Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs CyberArk Endpoint Privilege Manager comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Check Point Harmony Endpoint
Average Rating
8.8
Reviews Sentiment
8.0
Number of Reviews
113
Ranking in other categories
Endpoint Protection Platform (EPP) (6th), Endpoint Detection and Response (EDR) (8th)
CyberArk Endpoint Privilege...
Average Rating
8.2
Number of Reviews
30
Ranking in other categories
Endpoint Compliance (5th), Privileged Access Management (PAM) (6th), Anti-Malware Tools (8th), Application Control (6th), Ransomware Protection (7th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. Check Point Harmony Endpoint is designed for Endpoint Protection Platform (EPP) and holds a mindshare of 2.6%, up 2.5% compared to last year.
CyberArk Endpoint Privilege Manager, on the other hand, focuses on Privileged Access Management (PAM), holds 3.9% mindshare, up 3.7% since last year.
Endpoint Protection Platform (EPP)
Privileged Access Management (PAM)
 

Featured Reviews

reviewer4572384 - PeerSpot reviewer
Oct 11, 2023
Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering
We used to use other security solutions (Windows Defender and Kaspersky), however, we had security incidents that affected us (viruses and ransomware) and they were very difficult to identify or when we did identify them it was already a long time after the incident occurred and we did not know the cause and therefore affected the operability of our company considerably. Since we made the decision to move to Check Point Harmony we have had greater visibility of everything that happens on our devices and take a preventive approach rather than a reactive strategy, in addition to being more confident that we have Check Point protecting us.
Kaspars Vasilevskis - PeerSpot reviewer
Nov 20, 2023
Offers integrated solutions and expands its capabilities through strategic acquisitions
Setting up CyberArk Endpoint Privilege Manager was challenging for me due to the involvement of multiple components. The process required a good understanding of each component and its configuration. It is not a straightforward setup, and familiarity with the system is crucial to ensure everything is correctly configured. I would rate the easiness of the initial setup as a six out of ten. The deployment of CyberArk Endpoint Privilege Manager takes about a day. It is not as quick as some Linux, which can be up and running in just a couple of hours. CyberArk's deployment is more complex due to the various components that need to be set up and validated to ensure they work together seamlessly. Once the deployment is complete, you can then proceed with tasks like account onboarding.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It prevents the most imminent threats to the endpoint such as ransomware, phishing or drive-by malware, while quickly minimizing breach impact with autonomous detection and response."
"There's the possibility of being able to do the administration from the Check Point portal, maintaining control and visibility of the different security events at all times."
"It is easy to install from the cloud."
"The end-user facilities for managing the tool are good."
"I found the fact of working across multiple attack vectors easy and more beneficial."
"A unique feature with this product is that it will detect if the user is entering their password on a website, and then block it."
"Harmony Endpoint is able to detect, monitor, block, and mitigate attacks on the endpoint and it builds and maintains relevant logs for later inspection."
"The most valuable feature is forensics."
"CyberArk Endpoint Privilege Manager (EPM) 's most valuable feature is its ability to manage user application privileges and protect against ransomware attacks by controlling access to specific files and applications."
"It has drastically reduced the attack surface for local administrative rights and the chance of escalation of privilege. We've removed, at this point, close to 98 percent of the local administrative accounts on workstations. If there were an incident, it would stop at that point and we'd be able to know."
"The product is very flexible"
"The biggest benefit of CyberArk EPM for our customers is control over privileged access for endpoints. Endpoints are often the starting point for attackers to enter and move within a network. CyberArk EPM bridges the gap between security and operations teams. Operations teams are happy because work isn't stopped due to admin rights issues, while security teams are satisfied that full admin rights aren't given to all users."
"The solution allows me to give access and privileges to each user individually"
"CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable."
"The department management aspect of the solution is the most valuable aspect."
"We were able to reduce the number of privileged accounts by 50%, which helped to simplify our privileged access management environment."
 

Cons

"I have a few issues when attempting to install Harmony on some of the machines."
"For the future, I would like to see maybe a content-filtering emulation feature in Harmony Endpoint."
"It gives you an alert for malicious sites, which, after searching on the Google database, don't come out to be the same."
"We would like to make the documentation for more modern solutions like the Harmony family easier to find."
"Configuration with some applications did not take place effectively due to setup complications."
"As of now, product-wise, we haven't found any major concern that needs to improve, although it does not support full MDM and this is something that should be there."
"I'd also love to see them add full MDM support, but I appreciate that that's not the product market. If it did come in, I'd be more than happy to look at additional modules. It was probably one of the easiest products I've ever had to deploy it, but if it's not capable of doing MD, then that's going to impact its usefulness to us."
"Improvements are required in two key areas: notifications and setup simplification."
"CyberArk Endpoint Privilege Manager is a perfect solution, but CyberArk Endpoint Privilege Manager for Linux has many issues. Another area for improvement in CyberArk Endpoint Privilege Manager, specifically for Windows, is that there's no way for you to check credential theft from a text file, such as a notepad file."
"The product's threat protection and defense capabilities need enhancement."
"The product needs a streamlined user interface; improvements to the user interface can enhance user experience and make the solution more intuitive to navigate."
"Performance could be better. We have a couple of problems with CyberArk right now. One of the problems is performance in our environment. Support also takes a long time to respond. If the user already has local admin rights, then I can't collect any events in the console from this device. There are also some options in CyberArk that are not working properly, and are not helpful in this case. I can't collect any information to create a proper policy for the device. I have to investigate everything manually, or even disable the local admin from the device. I can collect the events only after this, and it's very time consuming. In my case, it's a waste of resources."
"They need much better integration with Azure AD."
"CyberArk has some performance issues. For example, servers could not handle the solution when we first took CyberArk Endpoint Privilege Manager."
"Can be improved by allowing computers to be excluded from policies."
"The product is expensive."
 

Pricing and Cost Advice

"The product is averagely priced. The product price is neither very high nor too low. The tool is not really expensive."
"We implement this solution with a yearly subscription and there are no extra costs."
"I bought them for 12 months and I genuinely cannot remember what I paid for them. I think it's about 100 pounds per user per year, so about 10 pounds a month per person."
"Check Point Harmony Endpoint is cost effective."
"I rate the solution's pricing a five out of ten. It costs around ₱2,200 per endpoint."
"Licensing comes free in that first year or is included in the base package. From a commercial point of view, it really just is the renewal cost, rather than a one-time fixed cost or buy-in."
"In comparison to other software solutions available on the market, it comes at a higher price point."
"Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years."
"Pricing depends on how many devices you use. Right now, on-premise, it costs us a little, but it's worth it. It seems like the cloud solution is much more expensive. We got this solution one year ago, and it's like we bought the solution, and now they are not going to support it on-premise anymore. We are in the implementation phase, and we missed this, and we already paid for the licenses. This is wasted time from my perspective, and CyberArk should be more customer-friendly."
"The price of CyberArk Endpoint Privilege Manager is expensive."
"It's not at the lower end of the market. I think the price is reasonable considering the quality it delivers. It is a top-notch solution at a fair price point."
"CyberArk Endpoint Privilege Manager has a very high price, so it's a one out of ten for me in terms of pricing."
"The tool is priced high. I would rate its pricing an eight out of ten."
"The solution's pricing is reasonable compared to other vendors' products."
"The cost for CyberArk is very high."
"The solution requires an annual license to use it. There can be some extra costs in some cases."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Government
8%
Financial Services Firm
7%
Manufacturing Company
7%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
It scans all the endpoints in your cloud and on-premises for vulnerabilities, threats, and malware attacks.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
The pricing is okay. It is in the enterprise range. It is not middle range. It is not so costly, but it is an enterprise.
What needs improvement with Check Point Harmony Endpoint?
The only drawback is the integration process. For example, I want to integrate with my source platform. It took some time. That's the only concern regarding the integrations. Check Point Harmony En...
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
Viewfinity
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Information Not Available
Find out what your peers are saying about Check Point Harmony Endpoint vs. CyberArk Endpoint Privilege Manager and other solutions. Updated: May 2022.
815,854 professionals have used our research since 2012.