Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs Trend Micro Deep Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Endpoint
Average Rating
8.8
Reviews Sentiment
8.0
Number of Reviews
112
Ranking in other categories
Endpoint Protection Platform (EPP) (8th), Endpoint Detection and Response (EDR) (9th)
Trend Micro Deep Security
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
89
Ranking in other categories
Virtualization Security (1st), Cloud and Data Center Security (8th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. Check Point Harmony Endpoint is designed for Endpoint Protection Platform (EPP) and holds a mindshare of 2.5%, down 2.7% compared to last year.
Trend Micro Deep Security, on the other hand, focuses on Virtualization Security, holds 40.4% mindshare, down 44.6% since last year.
Endpoint Protection Platform (EPP)
Virtualization Security
 

Featured Reviews

Alejandro Flores. - PeerSpot reviewer
Good visibility with cloud centralized management and several layers of security
There are some "weak points" that have to be mentioned, including: 1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents. 2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions. 3) You need a mature security team to manage this solution in order to get the most value from it.
Harel Cohen - PeerSpot reviewer
Offers excellent endpoint protection and great stability
Technically speaking, the customer support is okay, but the responsiveness needs to be improved. I'm referring to the universal support, as the Israeli staff are excellent and always willing to help. However, opening a case and entering into a back-and-forth with emails takes too much time. It should be working more quickly and smoothly.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We can map the MITRE attack framework along with the Cyber Kill Chain completely."
"It prevents the most imminent threats to the endpoint such as ransomware, phishing or drive-by malware, while quickly minimizing breach impact with autonomous detection and response."
"The most valuable feature is the Zero-day protection, which covers our on-premises users, and well as those users who are outside of our network."
"The most valuable feature of Check Point Harmony Endpoint is it can be used for all kinds of endpoints, including mobile phones."
"It is very powerful tooling that can be tuned a lot."
"We had a ransomware attack and the SandBlast agent automatically picked up the ransomware."
"Its ability to rollback anti-ransomware once an attack has started is the most valuable feature."
"It provides encryption for operating systems and protects browsers against malware."
"Deep Security enables us to bridge the gap between patching windows using the Virtual Patching feature. This allows us to make sure full patching is tested properly in our testing environments before rollout."
"Technical support is good."
"Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost. Big enterprises don't want to shut down their database or their data center for any kind of patch. Deep Security creates a wall and downloads all patches. You install it on the cloud. So, it saves your server from any kind of intrusion or any kind of penetration, and whenever you get a chance or time, in six, eight, or nine months, you can physically download or install all those patches in one go. So, it saves you time. It also saves your shutdown time and keeps your data center safe."
"Their support is good. They are responsive, which is nice."
"The solution has a low footprint and does not have a lot of impact on the host."
"The integration and configuration of this product in our AWS environment was good. We haven't had any problems at all."
"The initial setup was straightforward."
"It is stable and we have not faced any challenges during the rolled out"
 

Cons

"Some of the less tech-savvy users sometimes find it difficult in adjusting and learning how to use the platform."
"They could be focused on the analysis of USB devices."
"The price of the product could be more friendly."
"Tech Support must be better."
"I would like to see simple sandboxing for malware analysis."
"One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days."
"I still don't have a clear opinion of the possible improvements that the tool may need. There are still functionalities that I have not been able to try completely and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
"We would like to make the documentation for more modern solutions like the Harmony family easier to find."
"New patterns need improvement, as some new data access points are challenging to investigate and allow entry without detection."
"The default reports provided don't provide much insight."
"Trend Micro's technical support sometimes takes too long to respond, although they respond quickly at other times."
"The risk is very complex. We need our tools to be more intelligent, more automated, more detectable."
"What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality."
"We'd like to have more application control."
"Post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring."
"It needs to improve its integration with a lot of other products. This should be in the road map because we have a lot of SaaS-based appliances which are not connected with each other."
 

Pricing and Cost Advice

"In comparison to other software solutions available on the market, it comes at a higher price point."
"Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years."
"One of the key factors that made us go with this solution was the pricing. On the licensing part, there was an initial complementary set of licenses offered in the initial onboarding package, either 15 or 20. Then, we had some complementary licenses in the initial purchase of the package. That was pretty useful."
"Price-wise, the product is affordable. There are no additional costs apart from the licensing charges that are attached to the product."
"Check Point Harmony Endpoint is cost effective."
"The price is good."
"We pay roughly 80,000 Swedish krona per year. When it comes to the firewall, it's roughly 150,000 Swedish krona yearly. There's also maintenance, of course, which is roughly 10,000 krona per month."
"The licensing cost for Check Point is $3 USD or $4 USD per end-user."
"While the pricing was on the higher side, the manageability and comprehensive alerts provided by the product justified the cost."
"The product has a high price in Kuwait."
"Some of our customers complain about the cost of this solution."
"We did not purchase it through the AWS Marketplace because we have used Trend Micro in the past."
"The price is reasonably good as compared to other products into the market."
"We do pay-as-you-go pricing, which is good for us. We are working with Trend Micro's sales rep to see if we can have something similar for on-premise."
"Purchasing on the AWS Marketplace was easy. We decided to purchase this solution on the AWS Marketplace since we were already there."
"The cost is approximately six thousand Qatari Riyal ($1650 USD) per user."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
844,944 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Manufacturing Company
8%
Financial Services Firm
8%
Government
7%
Educational Organization
41%
Computer Software Company
9%
Financial Services Firm
7%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
The price for Check Point Harmony Endpoint ( /products/check-point-harmony-endpoint-reviews ) is good considering the services it offers. It is not expensive and provides comprehensive coverage.
What needs improvement with Check Point Harmony Endpoint?
One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days.
Is Crowdstrike Falcon better than Trend Micro Deep Security?
I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is the intelligence modules feature. I also find that Crowdstrike Falcon’s dashboard...
What's the difference between Trend Micro Deep Security and Trend Micro Apex One?
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and containers - all with a unified and comprehensive SaaS solution and without compromising ...
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
Deep Security
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: March 2025.
844,944 professionals have used our research since 2012.