What is Check Point Endpoint Security?
Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCheck Point Endpoint Security Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on Check Point Endpoint Security.
87 Likeliness to Recommend
94 Plan to Renew
1
Since last award
93 Satisfaction of Cost Relative to Value
Emotional Footprint Overview
+91 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love Check Point Endpoint Security?
Pros
- Acts with Integrity
- Fair
- Enables Productivity
- Helps Innovate
Emotional Footprint
How to Read
Positive
Neutral
Negative
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Feature Ratings
Kernel Monitoring
Endpoint Detection and Response
Centralized Management Portal
Host NGFW Functionality
Mac OS support
System Hardening
Forensics
Dynamic Malware Detection
Port and Device Control
Cross Platform Integration
Ransomware Recovery and Removal
Vendor Capability Ratings
Business Value Created
Quality of Features
Vendor Support
Product Strategy and Rate of Improvement
Ease of IT Administration
Ease of Customization
Usability and Intuitiveness
Ease of Implementation
Ease of Data Integration
Breadth of Features
Availability and Quality of Training
Also Featured in...
Check Point Endpoint Security Reviews
Nathaniel K.
- Role: Industry Specific Role
- Industry: Transportation
- Involvement: End User of Application
Submitted May 2022
Best Endpoint Protection Software
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
Check Point Endpoint Security is a great solution for business as it offers best data and network security features.
What is your favorite aspect of this product?
I like that Check Point Endpoint Security offers best data security features. We no longer worry about our network security thanks to it's features. I like this software is accurate and effective despite being affordable
What do you dislike most about this product?
No issues with Check Point Endpoint Security.
What recommendations would you give to someone considering this product?
We have enjoyed the best endpoint protection features and for this reason, I recommend the software to other businesses
Pros
- Continually Improving Product
- Reliable
- Trustworthy
- Saves Time
Manuel H.
- Role: Sales Marketing
- Industry: Entertainment
- Involvement: Business Leader or Manager
Submitted Apr 2022
The report is simple to read.
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
The setup screen may also be presented in other languajes, and the settings are simple to grasp. So that it is simple to comprehend, various information is supplied weekly or monthly, such as illegal access, infected devices, and which programs utilize a lot of bandwidth. Infected and hacked devices are also identified by their IP addresses, which might alert you even if nothing happens, and it is simple to warn you to be cautious about security.
What is your favorite aspect of this product?
Simple to configure, and even when configured by default, enough security is ensured. You may quickly configure settings to meet your organization's security policy. I believe these things were unnoticed since I did not implement CheckPoint. I believe that internalizing the report's contents will raise security awareness throughout the organization. According to the logs and reports, there appear to be a number of external attacks. Because the applications you are using are also appearing in the report, we are making efforts to prevent the usage of programs that are judged harmful or unrelated to work.
What do you dislike most about this product?
I don't always get the report. You can check by login into the administration panel, so no worries there, but if you don't get it, you may be concerned about what occurred.
What recommendations would you give to someone considering this product?
If you use the Internet, I believe UTM is a requirement. It appears that it is still not as well known as other UTMs, but it is highly regarded in the industry, and I read that Check Point invented the UTM mechanism. It is also suggested since the setup is simple to grasp and use it. Even when an employee searches with a browser and attempts to reach the home page, harmful sites are banned, thus it is extremely valuable as an administrator to avoid virus infection in advance.
Pros
- Continually Improving Product
- Reliable
- Enables Productivity
- Trustworthy
Alexa N.
- Role: Industry Specific Role
- Industry: Other
- Involvement: End User of Application
Submitted Apr 2022
Full integrated solution
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
Check point Endpoint Security help us to achieve the desired goals with their supportive team and management. It has great capabilities to prevent our system from threats. They are always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. It protects our data at various geographies along with the endpoints that we set up on the cloud. There is dedicated and prevention enhancement for our system to ensure full protection.
What is your favorite aspect of this product?
Check point Endpoint Security provides solutions for our problems based on our requirements. Also, there is low resource usage which prevent the system from collapsing and lagging. They allow us for a one-time login from end users working remotely away from their desks.
What do you dislike most about this product?
Check point Endpoint Security. The complexity for one-time logins are rather lengthy and it takes around five minutes to go through all of the authentication required. This could be improved so we can easily use it.
What recommendations would you give to someone considering this product?
I would recommend Check point Endpoint Security because it is highly accurate for IPS engine and is best in Class Logs Monitoring and report generating Firewall.
Pros
- Performance Enhancing
- Effective Service
- Saves Time
- Client Friendly Policies