What is Check Point Endpoint Security?
Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCheck Point Endpoint Security Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on Check Point Endpoint Security.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
88 Likeliness to Recommend
94 Plan to Renew
94 Satisfaction of Cost Relative to Value
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+91 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love Check Point Endpoint Security?
Pros
- Acts with Integrity
- Helps Innovate
- Enables Productivity
- Fair
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Vendor Capability Ratings
Check Point Endpoint Security Reviews
Alexa N.
- Role: Industry Specific Role
- Industry: Other
- Involvement: End User of Application
Submitted Apr 2022
Full integrated solution
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
Check point Endpoint Security help us to achieve the desired goals with their supportive team and management. It has great capabilities to prevent our system from threats. They are always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. It protects our data at various geographies along with the endpoints that we set up on the cloud. There is dedicated and prevention enhancement for our system to ensure full protection.
What is your favorite aspect of this product?
Check point Endpoint Security provides solutions for our problems based on our requirements. Also, there is low resource usage which prevent the system from collapsing and lagging. They allow us for a one-time login from end users working remotely away from their desks.
What do you dislike most about this product?
Check point Endpoint Security. The complexity for one-time logins are rather lengthy and it takes around five minutes to go through all of the authentication required. This could be improved so we can easily use it.
What recommendations would you give to someone considering this product?
I would recommend Check point Endpoint Security because it is highly accurate for IPS engine and is best in Class Logs Monitoring and report generating Firewall.
Pros
- Performance Enhancing
- Effective Service
- Saves Time
- Client Friendly Policies
Please tell us why you think this review should be flagged.
Noor L.
- Role: Industry Specific Role
- Industry: Retail
- Involvement: End User of Application
Submitted Mar 2022
Check Point Endpoint Security – A Beneficial Tool
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
It detects the threats of viruses and quickly report to the users’. The management of data is reliable. Using thus application, cost low data resources. It helps the users’ and it updates from time to time. Users’ find it quiet flexible and easy to use.
What is your favorite aspect of this product?
The interface is intuitive and user-friendly. It is simple and easy to learn and understand. No training is required for this purpose. It runs in the background allowing the users’ do their work and not interrupting them. It takes all the worries of the user related to viruses and malware. It gives the user more device control.
What do you dislike most about this product?
The speed of the application is slow. This irritates the users’ to wait for log-in and page loading. It consists of errors and bugs. The integration process is quite slow and complex. This makes the user reluctant. The customer service or customer support is not helpful to the users’.
What recommendations would you give to someone considering this product?
It detects the ransomware and quickly removes it from the computer. It is a great feature because it protects and saves the users’ data and files from harm and being corrupt. In this way, it is of great benefit for the user.
Pros
- Trustworthy
- Saves Time
- Acts with Integrity
- Helps Innovate
Please tell us why you think this review should be flagged.
Elisabeth C.
- Role: Information Technology
- Industry: Technology
- Involvement: End User of Application
Submitted Mar 2022
EDR with a fully integrated platform
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
Threat Virtualization and Removal, Conformity Checking, Malware and Forensics, Disk encryptions, consolidated administration, Threat Cloud analytics and URL screening Software, and anti-bot management.
What is your favorite aspect of this product?
When it comes to EDR, Checkpoint performs a distinct role since it offers not just centralized administration but also Attack Emulation, Risk Recovery, and Malware prevention, which are crucial components that eventually give improved security for wandering users.
What do you dislike most about this product?
Improved stability necessitates communications with endpoints. It requires time for the online management dashboard to deliver rules to endpoints. Can be used in conjunction with API to verify users.
What recommendations would you give to someone considering this product?
One of most top-rated platforms in circulation and has enhanced security characteristics that keep it appealing for employment. Check Point Endpoint Protection is ideal for enterprises that need to preserve privacy to reduce risk and damage of customer data.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
Please tell us why you think this review should be flagged.
Most Popular Check Point Endpoint Security Comparisons
Get Instant Access<br>to this Report
Get Instant Access
to this Report
Unlock your first report with just a business email. Register to access our entire library.
© 2024 SoftwareReviews.com. All rights reserved.