Check Point Endpoint Security Logo
Check Point Endpoint Security Logo
Check Point Software Technologies Ltd.

Check Point Endpoint Security

8.1 /10
Category
Check Point Endpoint Security
8.1 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection category

Filter By

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

87 Likeliness to Recommend

94 Plan to Renew

1
Since last award

93 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

+91 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

3% Negative
4% Neutral
93% Positive

Pros

  • Acts with Integrity
  • Fair
  • Enables Productivity
  • Helps Innovate

Feature Ratings

Average 81

Kernel Monitoring

88

Endpoint Detection and Response

85

Centralized Management Portal

82

Host NGFW Functionality

82

Mac OS support

82

System Hardening

82

Forensics

81

Dynamic Malware Detection

81

Port and Device Control

80

Cross Platform Integration

79

Ransomware Recovery and Removal

79

Vendor Capability Ratings

Average 83

Business Value Created

87

Quality of Features

85

Vendor Support

84

Product Strategy and Rate of Improvement

83

Ease of IT Administration

83

Ease of Customization

83

Usability and Intuitiveness

82

Ease of Implementation

82

Ease of Data Integration

81

Breadth of Features

81

Availability and Quality of Training

81

Check Point Endpoint Security Reviews

Muhammad Abdullah F.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Aug 2022

Great product which is improving a lot

Likeliness to Recommend

8 /10

What differentiates Check Point Endpoint Security from other similar products?

It has a great infinity portal to manage everything.

What is your favorite aspect of this product?

Ease of deployment

What do you dislike most about this product?

Hard to remove it

What recommendations would you give to someone considering this product?

There are better products out there

Pros

  • Helps Innovate
  • Unique Features
  • Effective Service
  • Inspires Innovation

Aggie C.

  • Role: Information Technology
  • Industry: Consulting
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Aug 2022

Why Check Point Endpoint Security Is The Best

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

For endpoint protection, Check Point Endpoint Security offers some of the best features. It's affordable, resourceful, and offers amazing protection features.

What is your favorite aspect of this product?

I have used Check Point Endpoint Security and I like that it's affordable. The software comes with great security features. It quickly scans for threats and blocks them before getting into our systems.

What do you dislike most about this product?

I haven't had problems using Check Point Endpoint Security

What recommendations would you give to someone considering this product?

Since Check Point Endpoint Security, has worked well, I recommend it without any doubt. It the very best I have used.

Pros

  • Helps Innovate
  • Reliable
  • Performance Enhancing
  • Enables Productivity

Reign R.

  • Role: Industry Specific Role
  • Industry: Manufacturing
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Jul 2022

Checkpoint top-notch tool for cybersecurity

Likeliness to Recommend

10 /10

What differentiates Check Point Endpoint Security from other similar products?

While downloading the files, threat emulation and threat extraction help the users a lot. The software offers quick and perfect remedies to the system. It helps in managing reports and generating accurate reports of analytics.

What is your favorite aspect of this product?

The best thing about check point software is that it comes with the sandblast agent to protect the endpoint and other devices. The framework is unique and captivating which not only detects but also investigates, isolates, and improves security concerns.

What do you dislike most about this product?

The checkpoint endpoint tool has some missing features and these features play an important role in supporting the best security functions. So, the tool is also overpriced when it comes to the features and you have to pay extra charges for cloud storage.

What recommendations would you give to someone considering this product?

On the whole, the checkpoint endpoint system is highly recommended to buy and the best part is that the free version is also available. Moreover, the software integrates through various channels and helps in browsing multiple database files which is apt. Another interesting thing about this tool is that you can install, uninstall and set it up this tool with zero hassle.

Pros

  • Performance Enhancing
  • Trustworthy
  • Efficient Service
  • Effective Service

Most Popular Check Point Endpoint Security Comparisons

  • ThreatDown Logo

    ThreatDown

    Compare
  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Kaspersky Endpoint Security for Business Logo

    Kaspersky Endpoint Security for Business

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Microsoft Defender for Endpoint Logo

    Microsoft Defender for Endpoint

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare