Try our new research platform with insights from 80,000+ expert users
reviewer2049771 - PeerSpot reviewer
Business Manager at MN World Enterprise Private Limited
User
Good security and support with an easy implementation process
Pros and Cons
  • "The zero-day threat prevention is excellent."
  • "I would like to see them add features where we can use this license for mobile browsers, too."

What is our primary use case?

I am using this product to prevent any kind of advanced threats. It keeps monitoring in the backend and does not hamper my ongoing work at all. it also secures my web browsing and has forensics access along with a sandbox to emulate and extract too. 

Before using this product, we had tried multiple others yet were not satisfied with the performance and dashboard reports. Check Point products allow us constant filtering and protect us from any kind of threats. 

How has it helped my organization?

It has been used for a banking environment and helps us to secure our end computing where USB blocking and even disk encryption and so many features have been bundled together. 

Securing our data was critical. It helps a lot and gives control to end users while they connect through the VPN. Secure VPN connectivity is important. It helps us to avoid any kind of risk when users are at home. 

It helped us a lot during the first phase of the Covid lockdown, which revealed the benefits of this product. 

What is most valuable?

I loved almost all the features.

The zero-day threat prevention is excellent. It gives us more confidence to have automated protection from unknown threats. 

It helps to secure our browsing. It can check if something is a genuine page or not. It also masks when we browse or enter our banking user ID and password. This gives us assurance that we are in a green and safe zone. 

What needs improvement?

I would like to see them add features where we can use this license for mobile browsers, too - as we had a container kind of product under MDM. This can give us more confidence that when on the go, a user still has full access to our important and crucial data. They should be fearless while accessing this through our VPN tunnel. 

Mobile handsets are now used for 40% of work to send mail or forward any kind of document. Securing users on mobile will give more confidence to users and higher authorities that will sometimes need to have access outside of the office for doing their financial or confidential transactions.

Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,676 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for more than four years.

What do I think about the stability of the solution?

After using this product last fours year I've never seen a single case where any devices have been affected. Even a lost device has not been a deal breaker. We have full control on end-user clients with the help of Check Point SandBlast. 

What do I think about the scalability of the solution?

It is very easy to scale. There are so many testing opportunities and upgrades. The features also do not slow down the CPU. From a stability and manageability point of view, it's very impressive. 

How are customer service and support?

Support can help us define and create policies on each and every use case. We also have the in-house expertise to provide support and handle the initial trouble shooting. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using Symantec and Sophos. There was not 100% clarity on reports, and we had many challenges in terms of upgrading the features. 

When we switched to Check Point, we got a single dashboard to control end clients, DLP, and email security. Their collaboration and support team is also awesome. 

How was the initial setup?

You can set up the policies very easily. You just post and restart your devices and everything is secure. Items can be managed under group policies. You can set up your own rules and policies easily. 

What about the implementation team?

Initially, we had taken advantage of Check Point expertise. Now, an in-house team can handle everything. It is manageable on our side. 

What was our ROI?

If you talk about ROI, it's helped us to protect our end-user devices. We've also found the performance of laptops has increased in the past one and a half years. It offers good value for money. 

What's my experience with pricing, setup cost, and licensing?

Securing data, peace of mind, great support, good reports, and third-party network audits have made Check Point good value for money. 

Which other solutions did I evaluate?

I had tried Palo Alto and Fortinet, however, we got value for money in Check Point. After a POC, we started with Check Point. 

What other advice do I have?

There are so many useful examples a normal office could take advantage of. It's a great product for working from home or remote users. The Check Point team is also great and has served us by helping put in place the right kinds of products. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Adhi Wahyu - PeerSpot reviewer
Network Engineer at RSUP Dr. Sardjito
Real User
Top 10
Great real-time scans, east central management, and helpful support
Pros and Cons
  • "The reporting feature where we can see and monitor what happened on our client computers is useful."
  • "They need to make the user interface on the server more intuitive and user-friendly."

What is our primary use case?

We use Check Point on our 500 computers to protect them from viruses and malware. The network is a protected local area network with limited connectivity to the internet. Not all computers are connected to the internet; only users with the necessity to connect can access it. We also increase the protection from viruses/malware by disabling USB ports for mobile storage. With all the protection steps taken, we still see that antivirus is a must to have as standard computer protection.

How has it helped my organization?

With all security steps taken to protect the network, viruses and malware still appeared in the network. Check Point Harmony Endpoint (endpoint antivirus) has helped our organization by preventing further damage to the computers and the network by detecting and taking appropriate action (quarantine, clean, delete) to viruses and malware. 

By doing this, our organization's business can maintain its operational state without any significant disturbance, and that is the most important thing to achieve.

What is most valuable?

Some of the most valuable features from Check Point include:

1. Its ability to run real-time scans in the background and detect all the malware and viruses while taking action to clean the system from the threat.

2. On-premise centralized management, so the client can do signature updates locally and save the internet bandwidth.

3. The reporting feature where we can see and monitor what happened on our client computers. For example, which client has out-of-date signatures, which client is infected by what virus, et cetera. 

What needs improvement?

Some areas of improvement could be :

1. Making the user interface on the server more intuitive and user-friendly. 

2. Making it easier for the user to do tuning and configuration to the server or the client application. For example, to turn off notifications, the user should be able to do that with some clicks on the user interface instead of searching and reading about how to do it in the knowledge base first and then trying to do it.

3. Our application version is quite old, and Check Point already released a newer version for endpoint protection, which includes a cloud version. After doing some trials, we see that Check Point already made many improvements to the features and user interface.   

For how long have I used the solution?

I've been using the solution for five years.

What do I think about the stability of the solution?

Tthis solution runs with good stability.

What do I think about the scalability of the solution?

If we deploy it on-premise, we should see the server hardware requirement first and match it with the number of clients we want to handle.

How are customer service and support?

Customer service gave good support when we needed it. For example, when we need support on renewing the license or when we need to upgrade the client version, they have a quick response time to deal with the problem.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did use a different solution previously. We switched as we want to use the same brand for our NGFW and our endpoint protection.

How was the initial setup?

The setup was quite straightforward. We installed the server first and then made the client installer. If you have an active directory on the network, you can install it with push installation. That said, we don't have it, so we needed to install the client by accessing the client directly.

What about the implementation team?

We implemented the product together with the vendor and an in-house team. The vendor team has good knowledge when it comes to implementing the product.

What's my experience with pricing, setup cost, and licensing?

At the time we purchased it, the licensing was separated into some modules. There were antivirus modules, data protection modules, and full modules if I'm not mistaken. You should make sure that the module you choose fits your requirement. 

Which other solutions did I evaluate?

We evaluated the ESET antivirus.

What other advice do I have?

Check Point has released their new product on endpoint protection, which includes a cloud version. You could try it for free to see if this product matches your needs before purchasing it.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
September 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,676 professionals have used our research since 2012.
Suraj Varma - PeerSpot reviewer
Network Security Engineer at Digitaltrack
Real User
Top 5
Good scanning and security with regular updates
Pros and Cons
  • "It gets regular updates of newly found threat signatures which keeps it updated."
  • "As of now, there are not any lack of features."

What is our primary use case?

The primary use case of this solution is to protect our company's LAN network from malware and viruses.

We have configured and deployed the Checkpoint NGFW and this is the security feature of Check Point.

How has it helped my organization?

With the help of Check Point Antivirus, we keep our company's LAN and DC network safe from malware and viruses. With this solution, our network has not been affected to date.

What is most valuable?

The most valuable feature of Check Point antivirus is that it scans every file type for malware and viruses.     

Also, it gets regular updates of newly found threat signatures which keeps it updated. 

What needs improvement?

As of now, there are not any lack of features. 

For how long have I used the solution?

I have been using this security feature of Check Point for the last year.

What do I think about the stability of the solution?

The stability is excellent.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

My experience with customer service and support has been excellent.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have been using Check Point antivirus only. We just upgraded the Check Point NGFW model.

How was the initial setup?

The initial setup was simple.

What about the implementation team?

We implemented the solution through an in-house team.

What's my experience with pricing, setup cost, and licensing?

In terms of cost, everything is perfect.

Which other solutions did I evaluate?

No, we haven't evaluated other options.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Presales Engineer at Vincacyber
Real User
Top 5Leaderboard
A cloud solution for antivirus, device encryption and URL filtering
Pros and Cons
  • "The solution offers multiple features in one solution, along with data detection."
  • "Check Point should provide some technical sessions on antivirus solutions."

What is our primary use case?

We use the solution for antivirus, device encryption, file encryption, and URL filtering.

What is most valuable?

The solution offers multiple features in one solution, along with data detection.

What needs improvement?

The agent side should be less. It impacts customers' asset performance because it will be more complex for the customers.

For how long have I used the solution?

I have been using Check Point Antivirus for 6-8 months.

What do I think about the stability of the solution?

Check Point should provide some technical sessions on antivirus solutions. Then, it would be helpful to reach more customers in India.

I rate the solution’s stability a seven out of ten.

What do I think about the scalability of the solution?

The solution is scalable. We have a few customers using this solution.

How are customer service and support?

It is quite difficult to get a response from OEM. We are facing issues with all products except for email security, with the support team of the Check Point.

How was the initial setup?

The initial setup is complex, depending on the number of assets. It takes less than half an hour for a single asset. We should set up everything after deploying and testing it. Symantec takes five to ten minutes after deploying to test everything. We use manual deployment.

What was our ROI?

The solution is helpful for a particular budget. We are getting the best solution that will cover all your parameters.

What's my experience with pricing, setup cost, and licensing?

The product’s pricing is moderate.

What other advice do I have?

Every feature provided by the antivirus software is good compared to other solutions. Sandboxing is helpful for customers while downloading and detecting malicious software.

1-2 persons are required for deployment, whereas the maintenance and monitoring need a team of three to five members.

I will recommend the solution. It's a very good solution compared to other antivirus capability servers. The sandboxing technology is helpful.

We have not integrated it with any other tool set. We integrated a Check Point to get the logs or connect the data.

Overall, I rate the solution an 8 out of 10.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Nagendra Nekkala - PeerSpot reviewer
Senior Manager ICT & Innovations at Bangalore International Airport Limited
Real User
Top 5Leaderboard
Comes with AI features and secures enterprise networks
Pros and Cons
  • "The tool comes with an in-built AI feature, which makes file management easier. It also secures the network from viruses, malware, and phishing attacks."
  • "Check Point Antivirus' performance could be faster. It needs to include app-based support to upload screenshots of issues. It needs to add timely and regular updates. The dashboards and reporting features need to offer more efficiency."

What is our primary use case?

We use Check Point Antivirus to secure our enterprise network. It protects our data servers from malware attacks. 

What is most valuable?

The tool comes with an in-built AI feature, which makes file management easier. It also secures the network from viruses, malware, and phishing attacks. 

What needs improvement?

Check Point Antivirus' performance could be faster. It needs to include app-based support to upload screenshots of issues. It needs to add timely and regular updates. The dashboards and reporting features need to offer more efficiency. 

For how long have I used the solution?

I have been using the product for two years. 

What do I think about the stability of the solution?

The product is stable. I rate it a nine out of ten. 

What do I think about the scalability of the solution?

Check Point Antivirus is scalable. You can add the 'n' number of servers at any time. My company has 1000 users. 

How are customer service and support?

The tool's tech support is good. 

How would you rate customer service and support?

Positive

How was the initial setup?

The tool's deployment is easy and takes two to three hours to complete. A single person can do deployment. The tool has a SmartConsole feature, which helps to deploy it efficiently without much processing. It is easy to maintain, and one person can handle the maintenance. 

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is the most economical solution. 

What other advice do I have?

The product is an AI-based solution with the latest capabilities. It offers the most secure protection. I rate it an eight out of ten. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1858884 - PeerSpot reviewer
Network Administrator at a computer software company with 1,001-5,000 employees
User
Top 20
Moderately priced, easy to configure, and good support
Pros and Cons
  • "Check Point Antivirus is easy to configure."
  • "Check Point Antivirus could be improved by having the gateway automatically run a packet capture on the traffic so that it can be easily uploaded to TAC in the event that there is a false positive or if the traffic is required for further investigation."

What is our primary use case?

Check Point Antivirus Blade is enabled on all of our HA clusters throughout the world. The primary use case for this product is to protect our end-users while working physically in the office or remotely. It monitors all traffic in and out of the organization to detect known threats such as malware. Functionality is limited without HTTPS inspection as the blade will just look at SRC/DST traffic rather than be able to do packet inspections on actual traffic. It is great that it is included in the base FW license.

How has it helped my organization?

Check Point Antivirus has improved our organization by being able to identify known threats and actively drop connections to ensure our users remain secure. It leverages the Bogus DNS endpoint from Check Point to redirect traffic destined for known threats and doesn't require a lot of admin overhead to configure or tune based on the organization's needs. An added bonus is Check Points "Threat Cloud" which all of its gateways talk to so that attacks that are detected in one customer's environment are updated and would be blocked automatically within another environment. 

What is most valuable?

Check Point Antivirus is easy to configure. We enable the blade in the SMS for the gateway and that's pretty much it. You can get into the nitty gritty and fine-tune some of the settings to fit your organization better than the default settings, however, personally, I have yet to do this and it is working as expected in my organization. It is also great that this is not an add-on license and is included with the low-tier licensing which helps to reduce the overall cost to the organization while increasing the value of the product.

What needs improvement?

Check Point Antivirus could be improved by having the gateway automatically run a packet capture on the traffic so that it can be easily uploaded to TAC in the event that there is a false positive or if the traffic is required for further investigation. I have had a few times where something was detected as being a false positive and TAC requested so much information that in all honesty, was not worth my time to collect as the URL being blocked was a simple webpage that, based on my analysis, the IP was previously being used for malicious intent and was now a legitimate business however was still being blocked by the blade.

For how long have I used the solution?

I've used the solution for five years. 

What do I think about the stability of the solution?

We have not had any performance issues.

What do I think about the scalability of the solution?

It is easy to scale and enable on SGs as long as they are managed by the same SMS.

How are customer service and support?

Support has improved over the years.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No previous solution was utilized. This solution has been in place on the SGs since they were installed.

How was the initial setup?

The setup is straightforward. It is enabled from the SMS and it works.

What about the implementation team?

We managed the setup of the solution in-house.

What was our ROI?

The ROI is revealed by the fact that it protects end-users.

What's my experience with pricing, setup cost, and licensing?

Check Point in general is moderately priced compared to competitors.

Which other solutions did I evaluate?

We evaluated Palo Alto and Fortigate.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Complaints analysis/investigation at compugana
Real User
Great features, helps with blocking unauthorized access, and protects data
Pros and Cons
  • "With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access."
  • "We'd like to see better integration with other security tools."

What is our primary use case?

Check Point Antivirus helps us to protect our networks and systems against computer threats such as viruses, spyware, malware, and online attacks. It helped us greatly improve the security perimeter with its advanced features, such as intrusion prevention, threat detection, and access control, which help to protect sensitive data and company information. It's helped us shrink all the security gaps and is an excellent tool for protecting all the endpoints of an organization. If the company must be audited, it helps a lot to meet many of the compliance requirements.

How has it helped my organization?

Check Point Antivirus helped us to improve in several ways. It offers advanced features such as data protection. With it, we were able to protect sensitive and confidential company data from online threats and external attacks. 

We also achieved intrusion prevention using intrusion detection to prevent attacks on the company network. 

With Check Point, we can implement security measures to control access to the network and systems, which helps prevent unauthorized access.

With its various features, we can enable business continuity with adequate protection while minimizing risks in operations.

What is most valuable?

Some of the Check Point Antivirus features that users may find valuable include:

The firewall helps provide protection to block unauthorized access to the network.

Intrusion prevention prevents attacks on the company network and helps companies to comply with regulatory requirements related to data protection.

It has a wide range of features that help make this tool one of the best on the market.

What needs improvement?

As with any tool, improvements can be made. Some improvements that would be useful include:

  • An updated user interface to improve it to make it easier to use.
  • Integration with other security tools. We'd like to see better integration with other security tools.
  • They should incorporate artificial intelligence and machine learning 
  • Performance could be better to reduce the impact on system resources as it consumes a lot of resources from some endpoints.

For how long have I used the solution?

The solution was implemented approximately five years ago.

What do I think about the stability of the solution?

The tool was designed to be highly stable with regular software updates and proactive monitoring.

What do I think about the scalability of the solution?

It is a highly scalable tool that has centralized management, automatic updates, and load-balancing capabilities. 

How are customer service and support?

They must improve support and customer service by improving response times and their SLA.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Previously, we only used an antivirus on the devices. After migrating our platform to the cloud, we needed a more robust tool and chose Check Point. 

How was the initial setup?

The installation of the product is complex if you do not have any previous knowledge. Once that learning curve is overcome, the administration and configuration become easy.

What about the implementation team?

The implementation was done in conjunction with an engineer from the provider and the IT department.

What was our ROI?

It is always good to generate an implementation plan for the acquisition and company requirements to make the best purchase decision and to gain a quick return.

What's my experience with pricing, setup cost, and licensing?

The price and licenses will depend on the features and functions that need to be implemented, as well as the number of devices needed. It is easy to install, however, you must have prior knowledge of the product.

Which other solutions did I evaluate?

We evaluated several solutions on the market that met the characteristics and requirements that we needed. Some were:

What other advice do I have?

It is always important to do a cost analysis and check requirements before making a decision.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at IRMA Anand
User
Great real-time endpoint detection, has high malware catch rates, and offers good protection overall
Pros and Cons
  • "They have a better endpoint catchment rate due to their reliability."
  • "A certain reduction in the annual subscription pricing could help many startup organizations like ours."

What is our primary use case?

Check Point Antivirus has proven to be a savior. It helps in protecting our computers and other e-devices at endpoints from malicious ransomware, etc. 

It actively eliminates malware and protects the system from any potential damage. 

It is well-performing antivirus software that is absolutely different from traditional threat-combating antivirus tools. 

Conventional antivirus software is often not upgraded enough to fight advanced threats. Check Point Antivirus's performance efficiency is quite good and is highly recommended by peers.

How has it helped my organization?

Check Point Antivirus is an advanced antivirus software with high-performance efficiency and is continuously improvising its features and version to have better security enhancements at the end. 

They have a better endpoint catchment rate due to their reliability. It comes quite highly recommended. Everyone recommends it. 

Our organization used to spend a lot on data and system security. The cost of security was increasingly becoming relatively high and unmanageable. Our peers recommended trying the Check Point Solution, which felt great after using it. It is worth having this security software for businesses!

What is most valuable?

The high malware catchment rate is great and really commendable. The software is equipped with scanning all kinds of sources, email servers, and cloud servers for their endpoint threat and immediately diffuses and eliminates the threat source and threat points. It helps us to improve security scanning and also leads to endpoint management throughout. 

The software provides advanced security features like signature-based malware detection, which is widely used by organizations for scanning their code management and securing their code system end to end.

The other features, like real-time endpoint detection, help us with 24/7 scanning and monitoring of the system for ransomware, and can immediately remove them permanently. 

What needs improvement?

Everything is just great about the software. That said, a certain reduction in the annual subscription pricing could help many startup organizations like ours. Small, marginal, and medium enterprises could also use a reduced subscription model so as not to pose much burden on budgets. 

Also, the cybersecurity trend is quite dynamic and changes every now and then. It would be really great if continuous upgrades and orientation and training on upgrades could be proactively arranged and organized by concerned officials from time to time.

For how long have I used the solution?

It's been one year now since I've been using the solution.

What do I think about the stability of the solution?

It is a very stable software.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

Technical support is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We started using Check Point. An earlier in-house-based local solution was used as an antivirus before that.

How was the initial setup?

The initial setup is easy and straightforward.

What about the implementation team?

We implemented the solution through the vendor only.

What was our ROI?

The ROI looks promising.

What's my experience with pricing, setup cost, and licensing?

The setup cost is significantly lower for Check Point Antivirus. Its pricing is low compared to the majority of the competitors. Licensing is smooth and easy.

Which other solutions did I evaluate?

We evaluated McAfee, Trend Security, etc., before finalizing the usage of Check Point Antivirus.

What other advice do I have?

It's a must-have security solution for all businesses and professionals as it is an advanced security solution with enough capabilities to improve cybersecurity enhancement for businesses. 

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.