Check Point Endpoint Security Logo
Check Point Endpoint Security Logo
Check Point

Check Point Endpoint Security

Composite Score
8.6 /10
CX Score
9.0 /10
Category
Check Point Endpoint Security
8.6 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

89 Likeliness to Recommend

1
Since last award

97 Plan to Renew

3
Since last award

88 Satisfaction of Cost Relative to Value

6
Since last award


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+94 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

1% Negative
2% Neutral
97% Positive

Pros

  • Enables Productivity
  • Fair
  • Friendly Negotiation
  • Security Protects

Feature Ratings

Average 81

Endpoint Detection and Response

88

Kernel Monitoring

86

Centralized Management Portal

84

Dynamic Malware Detection

83

Port and Device Control

82

Ransomware Recovery and Removal

82

Host NGFW Functionality

81

Forensics

81

System Hardening

81

Mac OS support

81

Application Containment Mechanisms

80

Vendor Capability Ratings

Average 80

Quality of Features

83

Business Value Created

82

Usability and Intuitiveness

82

Product Strategy and Rate of Improvement

81

Ease of Implementation

81

Ease of IT Administration

81

Vendor Support

81

Breadth of Features

80

Ease of Data Integration

79

Ease of Customization

79

Availability and Quality of Training

78

Check Point Endpoint Security Reviews

VISHAL K.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Jan 2025

A Complete EndPoint Security with Check Point

Likeliness to Recommend

8 /10

What differentiates Check Point Endpoint Security from other similar products?

Check Point is a well-established cybersecurity vendor with a strong reputation for innovation and reliability.

What is your favorite aspect of this product?

My favourite key aspect of this product is its unified threat prevention approach, which is very effective.

What do you dislike most about this product?

As of now, there is no point in disliking the product, but the OEM support could be improved.

What recommendations would you give to someone considering this product?

This solution is very helpful in analyzing the end-user machine behavior, and it also provides support for a wide range of devices. Highly recommended to achieve security for endpoint.

Pros

  • Enables Productivity
  • Trustworthy
  • Unique Features
  • Effective Service

Fatema S.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Jan 2025

Strong threat prevention but need high resource.

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

It provides comprehensive endpoint DLP not all vendors offer endpoint specific DLP

What is your favorite aspect of this product?

It provides seamless integration with check point ecosystem and it's interface is user friendly.

What do you dislike most about this product?

The check point endpoint consume high cpu and memory that effect in system performance.

What recommendations would you give to someone considering this product?

Choose the right Check Point Endpoint security licensing plan based on your needs and deploy it either in the cloud or on-prem.

Pros

  • Reliable
  • Performance Enhancing
  • Enables Productivity
  • Unique Features

Bhavik S.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Jan 2025

Easy to use Fantastic product!

Likeliness to Recommend

8 /10

What differentiates Check Point Endpoint Security from other similar products?

1.Unified Threat Management 2. Zero Trust Approach 3. ThreatCloud Intelligence 4. Ease of Management

What is your favorite aspect of this product?

My favourite aspect of check point endpoint security is its proactive threat prevention capabilities. The seamless integration with the ThreatCloud intelligence network is also impressive.

What do you dislike most about this product?

1) resource intensive on endpoint devices 2) Management interface 3) additional licensing or components

What recommendations would you give to someone considering this product?

1) Test the performance 2) Plan for Deployment 3) Understand Licensing and costs 4) Monitor ROI over time 5) Consider Support and updates

Pros

  • Continually Improving Product
  • Performance Enhancing
  • Enables Productivity
  • Efficient Service

Most Popular Check Point Endpoint Security Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare