Check Point Endpoint Security Logo Award Winner Product Badge
Check Point Endpoint Security Logo Award Winner Product Badge
Check Point

Check Point Endpoint Security

Composite Score
8.9 /10
CX Score
9.3 /10
Category
Check Point Endpoint Security
8.9 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Filter By

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

90 Likeliness to Recommend

99 Plan to Renew

1
Since last award

87 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+96 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

1% Negative
1% Neutral
98% Positive

Pros

  • Enables Productivity
  • Fair
  • Reliable
  • Trustworthy

Feature Ratings

Average 81

Endpoint Detection and Response

87

Centralized Management Portal

85

Dynamic Malware Detection

84

Port and Device Control

84

Host NGFW Functionality

82

Ransomware Recovery and Removal

82

Kernel Monitoring

81

Automated Remediation

80

Application Containment Mechanisms

80

System Hardening

79

Mac OS support

77

Vendor Capability Ratings

Average 81

Quality of Features

85

Business Value Created

84

Ease of IT Administration

83

Ease of Implementation

82

Breadth of Features

80

Ease of Data Integration

80

Usability and Intuitiveness

79

Product Strategy and Rate of Improvement

79

Vendor Support

79

Ease of Customization

79

Availability and Quality of Training

76

Check Point Endpoint Security Reviews

Aniruddha G.

  • Role: Information Technology
  • Industry: Finance
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Dec 2025

Solid Enterprise Protection with Seamless

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

What really sets Check Point apart in my experience is the ecosystem integration, especially if you're already running Check Point network security products. The unified threat intelligence sharing between your perimeter defenses and endpoints creates this cohesive security posture that's hard to match with mixed vendor environments. When a threat is detected at the network level, that intelligence immediately flows to all your endpoints, and vice versa. This kind of real-time coordination means you're not dealing with siloed security tools that don't talk to each other.

What is your favorite aspect of this product?

My favorite aspect is definitely the centralized management console and how it integrates with our broader Check Point security infrastructure. Being able to see everything from network threats to endpoint activity in one unified view has transformed how our security team operates. We're not constantly switching between different dashboards or trying to piece together incidents from multiple sources anymore. The threat intelligence sharing is particularly impressive because when something malicious is detected anywhere in our environment, that knowledge immediately protects all our other assets. It's made our incident response times.

What do you dislike most about this product?

What frustrates me most is the user interface, which honestly feels outdated compared to more modern security platforms. Navigation can be unintuitive, and finding specific settings often requires clicking through multiple menus that aren't always logically organized. The dashboard customization options are limited, so you're kind of stuck with their default layout even if it doesn't match your workflow. Updates and patches also tend to be more disruptive than I'd like, sometimes requiring more hands-on management than should be necessary in today's world of automated deployments.

What recommendations would you give to someone considering this product?

If you're evaluating Check Point Endpoint Security, my biggest recommendation is to seriously assess whether you're already invested in the Check Point ecosystem or planning to be. This product really shines when it's part of a larger Check Point deployment because that's where you get the integration benefits and unified threat intelligence that justify the investment. If you're running a mixed vendor environment, you might not see the same value proposition. Also, budget time for proper training because the learning curve is real, especially for administrators who'll be managing policies and responding to threats. Don't expect to just plug

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Evans V.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Mar 2025

Powerful, Unified Defense for Modern Threats

Likeliness to Recommend

10 /10

What differentiates Check Point Endpoint Security from other similar products?

Check Point's Endpoint Security is tightly integrated with its broader security management platform, which allows for centralized visibility, control, and management across all security layers. This enables businesses to manage their endpoint, network, and mobile security from a single console, improving efficiency and reducing operational overhead.

What is your favorite aspect of this product?

If I had to pick a favorite aspect of Check Point Endpoint Security, it would probably be the integration with Check Point's broader security ecosystem. The fact that it works seamlessly with Check Point’s firewall, mobile security, and cloud solutions provides an extra layer of protection and simplifies management for organizations.

What do you dislike most about this product?

There is no dislike as such

What recommendations would you give to someone considering this product?

Consider the size of your organization and the complexity of your security needs. If you're managing a large or diverse environment (with endpoints across various networks, devices, and locations), Check Point’s integrated and scalable platform will likely be a good fit due to its centralized management and broad coverage.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Priyanka J.

  • Role: Human Resources
  • Industry: Not for Profit
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Mar 2025

AI Driven Protection for Complex Environment

Likeliness to Recommend

10 /10

What differentiates Check Point Endpoint Security from other similar products?

1) Unified Security Architecture. 2) Threat Prevention and AI Driven Protection 3) Comprehensive Threat Intelligence

What is your favorite aspect of this product?

Favourite aspect about the product is its integration with threat cloud. This gives the product a significant edge as it continuously updates in real time with the latest data on emerging threats.

What do you dislike most about this product?

High Cost

What recommendations would you give to someone considering this product?

Highly recommend for organization looking for a robust, integrated solution that combines threat intelligence, prevention and centralized management.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Most Popular Check Point Endpoint Security Comparisons