


What is Check Point Endpoint Security?
Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCheck Point Endpoint Security Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on Check Point Endpoint Security.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
89 Likeliness to Recommend
98 Plan to Renew
87 Satisfaction of Cost Relative to Value
1
Since last award
Emotional Footprint Overview
- Product Experience:
- 96%
- Negotiation and Contract:
- 93%
- Conflict Resolution:
- 94%
- Strategy & Innovation:
- 94%
- Service Experience:
- 95%
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+95 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love Check Point Endpoint Security?
Pros
- Enables Productivity
- Fair
- Security Protects
- Reliable
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Endpoint Detection and Response
Centralized Management Portal
Port and Device Control
Dynamic Malware Detection
Host NGFW Functionality
Kernel Monitoring
Ransomware Recovery and Removal
Automated Remediation
Application Containment Mechanisms
System Hardening
Forensics
Vendor Capability Ratings
Quality of Features
Business Value Created
Ease of Implementation
Ease of IT Administration
Product Strategy and Rate of Improvement
Breadth of Features
Vendor Support
Ease of Data Integration
Usability and Intuitiveness
Ease of Customization
Availability and Quality of Training
Check Point Endpoint Security Reviews

Muhammad Abdullah F.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Leader or Manager
Submitted Aug 2022
Great product which is improving a lot
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
It has a great infinity portal to manage everything.
What is your favorite aspect of this product?
Ease of deployment
What do you dislike most about this product?
Hard to remove it
What recommendations would you give to someone considering this product?
There are better products out there
Pros
- Helps Innovate
- Unique Features
- Effective Service
- Inspires Innovation
Please tell us why you think this review should be flagged.

Reign R.
- Role: Industry Specific Role
- Industry: Manufacturing
- Involvement: End User of Application
Submitted Jul 2022
Checkpoint top-notch tool for cybersecurity
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
While downloading the files, threat emulation and threat extraction help the users a lot. The software offers quick and perfect remedies to the system. It helps in managing reports and generating accurate reports of analytics.
What is your favorite aspect of this product?
The best thing about check point software is that it comes with the sandblast agent to protect the endpoint and other devices. The framework is unique and captivating which not only detects but also investigates, isolates, and improves security concerns.
What do you dislike most about this product?
The checkpoint endpoint tool has some missing features and these features play an important role in supporting the best security functions. So, the tool is also overpriced when it comes to the features and you have to pay extra charges for cloud storage.
What recommendations would you give to someone considering this product?
On the whole, the checkpoint endpoint system is highly recommended to buy and the best part is that the free version is also available. Moreover, the software integrates through various channels and helps in browsing multiple database files which is apt. Another interesting thing about this tool is that you can install, uninstall and set it up this tool with zero hassle.
Pros
- Performance Enhancing
- Trustworthy
- Efficient Service
- Effective Service
Please tell us why you think this review should be flagged.
Noah L.
- Role: Industry Specific Role
- Industry: Finance
- Involvement: End User of Application
Submitted Jun 2022
A good solution that is still being developed.
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
Risk Emulation, which is downloadable file sandboxing, and Threat Extraction, which is data sanitization by proactive content elimination, are both very helpful in safeguarding file downloads, particularly from harmful URLs in e-mails. Anti-phishing performs well, stopping consumers from providing data on sites that appear to be authentic. Forensic investigations provide information about the incident's circumstances. There are several great features in this software, but I like the explore plugin. End customers recognize the increased value of the protection since the Checkpoint Browse plugin accomplishes something right away.
What is your favorite aspect of this product?
It is a robust antivirus program that prevents the setup folder that some other antivirus solutions easily accept. It verifies, for example, if the source can be validated. Check point has significantly assisted us in gaining new consumers in the sector. We appreciate the product since it is simple to use, cloud-based, and straightforward to set up. The management and investigative analytics that you provide us are beneficial in reducing danger. Threat tracking is particularly useful since it allows us to see where an assault began and allows us to react quickly. This is beneficial to the event response staff.
What do you dislike most about this product?
The administration portal's functionality might be improved. Exceptional administration is too broad for instance, we can't add a URL exception for anti-phishing but not for content screening. Risk Hunting doesn't enable us to scan for HTTPS URLs, just DNS searches or IP addresses. Whenever we seek instant data from the network, the system performance increases, and installed programs are stalled.
What recommendations would you give to someone considering this product?
There is nothing to hate; the community support is excellent, and the TAC assistance is among the finest I've seen; they routinely have very competent personnel.
Pros
- Reliable
- Trustworthy
- Caring
- Generous Negotitation
Please tell us why you think this review should be flagged.
Get Instant Access<br>to this Report
Get Instant Access
to this Report
Unlock your first report with just a business email. Register to access our entire library.
© 2025 SoftwareReviews.com. All rights reserved.
