Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs Cybereason Endpoint Detection & Response comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Protection Platform (EPP)
6th
Ranking in Endpoint Detection and Response (EDR)
8th
Average Rating
8.8
Reviews Sentiment
8.0
Number of Reviews
113
Ranking in other categories
No ranking in other categories
Cybereason Endpoint Detecti...
Ranking in Endpoint Protection Platform (EPP)
45th
Ranking in Endpoint Detection and Response (EDR)
34th
Average Rating
8.0
Number of Reviews
20
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of November 2024, in the Endpoint Detection and Response (EDR) category, the mindshare of Check Point Harmony Endpoint is 3.5%, up from 3.3% compared to the previous year. The mindshare of Cybereason Endpoint Detection & Response is 1.3%, down from 1.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR)
 

Featured Reviews

reviewer4572384 - PeerSpot reviewer
Oct 11, 2023
Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering
We used to use other security solutions (Windows Defender and Kaspersky), however, we had security incidents that affected us (viruses and ransomware) and they were very difficult to identify or when we did identify them it was already a long time after the incident occurred and we did not know the cause and therefore affected the operability of our company considerably. Since we made the decision to move to Check Point Harmony we have had greater visibility of everything that happens on our devices and take a preventive approach rather than a reactive strategy, in addition to being more confident that we have Check Point protecting us.
AtulChaurasia - PeerSpot reviewer
Aug 28, 2023
Scalable platform with intuitive features for detecting malicious files
We use Cybereason Endpoint Detection & Response to scan and detect unusual processes and malicious files on the endpoint The product's threat-hunting feature is very intuitive and easy to use as it is GUI-based. We need to know the specific fields we want to scan. It gives the entire report of…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution has all the standard features you would expect for endpoint protection."
"A unique feature with this product is that it will detect if the user is entering their password on a website, and then block it."
"The most valuable feature is the Zero-day protection, which covers our on-premises users, and well as those users who are outside of our network."
"It's pretty complete for preventing threats to endpoints. Its capabilities are great."
"The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists."
"Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum."
"Deploying new versions of the endpoint are easy."
"The most important characteristic of our requirements was the implementation of disk encryption."
"It gives all the information in a clear response."
"They do a very good job of providing multi-stage visualizations of malicious operations that immediately show all attack details across all devices and users. Since it is MalOp-centric model, you can see if there has been a similar operation across multiple machines. If it is the same thing appearing on multiple machines, you see all the machines and users affected in one screen."
"The initial setup is not overly complicated."
"The initial setup process is straightforward."
"For me, the technical support is good."
"Their EDR solution, the ability to mitigate issues through their command line, is probably the best feature that we've had. We use that all the time. It's very useful for doing investigations."
"The most valuable feature is the capability of the command used by the machine so that we see the kind of performance that is running."
"The interface is user-friendly."
 

Cons

"I have a few issues when attempting to install Harmony on some of the machines."
"The application control and URL filtering features are not very strong."
"It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects."
"It gives you an alert for malicious sites, which, after searching on the Google database, don't come out to be the same."
"One area of this product that has room for improvement is the disc encryption."
"I would like to see more automation."
"We would also like the application control module to be further developed in future versions to include applications commonly used or maintained by Check Point in order to be able to configure blocking policies more quickly."
"The web filter service could be improved."
"While the product is very good, there are still some areas for improvement. The initial triage area could be a bit simpler. They get into the weeds real fast; it gets very detailed very fast. I am still looking for an easier triage layer on top with the ability to dig deeper."
"Ad hoc higher-level reporting to senior management can be improved or can be implemented. That's definitely an area of improvement that they need to focus on."
"The integration with Microsoft solutions and Microsoft capabilities needs to be improved."
"It should be more stable, and the sensor needs improvement in terms of connectivity."
"Compared to our previous endpoint, we have a lot more false positives and a lot more duplication of alerts. So we're chasing more alerts."
"The deployment on individual endpoints is more geared toward larger organizations. It might prove to be a bit too complicated for a smaller organization. You need to know what you're doing when you're deploying the sensor."
"The reporting feature needs improvement."
"The product's reporting isn't great."
 

Pricing and Cost Advice

"The price of Check Point Harmony Endpoint is comparable to SonicWall. The price could be a bit lower."
"I rate the product price a four on a scale of one to ten, where one is low, and ten is high."
"Check Point Harmony Endpoint is cost effective."
"I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high."
"Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years."
"We pay roughly 80,000 Swedish krona per year. When it comes to the firewall, it's roughly 150,000 Swedish krona yearly. There's also maintenance, of course, which is roughly 10,000 krona per month."
"The cost is huge compared to other products that are available on market."
"The price is good."
"I had to go through a third-party to purchase it, which I wasn't really pleased about."
"This product is somewhat expensive and should be cheaper."
"In terms of cost, this is a good choice for our needs."
"In terms of pricing, it's a good solution."
"Though it is not the cheapest solution but it fits our budget. We pay an annual licensing fee."
"The pricing is manageable."
"I do not have experience with the licensing of the product."
"We considered a few other solutions. Some were ridiculously overpriced, while others didn't have solutions for Mac endpoints. That was a deal-breaker because most of our organization is on Mac. It came down to two vendors: Cybereason and another. They had similar pitches and almost identical approaches, but in the end, Cybereason gave us the best value for our money."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Government
8%
Financial Services Firm
7%
Manufacturing Company
7%
Computer Software Company
19%
Financial Services Firm
9%
Manufacturing Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
It scans all the endpoints in your cloud and on-premises for vulnerabilities, threats, and malware attacks.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
The pricing is okay. It is in the enterprise range. It is not middle range. It is not so costly, but it is an enterprise.
What needs improvement with Check Point Harmony Endpoint?
The only drawback is the integration process. For example, I want to integrate with my source platform. It took some time. That's the only concern regarding the integrations. Check Point Harmony En...
What is your experience regarding pricing and costs for Cybereason Endpoint Detection & Response?
Comparison with other products showed it be cheaper than some larger competitors. Set up cost for us were cheaper as we already had users experienced with the product in other business units. Initi...
What is your primary use case for Cybereason Endpoint Detection & Response?
We use the product for enhancing security postures by leveraging behavioral analytics and security engines effectively minimizing false positives and detecting threats.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
Cybereason EDR, Cybereason Deep Detect & Respond
 

Learn More

 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Lockheed Martin, Spark Capital, DocuSign, Softbank Capital
Find out what your peers are saying about Check Point Harmony Endpoint vs. Cybereason Endpoint Detection & Response and other solutions. Updated: November 2024.
815,854 professionals have used our research since 2012.