Check Point Endpoint Security safeguards your company's computers and mobile devices from cyberattacks. It uses advanced technology to detect and block threats, including viruses, malware, and phishing attempts. The software provides tools to investigate security incidents, isolate compromised devices, and respond quickly to threats. Check Point Endpoint Security helps your business stay secure by proactively protecting your devices and data.
Who is Check Point Endpoint Security best for
Check Point Endpoint Security offers robust protection against cyber threats, including viruses, malware, and phishing. Users appreciate its comprehensive security and real-time threat detection. However, some find the setup complex and the cost high. It's a good fit for businesses needing strong security, especially in high-risk industries.
Best fit for small, medium, and large enterprises.
Ideal for finance, healthcare, e-commerce, and media companies.
Check Point Endpoint Security features
Type in the name of the feature or in your own words tell us what you need
Supported
Check Point Endpoint Security protects against exploits targeting software vulnerabilities.
Supported
Check Point offers dashboards with endpoint health, deployment, and threat information.
Supported
Check Point Endpoint Security offers full-disk encryption, access control, and removable media encryption.
Supported
Check Point Endpoint Security includes Zero Phishing technology to detect and block phishing attacks.
Supported
Check Point Endpoint Security offers data encryption, access control, threat prevention, and centralized management.
Supported
Check Point supports network access control with predefined rules and policies.
Supported
Check Point Endpoint Security supports secure remote access via its VPN software blade.
Qualities
We evaluate the sentiment that users express about non-functional aspects of the
software
Value and Pricing Transparency
Strongly negative
-1
Customer Service
Rather negative
-0.5
Ease of Use
Rather positive
+0.67
Reliability and Performance
Strongly positive
+0.87
Ease of Implementation
Rather positive
+0.33
Check Point Endpoint Security reviews
We've summarised 221 Check Point Endpoint Security reviews (Check Point Endpoint Security G2 reviews) and
summarised the main points below.
Pros of Check Point Endpoint Security
Comprehensive protection against various cyber threats.
Real-time threat detection and prevention.
Easy-to-use interface for basic functionalities.
Seamless integration with Check Point VPN client.
Effective anti-ransomware capabilities.
Cons of Check Point Endpoint Security
Complex setup process can be challenging for some users.
High cost, especially for advanced features and add-ons.
Occasional performance impact and resource consumption.
Limited customization for certain features.
Technical support response times can be slow.
Check Point Endpoint Security pricing
The commentary is based on 14 reviews from Check Point Endpoint Security G2 reviews.
Check Point Endpoint Security is praised for its comprehensive security features but reviews often cite its high cost and complex configuration as drawbacks. Some users find the price reasonable, especially for enterprise-grade protection. However, smaller businesses may find it expensive.
Users sentiment
Strongly negative
-1
Check Point Endpoint Security alternatives
Symantec Endpoint Security
Better fit for retail, consumer goods, manufacturing, education, real estate, hospitality, transportation, media & entertainment, legal, non-profit, government, energy, professional services and automotive industries. Website traffic is growing faster. Easier to use, but less reliable.
Better customer service and easier to use. Growing faster, although Check Point Endpoint Security has more momentum in terms of employee growth. More efficient resource utilization.
More suitable for individuals and organizations seeking geographically-based password management. Geared towards a "Trust No One" approach where passwords aren't stored. Has broader industry applicability but less focus on finance, healthcare, and retail. Growing faster in website traffic but has declining employee growth. Lower Glassdoor rating. Simpler to use for basic functions, but users report high resource usage and a complex management console.
Better for medium to large businesses, especially in software, IT, telecommunications, and finance. Cloud-based and includes EDR, DLP, and mobile security. Check Point Endpoint Security alternative for simpler endpoint and mobile device security.
Better for small to medium businesses. Easier to use and implement. Has stronger customer service. Offers better value and pricing transparency. Growing faster. Higher rated by users.
What is Check Point Endpoint Security and what does Check Point Endpoint Security do?
What is Check Point Endpoint Security and what does Check Point Endpoint Security do?
Check Point Endpoint Security protects computers and mobile devices from cyber threats like malware and phishing. It offers real-time threat detection, data encryption, and secure remote access, helping businesses maintain a strong security posture. It's known for comprehensive protection but can be complex to set up.
How does Check Point Endpoint Security integrate with other tools?
How does Check Point Endpoint Security integrate with other tools?
Check Point Endpoint Security integrates with other Check Point products, such as its VPN client. It also supports network access control with predefined rules and policies. However, some users find the setup process complex and customization limited.
What the main competitors of Check Point Endpoint Security?
What the main competitors of Check Point Endpoint Security?
Top alternatives to Check Point Endpoint Security include Symantec Endpoint Security, SonicWall Capture Client, Trend Micro Smart Protection Suite, and ESET PROTECT SUITE. These competitors offer similar endpoint protection features like antivirus, anti-malware, and threat detection.
Is Check Point Endpoint Security legit?
Is Check Point Endpoint Security legit?
Check Point Endpoint Security is a legitimate and widely used security software. It offers robust protection against various cyber threats, with real-time detection and prevention capabilities. However, potential users should be aware of the complex setup and higher cost.
How much does Check Point Endpoint Security cost?
How much does Check Point Endpoint Security cost?
I'm sorry, but pricing information for Check Point Endpoint Security is not available. Contact Check Point directly for detailed pricing based on your specific needs and to determine if the product is worth the investment for your endpoint security requirements.
Is Check Point Endpoint Security customer service good?
Is Check Point Endpoint Security customer service good?
Check Point Endpoint Security's customer support receives mixed reviews. While some users praise the support team's helpfulness, others express frustration with delayed responses and ineffective solutions. A few users mention the need for an improved online support portal.
Reviewed by
MK
Michal Kaczor
CEO at Gralio
Michal has worked at startups for many years and writes about topics relating to software selection and IT
management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs
of any business and find solutions to its problems.
TT
Tymon Terlikiewicz
CTO at Gralio
Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech
department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX,
HR, Payroll, Marketing automation and various developer tools.