Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Endpoint vs OpenText Core Endpoint Protection​ comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 23, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Endpoint
Ranking in Endpoint Protection Platform (EPP)
4th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
205
Ranking in other categories
Anti-Malware Tools (3rd), Endpoint Detection and Response (EDR) (6th)
OpenText Core Endpoint Prot...
Ranking in Endpoint Protection Platform (EPP)
50th
Average Rating
7.8
Reviews Sentiment
5.8
Number of Reviews
31
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2026, in the Endpoint Protection Platform (EPP) category, the mindshare of Check Point Harmony Endpoint is 2.2%, down from 2.7% compared to the previous year. The mindshare of OpenText Core Endpoint Protection​ is 1.2%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
Check Point Harmony Endpoint2.2%
OpenText Core Endpoint Protection​1.2%
Other96.6%
Endpoint Protection Platform (EPP)
 

Featured Reviews

GR
Support at a security firm with 51-200 employees
Remote Access Security Reinforced with Real-Time Device Protection
Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility. It would be helpful to tailor views for different roles, such as IT or security support. Regarding needed improvements, custom report building could be enhanced. Current reports are informative, and a drag-and-drop builder would allow teams to create tailored views for compliance, executive summaries, or operational metrics. For further improvements, enhancing threat simulation and testing would be valuable. Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.
reviewer2584380 - PeerSpot reviewer
vCIO At Grove Networks Inc. at a computer software company with 11-50 employees
Improving threat detection is critical for enhanced protection
We use Webroot Business Endpoint Protection as a NextGen antivirus solution for our clients. It's included in the contract we have with our clients as a cost-effective option for antivirus protection Webroot Business Endpoint Protection is cost-effective for rolling it out to all of our clients,…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Its ability to rollback anti-ransomware once an attack has started is the most valuable feature."
"The application runs very fast and does not affect the performance speed of the device where it is installed."
"The best feature of Check Point Harmony Endpoint is the advanced threat detection, which provides 100% detection and shows strong performance against sophisticated attack techniques."
"Regular email alerts are beneficial."
"The standout features are primarily EDR and MDR."
"The feature that we find most valuable is the easy way of configuring it via the SmartConsole on Check Point. The configuration is very straightforward and although it has some impact on the firewall CPU and memory, it doesn't impact the IPS, for example. It allows for the scanning of downloaded files from the internet. Scanning files that our users have downloaded to check if they have any virus is the most important thing."
"They have a great knowledge base that you can leverage as a user."
"The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature."
"The solution is very simple and straightforward to use."
"The Webroot cloud console is very powerful."
"The main reason we had Webroot is that it was cost-effective for our clients."
"The initial setup was straightforward. It took five minutes. I installed the solution myself."
"There aren't any features that really stand out — I just want it to keep malware out of my system. To date, I haven't had any malware in my system."
"The most valuable features of the solution include the endpoint navigation protection, the protection related to the EMS service, as well as the control and the cloud integration capabilities."
"I rate the initial setup phase a ten on a scale of one to ten, where one is difficult, and ten is easy."
"The initial setup is not complex at all. It's very straightforward."
 

Cons

"There is room for improvement in detecting more sophisticated and emerging threats."
"The software requires considerable resources and can strain less powerful computers."
"We'd like to see better integration with other security tools."
"The only drawback is the integration process."
"It would be useful if you could also mark blocks as safe from a client. Now users always have to ask an admin to make exclusions."
"If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents."
"Customization of UI should be a little better in terms of application UI and messages that are displayed when something is blocked or non-compliant."
"I still don't have a clear opinion of the possible improvements that the tool may need. There are still functionalities that I have not been able to try completely and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
"An updated UI would be nice, but is not hardly used."
"Technical support is not the best. It's hard to get a hold of them if we need help. It's something that definitely needs improvement."
"Webroot Business Endpoint Protection needs to focus on how they can widen their area of scope by not just being an antivirus tool anymore. The shortcoming in the customization area of the tool needs improvement."
"Webroot is very reactionary. It waits until the threat is active within memory to try and detect it. They need better pre-execution detection and prevention."
"Since they're dealing with multi-core environments now, the best option would be for them to enhance the product so that the product can automatically do an assessment on the machine."
"Reporting system could be improved."
"We need to have a stronger defense against CryptoLock and other attackers."
"They should provide more information on the type of cyber attacks."
 

Pricing and Cost Advice

"The price of Check Point Harmony Endpoint is comparable to SonicWall. The price could be a bit lower."
"There are three different licensing models including basic, advanced, and complete, and it needs to be selected according to the endpoint."
"Check Point Antivirus is a good solution, but it's a little costly."
"I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high."
"Price-wise, the product is affordable. There are no additional costs apart from the licensing charges that are attached to the product."
"Licensing comes free in that first year or is included in the base package. From a commercial point of view, it really just is the renewal cost, rather than a one-time fixed cost or buy-in."
"The cost is huge compared to other products that are available on market."
"Check Point Harmony Endpoint is cost effective."
"Webroot Business Endpoint Protection is not too expensive. My licenses cost me between $300 and $400. It is really good price wise."
"The solution doesn't cost too much. It's about 30 Euros a year for each endpoint. It's pretty affordable for us and for many other companies."
"The solution is pretty cheap, actually. At our level, which is at 2,500 endpoints, we're paying 87 cents an agent per month."
"Our strategy was to overestimate the complexity and cost. It turned out that Webroot's assurance was justified."
"It is relatively cheap."
"Get a trial, then a multi-year license."
"The pricing is high."
"Webroot is less expensive than SentinelOne."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
881,515 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Manufacturing Company
9%
Outsourcing Company
7%
Comms Service Provider
6%
Computer Software Company
10%
Performing Arts
8%
Manufacturing Company
8%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business133
Midsize Enterprise70
Large Enterprise75
By reviewers
Company SizeCount
Small Business35
Midsize Enterprise2
Large Enterprise2
 

Questions from the Community

What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client.
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Harmony Endpoint offered competitive pricing for small user counts such as thirty-f...
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint works well overall, but one area I would like to see improved is the reporting and dashboard experience. Sometimes the alerts are clear, but digging into historical dat...
What is your experience regarding pricing and costs for Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection is probably on the cheaper side, so I would rate their pricing a one or a two out of ten.
What needs improvement with Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection needs to improve its ability to detect threats. It does not do what it's advertised to do. Real-time threat detection also doesn't work as it should.
What is your primary use case for Webroot Business Endpoint Protection?
We use Webroot Business Endpoint Protection as a NextGen antivirus solution for our clients. It's included in the contract we have with our clients as a cost-effective option for antivirus protection.
 

Also Known As

Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent, Check Point Antivirus
Webroot SecureAnywhere Business Endpoint Protection
 

Overview

 

Sample Customers

Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Mytech Partners
Find out what your peers are saying about Check Point Harmony Endpoint vs. OpenText Core Endpoint Protection​ and other solutions. Updated: December 2025.
881,515 professionals have used our research since 2012.