Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs Webroot Business Endpoint Protection comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Protection Platform (EPP)
8th
Average Rating
8.8
Reviews Sentiment
8.0
Number of Reviews
112
Ranking in other categories
Endpoint Detection and Response (EDR) (9th)
Webroot Business Endpoint P...
Ranking in Endpoint Protection Platform (EPP)
42nd
Average Rating
7.8
Reviews Sentiment
5.8
Number of Reviews
31
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of April 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Check Point Harmony Endpoint is 2.5%, down from 2.7% compared to the previous year. The mindshare of Webroot Business Endpoint Protection is 0.7%, down from 0.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Alejandro Flores. - PeerSpot reviewer
Good visibility with cloud centralized management and several layers of security
There are some "weak points" that have to be mentioned, including: 1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents. 2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions. 3) You need a mature security team to manage this solution in order to get the most value from it.
Rick Cassel - PeerSpot reviewer
Lightweight and not hard to set up however, does not offer good reporting
We've had a couple of events both this year and last year where it just didn't seem to catch ransomware, which is impossible to do if someone has hands-on with the system. There were some things that they had or used to have or don't have that I still haven't figured out called journaling. And it was supposed to be a way to roll back changes that were made. However, they're telling me they don't have that. That's not in the system. It’s my understanding that it doesn’t actually scan any files at all. They just look at their database of files they've scanned previously, and either it matches or doesn't. That might be where the shortcoming is, is that it just can't stay up-to-date fast enough to stop new things that are coming in. It's an after-the-fact anti-virus. It doesn't do anything proactive. The virus has to hit the machine before it detects it. There is one thing that is deplorable with the product that I would change as soon as I found a better one. However, the reports are worthless. You go and look at a scan report and cannot get a log of machines. I can log into a console and see the files were scanned every day at 2:00 AM, and they all passed green or something was detected and removed. However, you have to go to the console. I don't have anything that I can send to my client on reports. What they give you is a bunch of bar graphs with no details. You can't drill down. It'll say two infections. However, it doesn't tell you what machines. You've just really got several different reports, and they're all just a bunch of graphs and wasted paper. There's nothing really substantial. The reports that I can use for client-facing, once a month, to say, "Here, we scanned all these workstations. Here are our results," don’t exist. They've got fake reports. I've screamed about that for years, and they just won't do anything. Therefore, I created my own little up-to-date or not ask fail-type report. I send that to them in place of a report directly from a product.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Information is easily managed and protected (which is particularly useful in lost or stolen endpoints)."
"The insight and visibility of the detection is good."
"I have found the Zero phishing and IPS features the most useful in Check Point Harmony Endpoint. Additionally, threat emulation sandboxing is effective."
"The most valuable feature is the integration with CheckPoint's firewalls. You can have one port, and follow the logs from both Endpoint and firewall security."
"It monitors data flow across the networking system to enhance comprehensive workflow infrastructure."
"The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists."
"Resource overheads have been reduced and we are overall more secure as a business."
"It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution."
"The traffic security monitoring, traffic application access feature called the agent, the main feature which is the endpoint security feature are the ones I found valuable. And it also had the in branch security in kind of SD WAN, good three hundred and sixty protection. It is specific and there is ease of deployment also present."
"It is excellent endpoint protection for mobiles that does everything it says it will."
"Probably, compared to other antivirus programs, what we like about it is it is lightweight."
"The main reason we had Webroot is that it was cost-effective for our clients."
"The solution has many features. It is very easy to define and set the policies based on the user groups, it does not take up a lot of resources in operation, and has provided us with a good track record of protection."
"The most valuable features of the solution include the endpoint navigation protection, the protection related to the EMS service, as well as the control and the cloud integration capabilities."
"The feature we found most valuable is the AI functionality for maintaining endpoint security. This is very powerful."
"It is an easy-to-use and easy-to-configure product."
 

Cons

"Some of the less tech-savvy users sometimes find it difficult in adjusting and learning how to use the platform."
"The network monitoring features must be improved."
"SandBlast Agent had moments in which it had a high load, we escalated it to the CheckPoint support that helped us to stabilize it. We had a problem with the parameterization of the solution. Once corrected by following the CheckPoint instructions, everything worked normally again."
"Check Point Harmony Endpoint's GUI is old. It needs to have a modern dashboard for logging activities. Compared to other products, the solution is slow in terms of deep scanning."
"The services of EDR consumption should be reduced and the support needs to be improved."
"Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle."
"Support's service and the response times can be improved. The triaging of the tickets takes a long time and the tickets are only resolved with escalations."
"Check Point users a pattern-based security module, which is something that can be improved."
"We need to have a stronger defense against CryptoLock and other attackers."
"Webroot is very reactionary. It waits until the threat is active within memory to try and detect it. They need better pre-execution detection and prevention."
"We need more control over when upgrades to the app are rolled out."
"It doesn't do anything proactive. The virus has to hit the machine before it detects it."
"They should provide more information on the type of cyber attacks."
"It would be great if there was a feature which would allow you to scan an individual file on an endpoint user's computer."
"The console spins up relatively slowly, and some of the configuration items are obscure (e.g., reporting back one time per day is a default setting) and need to be tweaked."
"It needs to improve the problems with the faster connection, and have a huge reduction in false positives."
 

Pricing and Cost Advice

"Check Point Harmony Endpoint is cost effective."
"The price is good."
"Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years."
"We implement this solution with a yearly subscription and there are no extra costs."
"Price-wise, the product is affordable. There are no additional costs apart from the licensing charges that are attached to the product."
"The price of Check Point Harmony Endpoint is comparable to SonicWall. The price could be a bit lower."
"In addition to the standard licensing fees, there is a cost for support."
"We pay roughly 80,000 Swedish krona per year. When it comes to the firewall, it's roughly 150,000 Swedish krona yearly. There's also maintenance, of course, which is roughly 10,000 krona per month."
"Webroot is less expensive than SentinelOne."
"If you purchase for clients, then you are the managing billing entity. It's better to either get a monthly subscription check from your clients, or to prepay for the year (so as to not keep cash in reserve to pay the bill each month) IMHO."
"The solution doesn't cost too much. It's about 30 Euros a year for each endpoint. It's pretty affordable for us and for many other companies."
"I can't recall the exact pricing, but I believe there is a monthly fee of $20-30 per user."
"The pricing is high."
"It is relatively cheap."
"Our strategy was to overestimate the complexity and cost. It turned out that Webroot's assurance was justified."
"Its cost is not much per month. Our price is a couple of bucks a user."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
842,767 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Manufacturing Company
8%
Financial Services Firm
8%
Government
7%
Computer Software Company
19%
Real Estate/Law Firm
13%
Comms Service Provider
7%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
The price for Check Point Harmony Endpoint ( /products/check-point-harmony-endpoint-reviews ) is good considering the services it offers. It is not expensive and provides comprehensive coverage.
What needs improvement with Check Point Harmony Endpoint?
One area that requires improvement is the amount of audit logs the system can save, as it is currently limited to fourteen days.
What do you like most about Webroot Business Endpoint Protection?
I haven't observed any of the instabilities in the solution. It is a stable solution.
What is your experience regarding pricing and costs for Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection is probably on the cheaper side, so I would rate their pricing a one or a two out of ten.
What needs improvement with Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection needs to improve its ability to detect threats. It does not do what it's advertised to do. Real-time threat detection also doesn't work as it should.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
Webroot SecureAnywhere Business Endpoint Protection
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Mytech Partners
Find out what your peers are saying about Check Point Harmony Endpoint vs. Webroot Business Endpoint Protection and other solutions. Updated: March 2025.
842,767 professionals have used our research since 2012.