What is Check Point Endpoint Security?
Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCheck Point Endpoint Security Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on Check Point Endpoint Security.
87 Likeliness to Recommend
94 Plan to Renew
1
Since last award
93 Satisfaction of Cost Relative to Value
Emotional Footprint Overview
+90 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love Check Point Endpoint Security?
Pros
- Acts with Integrity
- Fair
- Enables Productivity
- Helps Innovate
Emotional Footprint
How to Read
Positive
Neutral
Negative
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Feature Ratings
Kernel Monitoring
Endpoint Detection and Response
Centralized Management Portal
Forensics
Host NGFW Functionality
Dynamic Malware Detection
System Hardening
Mac OS support
Ransomware Recovery and Removal
Cross Platform Integration
Automated Remediation
Vendor Capability Ratings
Quality of Features
Availability and Quality of Training
Ease of Data Integration
Ease of Implementation
Ease of IT Administration
Usability and Intuitiveness
Breadth of Features
Ease of Customization
Product Strategy and Rate of Improvement
Vendor Support
Business Value Created
Check Point Endpoint Security Reviews
Anna M.
- Role: Information Technology
- Industry: Transportation
- Involvement: End User of Application
Submitted Nov 2023
Check Point Endpoint Security great tool to use
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
By using an endpoint security tool, we can avoid many problems, which is very important, and here I would like to suggest the vendor Harmony, which is excellent in providing various features and regular updates.
What is your favorite aspect of this product?
Checkpoint Antivirus or Endpoint Protect is great at protecting our environment in many ways. We use sandblast for email security, we use several other blades to help protect our end users, and we use web filtering to block and protect when users go online.
What do you dislike most about this product?
The best features are clearly threat emulation and threat extraction, they secure file downloads very quickly. Anti-phishing is also very good I have to say, a very complete product.
What recommendations would you give to someone considering this product?
Check Point Endpoint Security is suitable for businesses where confidentiality needs to be maintained to reduce the risk and compromise of customer information.
Pros
- Continually Improving Product
- Performance Enhancing
- Enables Productivity
- Trustworthy
Nirav D.
- Role: Information Technology
- Industry: Engineering
- Involvement: End User of Application
Submitted Mar 2023
Industry Leading Endpoint Security Solution
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
Check Point Endpoint Security provides Secure data at rest, in use and in transit on endpoint devices. Feature which distinguishes from similar product is a purpose-built endpoint security solution that prevents advanced attacks in term providing Zero Day Security.
What is your favorite aspect of this product?
My favourite part of this product is Simple and flexible security administration, centrally managed Single Management Console to analyse and ability to control the network environment.
What do you dislike most about this product?
Check Point Endpoint Security can be improved on Cost effectiveness of the product.
What recommendations would you give to someone considering this product?
I would like to highly recommend this product to industries who are looking to evaluate the Endpoint Security solutions for their organisation. It is highly effective in terms of quarantining the malware and viruses.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
Naveen J.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Development, Integration, and Administration
Submitted Jan 2023
Broad Endpoint Support
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
The Harmony Endpoint provides us with complete deployment options (On-Premise, Cloud) as well as the ability to roll out the software to all of the numerous endpoint types we have. A mobile device launch, such as Android or iOS, is also available.
What is your favorite aspect of this product?
Check Point might be an option in the future. Aside from endpoint assistance, preventative measures were critical for making a choice during the evaluation phase. A Managed Service is not necessary for us because our organization is capable of running the platform itself."
What do you dislike most about this product?
Cloud management console can take some time to deliver rules to endpoints, but it may be more stable.
What recommendations would you give to someone considering this product?
It has perfect internal/operational efficiencies And a perfect compliance & risk management
Pros
- Helps Innovate
- Continually Improving Product
- Unique Features
- Effective Service