


What is Check Point Endpoint Security?
Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCheck Point Endpoint Security Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on Check Point Endpoint Security.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
89 Likeliness to Recommend
98 Plan to Renew
88 Satisfaction of Cost Relative to Value
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+94 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love Check Point Endpoint Security?
Pros
- Enables Productivity
- Fair
- Security Protects
- Reliable
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Endpoint Detection and Response
Centralized Management Portal
Port and Device Control
Dynamic Malware Detection
Kernel Monitoring
Host NGFW Functionality
Ransomware Recovery and Removal
Automated Remediation
Application Containment Mechanisms
Forensics
System Hardening
Vendor Capability Ratings
Quality of Features
Business Value Created
Ease of Implementation
Ease of IT Administration
Product Strategy and Rate of Improvement
Breadth of Features
Vendor Support
Usability and Intuitiveness
Ease of Data Integration
Ease of Customization
Availability and Quality of Training
Check Point Endpoint Security Reviews
Omkar P.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Development, Integration, and Administration
Submitted Feb 2025
offer strong security but expensive
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
Unlike many endpoint solutions that require multiple agents, Check Point provides a single-agent architecture that integrates multiple security features, including anti-malware, firewall, data encryption, and VPN.
What is your favorite aspect of this product?
Provide security includes data security, network security, advanced threat prevention, forensics, endpoint detection and response (EDR), and remote access VPN solutions in single agent
What do you dislike most about this product?
Expensive and some time use more CPU
What recommendations would you give to someone considering this product?
before buying Identify your security needs, choose the right License Plan and Check Point can be expensive, so compare pricing with Cisco, Fortinet, and Sophos before purchasing.
Pros
- Reliable
- Unique Features
- Caring
- Saves Time
Please tell us why you think this review should be flagged.
Harshit A.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Development, Integration, and Administration
Submitted Feb 2025
Strong security, threat prevention but Expensive
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
Check Point uses advanced AI-based threat detection, sandboxing and deep inspection while other vendor focuses more on network security.
What is your favorite aspect of this product?
Check Point provides firewall, anti-malware, VPN, data encryption, and endpoint security in one package, reducing the need for multiple solutions.
What do you dislike most about this product?
Expensive especially for small businesses and use more system resources
What recommendations would you give to someone considering this product?
go for Checkpoint security agent this is best agent in market. I used cisco security agent but checkpoint agent is far better than cisco
Pros
- Performance Enhancing
- Enables Productivity
- Unique Features
- Efficient Service
Please tell us why you think this review should be flagged.
Aiman S.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Development, Integration, and Administration
Submitted Feb 2025
Comprehensive Endpoint Protection with Check Point
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
The feature that makes Check Point Endpoint different from other vendors is that it detonates suspicious files in a safe environment to analyze their behavior before they can impact the endpoint.
What is your favorite aspect of this product?
The most I like is Check Point, which leverages its ThreatCloud, a massive threat intelligence network to identify and block the latest threats in real-time.
What do you dislike most about this product?
OEM support service can be improved.
What recommendations would you give to someone considering this product?
Evaluate thoroughly, prioritizing performance impact and ease of management against your specific security needs.
Pros
- Effective Service
- Client Friendly Policies
- Performance Enhancing
- Enables Productivity
Please tell us why you think this review should be flagged.
Get Instant Access<br>to this Report
Get Instant Access
to this Report
Unlock your first report with just a business email. Register to access our entire library.
© 2025 SoftwareReviews.com. All rights reserved.
