Check Point Endpoint Security Logo
Check Point Endpoint Security Logo
Check Point

Check Point Endpoint Security

7.9 /10
Category
Check Point Endpoint Security
7.9 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

88 Likeliness to Recommend

94 Plan to Renew

94 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

+91 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

3% Negative
4% Neutral
93% Positive

Pros

  • Acts with Integrity
  • Helps Innovate
  • Enables Productivity
  • Fair

Feature Ratings

Average 81

Vendor Capability Ratings

Average 83

Check Point Endpoint Security Reviews

Zarah H.

  • Role: Finance
  • Industry: Transportation
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted May 2022

Best Endpoint Protection Software

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

It's not only and endpoint security software but also comes with network security features, advanced threat protection and data security. It's very effective

What is your favorite aspect of this product?

I have used Check Point Endpoint Security and it's very resourceful. I like the network and data security features It's easy to setup There are always updates

What do you dislike most about this product?

I have no dislikes because Check Point Endpoint Security has been very helpful

What recommendations would you give to someone considering this product?

Check Point Endpoint Security is one software I would recommend with no doubts as it has worked well

Pros

  • Acts with Integrity
  • Helps Innovate
  • Continually Improving Product
  • Reliable

Nathaniel K.

  • Role: Industry Specific Role
  • Industry: Transportation
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted May 2022

Best Endpoint Protection Software

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

Check Point Endpoint Security is a great solution for business as it offers best data and network security features.

What is your favorite aspect of this product?

I like that Check Point Endpoint Security offers best data security features. We no longer worry about our network security thanks to it's features. I like this software is accurate and effective despite being affordable

What do you dislike most about this product?

No issues with Check Point Endpoint Security.

What recommendations would you give to someone considering this product?

We have enjoyed the best endpoint protection features and for this reason, I recommend the software to other businesses

Pros

  • Continually Improving Product
  • Reliable
  • Trustworthy
  • Saves Time

Manuel H.

  • Role: Sales Marketing
  • Industry: Entertainment
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Apr 2022

The report is simple to read.

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

The setup screen may also be presented in other languajes, and the settings are simple to grasp. So that it is simple to comprehend, various information is supplied weekly or monthly, such as illegal access, infected devices, and which programs utilize a lot of bandwidth. Infected and hacked devices are also identified by their IP addresses, which might alert you even if nothing happens, and it is simple to warn you to be cautious about security.

What is your favorite aspect of this product?

Simple to configure, and even when configured by default, enough security is ensured. You may quickly configure settings to meet your organization's security policy. I believe these things were unnoticed since I did not implement CheckPoint. I believe that internalizing the report's contents will raise security awareness throughout the organization. According to the logs and reports, there appear to be a number of external attacks. Because the applications you are using are also appearing in the report, we are making efforts to prevent the usage of programs that are judged harmful or unrelated to work.

What do you dislike most about this product?

I don't always get the report. You can check by login into the administration panel, so no worries there, but if you don't get it, you may be concerned about what occurred.

What recommendations would you give to someone considering this product?

If you use the Internet, I believe UTM is a requirement. It appears that it is still not as well known as other UTMs, but it is highly regarded in the industry, and I read that Check Point invented the UTM mechanism. It is also suggested since the setup is simple to grasp and use it. Even when an employee searches with a browser and attempts to reach the home page, harmful sites are banned, thus it is extremely valuable as an administrator to avoid virus infection in advance.

Pros

  • Continually Improving Product
  • Reliable
  • Enables Productivity
  • Trustworthy

Most Popular Check Point Endpoint Security Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare