Check Point Endpoint Security Logo Award Winner Product Badge
Check Point Endpoint Security Logo Award Winner Product Badge
Check Point

Check Point Endpoint Security

Composite Score
8.8 /10
CX Score
9.2 /10
Category
Check Point Endpoint Security
8.8 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Filter By

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

89 Likeliness to Recommend

98 Plan to Renew

88 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+94 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

1% Negative
2% Neutral
97% Positive

Pros

  • Enables Productivity
  • Fair
  • Security Protects
  • Reliable

Feature Ratings

Average 80

Endpoint Detection and Response

87

Centralized Management Portal

85

Port and Device Control

83

Dynamic Malware Detection

83

Kernel Monitoring

82

Host NGFW Functionality

82

Ransomware Recovery and Removal

81

Automated Remediation

79

Application Containment Mechanisms

79

Forensics

78

System Hardening

78

Vendor Capability Ratings

Average 80

Quality of Features

84

Business Value Created

83

Ease of Implementation

81

Ease of IT Administration

81

Product Strategy and Rate of Improvement

79

Breadth of Features

79

Vendor Support

79

Usability and Intuitiveness

79

Ease of Data Integration

78

Ease of Customization

76

Availability and Quality of Training

75

Check Point Endpoint Security Reviews

Omkar P.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Feb 2025

offer strong security but expensive

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

Unlike many endpoint solutions that require multiple agents, Check Point provides a single-agent architecture that integrates multiple security features, including anti-malware, firewall, data encryption, and VPN.

What is your favorite aspect of this product?

Provide security includes data security, network security, advanced threat prevention, forensics, endpoint detection and response (EDR), and remote access VPN solutions in single agent

What do you dislike most about this product?

Expensive and some time use more CPU

What recommendations would you give to someone considering this product?

before buying Identify your security needs, choose the right License Plan and Check Point can be expensive, so compare pricing with Cisco, Fortinet, and Sophos before purchasing.

Pros

  • Reliable
  • Unique Features
  • Caring
  • Saves Time

Harshit A.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Feb 2025

Strong security, threat prevention but Expensive

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

Check Point uses advanced AI-based threat detection, sandboxing and deep inspection while other vendor focuses more on network security.

What is your favorite aspect of this product?

Check Point provides firewall, anti-malware, VPN, data encryption, and endpoint security in one package, reducing the need for multiple solutions.

What do you dislike most about this product?

Expensive especially for small businesses and use more system resources

What recommendations would you give to someone considering this product?

go for Checkpoint security agent this is best agent in market. I used cisco security agent but checkpoint agent is far better than cisco

Pros

  • Performance Enhancing
  • Enables Productivity
  • Unique Features
  • Efficient Service

Aiman S.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Feb 2025

Comprehensive Endpoint Protection with Check Point

Likeliness to Recommend

8 /10

What differentiates Check Point Endpoint Security from other similar products?

The feature that makes Check Point Endpoint different from other vendors is that it detonates suspicious files in a safe environment to analyze their behavior before they can impact the endpoint.

What is your favorite aspect of this product?

The most I like is Check Point, which leverages its ThreatCloud, a massive threat intelligence network to identify and block the latest threats in real-time.

What do you dislike most about this product?

OEM support service can be improved.

What recommendations would you give to someone considering this product?

Evaluate thoroughly, prioritizing performance impact and ease of management against your specific security needs.

Pros

  • Effective Service
  • Client Friendly Policies
  • Performance Enhancing
  • Enables Productivity

Most Popular Check Point Endpoint Security Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Crowdstrike Falcon Platform Logo

    Crowdstrike Falcon Platform

    Compare