Try our new research platform with insights from 80,000+ expert users
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at IRMA Anand
User
Great real-time endpoint detection, has high malware catch rates, and offers good protection overall
Pros and Cons
  • "They have a better endpoint catchment rate due to their reliability."
  • "A certain reduction in the annual subscription pricing could help many startup organizations like ours."

What is our primary use case?

Check Point Antivirus has proven to be a savior. It helps in protecting our computers and other e-devices at endpoints from malicious ransomware, etc. 

It actively eliminates malware and protects the system from any potential damage. 

It is well-performing antivirus software that is absolutely different from traditional threat-combating antivirus tools. 

Conventional antivirus software is often not upgraded enough to fight advanced threats. Check Point Antivirus's performance efficiency is quite good and is highly recommended by peers.

How has it helped my organization?

Check Point Antivirus is an advanced antivirus software with high-performance efficiency and is continuously improvising its features and version to have better security enhancements at the end. 

They have a better endpoint catchment rate due to their reliability. It comes quite highly recommended. Everyone recommends it. 

Our organization used to spend a lot on data and system security. The cost of security was increasingly becoming relatively high and unmanageable. Our peers recommended trying the Check Point Solution, which felt great after using it. It is worth having this security software for businesses!

What is most valuable?

The high malware catchment rate is great and really commendable. The software is equipped with scanning all kinds of sources, email servers, and cloud servers for their endpoint threat and immediately diffuses and eliminates the threat source and threat points. It helps us to improve security scanning and also leads to endpoint management throughout. 

The software provides advanced security features like signature-based malware detection, which is widely used by organizations for scanning their code management and securing their code system end to end.

The other features, like real-time endpoint detection, help us with 24/7 scanning and monitoring of the system for ransomware, and can immediately remove them permanently. 

What needs improvement?

Everything is just great about the software. That said, a certain reduction in the annual subscription pricing could help many startup organizations like ours. Small, marginal, and medium enterprises could also use a reduced subscription model so as not to pose much burden on budgets. 

Also, the cybersecurity trend is quite dynamic and changes every now and then. It would be really great if continuous upgrades and orientation and training on upgrades could be proactively arranged and organized by concerned officials from time to time.

Buyer's Guide
Check Point Harmony Endpoint
October 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,098 professionals have used our research since 2012.

For how long have I used the solution?

It's been one year now since I've been using the solution.

What do I think about the stability of the solution?

It is a very stable software.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

Technical support is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We started using Check Point. An earlier in-house-based local solution was used as an antivirus before that.

How was the initial setup?

The initial setup is easy and straightforward.

What about the implementation team?

We implemented the solution through the vendor only.

What was our ROI?

The ROI looks promising.

What's my experience with pricing, setup cost, and licensing?

The setup cost is significantly lower for Check Point Antivirus. Its pricing is low compared to the majority of the competitors. Licensing is smooth and easy.

Which other solutions did I evaluate?

We evaluated McAfee, Trend Security, etc., before finalizing the usage of Check Point Antivirus.

What other advice do I have?

It's a must-have security solution for all businesses and professionals as it is an advanced security solution with enough capabilities to improve cybersecurity enhancement for businesses. 

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1958124 - PeerSpot reviewer
CEO / direktor at S3Next
Reseller
Great sandboxing and phishing protection with the ability to expand
Pros and Cons
  • "The product improved the overall security of our organization with the features like sandboxing and phishing prevention."
  • "We need a higher maximum file size in the sandboxing feature."

What is our primary use case?

We were searching for a next-generation antivirus solution, and this was the best choice on the market.

We have 25 users who work from home and the office.

All computers have Windows Professional version 10 or 11 installed.

We implemented a policy in which every client (either PC or mobile) has to have the Endpoint protection software installed with all the available blades.

Our company's cyber security monitoring process includes centralized product monitoring. 

How has it helped my organization?

The product improved the overall security of our organization with the features like sandboxing and phishing prevention.

We have centralized monitoring of the security of the clients even if they are not connected to our VPN network.

The e-mail and office solution is a great add-on to our existing Office 365 protection on our company's e-mails.

I also have to mention that we did not have our mobile devices protected before the implementation of Harmony mobile. That was really the next step in securing our company's overall IT security.

What is most valuable?

The sandboxing is good. We didn't have any file ransomware attacks since implementation.

The phishing protection works. It prevented a lot of nasty situations with fake websites.

Using this solution in e-mail and Office, we recognized how many man-in-the-middle attacks have been started to get some credential information from our employees.

In mobile, we didn't realize before how much harm can be done from the mobile devices in the network.

It replaced the ESET solutions we used before in our company.

What needs improvement?

We need a higher maximum file size in the sandboxing feature.

Maybe the exceptions could be made much more understandable and easy to use.

There should be an option added to temporarily disable the protection of all or some blades for testing reasons.

The email and Office solution could have some options for exceptions, for example: don't scan e-mails sent to the local PDF scanner e-mail address.

Maybe an option to auto-upgrade the client version to the next stable release of the client software would be nice.

For how long have I used the solution?

We have been using this solution for more then two years.

What do I think about the stability of the solution?

We didn't have any stability issues. We always use the stable releases of the client software.

What do I think about the scalability of the solution?

The solution offers very good scalability.

How are customer service and support?

So far, support is very good. I recommend them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used ESET, which was not satisfying.

How was the initial setup?

It was straightforward.

What about the implementation team?

We implemented through a local implementor.

What was our ROI?

The protection it gives to the clients is priceless.

What's my experience with pricing, setup cost, and licensing?

Get in contact with your local Check Point solution provider to give you an offer regarding the implementation.

Which other solutions did I evaluate?

We evalute the Fortinet solution.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Endpoint
October 2025
Learn what your peers think about Check Point Harmony Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,098 professionals have used our research since 2012.
SANDRA SUAREZ - PeerSpot reviewer
CEO at SAFEID
Reseller
Top 20
Provides encryption for operating systems and protection against malware
Pros and Cons
  • "It provides encryption for operating systems and protects browsers against malware."
  • "The endpoint might consume excessive resources from the machine, which can impact its performance."

What is most valuable?

It provides encryption for operating systems and protects browsers against malware, benefiting both new and old customers.

What needs improvement?

When using Check Point Harmony Endpoint, performance issues may occur, although not necessarily a ransomware attack. The endpoint might consume excessive resources from the machine, which can impact its performance.

For how long have I used the solution?

We have partnered with Check Point Harmony Endpoint.

What do I think about the scalability of the solution?

We have 25 endpoints using this solution.

How are customer service and support?

Email support works fine, but it needs to be on the phone.

How would you rate customer service and support?

Positive

How was the initial setup?

The deployment is not complex if you have to manage it. The installation can be done directly if the customer has a good knowledge of Microsoft systems. However, we have to install it manually, which can be difficult, especially when replacing all the old agents.

If the customer doesn't have an IP directory, we only put one person in it. We are deploying up to 1500 endpoints with only one person, maybe in two weeks. If the customer doesn't have an active directory and has 100-200 endpoints to install, we normally have to use three security engineers.

I rate the initial setup a nine out of ten, where one is difficult and ten is easy.

What was our ROI?

We have a particular case where today's endpoint provides complete security against ransomware. It runs effectively from work. It is about eighty to ninety percent effective.

What's my experience with pricing, setup cost, and licensing?

The pricing is high because we lost several customers to Trend Micro and Symantec. Latin America and Columbia particularly have high prices. It was probably fifty percent more.

What other advice do I have?

As a partner, Check Point provides us with the best protection. We can also arrange a demo or discussion to showcase the protection features and advantages to our customers.

Overall, I rate the solution an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Ajenthan Aiyathurai - PeerSpot reviewer
Manager - IT at NVCL Group
Real User
Top 5Leaderboard
Good monitoring and visibility with compliance capabilities
Pros and Cons
  • "It is easy to install from the cloud."
  • "Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats."

What is our primary use case?

We use this solution for our desktops, laptops, servers, and selective mobile devices. It offers real-time protection against malware and other malicious threats is superb. 

Our previously used antivirus has not been able to identify certain threats. Check Point Harmony did it. That is a key highlight of this product. Check Point Harmony Endpoint includes a firewall component that allows us to enforce network security policies at the endpoint level, including application control, network segmentation, VPN enforcement, etc.

How has it helped my organization?

We can now see the performance of the computers. Previously, we used some other applications where we could see the CPU percentage go increasingly high. Compared to that, this solution is good. 

Check Point Harmony Endpoint helps us ensure endpoint compliance with security policies and regulatory requirements by enforcing configuration settings. 

Moreover, It provides visibility into endpoint activities and enables security teams to detect, investigate, and respond to security incidents in real-time. So business progress never gets disturbed. 

What is most valuable?

It monitors endpoint behavior in real-time to identify and block suspicious activities indicative of malware or malicious behavior. This proactive approach helps us a lot. 

It employs sandboxing technology to execute suspicious files in a controlled environment and analyze their behavior. This allows it to identify and block malware that may evade traditional detection methods by remaining dormant or obfuscated. 

More importantly, it is easy to install from the cloud. 

What needs improvement?

Simplifying the user interface and making it more intuitive can enhance usability; this is more beneficial for those who are new to the industry and lack knowledge about threats. 

Enhancements in compliance management and reporting capabilities could help organizations meet regulatory requirements more effectively and streamline audit processes. 

Continuously updating and enriching threat intelligence feeds and research capabilities can improve threat detection and prevention accuracy and effectiveness.

For how long have I used the solution?

I've used the solution for over a year.

What do I think about the stability of the solution?

Check Point is a well established cybersecurity vendor with a long history of developing and maintaining security solutions. Harmony Endpoint benefits from this experience and is built on a solid foundation of technology and best practices. That i believe. 

What do I think about the scalability of the solution?

The centralized management console enables efficient management of endpoint security across the entire organization, irrespective of its size. Administrators can easily configure policies, deploy updates, and monitor endpoint activities from a single interface, streamlining management at scale.

How are customer service and support?

Customer service should be improved. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Check Point Harmony has fould a suspicious file that the previous application did not discover (that file was in the system for a period as alogic bomps).

How was the initial setup?

The initial setup was straightforward and easy.

What about the implementation team?

We handled the setup in-house.

What was our ROI?

We've noted ROI in Risk Reduction and have noted:

  • Productivity gains
  • Compliance cost reduction
  • Operational efficiency
  • Security consolidation
  • Incident response cost reduction

What's my experience with pricing, setup cost, and licensing?

Compared to other service providers, the price is a bit high. That said, it is worth the price. 

Which other solutions did I evaluate?

We did evaluate McAfee and Norton. 

What other advice do I have?

The solution is good, hence I'm more concerned about the pricing. It would be good if that can be been reduced. 

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Head of IT at RD Tech
Real User
Top 5Leaderboard
A professional and enterprise grade product that secure networks and offers peace of mind
Pros and Cons
  • "Check Point Antivirus ensures our organization's security posture by ensuring that everyone accessing the internet does so securely. It performs packet inspection, enabling all security blades to monitor and filter traffic constantly. This includes URL filtering to prevent access to unwanted sites and to protect against any attempts to compromise our network."
  • "The product should improve its pricing."

What is our primary use case?

The solution helps to protect our networks. 

What is most valuable?

Check Point Antivirus ensures our organization's security posture by ensuring that everyone accessing the internet does so securely. It performs packet inspection, enabling all security blades to monitor and filter traffic constantly. This includes URL filtering to prevent access to unwanted sites and to protect against any attempts to compromise our network.

The product streamlines security operations in our IT environment through its single configuration point, making it easy to configure all available blades. Monitoring, extracting logs from, and integrating with our Active Directory are also easy.

All of the features work in tandem for effective malware prevention.
We are quite satisfied with Check Point Antivirus, as it offers leading-edge features that other companies may not have. Despite the higher price, we carefully selected the product based on its feature set.

The sandbox technology is very useful. It operates offline in the cloud and facilitates easy replication. The tool works with our Ubiquiti switches and Active Directory.

What needs improvement?

The product should improve its pricing. 

What do I think about the stability of the solution?

We have stress-tested the tool. We've pushed a lot of requests to it, and it seems to be working fine.

What do I think about the scalability of the solution?

I think we will reach a limit once we get more traffic. But we don't expect that to happen on our current network. However, we would have to move to the next version regarding scalability. They have different tiers in their models with different performance levels. So we pitch in regards to current plus fifty percent. If we exceed that, we must go to the next level and buy the next product. My company has 150-200 users. I operate this with a team of two people. One is a primary, and the other is a secondary. It's extensively used, and we're always configuring and tuning it.

How are customer service and support?

We're paying for premium support, but it's worth its weight in gold because they are very quick. They understand things easily and come back to you with solutions very quickly. They reply quickly and know their stuff, which makes them easy to work with. They help us when we have problems and ensure they understand what we need.

How was the initial setup?

The setup of Check Point Antivirus can be straightforward or complex, depending on your familiarity with the product. Once you're familiar with it, the interface is easy to configure.

The deployment process was quick for us. We configured it using configuration files. We completed the configuration within four days, including a trial version over one weekend and production the following weekend.

What about the implementation team?

We relied on our in-house expertise for the deployment. However, the support provided by Check Point Antivirus was outstanding.

What was our ROI?

The return on investment is positive. Check Point Antivirus is not only securing our network but also simplifying management and facilitating changes.

What other advice do I have?

I rate the overall product a nine out of ten. My advice is that you get what you pay for. While it may cost more, Check Point Antivirus offers a fully mature, professional-grade product. This means you can trust that it's doing its job of securing our network. With Check Point Antivirus, you have peace of mind knowing that if something goes wrong, support is available.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1961277 - PeerSpot reviewer
Senior Ts Systems Integration Specialist at NTT Security
Real User
Top 5
Good real-time endpoint analysis, great blocking mechanisms, detects malware effectively
Pros and Cons
  • "The dashboard is user-friendly and easy to understand."
  • "We have observed some policies are not working as expected."

What is our primary use case?

We use the solution for multiple purposes such as endpoint protection, organizational malware attack tracking and maintaining, blocking of IP addresses, domain and URL blocking, and prevention and detection, according to the purposes we follow. 

Check Point is the best in the marketplace for next-generation firewalls. In combination with Endpoint Security, it proves to be stable, error-free, and up-to-date with the latest fixes and solutions available. 

How has it helped my organization?

Earlier in our organization there was normally an antivirus which was used to check endpoint protection and policies according to what was applied. However, the detection of endpoints was not up to date with real-time analysis. 

There is a lot of gap in analysis. The malware reports and signatures were not updated in real-time. There was no blocking of Suspicious URLs or domains in real-time. As we using Check Point in DMZ. We purchased the license and implemented it in the UAT zone for the best outcome as per the organization's requirements.

What is most valuable?

The most valuable aspects of the solution are the real-time endpoint analysis and blocking mechanism, the detection of malware and threats is the best use of this technology. 

As we have the stability of this product and best practices solution is applied to the infrastructure as endpoints have a clear view of the statistics and performance. 

Also, we have monitored the server level where it's been protected from the outside world. The CPU, memory, and hard disk consumption and compromisation are good. 

The dashboard has also been user-friendly and easy to understand.  

What needs improvement?

Check Point is the best in the marketplace. As the EDR [Endpoint Harmony] there is a lot of enhancement in fixing the solution. We have observed some policies are not working as expected. We have observed a few cosmetic issues as well, however, it's fine. 

Minor release should improve the stability and overall performance of the endpoint solution. Consumption of the endpoint solution should have clear visibility on day-to-day operation tasks that are being carried out also we should monitor the malicious IP address and URL for blocking the same.

For how long have I used the solution?

I've used the solution for four or more years.

What do I think about the stability of the solution?

The stability is the best in the marketplace.

What do I think about the scalability of the solution?

The scalability is the best in the marketplace.

How are customer service and support?

Their technical support is the best in the marketplace.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not previously use a different solution.

How was the initial setup?

The initial setup is straightforward.

What about the implementation team?

We handled the setup with an in-house team. I'd rate the experience foud out of five.

What was our ROI?

The ROI witnessed is the best in the marketplace.

What's my experience with pricing, setup cost, and licensing?

Check Point is the best in the marketplace. It's a good EDR and the cost is minimal.

Which other solutions did I evaluate?

We did not evaluate other options.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1822314 - PeerSpot reviewer
Head of Infrastructure and Networks at a insurance company with 51-200 employees
User
Excellent vulnerability scanning, rating, and remediation
Pros and Cons
  • "Resource overheads have been reduced and we are overall more secure as a business."
  • "There are a number of features behind paywalls which can be frustrating when you are already paying a premium."

What is our primary use case?

Check Point Harmony Endpoint Detection and Response is a very useful tool in combating vulnerabilities and threat actors. We have rolled it out across the business to all systems in our estate. 

It is very easy to perform vulnerability scans, view present vulnerabilities, and understand the ratings applied by the software. This allows us to focus on which areas are most at risk across the company. 

It was easy to install the agents to our physical and cloud devices and enabled targeted response to zero days.

How has it helped my organization?

As an IT infrastructure and security team we are now able to prioritize and target specific, higher-risk vulnerabilities, making our environment more secure. 

The ratings allow us to get a feel for the urgency of a vulnerability and apply it to our use case. We are also able to mitigate lower-priority vulnerabilities with suggested fixes and can add exemptions for false positives or acceptable risks. 

We are able to report current cyber security posture to the board and we are able to assign remediation tasks to team members. 

Resource overheads have been reduced and we are overall more secure as a business.  

What is most valuable?

We have found the combination of vulnerability scanning, rating, and remediation most valuable in the platform and the feature is vital to our everyday security hardening. 

We can effectively target vulnerabilities with suggested fixes and automate patches where relevant. 

There is a constant flow of newly added features and improved functionality is regularly made available by the Check Point team. 

Customer communication around zero days and other emerging threats is a great addition to the service.  

What needs improvement?

There are a number of features behind paywalls which can be frustrating when you are already paying a premium. 

The support is limited at times and can be quite slow, you are often directed to articles in the support center to read solutions for yourself. As a result, a lot of time has been spent reading Check Point articles on the online platform to increase knowledge around the product and further cyber security awareness in the team. It would be good to have a more direct route to remote support and demonstration.  

For how long have I used the solution?

We have been using Check Point Harmony Endpoint for around one year within our company. 

What do I think about the stability of the solution?

We have had very few, if any, stability issues with the solution.

Which solution did I use previously and why did I switch?

We previously used Rapid7. It was costly and had limited agent scanning timescales.

How was the initial setup?

The setup is nice and straightforward with a lot of hand-holding from the team.

What's my experience with pricing, setup cost, and licensing?


What other advice do I have?

We would try to add exceptions for false positives or mitigate threats earlier to clean up the experience.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edson  Duarte - PeerSpot reviewer
Information Technology at Banco Nacional de Investimento S.A.
Real User
Effective endpoint protection and includes both antivirus and firewall features
Pros and Cons
  • "The initial setup is very easy."
  • "I'm not very happy with the support, even in terms of the website. They don't offer much."

What is our primary use case?

Our primary use case is to protect endpoints.

What is most valuable?

The most valuable is encryption. 

What needs improvement?

We have some issues with encryption. The main issue is the red screen of death. Basically, it happened in previous versions of Check Point with encryption. When you install updates, not a specific update, but some Windows updates, the computer gets stuck. And it doesn't start. We were able to contact Check Point, and as a solution, they always say to use the latest version, but we are not happy with that solution. For us, it's not like a solution. 

Mostly, we work with the latest version. But that doesn't guarantee reliability.

It has another issue that we have at Check Point. Check Point has an antivirus with a Sandbox function. When you try to download some files, the sandbox gets confused with the sandblast. And sometimes you have to wait. 

So, there is room for improvement in terms of updates and with Sandbox and Sandblast. 

Another area of improvement is support. We faced some issues because of the language barrier. 

In future releases, I would like to see a nice feature in terms of encryption. When you want to decrypt a drive, it should be a little bit more user-friendly.

For how long have I used the solution?

I have been using this solution for three years. 

What do I think about the stability of the solution?

There is room for improvement in stability. The solution could be more stable. 

What do I think about the scalability of the solution?

It is a scalable solution. We have around 150 end users using this solution in our organization. 

How are customer service and support?

The customer service and support are really good. For basic support, it's good. But when you want expert support, it's not that good.

For basic support, you can talk to a person and understand the basics. I don't know if it's a language or a barrier issue or not. For example, you have an issue with your computer. When you call a call center, the first thing they would say is, "Turn it off and turn it on," or something like that. So, in that sense, they don't have problems. But when you want a more expert solution, like, "I'm having a problem with this specific update, and this happens. So, this sandbox issue, and this happens." They don't put you right away in contact with the experts. You have to insist a lot; at least, that was my experience.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have worked with WatchGuard Gateway AntiVirus. 

How was the initial setup?

The initial setup is very easy. It was very quick; it took around five minutes. 

What about the implementation team?

We deployed the solution ourselves. It is on the cloud, but the installations are made on-premises.

What's my experience with pricing, setup cost, and licensing?

The solution was a little bit expensive at the beginning, but that's not Check Point's fault. It's an issue with the taxes. When you buy a product, they have a lot of taxes. So, it becomes expensive. But they actually made very good pricing. WatchGuard also gives good prices.

We have a yearly base license. The support is included in the license costs. 

What other advice do I have?

First of all, be aware of the issues like the technical support. The solution is good. The product is good, but I'm not very happy with the support, even in terms of the website. They don't offer much.

Overall, I would rate the solution an eight out of ten. It is not a ten because of the support. But if it weren't for that, it's a very, very good solution.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: October 2025
Buyer's Guide
Download our free Check Point Harmony Endpoint Report and get advice and tips from experienced pros sharing their opinions.