Check Point Endpoint Security safeguards your company's computers and mobile devices from cyberattacks. It uses advanced technology to detect and block threats, including viruses, malware, and phishing attempts. The software provides tools to investigate security incidents, isolate compromised devices, and respond quickly to threats. Check Point Endpoint Security helps your business stay secure by proactively protecting your devices and data.
Who is Check Point Endpoint Security best for
Check Point Endpoint Security offers strong protection against cyber threats, with real-time detection and anti-ransomware capabilities. We find the integration with Check Point VPN client is seamless. While some users mention complex setup and occasional performance impacts, the comprehensive protection and easy-to-use interface for basic functions make it a solid choice. It’s worth considering alongside alternatives like FortiClient and Sophos Intercept X. In our experience, this is particularly effective in industries requiring high security, such as finance and healthcare, as well as education.
Best for any size company. From small businesses to large enterprises, it offers comprehensive cybersecurity.
Great for healthcare, finance, and retail – industries that need top-notch security. Also suitable for education.
Check Point Endpoint Security features
Supported
Single Agent: Single Agent: EPP, EDR & XDR, all in a single client and management console.
Supported
Flexible Management: Flexible Management: With an easy deployment for On-Prem, Cloud, or MSSP Management.
Supported
Extensive OS Support: Extensive OS Support: With wide range of supported Operating Systems, including Windows, Mac, Linux, Servers, VDI, Browsers and Mobile Devices
Supported
Threat Intelligence: Threat Intelligence: Check Point’s Threat Cloud Al provides Zero-Day protection with more than 60 AI engines.
Supported
Ransomware & malware protection: Ransomware & malware protection: Fortifying organizational data against sophisticated ransomware attacks.
Supported
Posture management: Posture management: Reduce the attack surface with automated vulnerability & patch management.
Supported
Zero-phishing & browser protection: Zero-phishing & browser protection: Blocks the most sophisticated phishing attacks with zero impact on end users.
Qualities
We evaluate the sentiment that users express about non-functional aspects of the
software
Value and Pricing Transparency
Rather negative
-0.6
Ease of Use
Strongly positive
+0.73
Reliability and Performance
Rather positive
+0.68
Ease of Implementation
Rather positive
+0.38
Check Point Endpoint Security reviews
We've summarised 231
Check Point Endpoint Security reviews (Check Point Endpoint Security G2 reviews) and
summarised the main points below.
Pros of Check Point Endpoint Security
Comprehensive protection against various cyber threats.
Real-time threat detection and prevention.
Easy-to-use interface for basic functionalities.
Seamless integration with Check Point VPN client.
Effective anti-ransomware capabilities.
Cons of Check Point Endpoint Security
Complex setup process can be challenging for some users.
High cost, especially for advanced features and add-ons.
Occasional performance impact and resource consumption.
Limited customization for certain features.
Technical support response times can be slow.
Check Point Endpoint Security pricing
The commentary is based on 15 reviews from Check Point Endpoint Security G2 reviews.
We find that Check Point Endpoint Security is generally considered pricey, especially the advanced versions. However, some users feel it's a good value, considering the comprehensive protection it offers. Others mention the high cost of the annual subscription.
Users sentiment
Rather negative
-0.6
Check Point Endpoint Security alternatives
ESET PROTECT
Secures business devices easily, runs light on performance.
What is Check Point Endpoint Security and what does Check Point Endpoint Security do?
Check Point Endpoint Security offers comprehensive protection for computers and mobile devices against cyber threats like malware and phishing. It provides threat detection, investigation tools, and quick incident response. We find it's a robust solution, but setup can be complex.
What is Check Point Endpoint Security and what does Check Point Endpoint Security do?
Check Point Endpoint Security offers comprehensive protection for computers and mobile devices against cyber threats like malware and phishing. It provides threat detection, investigation tools, and quick incident response. We find it's a robust solution, but setup can be complex.
How does Check Point Endpoint Security integrate with other tools?
Check Point Endpoint Security integrates with Check Point's VPN client and other Check Point security solutions. It also supports a wide range of operating systems, including Windows, Mac, Linux, and mobile devices. Information on integration with third-party tools is limited.
How does Check Point Endpoint Security integrate with other tools?
Check Point Endpoint Security integrates with Check Point's VPN client and other Check Point security solutions. It also supports a wide range of operating systems, including Windows, Mac, Linux, and mobile devices. Information on integration with third-party tools is limited.
What the main competitors of Check Point Endpoint Security?
We find that Check Point Endpoint Security's main competitors include FortiClient, Sophos Intercept X, CrowdStrike Falcon, Harmony Endpoint, ESET PROTECT, and Intezer. These alternatives offer similar endpoint protection features.
What the main competitors of Check Point Endpoint Security?
We find that Check Point Endpoint Security's main competitors include FortiClient, Sophos Intercept X, CrowdStrike Falcon, Harmony Endpoint, ESET PROTECT, and Intezer. These alternatives offer similar endpoint protection features.
Is Check Point Endpoint Security legit?
Check Point Endpoint Security is a legitimate cybersecurity solution. We find that it offers robust protection but can be complex to set up and expensive. It's best suited for businesses with high security needs.
Is Check Point Endpoint Security legit?
Check Point Endpoint Security is a legitimate cybersecurity solution. We find that it offers robust protection but can be complex to set up and expensive. It's best suited for businesses with high security needs.
How much does Check Point Endpoint Security cost?
I'm sorry, but Check Point Endpoint Security pricing is not publicly available. Contact Check Point directly for a quote tailored to your specific needs.
How much does Check Point Endpoint Security cost?
I'm sorry, but Check Point Endpoint Security pricing is not publicly available. Contact Check Point directly for a quote tailored to your specific needs.
Is Check Point Endpoint Security customer service good?
Based on the reviews, Check Point Endpoint Security's customer support receives mixed feedback. While some users praise the support team's helpfulness, others express concerns about delayed responses and the lack of effective solutions. Some users also desire a better online support portal.
Is Check Point Endpoint Security customer service good?
Based on the reviews, Check Point Endpoint Security's customer support receives mixed feedback. While some users praise the support team's helpfulness, others express concerns about delayed responses and the lack of effective solutions. Some users also desire a better online support portal.
Reviewed by
MK
Michal Kaczor
CEO at Gralio
Michal has worked at startups for many years and writes about topics relating to software selection and IT
management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs
of any business and find solutions to its problems.
TT
Tymon Terlikiewicz
CTO at Gralio
Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech
department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX,
HR, Payroll, Marketing automation and various developer tools.
NEW: Introducing Gralio Screen Buddy
An AI tool that observes your work, finds inefficiencies, and suggests smarter ways to do things. Maybe
you can use your tools better, automate tasks, or switch software.