Check Point Endpoint Security Logo
Check Point Endpoint Security Logo
Check Point

Check Point Endpoint Security

Composite Score
7.9 /10
CX Score
8.3 /10
Category
Check Point Endpoint Security
7.9 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

88 Likeliness to Recommend

94 Plan to Renew

94 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+91 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

3% Negative
4% Neutral
93% Positive

Pros

  • Acts with Integrity
  • Helps Innovate
  • Enables Productivity
  • Fair

Feature Ratings

Average 81

Vendor Capability Ratings

Average 83

Check Point Endpoint Security Reviews

Angeli S.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Jul 2024

A high quality solution

Likeliness to Recommend

10 /10

What differentiates Check Point Endpoint Security from other similar products?

What makes Check Point Endpoint Security different is its ability to detect and prevent threats in real time. The technology it uses is cutting-edge and it gives me peace of mind to know that my information is protected from any type of cyber attack.

What is your favorite aspect of this product?

What I like most about this software is its effectiveness. I have never had any security issues since I started using it and it has helped me keep my confidential information safe.

What do you dislike most about this product?

The only thing I dislike a little is the price, as it is a bit high compared to other security programs. However, I consider it worth the investment for the quality and protection it offers.

What recommendations would you give to someone considering this product?

In short, I would recommend Check Point Endpoint Security to anyone looking for a reliable and effective solution to protect their devices and data. Its effectiveness, ease of use, and threat detection capabilities make it an excellent choice for staying safe in the digital world.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Enables Productivity

Ashutosh P.

  • Role: Operations
  • Industry: Agriculture
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Apr 2024

Achieve zero trust security for your business !

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

It is cheap in compared to other alternatives and offer better security enhancements

What is your favorite aspect of this product?

Easy deployment and all round 100% security from all kinds of malware and threat points. It is affordable for all small, mid and large sized businesses and requires minimal maintenance yearly. The renewal of subscription is hassle free always

What do you dislike most about this product?

No problems seen till now. Its working absolutely fine for us .

What recommendations would you give to someone considering this product?

Go ahead with trial version of the software first and understand its functionality and utility fully before final buy

Pros

  • Helps Innovate
  • Enables Productivity
  • Trustworthy
  • Unique Features

Anna M.

  • Role: Information Technology
  • Industry: Transportation
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Nov 2023

Check Point Endpoint Security great tool to use

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

By using an endpoint security tool, we can avoid many problems, which is very important, and here I would like to suggest the vendor Harmony, which is excellent in providing various features and regular updates.

What is your favorite aspect of this product?

Checkpoint Antivirus or Endpoint Protect is great at protecting our environment in many ways. We use sandblast for email security, we use several other blades to help protect our end users, and we use web filtering to block and protect when users go online.

What do you dislike most about this product?

The best features are clearly threat emulation and threat extraction, they secure file downloads very quickly. Anti-phishing is also very good I have to say, a very complete product.

What recommendations would you give to someone considering this product?

Check Point Endpoint Security is suitable for businesses where confidentiality needs to be maintained to reduce the risk and compromise of customer information.

Pros

  • Continually Improving Product
  • Performance Enhancing
  • Enables Productivity
  • Trustworthy

Most Popular Check Point Endpoint Security Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare