Check Point Endpoint Security Logo Award Winner Product Badge
Check Point Endpoint Security Logo Award Winner Product Badge
Check Point

Check Point Endpoint Security

Composite Score
8.8 /10
CX Score
9.2 /10
Category
Check Point Endpoint Security
8.8 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Filter By

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

89 Likeliness to Recommend

98 Plan to Renew

88 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+94 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

1% Negative
2% Neutral
97% Positive

Pros

  • Enables Productivity
  • Fair
  • Security Protects
  • Reliable

Feature Ratings

Average 80

Endpoint Detection and Response

87

Centralized Management Portal

85

Port and Device Control

83

Dynamic Malware Detection

83

Kernel Monitoring

82

Host NGFW Functionality

82

Ransomware Recovery and Removal

81

Automated Remediation

79

Application Containment Mechanisms

79

Forensics

78

System Hardening

78

Vendor Capability Ratings

Average 80

Quality of Features

84

Business Value Created

83

Ease of Implementation

81

Ease of IT Administration

81

Product Strategy and Rate of Improvement

79

Breadth of Features

79

Vendor Support

79

Usability and Intuitiveness

79

Ease of Data Integration

78

Ease of Customization

76

Availability and Quality of Training

75

Check Point Endpoint Security Reviews

Noah L.

  • Role: Industry Specific Role
  • Industry: Finance
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Jun 2022

A good solution that is still being developed.

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

Risk Emulation, which is downloadable file sandboxing, and Threat Extraction, which is data sanitization by proactive content elimination, are both very helpful in safeguarding file downloads, particularly from harmful URLs in e-mails. Anti-phishing performs well, stopping consumers from providing data on sites that appear to be authentic. Forensic investigations provide information about the incident's circumstances. There are several great features in this software, but I like the explore plugin. End customers recognize the increased value of the protection since the Checkpoint Browse plugin accomplishes something right away.

What is your favorite aspect of this product?

It is a robust antivirus program that prevents the setup folder that some other antivirus solutions easily accept. It verifies, for example, if the source can be validated. Check point has significantly assisted us in gaining new consumers in the sector. We appreciate the product since it is simple to use, cloud-based, and straightforward to set up. The management and investigative analytics that you provide us are beneficial in reducing danger. Threat tracking is particularly useful since it allows us to see where an assault began and allows us to react quickly. This is beneficial to the event response staff.

What do you dislike most about this product?

The administration portal's functionality might be improved. Exceptional administration is too broad for instance, we can't add a URL exception for anti-phishing but not for content screening. Risk Hunting doesn't enable us to scan for HTTPS URLs, just DNS searches or IP addresses. Whenever we seek instant data from the network, the system performance increases, and installed programs are stalled.

What recommendations would you give to someone considering this product?

There is nothing to hate; the community support is excellent, and the TAC assistance is among the finest I've seen; they routinely have very competent personnel.

Pros

  • Reliable
  • Trustworthy
  • Caring
  • Generous Negotitation

Anuj V.

  • Role: Consultant
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Jun 2022

Secure your overall IT system from virus & malware

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

Check Point endpoint security is a foolproof security solution for any business in IT field. It is advanced tool for protecting your clouds, hardware and all the connected softwares with high precision threat detection technology and eliminating the same proactively. It is extremely easy to deploy the same in any kind of system with excellent API

What is your favorite aspect of this product?

Strong architecture Robust technology Supportive and cooperative tech support and business lead team Strong tech base Innovation is the key behind their all development Continuous improvement is their one of the most innovative aspect

What do you dislike most about this product?

No dislike so far. Keep hitting new offerings

What recommendations would you give to someone considering this product?

Go for Check point endpoint security solution and free your IT and cloud system from malwares, phishing attacks, spam and any potential system threats. Its a one stop solution for managing all kind of endpoints in most efficient manner

Pros

  • Helps Innovate
  • Effective Service
  • Caring
  • Respectful

Zarah H.

  • Role: Finance
  • Industry: Transportation
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted May 2022

Best Endpoint Protection Software

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

It's not only and endpoint security software but also comes with network security features, advanced threat protection and data security. It's very effective

What is your favorite aspect of this product?

I have used Check Point Endpoint Security and it's very resourceful. I like the network and data security features It's easy to setup There are always updates

What do you dislike most about this product?

I have no dislikes because Check Point Endpoint Security has been very helpful

What recommendations would you give to someone considering this product?

Check Point Endpoint Security is one software I would recommend with no doubts as it has worked well

Pros

  • Acts with Integrity
  • Helps Innovate
  • Continually Improving Product
  • Reliable

Most Popular Check Point Endpoint Security Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Crowdstrike Falcon Platform Logo

    Crowdstrike Falcon Platform

    Compare