Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)
Check Point Endpoint Security Logo
Check Point Endpoint Security Logo
Check Point

Check Point Endpoint Security

Composite Score
7.9 /10
CX Score
8.3 /10
Category
Check Point Endpoint Security
7.9 /10

What is Check Point Endpoint Security?

Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Check Point Endpoint Security won the following awards in the Endpoint Protection - Midmarket category

Check Point Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Check Point Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

88 Likeliness to Recommend

94 Plan to Renew

94 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+91 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Check Point Endpoint Security?

3% Negative
4% Neutral
93% Positive

Pros

  • Acts with Integrity
  • Helps Innovate
  • Enables Productivity
  • Fair

Feature Ratings

Average 81

Vendor Capability Ratings

Average 83

Check Point Endpoint Security Reviews

Karoline S.

  • Role: Industry Specific Role
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Feb 2022

Check Point security includes network security

Likeliness to Recommend

8 /10

What differentiates Check Point Endpoint Security from other similar products?

Allows simultaneous login for end users who work away from their desks. Only Check Point Endpoint Security incorporates advanced remote access as an integral part of storage space. Offers statistics safety for laptops, desktops, and detachable media with a robust and powerful combination of complete disk encryption, access control, port control, and removable media encryption.

What is your favorite aspect of this product?

Enables secure remote access for end users by encryption and authentication of data transmitted between remote access sessions between storage and business network. It protects end-point systems by limiting both incoming and outgoing traffic, ensures they're secure before permitting network access and robotically enforces rules while applications are allowed to run on pcs.

What do you dislike most about this product?

The VPN is the most complex part for us. Debugging is much more complicated compared to Fortinet, for example. That's the worst thing about Check Point.

What recommendations would you give to someone considering this product?

The feature I just like the maximum is their crucial control, the clever controller which you may use to control all the firewalls from one region. It has an ability to access almost everything in one location manage all your gateways and get all your logs for me, is the best feature to work with.

Pros

  • Continually Improving Product
  • Performance Enhancing
  • Enables Productivity
  • Client Friendly Policies

Waithaka G.

  • Role: Information Technology
  • Industry: Transportation
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Jan 2022

Great Capabilities But Expensive

Likeliness to Recommend

9 /10

What differentiates Check Point Endpoint Security from other similar products?

What makes Check Point Endpoint Security different from many competitors is the ease of managing all endpoint features from a single console. The software offers features that makes it easy to secure networks and data. It also comes with advanced threats protection features.

What is your favorite aspect of this product?

The software is easy to manage thanks to the centralized console. The software keeps away malware among other forms of threats. It is quick to detect and block threats

What do you dislike most about this product?

While it offers best features, it doesn't come cheap

What recommendations would you give to someone considering this product?

For the best Endpoint protection for your business, I recommend Check Point Endpoint Security. It's effective and offers multiple features. However, you will have to pay more for the bullet proof security features.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Performance Enhancing
  • Enables Productivity
  • Role: Finance
  • Industry: Construction
  • Involvement: End User of Application
Validated Review
Anonymous Reviewer

Submitted Aug 2021

Effective and and Affordable Endpoint Protection

Likeliness to Recommend

9 /10

Pros

  • Reliable
  • Enables Productivity
  • Effective Service
  • Saves Time

Most Popular Check Point Endpoint Security Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019