Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs Trellix Endpoint Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Protection Platform (EPP)
6th
Average Rating
8.8
Reviews Sentiment
8.0
Number of Reviews
111
Ranking in other categories
Endpoint Detection and Response (EDR) (9th)
Trellix Endpoint Security
Ranking in Endpoint Protection Platform (EPP)
9th
Average Rating
8.0
Reviews Sentiment
7.1
Number of Reviews
98
Ranking in other categories
Extended Detection and Response (XDR) (13th)
 

Mindshare comparison

As of February 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Check Point Harmony Endpoint is 2.6%, down from 2.6% compared to the previous year. The mindshare of Trellix Endpoint Security is 3.2%, down from 3.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Alejandro Flores. - PeerSpot reviewer
Good visibility with cloud centralized management and several layers of security
There are some "weak points" that have to be mentioned, including: 1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents. 2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions. 3) You need a mature security team to manage this solution in order to get the most value from it.
AhmedEl-Tayeb - PeerSpot reviewer
Good user behavioral analysis and helpful patching but needs better support services
Some of our products have a first and second line owned by us. We are giving support services to the customers instead of the vendor. Some other products are supported directly by the technology vendor, however. Technical support from the vendor is very bad. Usually, when the customer submits a ticket, they put a severity level on the case. Whenever the case is very important, and there is a real malfunction in the product on the customer side, and there is something down that needs someone to have a look immediately, it takes more time than it should to even engage with the customer. When someone has to contact the customer and have a remote session within the customer environment, they sometimes lack in terms of communication with the customer. The support centers are located in the East and not all have an acceptable level of English in order to communicate directly with the customer.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's easy to scale as needed."
"SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth."
"We love the reports and monitoring they provide."
"The initial setup is very easy."
"One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users machine. This is a very valuable feature of this solution."
"Stability is good, and the product is well-designed for security needs."
"Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved."
"The traditional anti-malware engine is valuable."
"We like the management of the ePO, and we like the management console."
"The solution includes a good combination of features for both signature and signature-less."
"Dynamic Application Containment."
"I have found many of the features to be useful."
"The most valuable features of the solution include DLP (data loss prevention), CASB (cloud access security broker) functionality, endpoint encryption, and cloud workload security."
"The most valuable features of Trellix Endpoint Security include its protection capabilities such as DNS and endpoint security, DNS threat prevention, as well as advanced threat prevention."
"One valuable feature is Threat Prevention with the on-demand scan."
"It's easy to use."
 

Cons

"The web filter service could be improved."
"I would like to see a better UI for admin functions."
"The solution needs better reports and centralized logs."
"A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings."
"The price of the product could be more friendly."
"I would like to see is this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses."
"Technical support can be a bit slow at times."
"The heartbeat interval must be improved."
"There are certain shortcomings in the features concerning DLP in Trellix, where certain additions must be made in the future."
"Signatures to protect against new attacks."
"It would be nice if the solution was a bit more stable."
"There is room to improve with scalability."
"The product is not easy to use."
"The solution should provide a more easy way to uninstall it on specific stations."
"It would be a lot easier if I could add multiple user accounts within a single device."
"Recently, Trellix has introduced a CDR, which involves more manual response than automatic. I believe they should enhance the system by adding features like automated response and the ability to create custom playbooks. This is crucial for an EDR solution, and currently, Trellix lacks this feature while other products offer it."
 

Pricing and Cost Advice

"I bought them for 12 months and I genuinely cannot remember what I paid for them. I think it's about 100 pounds per user per year, so about 10 pounds a month per person."
"In comparison to other software solutions available on the market, it comes at a higher price point."
"We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it."
"The price is good."
"In addition to the standard licensing fees, there is a cost for support."
"We implement this solution with a yearly subscription and there are no extra costs."
"One of the key factors that made us go with this solution was the pricing. On the licensing part, there was an initial complementary set of licenses offered in the initial onboarding package, either 15 or 20. Then, we had some complementary licenses in the initial purchase of the package. That was pretty useful."
"There are three different licensing models including basic, advanced, and complete, and it needs to be selected according to the endpoint."
"No comment."
"The tool is affordable"
"It is not that expensive. There is no additional cost. We got the entire bundle together."
"I would rate the cost as four to five, considering it's normal compared to other products. I find it nominal and worth the money."
"It is reasonably priced."
"The price of McAfee is pretty similar to Symantec, and there are no costs in addition to the standard licensing fees."
"Its price is reasonable, but it could be made free."
"There are some extra expenses for using the product, in addition to licensing related to the maintenance of the product."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
838,713 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Government
8%
Manufacturing Company
8%
Financial Services Firm
7%
Educational Organization
44%
Government
9%
Computer Software Company
7%
Financial Services Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability. It is suitable for enterprises but can be challenging to position for small to medium customers.
What needs improvement with Check Point Harmony Endpoint?
Support needs improvement. Currently, support is primarily via email, which leads to longer response times. Fine-tuning for applications and better support from Harmony would be helpful, especially...
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deploy various components as desired with McAfee Endpoint Security, whereas many othe...
What do you like most about McAfee Endpoint Security?
It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts.
What is your experience regarding pricing and costs for McAfee Endpoint Security?
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
inHouseIT, Seagate Technology
Find out what your peers are saying about Check Point Harmony Endpoint vs. Trellix Endpoint Security and other solutions. Updated: January 2025.
838,713 professionals have used our research since 2012.