Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs OpenText Core Endpoint Protection​ comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 23, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Protection Platform (EPP)
4th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
205
Ranking in other categories
Anti-Malware Tools (3rd), Endpoint Detection and Response (EDR) (6th)
OpenText Core Endpoint Prot...
Ranking in Endpoint Protection Platform (EPP)
50th
Average Rating
7.8
Reviews Sentiment
5.8
Number of Reviews
31
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2026, in the Endpoint Protection Platform (EPP) category, the mindshare of Check Point Harmony Endpoint is 2.2%, down from 2.7% compared to the previous year. The mindshare of OpenText Core Endpoint Protection​ is 1.2%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
Check Point Harmony Endpoint2.2%
OpenText Core Endpoint Protection​1.2%
Other96.6%
Endpoint Protection Platform (EPP)
 

Featured Reviews

GR
Support at a security firm with 51-200 employees
Remote Access Security Reinforced with Real-Time Device Protection
Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility. It would be helpful to tailor views for different roles, such as IT or security support. Regarding needed improvements, custom report building could be enhanced. Current reports are informative, and a drag-and-drop builder would allow teams to create tailored views for compliance, executive summaries, or operational metrics. For further improvements, enhancing threat simulation and testing would be valuable. Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
reviewer2584380 - PeerSpot reviewer
vCIO At Grove Networks Inc. at a computer software company with 11-50 employees
Improving threat detection is critical for enhanced protection
We use Webroot Business Endpoint Protection as a NextGen antivirus solution for our clients. It's included in the contract we have with our clients as a cost-effective option for antivirus protection Webroot Business Endpoint Protection is cost-effective for rolling it out to all of our clients,…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is a great, cost-effective, and stable security solution to opt for."
"Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard."
"Check Point Harmony Endpoint has significantly strengthened the defense against malware, ransomware, phishing, and zero-day threats, and the unified agent ensures consistent protection across all endpoints."
"There's the possibility of being able to do the administration from the Check Point portal, maintaining control and visibility of the different security events at all times."
"Since deploying Check Point Harmony Endpoint, I have seen a clear reduction in security incidents, such as phishing and malware infections."
"Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved."
"The application runs very fast and does not affect the performance speed of the device where it is installed."
"The centralized management and AI protection of Check Point Harmony Endpoint help us to easily deploy all the endpoints, new endpoints, centrally monitor them, policy enforcement, and everything."
"Low performance requirements."
"The initial setup was straightforward. It took five minutes. I installed the solution myself."
"I haven't observed any of the instabilities in the solution. It is a stable solution."
"Its ease of installation is valuable. It has been a low-resource tool and the continuous updates in the past have made it attractive from the standpoint of the trust level on the protection."
"Doesn't consume resources or affect the computer performance at all."
"It is excellent endpoint protection for mobiles that does everything it says it will."
"They have a lot of features integrated from way back, which shows that the product developers know exactly what they're doing."
"I rate the initial setup phase a ten on a scale of one to ten, where one is difficult, and ten is easy."
 

Cons

"Check Point Harmony Endpoint can be improved if it were less resource-intensive because not all of our end-users have laptops with high resources available, such as 16 GB of RAM."
"I see a need for improvement especially in policy management and policy customization with Check Point Harmony Endpoint."
"Technical support can be a bit slow at times."
"As of now, product-wise, we haven't found any major concern that needs to improve, although it does not support full MDM and this is something that should be there."
"It needs more documentation and better ease of deployment. For documentation, it needs more information about integrating the endpoints on SandBlast Agent mobile as well as on desktop platforms."
"I'm not very happy with the support, even in terms of the website. They don't offer much."
"The software requires considerable resources and can strain less powerful computers."
"I would like to be able to see this integration of device analysis and verification - not just in native-integrated solutions - for Linux and iOS mobile devices, which are today a part of the larger group of devices and solutions that we have available."
"We need to know more details about how the virus interacted with the computer."
"Their customer support should be better. We started having some issues with it, and we didn't get the required support."
"The console spins up relatively slowly, and some of the configuration items are obscure (e.g., reporting back one time per day is a default setting) and need to be tweaked."
"We need to have a stronger defense against CryptoLock and other attackers."
"The reporting is the weakest part of the Webroot console. Frequently, I export to Excel to massage something into it to pass on to others."
"Webroot Business Endpoint Protection needs to focus on how they can widen their area of scope by not just being an antivirus tool anymore. The shortcoming in the customization area of the tool needs improvement."
"The only complaint I have with Webroot is its inability to prevent UoD phishing and its inability to check against bots or block anti-attacks. Plus the URL server is in zero-definition."
"Unified threat management (UTM) integration."
 

Pricing and Cost Advice

"The product is averagely priced. The product price is neither very high nor too low. The tool is not really expensive."
"Initial monies replacing all AVs with a single product is about £10k."
"The licensing cost for Check Point is $3 USD or $4 USD per end-user."
"I rate the product price a four on a scale of one to ten, where one is low, and ten is high."
"I rate the solution's pricing a five out of ten. It costs around ₱2,200 per endpoint."
"Check Point Antivirus is the most economical solution."
"In terms of licensing, have a buffer zone around your projects in terms of the amount of endpoints that you want to have. You can always have more, but it is best to leave room for a little increase or growth."
"We pay roughly 80,000 Swedish krona per year. When it comes to the firewall, it's roughly 150,000 Swedish krona yearly. There's also maintenance, of course, which is roughly 10,000 krona per month."
"The solution is very cost-effective."
"I think the price is fairly reasonable. I was really prepared to pay more, but the price is fine."
"We evaluate other options using multiple choices, best value, management and functionality."
"I can't recall the exact pricing, but I believe there is a monthly fee of $20-30 per user."
"The solution doesn't cost too much. It's about 30 Euros a year for each endpoint. It's pretty affordable for us and for many other companies."
"Our strategy was to overestimate the complexity and cost. It turned out that Webroot's assurance was justified."
"Its cost is not much per month. Our price is a couple of bucks a user."
"Webroot is less expensive than SentinelOne."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
882,103 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Manufacturing Company
9%
Outsourcing Company
7%
Comms Service Provider
6%
Computer Software Company
9%
Performing Arts
8%
Manufacturing Company
8%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business133
Midsize Enterprise70
Large Enterprise75
By reviewers
Company SizeCount
Small Business35
Midsize Enterprise2
Large Enterprise2
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Harmony Endpoint offered competitive pricing for small user counts such as thirty-f...
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint works well overall, but one area I would like to see improved is the reporting and dashboard experience. Sometimes the alerts are clear, but digging into historical dat...
What is your experience regarding pricing and costs for Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection is probably on the cheaper side, so I would rate their pricing a one or a two out of ten.
What needs improvement with Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection needs to improve its ability to detect threats. It does not do what it's advertised to do. Real-time threat detection also doesn't work as it should.
What is your primary use case for Webroot Business Endpoint Protection?
We use Webroot Business Endpoint Protection as a NextGen antivirus solution for our clients. It's included in the contract we have with our clients as a cost-effective option for antivirus protection.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent, Check Point Antivirus
Webroot SecureAnywhere Business Endpoint Protection
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Mytech Partners
Find out what your peers are saying about Check Point Harmony Endpoint vs. OpenText Core Endpoint Protection​ and other solutions. Updated: February 2026.
882,103 professionals have used our research since 2012.