This content is currently locked.

Your current McLean & Company subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
+1-877-281-0480 (US/CAN) or
+1-703-544-9513 (International)
Check Point Endpoint Security Logo Award Winner Product Badge
Check Point Endpoint Security Logo Award Winner Product Badge
Check Point

Check Point Endpoint Security

Composite Score
8.9 /10
CX Score
9.3 /10
Category
Check Point Endpoint Security
8.9 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Filter By

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

90 Likeliness to Recommend

98 Plan to Renew

86 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+95 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

1% Negative
1% Neutral
98% Positive

Pros

  • Enables Productivity
  • Reliable
  • Fair
  • Friendly Negotiation

Feature Ratings

Average 81

Endpoint Detection and Response

87

Centralized Management Portal

85

Dynamic Malware Detection

84

Port and Device Control

83

Ransomware Recovery and Removal

82

Host NGFW Functionality

82

Kernel Monitoring

81

Automated Remediation

80

Application Containment Mechanisms

80

System Hardening

79

Mac OS support

78

Vendor Capability Ratings

Average 80

Quality of Features

85

Business Value Created

84

Ease of IT Administration

82

Ease of Implementation

81

Breadth of Features

80

Usability and Intuitiveness

80

Ease of Data Integration

79

Product Strategy and Rate of Improvement

79

Vendor Support

79

Ease of Customization

78

Availability and Quality of Training

76

Check Point Endpoint Security Reviews

Kushal K.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Jan 2025

Great features and performance but a bit expensive

Likeliness to Recommend

10 /10

What differentiates Check Point Endpoint Security from other similar products?

Stronger threat protection, easy centralized management and smooth integration unlike traditional antivirus that reacts after attacks happen

What is your favorite aspect of this product?

I like how it stops threats before they can cause any damage and runs smoothly in the background

What do you dislike most about this product?

Sometimes it slows down the system, and the price is a bit high compared to other options

What recommendations would you give to someone considering this product?

If you need strong security, it's a good choice, but be ready for a slightly high price and some system slowdowns. Try the demo first to see if it works well for you

Pros

  • Reliable
  • Unique Features
  • Effective Service
  • Saves Time

Nasreen S.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Jan 2025

Strong security, but can impact system performance

Likeliness to Recommend

8 /10

What differentiates Check Point Endpoint Security from other similar products?

Check Point Endpoint Security gives better protection and works well with other security tools compared to other brands. It focuses on stopping threats before they happen, unlike basic antivirus

What is your favorite aspect of this product?

simple centralize management and easy to use

What do you dislike most about this product?

cost and it effect some system performance in my company

What recommendations would you give to someone considering this product?

The cost should be lower, and the product should be made more lightweight to avoid slowing down system performance in the company

Pros

  • Reliable
  • Unique Features
  • Respectful
  • Security Protects

Fatema S.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Jan 2025

Strong threat prevention but need high resource.

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

It provides comprehensive endpoint DLP not all vendors offer endpoint specific DLP

What is your favorite aspect of this product?

It provides seamless integration with check point ecosystem and it's interface is user friendly.

What do you dislike most about this product?

The check point endpoint consume high cpu and memory that effect in system performance.

What recommendations would you give to someone considering this product?

Choose the right Check Point Endpoint security licensing plan based on your needs and deploy it either in the cloud or on-prem.

Pros

  • Reliable
  • Performance Enhancing
  • Enables Productivity
  • Unique Features

Most Popular Check Point Endpoint Security Comparisons