Check Point Endpoint Security Logo Award Winner Product Badge
Check Point Endpoint Security Logo Award Winner Product Badge
Check Point

Check Point Endpoint Security

Composite Score
8.8 /10
CX Score
9.3 /10
Category
Check Point Endpoint Security
8.8 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Filter By

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

89 Likeliness to Recommend

98 Plan to Renew

87 Satisfaction of Cost Relative to Value

1
Since last award


Emotional Footprint Overview

Chart with 5 data points.
The chart has 1 X axis displaying categories.
The chart has 1 Y axis displaying values. Range: 0 to 100.
End of interactive chart.
{y}
{name}

Emotional Footprint Overview

Product Experience:
96%
Negotiation and Contract:
93%
Conflict Resolution:
94%
Strategy & Innovation:
94%
Service Experience:
94%

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+95 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

Chart

Bar chart with 10 data series.
The chart has 1 X axis displaying values. Range: -0.5 to 0.5.
The chart has 1 Y axis displaying values. Range: 0 to 100.
End of interactive chart.
1% Negative
2% Neutral
97% Positive

Pros

  • Enables Productivity
  • Fair
  • Security Protects
  • Reliable

Feature Ratings

Average 80

Endpoint Detection and Response

86

Centralized Management Portal

85

Port and Device Control

83

Dynamic Malware Detection

83

Host NGFW Functionality

82

Kernel Monitoring

82

Ransomware Recovery and Removal

81

Automated Remediation

79

Application Containment Mechanisms

78

System Hardening

78

Forensics

77

Vendor Capability Ratings

Average 80

Quality of Features

84

Business Value Created

82

Ease of Implementation

81

Ease of IT Administration

81

Product Strategy and Rate of Improvement

80

Breadth of Features

79

Vendor Support

79

Ease of Data Integration

79

Usability and Intuitiveness

79

Ease of Customization

77

Availability and Quality of Training

76

Check Point Endpoint Security Reviews

Alexa N.

  • Role: Industry Specific Role
  • Industry: Other
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Apr 2022

Full integrated solution

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

Check point Endpoint Security help us to achieve the desired goals with their supportive team and management. It has great capabilities to prevent our system from threats. They are always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. It protects our data at various geographies along with the endpoints that we set up on the cloud. There is dedicated and prevention enhancement for our system to ensure full protection.

What is your favorite aspect of this product?

Check point Endpoint Security provides solutions for our problems based on our requirements. Also, there is low resource usage which prevent the system from collapsing and lagging. They allow us for a one-time login from end users working remotely away from their desks.

What do you dislike most about this product?

Check point Endpoint Security. The complexity for one-time logins are rather lengthy and it takes around five minutes to go through all of the authentication required. This could be improved so we can easily use it.

What recommendations would you give to someone considering this product?

I would recommend Check point Endpoint Security because it is highly accurate for IPS engine and is best in Class Logs Monitoring and report generating Firewall.

Pros

  • Performance Enhancing
  • Effective Service
  • Saves Time
  • Client Friendly Policies

Manuel H.

  • Role: Sales Marketing
  • Industry: Entertainment
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Apr 2022

The report is simple to read.

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

The setup screen may also be presented in other languajes, and the settings are simple to grasp. So that it is simple to comprehend, various information is supplied weekly or monthly, such as illegal access, infected devices, and which programs utilize a lot of bandwidth. Infected and hacked devices are also identified by their IP addresses, which might alert you even if nothing happens, and it is simple to warn you to be cautious about security.

What is your favorite aspect of this product?

Simple to configure, and even when configured by default, enough security is ensured. You may quickly configure settings to meet your organization's security policy. I believe these things were unnoticed since I did not implement CheckPoint. I believe that internalizing the report's contents will raise security awareness throughout the organization. According to the logs and reports, there appear to be a number of external attacks. Because the applications you are using are also appearing in the report, we are making efforts to prevent the usage of programs that are judged harmful or unrelated to work.

What do you dislike most about this product?

I don't always get the report. You can check by login into the administration panel, so no worries there, but if you don't get it, you may be concerned about what occurred.

What recommendations would you give to someone considering this product?

If you use the Internet, I believe UTM is a requirement. It appears that it is still not as well known as other UTMs, but it is highly regarded in the industry, and I read that Check Point invented the UTM mechanism. It is also suggested since the setup is simple to grasp and use it. Even when an employee searches with a browser and attempts to reach the home page, harmful sites are banned, thus it is extremely valuable as an administrator to avoid virus infection in advance.

Pros

  • Continually Improving Product
  • Reliable
  • Enables Productivity
  • Trustworthy

Noor L.

  • Role: Industry Specific Role
  • Industry: Retail
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Mar 2022

Check Point Endpoint Security – A Beneficial Tool

Likeliness to Recommend

8 /10

What differentiates Check Point Endpoint Security from other similar products?

It detects the threats of viruses and quickly report to the users’. The management of data is reliable. Using thus application, cost low data resources. It helps the users’ and it updates from time to time. Users’ find it quiet flexible and easy to use.

What is your favorite aspect of this product?

The interface is intuitive and user-friendly. It is simple and easy to learn and understand. No training is required for this purpose. It runs in the background allowing the users’ do their work and not interrupting them. It takes all the worries of the user related to viruses and malware. It gives the user more device control.

What do you dislike most about this product?

The speed of the application is slow. This irritates the users’ to wait for log-in and page loading. It consists of errors and bugs. The integration process is quite slow and complex. This makes the user reluctant. The customer service or customer support is not helpful to the users’.

What recommendations would you give to someone considering this product?

It detects the ransomware and quickly removes it from the computer. It is a great feature because it protects and saves the users’ data and files from harm and being corrupt. In this way, it is of great benefit for the user.

Pros

  • Trustworthy
  • Saves Time
  • Acts with Integrity
  • Helps Innovate

Most Popular Check Point Endpoint Security Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Crowdstrike Falcon Platform Logo

    Crowdstrike Falcon Platform

    Compare