Try our new research platform with insights from 80,000+ expert users

BlackBerry Cylance Cybersecurity vs Check Point Harmony Endpoint comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 12, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BlackBerry Cylance Cybersec...
Ranking in Endpoint Protection Platform (EPP)
19th
Average Rating
8.0
Reviews Sentiment
4.6
Number of Reviews
44
Ranking in other categories
No ranking in other categories
Check Point Harmony Endpoint
Ranking in Endpoint Protection Platform (EPP)
8th
Average Rating
8.8
Reviews Sentiment
8.0
Number of Reviews
112
Ranking in other categories
Endpoint Detection and Response (EDR) (9th)
 

Mindshare comparison

As of April 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of BlackBerry Cylance Cybersecurity is 1.1%, down from 1.5% compared to the previous year. The mindshare of Check Point Harmony Endpoint is 2.5%, down from 2.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Sooraj Makkancherrry - PeerSpot reviewer
Doesn't have daily updates, which is important for healthcare IT
I face challenges with the exclusion policy - it still scans folders we told it not to, causing issues. When we contact support, they tell us to update the latest agent, but we can't do that immediately due to medical device protocols and validation testing. I wish support would try to understand our issues better instead of giving this standard response. The machine learning feature they use often tells us to upgrade the agent or add things to the exclusion list, which isn't unacceptable. It's a very good and new technology as a tool and antivirus. But sometimes, it doesn't work properly with our medical devices and products, quarantining files it shouldn't even after we add them to exclusions. This is tricky for us.
Alejandro Flores. - PeerSpot reviewer
Good visibility with cloud centralized management and several layers of security
There are some "weak points" that have to be mentioned, including: 1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents. 2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions. 3) You need a mature security team to manage this solution in order to get the most value from it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The platform's most valuable features are the malware detection capabilities."
"It secures different entry points into the network."
"The solution is very quick at easily changing the levels of protection for each computer and the server."
"CylancePROTECT works on AI technology, is always up to date, and uses very few resources on your devices."
"What I like best about CylancePROTECT is its accuracy, as it doesn't give many false positives."
"The most valuable features are script blocking and macros within Word documents for stopping unwanted applications from running in the background."
"Two or three years ago when the WannaCry virus struck, the people that were on Cylance were the ones that weren't affected."
"​Very easy to deploy. It can be done one by one or deployed by customizing an MSI file for GPO push.​"
"The rollout and management of devices were very simple."
"Forensic Analysis provides a complete analysis of threats via detailed reports."
"We can map the MITRE attack framework along with the Cyber Kill Chain completely."
"The most valuable feature of this solution is the VPN."
"A unique feature with this product is that it will detect if the user is entering their password on a website, and then block it."
"It is quite easy to use and deploy the agent on endpoints to protect them from bad actors."
"It monitors data flow across the networking system to enhance comprehensive workflow infrastructure."
"Its ability to rollback anti-ransomware once an attack has started is the most valuable feature."
 

Cons

"I would say one thing that they might need to bring in is protection for mobile devices."
"The management console needs a little maturity in how it presents data and allows the administrator to drill down or search across systems."
"It's a good solution but some features just need to be updated."
"The solution needs better dashboards that are easier to use."
"​It needs real analysis of quarantined files. The EDR product isn't showing much right now."
"The product does not do a lot of reporting on what it is taking care of. Enhanced reporting would be a welcome improvement."
"The process of whitelisting a script that you want to be able to run can be a little bit difficult, or awkward."
"The company that sells us the licenses sometimes doesn't know how to do certain things."
"Check Point Harmony Endpoint could improve mobile device management (MDM)."
"Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries."
"We would also like the application control module to be further developed in future versions to include applications commonly used or maintained by Check Point in order to be able to configure blocking policies more quickly."
"They should also add new functions such as threat hunting."
"It would be useful if you could also mark blocks as safe from a client. Now users always have to ask an admin to make exclusions."
"We did have some early compatibility issues, which I hope Check Point has since resolved."
"If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents."
"There was a learning curve for our general population of employees (the user)."
 

Pricing and Cost Advice

"It is expensive, but not unreasonable."
"The initial end-point cost may seem a little high (~$55/device/year) but when you look at the total peace of mind that the solution provides, with no reboots for updates, and negligible performance impact, it is well worth it."
"Currently, we have competitive pricing for Cylance, which is affordable enough to consider."
"CylancePROTECT is worth the money, but I'm not sure of its exact price. I can't remember off the top of my head."
"The product cost is about $5, per user, per month."
"This cost of the license is approximately $5 USD monthly per user."
"CylancePROTECT is an affordable solution."
"The solution provides me with competitive pricing."
"The price is good."
"The cost is huge compared to other products that are available on market."
"We implement this solution with a yearly subscription and there are no extra costs."
"Licensing comes free in that first year or is included in the base package. From a commercial point of view, it really just is the renewal cost, rather than a one-time fixed cost or buy-in."
"Price-wise, the product is affordable. There are no additional costs apart from the licensing charges that are attached to the product."
"I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high."
"I rate the solution's pricing a five out of ten. It costs around ₱2,200 per endpoint."
"Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
845,040 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Manufacturing Company
11%
Government
8%
Financial Services Firm
7%
Computer Software Company
16%
Manufacturing Company
8%
Financial Services Firm
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Blackberry Protect?
It is a good endpoint solution. It is very easy to manage and detect the threat immediately. It will take the necessary actions.
What is your experience regarding pricing and costs for Blackberry Protect?
The price is reasonable for us at the moment. I rate the overall solution an eight out of ten.
What needs improvement with Blackberry Protect?
I face challenges with the exclusion policy - it still scans folders we told it not to, causing issues. When we contact support, they tell us to update the latest agent, but we can't do that immedi...
What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
The price for Check Point Harmony Endpoint ( /products/check-point-harmony-endpoint-reviews ) is good considering the services it offers. It is not expensive and provides comprehensive coverage.
What needs improvement with Check Point Harmony Endpoint?
One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days.
 

Also Known As

Blackberry Protect
Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
 

Overview

 

Sample Customers

Panasonic, Noble Energy, Apria Healthcare Group Inc., Charles River Laboratories, Rovi Corporation, Toyota, Kiewit
Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Find out what your peers are saying about BlackBerry Cylance Cybersecurity vs. Check Point Harmony Endpoint and other solutions. Updated: March 2025.
845,040 professionals have used our research since 2012.