Check Point Endpoint Security Logo
Check Point Endpoint Security Logo
Check Point Software Technologies Ltd.

Check Point Endpoint Security

8.1 /10
Category
Check Point Endpoint Security
8.1 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection category

Filter By

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

87 Likeliness to Recommend

94 Plan to Renew

1
Since last award

93 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

+91 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

3% Negative
4% Neutral
93% Positive

Pros

  • Acts with Integrity
  • Fair
  • Enables Productivity
  • Helps Innovate

Feature Ratings

Average 81

Kernel Monitoring

88

Endpoint Detection and Response

85

Centralized Management Portal

82

Host NGFW Functionality

82

Mac OS support

82

System Hardening

82

Forensics

81

Dynamic Malware Detection

81

Port and Device Control

80

Cross Platform Integration

79

Ransomware Recovery and Removal

79

Vendor Capability Ratings

Average 83

Business Value Created

87

Quality of Features

85

Vendor Support

84

Product Strategy and Rate of Improvement

83

Ease of IT Administration

83

Ease of Customization

83

Usability and Intuitiveness

82

Ease of Implementation

82

Ease of Data Integration

81

Breadth of Features

81

Availability and Quality of Training

81

Check Point Endpoint Security Reviews

  • Role: Information Technology
  • Industry: Technology
  • Involvement: Business Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Apr 2021

Good as long as you leverage the entire stack

Likeliness to Recommend

8 /10

Pros

  • Security Protects
  • Reliable
  • Enables Productivity
  • Trustworthy

Cons

  • Less Efficient Service
  • Inhibits Innovation
  • Slower Product Innovation

Don C.

  • Role: Information Technology
  • Industry: Insurance
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Aug 2020

Excellent facility security with easy access.

Likeliness to Recommend

10 /10

What differentiates Check Point Endpoint Security from other similar products?

Great endpoint protection for VPN access and desktop security.

What is your favorite aspect of this product?

VPN configurability and customization.

What do you dislike most about this product?

Nothing at this time.

What recommendations would you give to someone considering this product?

Nothing at this time.

Pros

  • Trustworthy
  • Effective Service
  • Inspires Innovation
  • Caring

Niniveth Marybel M.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Feb 2020

Endpoint Protection Complete

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

Check Point Endpoint Security tends to be different from other programs because it can be managed through a single console, so managing its service is quite simple, it is software that provides quite extensive security, that is, from data security, network, forensic analysis and even detection of advanced threats including those of zero day, so that the one that covers all this makes it a very complete software for business use, its protection not only protects data in use but also those that are at rest So it is quite functional software with a very versatile design.

What is your favorite aspect of this product?

The feature that I like most about this powerful endpoint protection software is that its console is fully centralized, so managing it is really simple because we can handle all the security of the business environment from one place, also the one that provides extremely useful functions. such as the detection of advanced threats, since all our endpoints are protected no matter what type of threats they face, and their deployment is fast and maintenance is very easy.

What do you dislike most about this product?

It is not possible to perform bandwidth monitoring and this is because it lacks this function, so unfortunately as users we cannot regulate it, in addition to its cost being somewhat high.

What recommendations would you give to someone considering this product?

I recommend its use, since today it is advisable to have software that is capable of providing complete protection to the entire business environment and this program provides quite advanced capabilities that allow the prevention of any threat that may affect the endpoints.

Pros

  • Effective Service
  • Saves Time
  • Acts with Integrity
  • Helps Innovate

Most Popular Check Point Endpoint Security Comparisons

  • ThreatDown Logo

    ThreatDown

    Compare
  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Kaspersky Endpoint Security for Business Logo

    Kaspersky Endpoint Security for Business

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Microsoft Defender for Endpoint Logo

    Microsoft Defender for Endpoint

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare