Trellix Endpoint Security and Check Point Harmony Endpoint compete in endpoint protection. Check Point Harmony Endpoint appears to have the upper hand due to its comprehensive features.
Features: Trellix Endpoint Security focuses on malware detection, threat response, and strong encryption. Check Point Harmony Endpoint provides zero-day threat protection, VPN integration, and advanced endpoint threat hunting.
Room for Improvement: Trellix Endpoint Security needs better threat intelligence, faster updates, and more intuitive user experience. Check Point Harmony Endpoint requires more streamlined policy management, better reporting capabilities, and improved interface design.
Ease of Deployment and Customer Service: Trellix Endpoint Security offers an easy deployment process but receives mixed reviews on customer service. Check Point Harmony Endpoint is slightly more complex to deploy but has positive customer support feedback.
Pricing and ROI: Trellix Endpoint Security has competitive setup costs with a favorable ROI. Check Point Harmony Endpoint is more expensive yet provides substantial long-term value.
The product is affordable and provides excellent coverage and protection across multiple platforms.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
Only email support is available, leading to delays in getting assistance.
Their support was helpful enough for me to give them a seven out of ten.
I would rate their customer service nine out of ten.
The response time is a notable issue.
Check Point Harmony Endpoint is scalable, suitable for both small and large companies.
It possesses high scalability because it is a SaaS solution from the cloud, allowing expansion as needed.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
Trellix Endpoint Security is scalable.
The stability of the tool is high, as I have not experienced any downtime.
I would rate its stability as nine out of ten.
Better technical support would enhance the product's competitiveness.
One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days.
What needs improvement in Trellix Endpoint Security is the reduction of resource consumption by the scanning feature.
Artificial intelligence also requires improvement to further enhance the product.
It is not expensive and provides comprehensive coverage.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
Endpoint protection is valuable.
Harmony Endpoint has a geo policy that allows me to see where users log in from, enabling me to analyze if someone tries to access an account from another location.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
The most valuable features of Trellix Endpoint Security include its protection capabilities such as DNS and endpoint security, DNS threat prevention, as well as advanced threat prevention.
Check Point Harmony Endpoint integrates security solutions, allowing comprehensive protection against cyber threats. It's designed to suit enterprise-scale operations with robust features for threat prevention and management.
Check Point Harmony Endpoint offers advanced security capabilities that prioritize threat analysis, detection, and prevention. Tailored for professional environments, it provides tools to handle endpoint vulnerabilities effectively. Its user-centric design ensures that IT teams can manage network security with streamlined operations. Continuous updates and threat intelligence are offered to counter emerging threats, and its deployment is optimized for ease of use.
What are the key features of Check Point Harmony Endpoint?In specific industries like finance and healthcare, Check Point Harmony Endpoint is deployed to secure sensitive data and protect against sector-specific threats. Its flexibility allows adaptation to meet industry standards, ensuring critical infrastructures maintain operational security without hindrance.
Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.
Trellix Endpoint Security Benefits
Trellix Endpoint Security Top Features
Reviews from Real Users
“It has a great console. We can manage everything from the central console and it is very easy. Every year we are getting the benefits of legacy also. It's easy to set up.” - S Fazlul H., IT Lead Engineer, Information Technology at Banglalink
“There is a new feature where you can set thresholds for all the CPU consumption allowing for no consumption on the servers when the scans happen. It is a separate plugin or addon, and if we have it on all the virtual machines it automatically checks the resources, and based on that, it will schedule the scans. That is something that I have not seen in other antivirus solutions, such as Symantec.” - Sabari K. Senior Engineer at a comms service provider
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.