Check Point Endpoint Security Logo Award Winner Product Badge
Check Point Endpoint Security Logo Award Winner Product Badge
Check Point

Check Point Endpoint Security

Composite Score
8.8 /10
CX Score
9.3 /10
Category
Check Point Endpoint Security
8.8 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Filter By

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

90 Likeliness to Recommend

98 Plan to Renew

86 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+95 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

1% Negative
1% Neutral
98% Positive

Pros

  • Reliable
  • Enables Productivity
  • Fair
  • Friendly Negotiation

Feature Ratings

Average 81

Endpoint Detection and Response

87

Centralized Management Portal

85

Dynamic Malware Detection

84

Port and Device Control

83

Ransomware Recovery and Removal

82

Host NGFW Functionality

82

Kernel Monitoring

82

Automated Remediation

80

Application Containment Mechanisms

80

System Hardening

79

Mac OS support

78

Vendor Capability Ratings

Average 80

Quality of Features

85

Business Value Created

83

Ease of IT Administration

82

Ease of Implementation

82

Breadth of Features

80

Ease of Data Integration

80

Usability and Intuitiveness

79

Product Strategy and Rate of Improvement

79

Vendor Support

79

Ease of Customization

79

Availability and Quality of Training

76

Check Point Endpoint Security Reviews

  • Role: Information Technology
  • Industry: Telecommunications
  • Involvement: End User of Application
Validated Review
Anonymous Reviewer

Submitted Jan 2025

Fantastic Product

Likeliness to Recommend

10 /10

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Anna M.

  • Role: Information Technology
  • Industry: Transportation
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Nov 2023

Check Point Endpoint Security great tool to use

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

By using an endpoint security tool, we can avoid many problems, which is very important, and here I would like to suggest the vendor Harmony, which is excellent in providing various features and regular updates.

What is your favorite aspect of this product?

Checkpoint Antivirus or Endpoint Protect is great at protecting our environment in many ways. We use sandblast for email security, we use several other blades to help protect our end users, and we use web filtering to block and protect when users go online.

What do you dislike most about this product?

The best features are clearly threat emulation and threat extraction, they secure file downloads very quickly. Anti-phishing is also very good I have to say, a very complete product.

What recommendations would you give to someone considering this product?

Check Point Endpoint Security is suitable for businesses where confidentiality needs to be maintained to reduce the risk and compromise of customer information.

Pros

  • Continually Improving Product
  • Performance Enhancing
  • Enables Productivity
  • Trustworthy

Nirav D.

  • Role: Information Technology
  • Industry: Engineering
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Mar 2023

Industry Leading Endpoint Security Solution

Likeliness to Recommend

10 /10

What differentiates Check Point Endpoint Security from other similar products?

Check Point Endpoint Security provides Secure data at rest, in use and in transit on endpoint devices. Feature which distinguishes from similar product is a purpose-built endpoint security solution that prevents advanced attacks in term providing Zero Day Security.

What is your favorite aspect of this product?

My favourite part of this product is Simple and flexible security administration, centrally managed Single Management Console to analyse and ability to control the network environment.

What do you dislike most about this product?

Check Point Endpoint Security can be improved on Cost effectiveness of the product.

What recommendations would you give to someone considering this product?

I would like to highly recommend this product to industries who are looking to evaluate the Endpoint Security solutions for their organisation. It is highly effective in terms of quarantining the malware and viruses.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Most Popular Check Point Endpoint Security Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Crowdstrike Falcon Platform Logo

    Crowdstrike Falcon Platform

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare