Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs Panda Adaptive Defense 360 comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Protection Platform (EPP)
6th
Ranking in Endpoint Detection and Response (EDR)
8th
Average Rating
8.8
Reviews Sentiment
8.0
Number of Reviews
113
Ranking in other categories
No ranking in other categories
Panda Adaptive Defense 360
Ranking in Endpoint Protection Platform (EPP)
32nd
Ranking in Endpoint Detection and Response (EDR)
24th
Average Rating
8.2
Reviews Sentiment
7.3
Number of Reviews
27
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of November 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of Check Point Harmony Endpoint is 2.6%, up from 2.5% compared to the previous year. The mindshare of Panda Adaptive Defense 360 is 1.4%, up from 1.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

reviewer4572384 - PeerSpot reviewer
Oct 11, 2023
Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering
We used to use other security solutions (Windows Defender and Kaspersky), however, we had security incidents that affected us (viruses and ransomware) and they were very difficult to identify or when we did identify them it was already a long time after the incident occurred and we did not know the cause and therefore affected the operability of our company considerably. Since we made the decision to move to Check Point Harmony we have had greater visibility of everything that happens on our devices and take a preventive approach rather than a reactive strategy, in addition to being more confident that we have Check Point protecting us.
Juan Ramón López Ruiz - PeerSpot reviewer
Apr 24, 2024
Recognizes and mitigates a wide array of spam and phishing attempts
This is one of the best solutions for servers for advanced users. Advanced users, such as those working with banks and who have to make payments, are exposed to more attacks. The people whose job is to write, create invoices, register products, or do quotes. They don't need the EPR. They can use a…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Stability-wise, I rate the solution a ten out of ten."
"It's great for securing our endpoints from any external attacks."
"Information is easily managed and protected (which is particularly useful in lost or stolen endpoints)."
"Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved."
"It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks."
"In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations."
"The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature."
"The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets."
"Their remote management (RMM) is very good."
"I've found it's got excellent web protection."
"The dashboard management feature is valuable."
"It's very easy to deploy, we don't have any problem or issues. It's most full automatic. It basically takes the assumption that everything is supposed to be a suspect; files, processes, URL accesses, and so on."
"The feature I find most valuable is the advance search engine."
"We have control over our devices, specifically USB ports, allowing us to block or control the traffic."
"Great technical support staff."
"The detection capabilities for malicious activities are effective."
 

Cons

"Check Point users a pattern-based security module, which is something that can be improved."
"As I understand there will be a URL filtering feature included with the browser agent in the future. This will allow URL filtering without the need for a Gateway Device. This is something I am looking forward to and would be a great addition to list of features."
"It needs more documentation and better ease of deployment. For documentation, it needs more information about integrating the endpoints on SandBlast Agent mobile as well as on desktop platforms."
"They need to focus on more scalability (as much as possible) so that the solution can run across all supported OS."
"The management in Check Point Harmony Endpoint could be improved."
"Legacy VPNs and digital footprints should be minimized."
"If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents."
"We need a higher maximum file size in the sandboxing feature."
"The stability could be improved. My teammates who use Panda Security and I have experienced some issues."
"I'd like to integrate it into my main services."
"We do get the odd false positive when we're trying to install the software."
"Panda Adaptive Defense 360 is not compatible with certain network devices like access points, switches, or routers, which would be an area for improvement."
"For some urgent updates, I don't like the need for the tool to be frequently restarted."
"t would help if it would monitor the network better."
"They need to offer a clear dashboard so you can see everything everywhere all at once."
"It needs some improvements in the DNS security feature. Currently, it does not have full DNS security. It only has semi-DNS security, which can be improved. It is an important feature for us, and it would be really good if they can improve the DNS security feature. Our group has some plans to change to Cisco AMP, which has features such as DNS, Umbrella. We are trying to learn about Cisco AMP and compare it with Panda."
 

Pricing and Cost Advice

"The pricing is reasonable."
"The solution is reasonable, but there are cheaper solutions out there."
"I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high."
"In terms of licensing, have a buffer zone around your projects in terms of the amount of endpoints that you want to have. You can always have more, but it is best to leave room for a little increase or growth."
"One of the key factors that made us go with this solution was the pricing. On the licensing part, there was an initial complementary set of licenses offered in the initial onboarding package, either 15 or 20. Then, we had some complementary licenses in the initial purchase of the package. That was pretty useful."
"Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years."
"We pay roughly 80,000 Swedish krona per year. When it comes to the firewall, it's roughly 150,000 Swedish krona yearly. There's also maintenance, of course, which is roughly 10,000 krona per month."
"We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it."
"The price of this solution depends on the number of licenses that you are purchasing."
"The licensing costs are not too high. We pay about 20 Euros a year. It's a reasonable amount to pay."
"Our licensing fee is 1M Euro per month, so it is about 80 Euro's per user."
"There is a license needed to use this solution and it is approximately $30 annually."
"Customers need to pay monthly licensing costs for Panda Security Adaptive Defense, which is not expensive."
"Panda is cloud-only and comes at a reasonable cost. It is a set price per seat."
"The licensing is subscription-based and priced well compared to other endpoint security solutions."
"I don't think Panda's license is too expensive, but they're charging more than it's worth. It's a yearly license. For 1,000 endpoints, it's around $18,000."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Government
8%
Financial Services Firm
7%
Manufacturing Company
7%
Computer Software Company
17%
Comms Service Provider
13%
Manufacturing Company
6%
Hospitality Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
It scans all the endpoints in your cloud and on-premises for vulnerabilities, threats, and malware attacks.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
The pricing is okay. It is in the enterprise range. It is not middle range. It is not so costly, but it is an enterprise.
What needs improvement with Check Point Harmony Endpoint?
The only drawback is the integration process. For example, I want to integrate with my source platform. It took some time. That's the only concern regarding the integrations. Check Point Harmony En...
What do you like most about Panda Security Adaptive Defense?
The most valuable features of the solution stem from the fact that I like the tool's UI, ease of management, ease of making reports, and the ability to export information easily.
What needs improvement with Panda Security Adaptive Defense?
The software can improve the number of messages we are receiving in case of an attack.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
Panda Security Adaptive Defense 360, Panda Security Endpoint Protection, Panda Security for Desktops
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Indra, Valea AB, Fineit, Aemcom, Data Solutions INC., Gloucestershire NHS, Golden Star Resources Ltd, Hispania Racing Team, Instituto Dos Museus e da ConserÊo, Escuelas Pias Provincia Emaus, Axiom Housing Association, Municipality of Bjuv, Lesedi Nuclear, Mullsj_ municipality, Eng. skolan Norr AB, Dalakraft AB, Peter Green Haulage Ltd
Find out what your peers are saying about Check Point Harmony Endpoint vs. Panda Adaptive Defense 360 and other solutions. Updated: November 2024.
815,854 professionals have used our research since 2012.