Check Point Endpoint Security (formerly Harmony Endpoint)
Check Point Software TechnologiesReviews from AWS customer
0 AWS reviews
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
280 reviews
from
External reviews are not included in the AWS star rating for the product.
Efficient Antivirus for Secure Work Environments & Peace of Mind with Check Point Security
What do you like best about the product?
Its provide the strong protection with real-time threat prevention and deep inspection capabilities. It effectively detects and blocks malware, ransomware, and zero-day attacks before they impact the system. The centralized management console makes it easy to monitor and control endpoint security.
What do you dislike about the product?
Nothing as of now for now, everything is going good now.
What problems is the product solving and how is that benefiting you?
It keeps my data safe and ensures smooth performance without slowing down the PC. It also blocks suspicious files and links before they cause any issues, giving me peace of mind while working.
Solid Security, Room to Improve in Support
What do you like best about the product?
I really like Check Point Harmony Endpoint; its threat protection is very robust. We really like how it works on the endpoints, laptops, and devices that the company's security manages. It has few false positives in its monitoring and is also quite up-to-date.
What do you dislike about the product?
This solution works very well, but when there are problems with some technical detail, the escalation to support is sometimes very slot
it takes a long time for an agent to resolve it. This is an area for improvement.
it takes a long time for an agent to resolve it. This is an area for improvement.
What problems is the product solving and how is that benefiting you?
Harmony Endpoint has helped us resolve malware attacks and potential ransomware attacks because its built-in validation system is so helpful. Previously, an employee experienced a malware attack that created a vulnerability. Since implementation, we now have virtually secure environments.
Robust Security Meets Ease of Use with Harmony Endpoint
What do you like best about the product?
Checkpoint Harmony Endpoint is well balance strong security with ease of use and centralized management. Harmony Endpoint offers multiple layers of protection like behavioral analysis, threat emulation and anti-ransomware.its lightweight client ensures strong endpoint security without compromising system performance, and the forensics and incident response capabilities make investigation and remediation much easier. Customer support is so great.
What do you dislike about the product?
No dislike as of now. Product is doing great.
What problems is the product solving and how is that benefiting you?
Checkpoint Harmony Endpoint It effectively mitigates problems such as ransomware attacks, phishing attempts, data breaches, and zero-day threats, which are common in today’s distributed and hybrid work setups.By providing real-time threat prevention, endpoint detection and response (EDR), and behavioral analysis, Harmony Endpoint ensures that both known and unknown threats are stopped before they can impact systems or data.In addition, automated forensics and remediation features allow for faster recovery and minimize downtime after a security event.
Robust Protection and Visibility, Harmony Endpoint
What do you like best about the product?
Harmony Endpoint does a great job of combining multiple layers of protection into one solution.
It helps us stop malware, phishing, and ransomware before they cause damage. I also like how lightweight it is our users barely notice it running, but we still get strong security and detailed visibility into endpoint activity.
It helps us stop malware, phishing, and ransomware before they cause damage. I also like how lightweight it is our users barely notice it running, but we still get strong security and detailed visibility into endpoint activity.
What do you dislike about the product?
Harmony Endpoint works well overall, but it can feel a bit heavy on system resources at times, especially during scans. Some users have also found the interface a little dated and not as intuitive as other tools.
It gets the job done, but there’s definitely room for a smoother user experience.
It gets the job done, but there’s definitely room for a smoother user experience.
What problems is the product solving and how is that benefiting you?
Harmony Endpoint has helped us protect employee devices both inside and outside the office due to the tasks of each department, yet they can safely use resources with protected devices.
Additionally, it is simple and intuitive to use from the Check Point Infinity portal to manage and monitor company devices.
Additionally, it is simple and intuitive to use from the Check Point Infinity portal to manage and monitor company devices.
Real-Time Protection for Peace of Mind & Systems Safe and Running Smoothly
What do you like best about the product?
The real-time scanning and automatic updates work smoothly without slowing down the system, keeping all devices secure and performing well.It provides strong and consistent protection against viruses, malware, and other online threats.
What do you dislike about the product?
Nothing as of now, all going well and good for now, till now no issues faced.
What problems is the product solving and how is that benefiting you?
This prevents data loss, avoids system slowdowns caused by infections, and ensures that both personal and work-related files remain safe. It gives me confidence that my devices and network stay secure without constant manual intervention.It protects my devices from viruses, malware, and other cyber threats in real time.
Comprehensive Protection Made Simple, But Can Slow Older Devices
What do you like best about the product?
I like best about Check Point Harmony Endpoint is how it simplifies endpoint protection without sacrificing depth. It combines antivirus, anti-ransomware, threat emulation, and behavioral analysis into one lightweight agent that’s easy to deploy and manage.
What do you dislike about the product?
One thing I dislike about Check Point Harmony Endpoint is that it can be resource-intensive on some machines, especially older endpoints. During scans or updates, users occasionally notice a slowdown in performance, which can be disruptive.
What problems is the product solving and how is that benefiting you?
It protects our devices from ransomware, phishing, and file based malware, which used to be a major concern. Before using Harmony, we had to deal with manual cleanups and reactive threat responses. Now, threats are blocked before they cause damage, and the rollback feature can reverse changes if something slips through.
efficient, safe and friendly
What do you like best about the product?
What I like most about Check Point Harmony Endpoint is its comprehensive, multi-layered protection. It effectively defends against zero-day threats, ransomware, and advanced malware using a combination of behavioral analysis, threat intelligence, and anti-exploit technologies, which gives strong confidence in endpoint security.
From a daily operations standpoint, the centralized management console is a major advantage. It allows me to monitor, manage, and respond to threats across multiple endpoints from a single interface. The UI is intuitive, making it easier to investigate incidents, apply policies, and maintain visibility without needing multiple tools.
Another key benefit is its seamless integration with other Check Point solutions. This unified ecosystem simplifies security management, improves correlation of threats, and enables a more consistent and coordinated defense strategy across the organization.
Overall, it has improved my workflow by reducing the complexity of endpoint security management while increasing visibility and protection across the environment.
From a daily operations standpoint, the centralized management console is a major advantage. It allows me to monitor, manage, and respond to threats across multiple endpoints from a single interface. The UI is intuitive, making it easier to investigate incidents, apply policies, and maintain visibility without needing multiple tools.
Another key benefit is its seamless integration with other Check Point solutions. This unified ecosystem simplifies security management, improves correlation of threats, and enables a more consistent and coordinated defense strategy across the organization.
Overall, it has improved my workflow by reducing the complexity of endpoint security management while increasing visibility and protection across the environment.
What do you dislike about the product?
What I dislike about Check Point Harmony Endpoint is that, while it provides strong protection, there are some challenges that impact day-to-day operations.
From a performance perspective, it can be resource-intensive—especially during scans and updates—which may affect endpoint performance and user experience on lower-spec devices.
Regarding UI/UX and onboarding, the initial setup and policy configuration can be complex, with a noticeable learning curve for new teams. Navigating advanced settings and fully understanding policy behavior takes time and experience.
In terms of integrations, while it works very well within the Check Point ecosystem, integration with third-party tools and platforms outside that ecosystem can be limited or require additional effort.
For policy management, there is limited granularity in some scenarios—for example, certain configurations apply at the device level rather than allowing more flexible, user-based policy control.
Looking at support and onboarding, technical support is generally reliable, but response times—especially through email—can sometimes be slower than expected in critical situations.
Finally, from a pricing/ROI standpoint, the pricing model is not very transparent, as it typically requires going through partners or resellers for quotes. This can make it harder to quickly evaluate cost versus value.
Overall, while it is a powerful security solution, these areas can introduce operational friction if not carefully managed.
From a performance perspective, it can be resource-intensive—especially during scans and updates—which may affect endpoint performance and user experience on lower-spec devices.
Regarding UI/UX and onboarding, the initial setup and policy configuration can be complex, with a noticeable learning curve for new teams. Navigating advanced settings and fully understanding policy behavior takes time and experience.
In terms of integrations, while it works very well within the Check Point ecosystem, integration with third-party tools and platforms outside that ecosystem can be limited or require additional effort.
For policy management, there is limited granularity in some scenarios—for example, certain configurations apply at the device level rather than allowing more flexible, user-based policy control.
Looking at support and onboarding, technical support is generally reliable, but response times—especially through email—can sometimes be slower than expected in critical situations.
Finally, from a pricing/ROI standpoint, the pricing model is not very transparent, as it typically requires going through partners or resellers for quotes. This can make it harder to quickly evaluate cost versus value.
Overall, while it is a powerful security solution, these areas can introduce operational friction if not carefully managed.
What problems is the product solving and how is that benefiting you?
Check Point Harmony Endpoint solves the challenge of protecting endpoints against increasingly sophisticated and evolving cyber threats, while also simplifying security management across the organization.
Before implementing it, endpoint protection was often fragmented—multiple tools for antivirus, anti-ransomware, and threat detection—making it harder to maintain visibility and respond quickly. Harmony Endpoint consolidates these capabilities into a single platform, providing layered protection against zero-day threats, ransomware, phishing, and advanced malware.
A key benefit is the centralized management console, which allows me to monitor all endpoints, enforce policies, and respond to incidents from one place. This significantly reduces administrative overhead and improves response times when dealing with security events.
From a security standpoint, its behavioral analysis and threat intelligence help detect and prevent attacks that traditional signature-based solutions might miss. This has strengthened our overall security posture and reduced risk exposure.
Additionally, the platform improves consistency and control by applying standardized security policies across all devices, ensuring compliance and minimizing configuration gaps.
Overall, it benefits me by simplifying endpoint security management, improving visibility, reducing operational complexity, and providing stronger, proactive protection against modern threats.
Before implementing it, endpoint protection was often fragmented—multiple tools for antivirus, anti-ransomware, and threat detection—making it harder to maintain visibility and respond quickly. Harmony Endpoint consolidates these capabilities into a single platform, providing layered protection against zero-day threats, ransomware, phishing, and advanced malware.
A key benefit is the centralized management console, which allows me to monitor all endpoints, enforce policies, and respond to incidents from one place. This significantly reduces administrative overhead and improves response times when dealing with security events.
From a security standpoint, its behavioral analysis and threat intelligence help detect and prevent attacks that traditional signature-based solutions might miss. This has strengthened our overall security posture and reduced risk exposure.
Additionally, the platform improves consistency and control by applying standardized security policies across all devices, ensuring compliance and minimizing configuration gaps.
Overall, it benefits me by simplifying endpoint security management, improving visibility, reducing operational complexity, and providing stronger, proactive protection against modern threats.
Powerful ThreatCloud AI Integration and Seamless Automation
What do you like best about the product?
It is integrated with ThreatCloud AI with more than 50 million endpoint sends data to the threatcloud AI. It can be integrated with the Playblock from the infinity portal for automation. It also provides protection against ransomware along with full disk encryption.
What do you dislike about the product?
It is little resource intensive compared to its competition because it will take little bit of time to open windows due to full disk encryption.
What problems is the product solving and how is that benefiting you?
It provided security for the computer in whole organization and it can also be managed with the Smart Management Server
Great Integration with Checkpoint, but Resource-Heavy
What do you like best about the product?
It is integrated with Checkpoint Threatcloud AI and can also be integrated with Checkpoint Infinity for Playblocks as well.
What do you dislike about the product?
It requires a little more resource compare to its competition.
What problems is the product solving and how is that benefiting you?
It is blocking most of the malware as Checkpoint has high amount of efficacy for malware detection and its also provides full disk encryption.
Easy and Strong Protection with Harmony Endpoint
What do you like best about the product?
Harmony Endpoint makes it easy to keep all computers and devices safe. It stops threats from unknown websites, apps, and emails. The system runs without slowing work, and I can see what’s happening on every device, so managing security feels simple and reliable.
What do you dislike about the product?
Noting as of now, all going very smooth and well.
What problems is the product solving and how is that benefiting you?
Harmony Endpoint stops malware, phishing attacks, and risky apps from affecting devices. It reduces system crashes and prevents data loss. With everything under control from one place, managing security is easier, and users can work safely without interruptions or worrying about threats slowing down their computers.
showing 21 - 30