Check Point Endpoint Security safeguards your company's computers and mobile devices from cyberattacks. It uses advanced technology to detect and block threats, including viruses, malware, and phishing attempts. The software provides tools to investigate security incidents, isolate compromised devices, and respond quickly to threats. Check Point Endpoint Security helps your business stay secure by proactively protecting your devices and data.
Who is Check Point Endpoint Security best for
Check Point Endpoint Security offers robust protection against cyber threats, including viruses, malware, and phishing. Users appreciate its comprehensive security and real-time threat detection. However, some find the setup complex and the cost high. It's a good fit for businesses needing strong security, especially in high-risk industries.
Best fit for small, medium, and large enterprises.
Ideal for finance, healthcare, e-commerce, and media companies.
Check Point Endpoint Security features
Supported
Check Point Endpoint Security protects against exploits targeting software vulnerabilities.
Supported
Check Point offers dashboards with endpoint health, deployment, and threat information.
Supported
Check Point Endpoint Security offers full-disk encryption, access control, and removable media encryption.
Supported
Check Point Endpoint Security includes Zero Phishing technology to detect and block phishing attacks.
Supported
Check Point Endpoint Security offers data encryption, access control, threat prevention, and centralized management.
Supported
Check Point supports network access control with predefined rules and policies.
Supported
Check Point Endpoint Security supports secure remote access via its VPN software blade.
Qualities
We evaluate the sentiment that users express about non-functional aspects of the
software
Value and Pricing Transparency
Strongly negative
-1
Customer Service
Rather negative
-0.5
Ease of Use
Rather positive
+0.67
Reliability and Performance
Strongly positive
+0.87
Ease of Implementation
Rather positive
+0.33
Check Point Endpoint Security reviews
We've summarised 221
Check Point Endpoint Security reviews (Check Point Endpoint Security G2 reviews) and
summarised the main points below.
Pros of Check Point Endpoint Security
Comprehensive protection against various cyber threats.
Real-time threat detection and prevention.
Easy-to-use interface for basic functionalities.
Seamless integration with Check Point VPN client.
Effective anti-ransomware capabilities.
Cons of Check Point Endpoint Security
Complex setup process can be challenging for some users.
High cost, especially for advanced features and add-ons.
Occasional performance impact and resource consumption.
Limited customization for certain features.
Technical support response times can be slow.
Check Point Endpoint Security pricing
The commentary is based on 14 reviews from Check Point Endpoint Security G2 reviews.
Check Point Endpoint Security is praised for its comprehensive security features but reviews often cite its high cost and complex configuration as drawbacks. Some users find the price reasonable, especially for enterprise-grade protection. However, smaller businesses may find it expensive.
Users sentiment
Strongly negative
-1
Check Point Endpoint Security alternatives
FortiClient
Endpoint security keeping your network and devices safe.
What is Check Point Endpoint Security and what does Check Point Endpoint Security do?
Check Point Endpoint Security protects computers and mobile devices from cyber threats like malware and phishing. It offers real-time threat detection, data encryption, and secure remote access, helping businesses maintain a strong security posture. It's known for comprehensive protection but can be complex to set up.
What is Check Point Endpoint Security and what does Check Point Endpoint Security do?
Check Point Endpoint Security protects computers and mobile devices from cyber threats like malware and phishing. It offers real-time threat detection, data encryption, and secure remote access, helping businesses maintain a strong security posture. It's known for comprehensive protection but can be complex to set up.
How does Check Point Endpoint Security integrate with other tools?
Check Point Endpoint Security integrates with other Check Point products, such as its VPN client. It also supports network access control with predefined rules and policies. However, some users find the setup process complex and customization limited.
How does Check Point Endpoint Security integrate with other tools?
Check Point Endpoint Security integrates with other Check Point products, such as its VPN client. It also supports network access control with predefined rules and policies. However, some users find the setup process complex and customization limited.
What the main competitors of Check Point Endpoint Security?
Top alternatives to Check Point Endpoint Security include Symantec Endpoint Security, SonicWall Capture Client, Trend Micro Smart Protection Suite, and ESET PROTECT SUITE. These competitors offer similar endpoint protection features like antivirus, anti-malware, and threat detection.
What the main competitors of Check Point Endpoint Security?
Top alternatives to Check Point Endpoint Security include Symantec Endpoint Security, SonicWall Capture Client, Trend Micro Smart Protection Suite, and ESET PROTECT SUITE. These competitors offer similar endpoint protection features like antivirus, anti-malware, and threat detection.
Is Check Point Endpoint Security legit?
Check Point Endpoint Security is a legitimate and widely used security software. It offers robust protection against various cyber threats, with real-time detection and prevention capabilities. However, potential users should be aware of the complex setup and higher cost.
Is Check Point Endpoint Security legit?
Check Point Endpoint Security is a legitimate and widely used security software. It offers robust protection against various cyber threats, with real-time detection and prevention capabilities. However, potential users should be aware of the complex setup and higher cost.
How much does Check Point Endpoint Security cost?
I'm sorry, but pricing information for Check Point Endpoint Security is not available. Contact Check Point directly for detailed pricing based on your specific needs and to determine if the product is worth the investment for your endpoint security requirements.
How much does Check Point Endpoint Security cost?
I'm sorry, but pricing information for Check Point Endpoint Security is not available. Contact Check Point directly for detailed pricing based on your specific needs and to determine if the product is worth the investment for your endpoint security requirements.
Is Check Point Endpoint Security customer service good?
Check Point Endpoint Security's customer support receives mixed reviews. While some users praise the support team's helpfulness, others express frustration with delayed responses and ineffective solutions. A few users mention the need for an improved online support portal.
Is Check Point Endpoint Security customer service good?
Check Point Endpoint Security's customer support receives mixed reviews. While some users praise the support team's helpfulness, others express frustration with delayed responses and ineffective solutions. A few users mention the need for an improved online support portal.
Reviewed by
MK
Michal Kaczor
CEO at Gralio
Michal has worked at startups for many years and writes about topics relating to software selection and IT
management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs
of any business and find solutions to its problems.
TT
Tymon Terlikiewicz
CTO at Gralio
Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech
department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX,
HR, Payroll, Marketing automation and various developer tools.
NEW: Introducing Gralio Screen Buddy
An AI tool that observes your work, finds inefficiencies, and suggests smarter ways to do things. Maybe
you can use your tools better, automate tasks, or switch software.