Check Point Endpoint Security Logo Award Winner Product Badge
Check Point Endpoint Security Logo Award Winner Product Badge
Check Point

Check Point Endpoint Security

Composite Score
8.8 /10
CX Score
9.3 /10
Category
Check Point Endpoint Security
8.8 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Filter By

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

89 Likeliness to Recommend

98 Plan to Renew

87 Satisfaction of Cost Relative to Value

1
Since last award


Emotional Footprint Overview

Chart with 5 data points.
The chart has 1 X axis displaying categories.
The chart has 1 Y axis displaying values. Range: 0 to 100.
End of interactive chart.
{y}
{name}

Emotional Footprint Overview

Product Experience:
96%
Negotiation and Contract:
93%
Conflict Resolution:
94%
Strategy & Innovation:
94%
Service Experience:
94%

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+95 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

Chart

Bar chart with 10 data series.
The chart has 1 X axis displaying values. Range: -0.5 to 0.5.
The chart has 1 Y axis displaying values. Range: 0 to 100.
End of interactive chart.
1% Negative
1% Neutral
98% Positive

Pros

  • Enables Productivity
  • Fair
  • Security Protects
  • Reliable

Feature Ratings

Average 80

Endpoint Detection and Response

86

Centralized Management Portal

85

Port and Device Control

83

Dynamic Malware Detection

83

Host NGFW Functionality

82

Kernel Monitoring

82

Ransomware Recovery and Removal

81

Automated Remediation

79

Application Containment Mechanisms

78

System Hardening

78

Forensics

77

Vendor Capability Ratings

Average 80

Quality of Features

84

Business Value Created

82

Ease of Implementation

81

Ease of IT Administration

81

Product Strategy and Rate of Improvement

80

Breadth of Features

79

Vendor Support

79

Ease of Data Integration

79

Usability and Intuitiveness

79

Ease of Customization

77

Availability and Quality of Training

76

Check Point Endpoint Security Reviews

Elisabeth C.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Mar 2022

EDR with a fully integrated platform

Likeliness to Recommend

8 /10

What differentiates Check Point Endpoint Security from other similar products?

Threat Virtualization and Removal, Conformity Checking, Malware and Forensics, Disk encryptions, consolidated administration, Threat Cloud analytics and URL screening Software, and anti-bot management.

What is your favorite aspect of this product?

When it comes to EDR, Checkpoint performs a distinct role since it offers not just centralized administration but also Attack Emulation, Risk Recovery, and Malware prevention, which are crucial components that eventually give improved security for wandering users.

What do you dislike most about this product?

Improved stability necessitates communications with endpoints. It requires time for the online management dashboard to deliver rules to endpoints. Can be used in conjunction with API to verify users.

What recommendations would you give to someone considering this product?

One of most top-rated platforms in circulation and has enhanced security characteristics that keep it appealing for employment. Check Point Endpoint Protection is ideal for enterprises that need to preserve privacy to reduce risk and damage of customer data.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Karoline S.

  • Role: Industry Specific Role
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Feb 2022

Check Point security includes network security

Likeliness to Recommend

8 /10

What differentiates Check Point Endpoint Security from other similar products?

Allows simultaneous login for end users who work away from their desks. Only Check Point Endpoint Security incorporates advanced remote access as an integral part of storage space. Offers statistics safety for laptops, desktops, and detachable media with a robust and powerful combination of complete disk encryption, access control, port control, and removable media encryption.

What is your favorite aspect of this product?

Enables secure remote access for end users by encryption and authentication of data transmitted between remote access sessions between storage and business network. It protects end-point systems by limiting both incoming and outgoing traffic, ensures they're secure before permitting network access and robotically enforces rules while applications are allowed to run on pcs.

What do you dislike most about this product?

The VPN is the most complex part for us. Debugging is much more complicated compared to Fortinet, for example. That's the worst thing about Check Point.

What recommendations would you give to someone considering this product?

The feature I just like the maximum is their crucial control, the clever controller which you may use to control all the firewalls from one region. It has an ability to access almost everything in one location manage all your gateways and get all your logs for me, is the best feature to work with.

Pros

  • Continually Improving Product
  • Performance Enhancing
  • Enables Productivity
  • Client Friendly Policies

Lara D.

  • Role: Sales Marketing
  • Industry: Finance
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Mar 2022

securing your business flawlessly

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

Check point helps you with so many features that it has and one of those that I like the most are its full disk encryption, threat protection with almost all kinds of basic as well as advanced threats in today’s world. They also have remote access VDN and phishing prevention. In short, it has all features that a company needs to protect itself from unknown threats.

What is your favorite aspect of this product?

When it comes reliability check point is the name that comes in my mind. At our company we have been using it for as long as I can remember. It is surely one of the greatest platforms when you talk about over all security and threat protection online as well as offline. This can easily caters and manages the needs of a big firm like ours and with that my friend I say that we trust them a lot!

What do you dislike most about this product?

Integration of API’s as well cloud and server can be improved, it is not that but there is a small room for improvement. Other than that I can’t remember a thing which I do not like about this software.

What recommendations would you give to someone considering this product?

A platform like this is surely the need of hour. You can manage and annihilate all threats to your company by investing in something that actually works and worth the money. If you are looking for a software that is a whole and complete package with little to no complaint for your big firm, this is your deal. An ideal one!

Pros

  • Helps Innovate
  • Continually Improving Product
  • Inspires Innovation
  • Caring

Most Popular Check Point Endpoint Security Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Crowdstrike Falcon Platform Logo

    Crowdstrike Falcon Platform

    Compare