Logo of Check Point Endpoint Security

Check Point Endpoint Security

Website LinkedIn Twitter

Last updated on

Company health

Employee growth
5% increase in the last year
Web traffic
7% decrease in the last quarter

Ratings

G2
4.4/5
(231)
Glassdoor
3.8/5
(2333)

Check Point Endpoint Security description

Check Point Endpoint Security safeguards your company's computers and mobile devices from cyberattacks. It uses advanced technology to detect and block threats, including viruses, malware, and phishing attempts. The software provides tools to investigate security incidents, isolate compromised devices, and respond quickly to threats. Check Point Endpoint Security helps your business stay secure by proactively protecting your devices and data.


Who is Check Point Endpoint Security best for

Check Point Endpoint Security offers strong protection against cyber threats, with real-time detection and anti-ransomware capabilities. We find the integration with Check Point VPN client is seamless. While some users mention complex setup and occasional performance impacts, the comprehensive protection and easy-to-use interface for basic functions make it a solid choice. It’s worth considering alongside alternatives like FortiClient and Sophos Intercept X. In our experience, this is particularly effective in industries requiring high security, such as finance and healthcare, as well as education.

  • Best for any size company. From small businesses to large enterprises, it offers comprehensive cybersecurity.

  • Great for healthcare, finance, and retail – industries that need top-notch security. Also suitable for education.


Check Point Endpoint Security features

Supported

Single Agent: Single Agent: EPP, EDR & XDR, all in a single client and management console.

Supported

Flexible Management: Flexible Management: With an easy deployment for On-Prem, Cloud, or MSSP Management.

Supported

Extensive OS Support: Extensive OS Support: With wide range of supported Operating Systems, including Windows, Mac, Linux, Servers, VDI, Browsers and Mobile Devices

Supported

Threat Intelligence: Threat Intelligence: Check Point’s Threat Cloud Al provides Zero-Day protection with more than 60 AI engines.

Supported

Ransomware & malware protection: Ransomware & malware protection: Fortifying organizational data against sophisticated ransomware attacks.

Supported

Posture management: Posture management: Reduce the attack surface with automated vulnerability & patch management.

Supported

Zero-phishing & browser protection: Zero-phishing & browser protection: Blocks the most sophisticated phishing attacks with zero impact on end users.

Qualities

We evaluate the sentiment that users express about non-functional aspects of the software

Value and Pricing Transparency

Rather negative
-0.6

Ease of Use

Strongly positive
+0.73

Reliability and Performance

Rather positive
+0.68

Ease of Implementation

Rather positive
+0.38

Check Point Endpoint Security reviews

We've summarised 231 Check Point Endpoint Security reviews (Check Point Endpoint Security G2 reviews) and summarised the main points below.

Pros of Check Point Endpoint Security
  • Comprehensive protection against various cyber threats.
  • Real-time threat detection and prevention.
  • Easy-to-use interface for basic functionalities.
  • Seamless integration with Check Point VPN client.
  • Effective anti-ransomware capabilities.
Cons of Check Point Endpoint Security
  • Complex setup process can be challenging for some users.
  • High cost, especially for advanced features and add-ons.
  • Occasional performance impact and resource consumption.
  • Limited customization for certain features.
  • Technical support response times can be slow.

Check Point Endpoint Security pricing

The commentary is based on 15 reviews from Check Point Endpoint Security G2 reviews.

We find that Check Point Endpoint Security is generally considered pricey, especially the advanced versions. However, some users feel it's a good value, considering the comprehensive protection it offers. Others mention the high cost of the annual subscription.

Users sentiment

Rather negative
-0.6

Check Point Endpoint Security alternatives

  • Logo of ESET PROTECT
    ESET PROTECT
    Secures business devices easily, runs light on performance.
    Read more
  • Logo of FortiClient
    FortiClient
    Endpoint security keeping your network and devices safe.
    Read more
  • Logo of Symantec Endpoint Security
    check-point-endpoint-security vs Symantec Endpoint Security
    Stops threats, protects devices, and simplifies security.
    Read more
  • Logo of Sophos Intercept X: Next-Gen Endpoint
    Sophos Intercept X: Next-Gen Endpoint
    Stops malware and ransomware with AI-powered endpoint protection.
    Read more
  • Logo of CrowdStrike Falcon Endpoint Protection Platform
    CrowdStrike Falcon Endpoint Protection Platform
    Stops breaches with cloud-native AI-powered endpoint protection.
    Read more
  • Logo of Intezer
    Intezer
    Cybersecurity AI that analyzes and neutralizes threats automatically.
    Read more

Check Point Endpoint Security FAQ

  • What is Check Point Endpoint Security and what does Check Point Endpoint Security do?

    Check Point Endpoint Security offers comprehensive protection for computers and mobile devices against cyber threats like malware and phishing. It provides threat detection, investigation tools, and quick incident response. We find it's a robust solution, but setup can be complex.

  • How does Check Point Endpoint Security integrate with other tools?

    Check Point Endpoint Security integrates with Check Point's VPN client and other Check Point security solutions. It also supports a wide range of operating systems, including Windows, Mac, Linux, and mobile devices. Information on integration with third-party tools is limited.

  • What the main competitors of Check Point Endpoint Security?

    We find that Check Point Endpoint Security's main competitors include FortiClient, Sophos Intercept X, CrowdStrike Falcon, Harmony Endpoint, ESET PROTECT, and Intezer. These alternatives offer similar endpoint protection features.

  • Is Check Point Endpoint Security legit?

    Check Point Endpoint Security is a legitimate cybersecurity solution. We find that it offers robust protection but can be complex to set up and expensive. It's best suited for businesses with high security needs.

  • How much does Check Point Endpoint Security cost?

    I'm sorry, but Check Point Endpoint Security pricing is not publicly available. Contact Check Point directly for a quote tailored to your specific needs.

  • Is Check Point Endpoint Security customer service good?

    Based on the reviews, Check Point Endpoint Security's customer support receives mixed feedback. While some users praise the support team's helpfulness, others express concerns about delayed responses and the lack of effective solutions. Some users also desire a better online support portal.


Reviewed by

MK
Michal Kaczor
CEO at Gralio

Michal has worked at startups for many years and writes about topics relating to software selection and IT management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs of any business and find solutions to its problems.

TT
Tymon Terlikiewicz
CTO at Gralio

Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX, HR, Payroll, Marketing automation and various developer tools.

NEW: Introducing Gralio Screen Buddy

An AI tool that observes your work, finds inefficiencies, and suggests smarter ways to do things. Maybe you can use your tools better, automate tasks, or switch software.

For Individuals
Streamline your daily tasks, get helpful AI tips, and find the right tools for your workflow.
For Businesses
See how your team really works, uncover automation opportunities, and get software recommendations tailored to your processes.