Check Point Endpoint Security Logo Award Winner Product Badge
Check Point Endpoint Security Logo Award Winner Product Badge
Check Point

Check Point Endpoint Security

Composite Score
8.8 /10
CX Score
9.2 /10
Category
Check Point Endpoint Security
8.8 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Filter By

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

89 Likeliness to Recommend

98 Plan to Renew

88 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+94 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

1% Negative
2% Neutral
97% Positive

Pros

  • Enables Productivity
  • Fair
  • Security Protects
  • Reliable

Feature Ratings

Average 80

Endpoint Detection and Response

87

Centralized Management Portal

85

Port and Device Control

83

Dynamic Malware Detection

83

Kernel Monitoring

82

Host NGFW Functionality

82

Ransomware Recovery and Removal

81

Automated Remediation

79

Application Containment Mechanisms

79

Forensics

78

System Hardening

78

Vendor Capability Ratings

Average 80

Quality of Features

84

Business Value Created

83

Ease of Implementation

81

Ease of IT Administration

81

Product Strategy and Rate of Improvement

79

Breadth of Features

79

Vendor Support

79

Usability and Intuitiveness

79

Ease of Data Integration

78

Ease of Customization

76

Availability and Quality of Training

75

Check Point Endpoint Security Reviews

  • Role: Consultant
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Anonymous Reviewer

Submitted Jan 2025

Managed security and scalable product

Likeliness to Recommend

8 /10

Pros

  • Helps Innovate
  • Continually Improving Product
  • Trustworthy
  • Efficient Service

Yeni S.

  • Role: Sales Marketing
  • Industry: Consulting
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Nov 2024

It is also good recommendation to help us safeguar

Likeliness to Recommend

10 /10

What differentiates Check Point Endpoint Security from other similar products?

What then sets Check Point Endpoint Security apart is the relatively high level of protection from cyber threats. It has assisted in protection from malware, ransomware, and other hacking attacks that we experience regularly and which has been critical in protection of our sensitive information.

What is your favorite aspect of this product?

The best thing I found about Check Point Endpoint Security is that it is quite simple to use. The user interface as observed is very user friendly and enables us to consequently set up and apply security to our gadgets. On the other hand, this real time protection it has is really healthy which overtime came as a relief in handling my information.

What do you dislike most about this product?

But there is one minus that I have also experienced occasionally: some amount of slowness in computers during the full scan that can a bit declasse for users. Despite of this minor issue, we are indeed compensated for with the numerous advantages and security that the software give us.

What recommendations would you give to someone considering this product?

Worth it, therefore, to choose Check Point Endpoint Security as our layer of protection for our computers and safeguard us from possibly future cyber threats. This is why it can be said that CloseGuard has high effectiveness, it is convenient, easy to use and can be customized, which puts it into a different league than the majority of other security applications.

Pros

  • Helps Innovate
  • Performance Enhancing
  • Enables Productivity
  • Effective Service

Angeli S.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Jul 2024

A high quality solution

Likeliness to Recommend

10 /10

What differentiates Check Point Endpoint Security from other similar products?

What makes Check Point Endpoint Security different is its ability to detect and prevent threats in real time. The technology it uses is cutting-edge and it gives me peace of mind to know that my information is protected from any type of cyber attack.

What is your favorite aspect of this product?

What I like most about this software is its effectiveness. I have never had any security issues since I started using it and it has helped me keep my confidential information safe.

What do you dislike most about this product?

The only thing I dislike a little is the price, as it is a bit high compared to other security programs. However, I consider it worth the investment for the quality and protection it offers.

What recommendations would you give to someone considering this product?

In short, I would recommend Check Point Endpoint Security to anyone looking for a reliable and effective solution to protect their devices and data. Its effectiveness, ease of use, and threat detection capabilities make it an excellent choice for staying safe in the digital world.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Enables Productivity

Most Popular Check Point Endpoint Security Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Crowdstrike Falcon Platform Logo

    Crowdstrike Falcon Platform

    Compare