Check Point Endpoint Security Logo
Check Point Endpoint Security Logo
Check Point Software Technologies Ltd.

Check Point Endpoint Security

8.1 /10
Category
Check Point Endpoint Security
8.1 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

87 Likeliness to Recommend

94 Plan to Renew

93 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

+91 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

3% Negative
4% Neutral
93% Positive

Pros

  • Acts with Integrity
  • Fair
  • Enables Productivity
  • Helps Innovate

Feature Ratings

Average 81

Vendor Capability Ratings

Average 83

Check Point Endpoint Security Reviews

  • Role: Information Technology
  • Industry: Technology
  • Involvement: Business Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Apr 2021

Good as long as you leverage the entire stack

Likeliness to Recommend

8 /10

Pros

  • Security Protects
  • Reliable
  • Enables Productivity
  • Trustworthy

Cons

  • Less Efficient Service
  • Inhibits Innovation
  • Slower Product Innovation

Don C.

  • Role: Information Technology
  • Industry: Insurance
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Aug 2020

Excellent facility security with easy access.

Likeliness to Recommend

10 /10

What differentiates Check Point Endpoint Security from other similar products?

Great endpoint protection for VPN access and desktop security.

What is your favorite aspect of this product?

VPN configurability and customization.

What do you dislike most about this product?

Nothing at this time.

What recommendations would you give to someone considering this product?

Nothing at this time.

Pros

  • Trustworthy
  • Effective Service
  • Inspires Innovation
  • Caring

Niniveth Marybel M.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Feb 2020

Endpoint Protection Complete

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

Check Point Endpoint Security tends to be different from other programs because it can be managed through a single console, so managing its service is quite simple, it is software that provides quite extensive security, that is, from data security, network, forensic analysis and even detection of advanced threats including those of zero day, so that the one that covers all this makes it a very complete software for business use, its protection not only protects data in use but also those that are at rest So it is quite functional software with a very versatile design.

What is your favorite aspect of this product?

The feature that I like most about this powerful endpoint protection software is that its console is fully centralized, so managing it is really simple because we can handle all the security of the business environment from one place, also the one that provides extremely useful functions. such as the detection of advanced threats, since all our endpoints are protected no matter what type of threats they face, and their deployment is fast and maintenance is very easy.

What do you dislike most about this product?

It is not possible to perform bandwidth monitoring and this is because it lacks this function, so unfortunately as users we cannot regulate it, in addition to its cost being somewhat high.

What recommendations would you give to someone considering this product?

I recommend its use, since today it is advisable to have software that is capable of providing complete protection to the entire business environment and this program provides quite advanced capabilities that allow the prevention of any threat that may affect the endpoints.

Pros

  • Effective Service
  • Saves Time
  • Acts with Integrity
  • Helps Innovate

Most Popular Check Point Endpoint Security Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Logo

    Acronis Cyber Protect

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare