Logo of Check Point Endpoint Security

Check Point Endpoint Security

Website LinkedIn Twitter

Last updated on

Company health

Employee growth
7% increase in the last year
Web traffic
6% increase in the last quarter

Ratings

G2
4.4/5
(231)
Glassdoor
3.8/5
(2333)

Check Point Endpoint Security description

Check Point Endpoint Security safeguards your company's computers and mobile devices from cyberattacks. It uses advanced technology to detect and block threats, including viruses, malware, and phishing attempts. The software provides tools to investigate security incidents, isolate compromised devices, and respond quickly to threats. Check Point Endpoint Security helps your business stay secure by proactively protecting your devices and data.


Who is Check Point Endpoint Security best for

Check Point Endpoint Security offers robust protection against cyber threats, including viruses, malware, and phishing. Users appreciate its comprehensive security and real-time threat detection. However, some find the setup complex and the cost high. It's a good fit for businesses needing strong security, especially in high-risk industries.

  • Best fit for small, medium, and large enterprises.

  • Ideal for finance, healthcare, e-commerce, and media companies.


Check Point Endpoint Security features

Type in the name of the feature or in your own words tell us what you need
Supported

Check Point Endpoint Security protects against exploits targeting software vulnerabilities.

Supported

Check Point offers dashboards with endpoint health, deployment, and threat information.

Supported

Check Point Endpoint Security offers full-disk encryption, access control, and removable media encryption.

Supported

Check Point Endpoint Security includes Zero Phishing technology to detect and block phishing attacks.

Supported

Check Point Endpoint Security offers data encryption, access control, threat prevention, and centralized management.

Supported

Check Point supports network access control with predefined rules and policies.

Supported

Check Point Endpoint Security supports secure remote access via its VPN software blade.

Qualities

We evaluate the sentiment that users express about non-functional aspects of the software

Value and Pricing Transparency

Strongly negative
-1

Customer Service

Rather negative
-0.5

Ease of Use

Rather positive
+0.67

Reliability and Performance

Strongly positive
+0.87

Ease of Implementation

Rather positive
+0.33

Check Point Endpoint Security reviews

We've summarised 221 Check Point Endpoint Security reviews (Check Point Endpoint Security G2 reviews) and summarised the main points below.

Pros of Check Point Endpoint Security
  • Comprehensive protection against various cyber threats.
  • Real-time threat detection and prevention.
  • Easy-to-use interface for basic functionalities.
  • Seamless integration with Check Point VPN client.
  • Effective anti-ransomware capabilities.
Cons of Check Point Endpoint Security
  • Complex setup process can be challenging for some users.
  • High cost, especially for advanced features and add-ons.
  • Occasional performance impact and resource consumption.
  • Limited customization for certain features.
  • Technical support response times can be slow.

Check Point Endpoint Security pricing

The commentary is based on 14 reviews from Check Point Endpoint Security G2 reviews.

Check Point Endpoint Security is praised for its comprehensive security features but reviews often cite its high cost and complex configuration as drawbacks. Some users find the price reasonable, especially for enterprise-grade protection. However, smaller businesses may find it expensive.

Users sentiment

Strongly negative
-1

Check Point Endpoint Security alternatives

  • Logo of Symantec Endpoint Security
    Symantec Endpoint Security
    Better fit for retail, consumer goods, manufacturing, education, real estate, hospitality, transportation, media & entertainment, legal, non-profit, government, energy, professional services and automotive industries. Website traffic is growing faster. Easier to use, but less reliable.
    Read more
  • Logo of SonicWall Capture Client
    SonicWall Capture Client
    Better for smaller companies. Has growing website traffic momentum.
    Read more
  • Logo of Trend Micro Smart Protection Suite
    Trend Micro Smart Protection Suite
    Better customer service and easier to use. Growing faster, although Check Point Endpoint Security has more momentum in terms of employee growth. More efficient resource utilization.
    Read more
  • Logo of Symantec End-user Endpoint Security
    Symantec End-user Endpoint Security
    More suitable for individuals and organizations seeking geographically-based password management. Geared towards a "Trust No One" approach where passwords aren't stored. Has broader industry applicability but less focus on finance, healthcare, and retail. Growing faster in website traffic but has declining employee growth. Lower Glassdoor rating. Simpler to use for basic functions, but users report high resource usage and a complex management console.
    Read more
  • Logo of MVISION Endpoint Security Platform
    MVISION Endpoint Security Platform
    Better for medium to large businesses, especially in software, IT, telecommunications, and finance. Cloud-based and includes EDR, DLP, and mobile security. Check Point Endpoint Security alternative for simpler endpoint and mobile device security.
    Read more
  • Logo of ESET PROTECT SUITE
    ESET PROTECT SUITE
    Better for small to medium businesses. Easier to use and implement. Has stronger customer service. Offers better value and pricing transparency. Growing faster. Higher rated by users.
    Read more

Check Point Endpoint Security FAQ

  • What is Check Point Endpoint Security and what does Check Point Endpoint Security do?

    Check Point Endpoint Security protects computers and mobile devices from cyber threats like malware and phishing. It offers real-time threat detection, data encryption, and secure remote access, helping businesses maintain a strong security posture. It's known for comprehensive protection but can be complex to set up.

  • How does Check Point Endpoint Security integrate with other tools?

    Check Point Endpoint Security integrates with other Check Point products, such as its VPN client. It also supports network access control with predefined rules and policies. However, some users find the setup process complex and customization limited.

  • What the main competitors of Check Point Endpoint Security?

    Top alternatives to Check Point Endpoint Security include Symantec Endpoint Security, SonicWall Capture Client, Trend Micro Smart Protection Suite, and ESET PROTECT SUITE. These competitors offer similar endpoint protection features like antivirus, anti-malware, and threat detection.

  • Is Check Point Endpoint Security legit?

    Check Point Endpoint Security is a legitimate and widely used security software. It offers robust protection against various cyber threats, with real-time detection and prevention capabilities. However, potential users should be aware of the complex setup and higher cost.

  • How much does Check Point Endpoint Security cost?

    I'm sorry, but pricing information for Check Point Endpoint Security is not available. Contact Check Point directly for detailed pricing based on your specific needs and to determine if the product is worth the investment for your endpoint security requirements.

  • Is Check Point Endpoint Security customer service good?

    Check Point Endpoint Security's customer support receives mixed reviews. While some users praise the support team's helpfulness, others express frustration with delayed responses and ineffective solutions. A few users mention the need for an improved online support portal.


Reviewed by

MK
Michal Kaczor
CEO at Gralio

Michal has worked at startups for many years and writes about topics relating to software selection and IT management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs of any business and find solutions to its problems.

TT
Tymon Terlikiewicz
CTO at Gralio

Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX, HR, Payroll, Marketing automation and various developer tools.