Check Point Endpoint Security Logo Award Winner Product Badge
Check Point Endpoint Security Logo Award Winner Product Badge
Check Point

Check Point Endpoint Security

Composite Score
8.8 /10
CX Score
9.3 /10
Category
Check Point Endpoint Security
8.8 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Filter By

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

89 Likeliness to Recommend

98 Plan to Renew

87 Satisfaction of Cost Relative to Value

1
Since last award


Emotional Footprint Overview

Chart with 5 data points.
The chart has 1 X axis displaying categories.
The chart has 1 Y axis displaying values. Range: 0 to 100.
End of interactive chart.
{y}
{name}

Emotional Footprint Overview

Product Experience:
96%
Negotiation and Contract:
93%
Conflict Resolution:
94%
Strategy & Innovation:
94%
Service Experience:
95%

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+95 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

Chart

Bar chart with 10 data series.
The chart has 1 X axis displaying values. Range: -0.5 to 0.5.
The chart has 1 Y axis displaying values. Range: 0 to 100.
End of interactive chart.
1% Negative
1% Neutral
98% Positive

Pros

  • Enables Productivity
  • Fair
  • Security Protects
  • Reliable

Feature Ratings

Average 80

Endpoint Detection and Response

86

Centralized Management Portal

85

Port and Device Control

83

Dynamic Malware Detection

83

Host NGFW Functionality

82

Kernel Monitoring

82

Ransomware Recovery and Removal

81

Automated Remediation

79

Application Containment Mechanisms

78

System Hardening

78

Forensics

77

Vendor Capability Ratings

Average 80

Quality of Features

84

Business Value Created

82

Ease of Implementation

81

Ease of IT Administration

81

Product Strategy and Rate of Improvement

80

Breadth of Features

79

Vendor Support

79

Ease of Data Integration

79

Usability and Intuitiveness

79

Ease of Customization

77

Availability and Quality of Training

76

Check Point Endpoint Security Reviews

Nayana K.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Jan 2025

A Solution for EndPoint security with Check Point

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

Check Point EndPoint Security provides zero-day protection from emerging threats.

What is your favorite aspect of this product?

Simple and reliable security administration from a centralized management console.

What do you dislike most about this product?

Pricing for the solution could be minimal, as sometimes smaller organizations cannot afford the products.

What recommendations would you give to someone considering this product?

Best solution to secure the endpoint devices. Highly recommended.

Pros

  • Effective Service
  • Caring
  • Security Protects
  • Helps Innovate

HARISH J.

  • Role: Information Technology
  • Industry: Other
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Jan 2025

EndPoint Security with Check Point

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

Its centralized management console is very helpful for administration and provides full visibility with outstanding reporting.

What is your favorite aspect of this product?

Reporting on incident and endpoint behaviour is outstanding.

What do you dislike most about this product?

As of now, there is no point in disliking the solution.

What recommendations would you give to someone considering this product?

Highly recommended to secure the endpoint devices and meet the security compliance.

Pros

  • Performance Enhancing
  • Enables Productivity
  • Efficient Service
  • Reliable

Dhanaji M.

  • Role: Information Technology
  • Industry: Other
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Jan 2025

A Complete EndPoint Security Solution

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

Its centralized console, which provides central management and visibility across all endpoints, simplifies administration features that differentiate it from other similar products or solutions.

What is your favorite aspect of this product?

What I like most about the product is its unified security architecture, where we can easily integrate the endpoint agent with other Check Point security solutions.

What do you dislike most about this product?

As of now, there is no point in disliking the solution but its OEM support can be improved.

What recommendations would you give to someone considering this product?

I will highly recommend taking advantage of this endpoint solution to provide the best endpoint security and control.

Pros

  • Unique Features
  • Performance Enhancing
  • Enables Productivity
  • Respectful

Most Popular Check Point Endpoint Security Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Crowdstrike Falcon Platform Logo

    Crowdstrike Falcon Platform

    Compare