint as an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Dec 31, 2025
Flag as inappropriate
PeerSpot user
D Alvarado - PeerSpot reviewer
IT Cloud Learder at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Nov 13, 2025
Has significantly reduced ransomware incidents and improved threat response times
Pros and Cons
  • "Since we started using it, we've seen fewer security incidents, faster response times, and better protection against ransomware."
  • "While the platform is powerful, the user interface of Check Point Harmony Endpoint could be more intuitive for non-technical users."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is to protect employee devices from malware, ransomware, and phishing attacks. It's another feature I need to use, around the different features in Check Point, and I search for complete protection with Check Point.

What is most valuable?

The best feature of Check Point Harmony Endpoint is the ransomware protection in this case.

What makes the ransomware protection stand out is how fast and accurate ransomware detection is. It blocks threats in real time before they spread, and the automated response makes it easy to contain incidents without manual efforts.

Check Point Harmony Endpoint has had a strong positive impact on my organization. Since we started using it, we've seen fewer security incidents, faster response times, and better protection against ransomware. Our response times to threats have improved by at least 50% compared to before. Manual investigation and containment could take hours, but now, automated alerts and remediation let us act within minutes. For example, a recent malware attempt was blocked and isolated in under five minutes without needing manual intervention.

The reporting feature in Check Point Harmony Endpoint is great as it is necessary for normative governance and audits. Harmony Endpoint integrates well with other existing security tools, such as the SIEM in Azure, specifically Azure Sentinel.

What needs improvement?

Check Point Harmony Endpoint could improve with more flexible pricing options, faster updates, and better threat intelligence. Better documentation and more intuitive UI tweaks would also help streamline deployment and daily management.

While the platform is powerful, the user interface of Check Point Harmony Endpoint could be more intuitive for non-technical users. Sometimes it takes extra clicks to find key settings or reports, and while support is responsive, faster resolution time would help during urgent incidents.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for around three years.

What other advice do I have?

Check Point Harmony Endpoint gives us peace of mind. It's reliably effective and fits well into our security strategy.

I prefer Check Point as my provider and do not have any advice for others looking into using Check Point Harmony Endpoint.

I do not have any advice for others who are considering using Check Point Harmony Endpoint.

On a scale of one to ten, I rate Check Point Harmony Endpoint an eight.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 13, 2025
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
December 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.
Alex Duarte - PeerSpot reviewer
Security Support at a non-tech company with 201-500 employees
Real User
Top 5
Dec 30, 2025
Safeguarding Remote Devices with Proactive Ransomware Prevention
Pros and Cons
  • "The best features of Check Point Harmony Endpoint that stand out the most for me include the anti-ransomware protection, which detects abnormal encryption behavior, stops it instantly, and restores affected files, preventing downtime for the users."
  • "I think the documentation for Check Point Harmony Endpoint is a little thin because it is not really intuitive."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is to enforce and ensure the laptops and tablets in my company because the users, when they need to get out and visit different clients and connect in different sites, need to see corporate data, so I need to create powerful security.

A quick example of how I use Check Point Harmony Endpoint for this purpose is when one of our employees accidentally tried to download a file from a phishing email that looked like a legitimate invoice. In this case, Check Point Harmony Endpoint immediately flagged the file as malicious, quarantined it, and blocked the execution before it could run on the device.

Another scenario where Check Point Harmony Endpoint has been especially useful is in securing remote workers when our team shifted to hybrid work. We need to ensure the laptops connecting from home networks were just as protected as those inside the office, and Check Point Harmony Endpoint gave us consistent protection by enforcing policies such as blocking unauthorized USB devices and preventing data from being copied to personal drives.

What is most valuable?

The best features of Check Point Harmony Endpoint that stand out the most for me include the anti-ransomware protection, which detects abnormal encryption behavior, stops it instantly, and restores affected files, preventing downtime for the users.

The anti-ransomware feature of Check Point Harmony Endpoint works quietly in the background every day, monitoring for suspicious encryption activity or unusual file behavior, and it does not just rely on signatures; it looks for patterns that resemble ransomware attacks, such as rapid file changes or attempts to lock large volumes of data.

One very useful feature of Check Point Harmony Endpoint that I have not mentioned yet is its forensics and incident analysis capability, because after a threat is detected and blocked, the system provides detailed insights into how the attack started.

Check Point Harmony Endpoint has positively impacted my organization by strengthening endpoint security, and as a result, we have reduced the workload on our IT team, including reduced ransomware risk. For example, the anti-ransomware feature stopped an attempted attack by detecting abnormal file encryption and restored affected files, preventing downtime, which allows the users to have more free time.

What needs improvement?

I think the documentation for Check Point Harmony Endpoint is a little thin because it is not really intuitive.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for six years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is very stable in all tools.

What do I think about the scalability of the solution?

The scalability of Check Point Harmony Endpoint is very good; it is very scalable.

How are customer service and support?

The customer support for Check Point Harmony Endpoint is very great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

yes

How was the initial setup?

Check Point Harmony Endpoint was deployed in my organization using a hybrid cloud.

What was our ROI?

I have seen specific outcomes or metrics with Check Point Harmony Endpoint, such as saving about 20% a month in manual incident handling.

What's my experience with pricing, setup cost, and licensing?

My experience with the pricing, setup cost, and licensing of Check Point Harmony Endpoint is favorable for me; I have no problem with the license.

What other advice do I have?

I save time in the IT team due to Check Point Harmony Endpoint.

I recommend Check Point Harmony Endpoint to others looking into using it because it is a very complete security tool.

Check Point Harmony Endpoint is a great tool for people trying to enforce their companies with excellent security. I have rated this review nine out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Dec 30, 2025
Flag as inappropriate
PeerSpot user
Shakilabee  A - PeerSpot reviewer
Information Technology Engineer at a tech services company with 51-200 employees
Real User
Top 10
Dec 9, 2025
Endpoint security has strengthened data protection and now stops phishing and ransomware
Pros and Cons
  • "Check Point Harmony Endpoint has positively impacted our organization by improving our security, preventing issues such as phishing, ransomware, and malware, and offering URL protection that filters downloads from browsers to stop any malicious files before they are downloaded."
  • "To improve Check Point Harmony Endpoint, I believe the DLP feature needs enhancement because many SMB customers seek a single solution that includes both EDR and DLP to meet regulations."

What is our primary use case?

My main use case for Check Point Harmony Endpoint involves its endpoint protection as well as full disk encryption with the EDR solutions, Endpoint Detection and Response.

A specific example of how I use the endpoint protection or disk encryption in my daily work includes using disk encryption such as BitLocker, along with two encryption types: FileVault and Check Point encryption. The encryption keys are stored in the Check Point Harmony Endpoint console.

The main point I want to add about my primary use case is that the basic license includes an EDR license, Endpoint Detection and Response, which is a major highlight for Check Point Harmony Endpoint.

What is most valuable?

The best features that Check Point Harmony Endpoint offers for me and my team include Application Control, Device Control, SandBlasting, and the basic DLP.

Application Control and Device Control have helped my organization by allowing us to block applications, such as inbuilt agents installed on user devices, while using Check Point Harmony Endpoint Application Control features. With Device Control, we can impose restrictions on users, preventing them from copying organization data from pen drives or external drives such as Bluetooth. We can control accessories, keyboards, and mice, either blocking or allowing them as needed.

Check Point Harmony Endpoint has positively impacted our organization by improving our security, preventing issues such as phishing, ransomware, and malware. It also offers URL protection, filtering downloads from browsers to stop any malicious files before they are downloaded.

What needs improvement?

Regarding the features, I want to add that DLP, in my opinion, is not full-fledged; it only provides features at the web browser level.

To improve Check Point Harmony Endpoint, I believe the DLP feature needs enhancement because many SMB customers seek a single solution that includes both EDR and DLP to meet regulations. While EDR has no drawbacks, we often have to look for other DLP solutions due to the limited DLP features in Check Point Harmony Endpoint.

Beyond the DLP concerns, I feel that everything else works well. Features such as encryption, SandBlasting, patch management, and vulnerability management are available in Check Point Harmony Endpoint. The only notable drawback for me is the DLP feature, and if we receive more use cases from customers, we can provide updates on that.

For how long have I used the solution?

I have been working in my current field for the past three years and four months.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is stable in my experience.

What do I think about the scalability of the solution?

Regarding scalability, I would like to provide a specific rating, but I am unsure how to articulate that clearly.

Which solution did I use previously and why did I switch?

Before using Check Point Harmony Endpoint, we had alternatives in place but I cannot specify which ones at this moment.

We evaluated other options, specifically Kaspersky, which offers a single solution encompassing email gateway and patch management alongside endpoint security. We assessed that offering in comparison.

What was our ROI?

In terms of return on investment, I cannot quantify savings because of the numerous variables involved.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Harmony Endpoint offered competitive pricing for small user counts such as thirty-five, but they have raised the minimum entry level to one hundred users. While the prices are higher than those of other solutions, the features justify the investment for customers.

What other advice do I have?

While we did not actively track metrics, I can share that when we downloaded a third-party KMS tool considered an activation tool, Check Point Harmony Endpoint detected it as malicious and blocked the EXE file during the download process.

My advice for those considering Check Point Harmony Endpoint is to pursue it for its better features, particularly the EDR licensing available even in the basic package, unlike some competitors that reserve it for advanced or complete solution packages. SandBlasting is a standout feature that I recommend highlighting to customers. I would rate this product nine out of ten.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Dec 9, 2025
Flag as inappropriate
PeerSpot user
Cristopher Z - PeerSpot reviewer
Administrador De Redes at a financial services firm with 501-1,000 employees
Real User
Top 5
Nov 21, 2025
Endpoint threats have been contained immediately and security actions now run automatically across all devices
Pros and Cons
  • "During a ransomware attack that targeted several laptops, Check Point Harmony Endpoint immediately isolated the affected device and blocked the malicious process before it could spread."
  • "The interface can feel complex at times; a simplified navigation would make daily use easier."

What is our primary use case?

Check Point Harmony Endpoint protects device endpoints, specifically laptops, when people need to work outside of the office.

How has it helped my organization?

The best features Check Point Harmony Endpoint offers include strong ransomware protection and the ability to isolate compromised devices instantly.

These features work well for us because they combine prevention, detection, and response in one platform. For example, ransomware protection isolates devices instantly, which is faster than other tools we have used that required manual intervention. The central management console also stands out since it lets us apply policies across all endpoints at once, while other solutions needed separate configuration.

One feature that has proven very valuable in Check Point Harmony Endpoint is the forensics analysis capability. After an incident, it provides detailed reports on how the attack was attempted and what actions were taken to block it.

What is most valuable?

Check Point Harmony Endpoint helped our team when an employee connected from an unsecured public Wi-Fi during travel. The solution automatically enforced the VPN access and endpoint protection, which prevented exposure to potential threats. It also detected and blocked a suspicious download before it could impact the device.

During a ransomware attack that targeted several laptops, Check Point Harmony Endpoint immediately isolated the affected device and blocked the malicious process before it could spread. At the same time, the central console alerted us and allowed quick remediation without disturbing other users. This proactive response saved us from potential downtime and data loss and showed the value of having endpoint protection tightly integrated with our overall security framework.

What needs improvement?

Check Point Harmony Endpoint is strong overall, but there are areas that could be improved. The interface can feel complex at times; a simplified navigation would make daily use easier. Reporting and analysis could also be more customizable with clearer dashboards to match different business needs.

Documentation and customer support could be enhanced because support is only available in English.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for around four years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is very stable.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint's scalability is good.

How are customer service and support?

Customer support is very fast.

How would you rate customer service and support?

Positive

What was our ROI?

I have seen a return on investment in terms of time saved.

Before we implemented Check Point Harmony Endpoint, isolating a compromised device could take one to two hours due to manual checks and coordination. Now, the system automatically detects and isolates endpoints within minutes. This has significantly reduced downtime and allows our team to focus on other remediations or tasks.

What other advice do I have?

Check Point Harmony Endpoint is a faster application for security on your device, and it is excellent for protecting your organization. I would rate Check Point Harmony Endpoint a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 21, 2025
Flag as inappropriate
PeerSpot user
Yash Dubey - PeerSpot reviewer
Presales Consultant at a outsourcing company with 1,001-5,000 employees
Real User
Top 5Leaderboard
Oct 31, 2025
Visibility across all endpoints has helped save time by avoiding manual tracking
Pros and Cons
  • "The best features Check Point Harmony Endpoint offers include complete visibility and a single dashboard where I can see everything for all employees."
  • "Check Point Harmony Endpoint can be improved by having the capability to integrate with other solutions, as no one has the complete Check Point solution, so integration with other OEMs would be beneficial."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is to ensure that endpoints are secured, such as laptops and mobile devices.

A specific example of how I use Check Point Harmony Endpoint to secure laptops and mobile devices is when employees leave the company and download third-party applications. Sometimes they share data via mobile, and in such cases, Check Point Harmony Endpoint helps to secure the data.

This is something we are currently using as our main use case with Check Point Harmony Endpoint.

What is most valuable?

The best features Check Point Harmony Endpoint offers include complete visibility and a single dashboard where I can see everything for all employees.

Having complete visibility and a unified dashboard helps me day-to-day as it makes my job easier because I can see everything on a single dashboard, and it also saves me time since at a granular level, I can see it on my dashboard without having to go in-depth and search desk to desk.

Check Point Harmony Endpoint has positively impacted my organization through visibility over the employees' use cases.

The visibility helps us identify what data should be given access on mobile, such as email services or any other services, and how much data should be traveled through mobile. We are currently figuring this out and will keep everything on-premises in the company with less data shared via endpoints.

What needs improvement?

Check Point Harmony Endpoint can be improved by having the capability to integrate with other solutions, as no one has the complete Check Point solution, so integration with other OEMs would be beneficial.

If Check Point Harmony Endpoint can improve from a costing perspective, it would be easier for us.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for around eight months.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is stable and has been stable to date.

What do I think about the scalability of the solution?

The scalability of Check Point Harmony Endpoint is good.

How are customer service and support?

I have not yet used customer support for Check Point Harmony Endpoint.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

How was the initial setup?

I am not certain if we purchased Check Point Harmony Endpoint through the AWS Marketplace, as the company made the purchase.

What was our ROI?

I have seen a return on investment in terms of time saved because I get visibility, so time saved is something I can definitely mention.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing indicates it is on a higher side.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Check Point Harmony Endpoint.

What other advice do I have?

I would rate Check Point Harmony Endpoint an eight out of ten.

I chose eight out of ten because I have been using it for eight months and have more to explore with it, and to date, all of my use cases have been accomplished.

My advice to others looking into using Check Point Harmony Endpoint is that they should at least try it for a proof of concept, as it is a good product.

I do not have any additional thoughts about Check Point Harmony Endpoint before we wrap up.

My overall review rating for Check Point Harmony Endpoint is eight.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 31, 2025
Flag as inappropriate
PeerSpot user
reviewer2751327 - PeerSpot reviewer
Cloud network engineer at a manufacturing company with 10,001+ employees
Real User
Top 5
Aug 26, 2025
Comprehensive and proactive protection enhances operational efficiency with agility
Pros and Cons
  • "The best features Check Point Harmony Endpoint offers are its comprehensive and proactive approach; these features stand out because it's very lightweight and has very good anti-ransomware protection."
  • "Check Point Harmony Endpoint can be improved as it is a bit clunky and not intuitive, especially when navigating around the more advanced settings or trying to interpret the logs, and the agent is resource intensive on some occasions."

What is our primary use case?

My main use case for Check Point Harmony Endpoint is office advanced endpoint protection, so our users can navigate safely on the internet.

What is most valuable?

The best features Check Point Harmony Endpoint offers are its comprehensive and proactive approach; these features stand out because it's very lightweight and has very good anti-ransomware protection.

Check Point Harmony Endpoint has positively impacted my organization by enhancing business process agility and user protection, resulting in more operational efficiency.

What needs improvement?

Check Point Harmony Endpoint can be improved as it is a bit clunky and not intuitive, especially when navigating around the more advanced settings or trying to interpret the logs, and the agent is resource intensive on some occasions.

With the advanced settings or logs, there is an overall bad experience, as there are particular settings and log types that are confusing and hard to use. More improvements are required in these areas.

For how long have I used the solution?

I have been using Check Point Harmony Endpoint for six months.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is stable.

What do I think about the scalability of the solution?

Check Point Harmony Endpoint is very scalable.

How are customer service and support?

The customer support is pretty good.

I would rate the customer support an eight out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before choosing Check Point Harmony Endpoint, I evaluated other options, namely Fortinet and Palo Alto.

What was our ROI?

Since implementing Check Point Harmony Endpoint, I've saved time due to operational efficiency, but there are no specific metrics I can share.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing was not good.

The experience was negative primarily due to the cost related to the pricing and the setup process.

What other advice do I have?

My advice to others looking into using Check Point Harmony Endpoint is to evaluate the cost and POC of the product first. I rate Check Point Harmony Endpoint eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Aug 26, 2025
Flag as inappropriate
PeerSpot user
Vishal Koovaparam  - PeerSpot reviewer
Server Security Analyst and Solution at a outsourcing company with 11-50 employees
Real User
Top 5
Nov 17, 2025
Central policies have simplified user access and boosted security visibility across branches
Pros and Cons
  • "Check Point Harmony Endpoint has positively impacted the organization by allowing policies to be configured and enforced from the central console, eliminating the need to manage multiple branches separately."
  • "Check Point Harmony Endpoint is initially somewhat complex, and this could be improved."

What is our primary use case?

Check Point Harmony Endpoint's main use case is to provide security at the end-user level, as users are not always aware of cyber security threats.

A specific example of how Check Point Harmony Endpoint is used to control user access and security at the end-user level is through centrally configured policies organized by department for employees. Security profiles such as URL filtering, threat prevention, USB restrictions, and file upload controls outside the internet have been enforced. All of these controls are implemented.

What is most valuable?

The best feature Check Point Harmony Endpoint offers is its usability, which is essential. When first using Check Point Harmony Endpoint, it was very easy to navigate the GUI and configure policies and security enforcement, whether for particular users or specific departments.

Check Point Harmony Endpoint has positively impacted the organization by allowing policies to be configured and enforced from the central console, eliminating the need to manage multiple branches separately. Full visibility is now available, and it is possible to see which policies are enforced for which users or department users.

The outcomes demonstrate that the configuration workload for the IT team has been minimized, and they can easily control, configure, and manage users across all branches from the central console.

What needs improvement?

Check Point Harmony Endpoint is initially somewhat complex, and this could be improved.

For how long have I used the solution?

Check Point Harmony Endpoint has been in use for more than two years.

What do I think about the stability of the solution?

Check Point Harmony Endpoint is very stable.

What do I think about the scalability of the solution?

The scalability of Check Point Harmony Endpoint is entirely dependent on the license purchased during the initial acquisition of the solution. Each user license must be purchased separately for scalability.

How are customer service and support?

The customer support is very supportive.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Check Point Harmony Endpoint is the only solution currently in use, and no different solution was previously used.

How was the initial setup?

Check Point Harmony Endpoint is initially somewhat complex, and this could be improved.

What about the implementation team?

The organization is a partner with this vendor in addition to being a customer.

What was our ROI?

A return on investment has been realized, specifically in terms of time saved.

Which other solutions did I evaluate?

Before choosing Check Point Harmony Endpoint, other options were evaluated, including CrowdStrike Endpoint Security.

What other advice do I have?

My advice for others considering Check Point Harmony Endpoint is that Check Point is a highly reputable OEM that provides outstanding cyber security solutions, whether for the network, endpoint, or cloud solutions. I would rate this product a 9 out of 10.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Nov 17, 2025
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.