We performed a comparison between Check Point Harmony Endpoint and Intercept X Endpoint based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. The solution is praised for its forensic analysis and VPN connectivity. Intercept X Endpoint combines two products into one solution, offering strong performance, server protection, and efficient threat management capabilities. Users say Check Point could improve its endpoint vulnerability management and threat-hunting features. Intercept X Endpoint could benefit from better integration with third-party vendors and improved support for virtual infrastructures.
Service and Support: While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement. Some users found Intercept X Endpoint's support team knowledgeable and supportive, while others expressed dissatisfaction with responsiveness.
Ease of Deployment: Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades. Intercept X Endpoint has a straightforward initial setup, with quick installation and simple configuration and maintenance. Some users said they occasionally encountered issues that required reinstallation.
Pricing: Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower. Intercept X Endpoint is generally seen as fairly priced, but some users think it’s on the higher end of the price scale.
ROI: Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow. Users say that Intercept X Endpoint offers exceptional defense against ransomware and zero-day threats, leading to a positive return on investment.
Comparison Results: Our users prefer Check Point Harmony Endpoint over Intercept X Endpoint. Check Point Harmony Endpoint provides a robust defense against ransomware and phishing attacks. While Intercept X earned high marks for its threat management capabilities, user reviews indicate that Check Point Harmony Endpoint offers a more comprehensive and effective solution for endpoint security.
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"It is very easy to set up. I would rate my experience with the initial setup a ten out of ten, with ten being very easy to set up."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"The product's initial setup phase is very easy."
"Additionally, when it comes to EDR, there are more tools available to assist with client work."
"The solution was relatively easy to deploy."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"The end-user facilities for managing the tool are good."
"The zero-day threat prevention is excellent."
"It prevents the most imminent threats to the endpoint such as ransomware, phishing or drive-by malware, while quickly minimizing breach impact with autonomous detection and response."
"Its stability during any heavy performance activity is excellent."
"It provides remote access for the staff and increases their productivity."
"The solution has all the standard features you would expect for endpoint protection."
"Check Point Harmony Endpoint can be easily deployed and is cost effective and more secure."
"The most valuable feature is forensics."
"It is very easy to set up and easy to use. It is also not resource-intensive."
"Sophos Intercept X is a very effective solution and its being cloud-based is a benefit. Wherever my users are, I can apply policies to them. In the era of mobility, when users are out of the office or they're in different locations, it doesn't matter."
"It is easy to change the size of its capabilities, i.e. to expand processes or scale the size of users."
"The product is user-friendly."
"We most value the price and interface quality with Sophos Intercept X. We focus on solution quality."
"Technical support is responsive and adept."
"The forensics within the solution are quite good. The ransomware mitigation is also impressive."
"The solution protects us."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"It takes about two business days for initial support, which is too slow in urgent situations."
"The solution should address emerging threats like SQL injection."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"The dashboard isn't easy to access and manage."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"The remote deployment with Check Point Endpoint Security requires improvement. We have to depend on some of their deployment tools. I would like a system endpoint protection management tool or a remote deployment tool."
"It would also be great to include DLP capabilities for the endpoint so that we do not have to deploy additional agents on servers or PCs or use additional products."
"Support's service and the response times can be improved. The triaging of the tickets takes a long time and the tickets are only resolved with escalations."
"I still don't have a clear opinion of the possible improvements that the tool may need. There are still functionalities that I have not been able to try completely and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
"The management in Check Point Harmony Endpoint could be improved."
"I'd also love to see them add full MDM support, but I appreciate that that's not the product market. If it did come in, I'd be more than happy to look at additional modules. It was probably one of the easiest products I've ever had to deploy it, but if it's not capable of doing MD, then that's going to impact its usefulness to us."
"We need a higher maximum file size in the sandboxing feature."
"They should also add new functions such as threat hunting."
"They don't have the full stack of offerings as compared to the other competitive products that we see."
"The tool should be made compatible with Linux and Microsoft operating systems."
"Integration with firewall solutions could be better."
"This solution is not in the high ratings on many of the top review sites. This solution has to be near the top for me to continue using it."
"It could be a bit easier to implement."
"The technical support is the lone sore-point when dealing with this product."
"It's a bit heavy on the computers. So once you install it, the computer slows down. It is a resource-intensive solution."
"The initial setup can be difficult if you don't come in with at least some knowledge about the product."
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 103 reviews while Intercept X Endpoint is ranked 7th in Endpoint Protection Platform (EPP) with 101 reviews. Check Point Harmony Endpoint is rated 8.8, while Intercept X Endpoint is rated 8.4. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Intercept X Endpoint writes "A standard offering with good threat analysis but reduces machine performance". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Intercept X Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Symantec Endpoint Security. See our Check Point Harmony Endpoint vs. Intercept X Endpoint report.
See our list of best Endpoint Protection Platform (EPP) vendors and best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.