We performed a comparison between Check Point Harmony Endpoint and Cynet based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. The solution is praised for its forensic analysis and VPN connectivity. Cynet offers strong ransomware protection and an intuitive interface. Users say Check Point could improve its endpoint vulnerability management and threat-hunting features. Cynet needs to expand device support and add customization options. Users suggest improving network monitoring and strengthening integration with other tools.
Service and Support: While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement. Cynet's customer service is consistently lauded for its excellence. They have a dedicated support team that is available round the clock, and they also have a contingency plan for urgent incidents.
Ease of Deployment: Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades. Cynet’s setup is highly efficient, with the ability to configure thousands of devices quickly.
Pricing: Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower. Customers generally think Cynet is affordable and a good value for its features.
ROI: Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow. Cynet yields an excellent ROI by preventing cyberattacks and safeguarding sensitive data.
Comparison Results: Our users prefer Check Point Harmony Endpoint over Cynet. Check Point Harmony Endpoint provides a robust defense against ransomware and phishing attacks. While Cynet receives praise for its ransomware protection and 24/7 support, user reviews indicate that Check Point Harmony Endpoint offers a more comprehensive and effective solution for endpoint security.
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"NGAV and EDR features are outstanding."
"I get alerts when scripts are detected in the environment."
"The stability is very good."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"The setup is pretty simple."
"This is stable and scalable."
"The price is low and quite competitive with others."
"Its ability to rollback anti-ransomware once an attack has started is the most valuable feature."
"It is very powerful tooling that can be tuned a lot."
"One of the strengths of Harmony is its power to detect threats and keep us safe."
"The rollout and management of devices were very simple."
"The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry."
"The security is its most valuable feature."
"The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers."
"It has extended OS support to ensure your legacy endpoints also have zero-day protection."
"The product has valuable front-end features."
"We are protecting all our workstations."
"The visibility it gives is excellent."
"It is a very stable solution...It is a very scalable solution...The initial setup of Cynet was easy."
"The initial setup is very fast and very easy."
"The interface is exceptionally clear and easy to understand."
"A reliable security system that automatically quarantines anything suspicious."
"Cynet's most valuable features are laptop and server performance, internal network monitoring, and external firewall lock management."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"We'd like to see more one-to-one product presentations for the distribution channels."
"Detections could be improved."
"The only minor concern is occasional interference with desired programs."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"Cannot be used on mobile devices with a secure connection."
"ZTNA can improve latency."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"As I understand there will be a URL filtering feature included with the browser agent in the future. This will allow URL filtering without the need for a Gateway Device. This is something I am looking forward to and would be a great addition to list of features."
"Tech Support must be better."
"We need a higher maximum file size in the sandboxing feature."
"They need to make the user interface on the server more intuitive and user-friendly."
"Check Point offers solutions with only a few features for our company's customers' sites."
"It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects."
"It's not easy to investigate an incident that you find in the company. Users often face trouble when downloading files, so it is very slow in terms of how it works."
"If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents."
"Its dashboard is not so good. On the dashboard, they don't show the count for client endpoints, which is a failure of this product. This count should be shown on the dashboard. I have 1,000 clients, but I can't see it anywhere on the dashboard."
"There are some shortcomings in Cynet's integration capabilities that need improvement."
"Most of their times are in Greenwich Mean Time. I would like to see more local time zones."
"It is an endpoint agent, but they don't have a probe for checking the network traffic. They could improve from this point of view."
"I think the technical support could be better."
"Compliance reports need to improve."
"The solution just needs to keep maturing and they need to keep up with the threat landscape to ensure they're protecting clients well as time passes."
"An administration feature will be useful for Cynet."
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 104 reviews while Cynet is ranked 16th in Endpoint Protection Platform (EPP) with 35 reviews. Check Point Harmony Endpoint is rated 8.8, while Cynet is rated 8.8. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Cynet writes "Provides memory protection, device control, and vulnerability management". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and Cortex XDR by Palo Alto Networks, whereas Cynet is most compared with CrowdStrike Falcon, SentinelOne Singularity Complete, ESET Endpoint Protection Platform, Microsoft Defender for Endpoint and Wazuh. See our Check Point Harmony Endpoint vs. Cynet report.
See our list of best Endpoint Protection Platform (EPP) vendors, best Endpoint Detection and Response (EDR) vendors, and best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.