What is Check Point Endpoint Security?
Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCheck Point Endpoint Security Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on Check Point Endpoint Security.
87 Likeliness to Recommend
94 Plan to Renew
93 Satisfaction of Cost Relative to Value
Emotional Footprint Overview
+91 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love Check Point Endpoint Security?
Pros
- Acts with Integrity
- Fair
- Enables Productivity
- Helps Innovate
Emotional Footprint
How to Read
Positive
Neutral
Negative
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Feature Ratings
Vendor Capability Ratings
Also Featured in...
Check Point Endpoint Security Reviews
- Role: Information Technology
- Industry: Technology
- Involvement: Business Leader or Manager
Submitted Apr 2021
Good as long as you leverage the entire stack
Likeliness to Recommend
Pros
- Security Protects
- Reliable
- Enables Productivity
- Trustworthy
Cons
- Less Efficient Service
- Inhibits Innovation
- Slower Product Innovation
Don C.
- Role: Information Technology
- Industry: Insurance
- Involvement: End User of Application
Submitted Aug 2020
Excellent facility security with easy access.
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
Great endpoint protection for VPN access and desktop security.
What is your favorite aspect of this product?
VPN configurability and customization.
What do you dislike most about this product?
Nothing at this time.
What recommendations would you give to someone considering this product?
Nothing at this time.
Pros
- Trustworthy
- Effective Service
- Inspires Innovation
- Caring
Niniveth Marybel M.
- Role: Information Technology
- Industry: Technology
- Involvement: End User of Application
Submitted Feb 2020
Endpoint Protection Complete
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
Check Point Endpoint Security tends to be different from other programs because it can be managed through a single console, so managing its service is quite simple, it is software that provides quite extensive security, that is, from data security, network, forensic analysis and even detection of advanced threats including those of zero day, so that the one that covers all this makes it a very complete software for business use, its protection not only protects data in use but also those that are at rest So it is quite functional software with a very versatile design.
What is your favorite aspect of this product?
The feature that I like most about this powerful endpoint protection software is that its console is fully centralized, so managing it is really simple because we can handle all the security of the business environment from one place, also the one that provides extremely useful functions. such as the detection of advanced threats, since all our endpoints are protected no matter what type of threats they face, and their deployment is fast and maintenance is very easy.
What do you dislike most about this product?
It is not possible to perform bandwidth monitoring and this is because it lacks this function, so unfortunately as users we cannot regulate it, in addition to its cost being somewhat high.
What recommendations would you give to someone considering this product?
I recommend its use, since today it is advisable to have software that is capable of providing complete protection to the entire business environment and this program provides quite advanced capabilities that allow the prevention of any threat that may affect the endpoints.
Pros
- Effective Service
- Saves Time
- Acts with Integrity
- Helps Innovate