We performed a comparison between Check Point Harmony Endpoint and ESET Endpoint Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. The solution is praised for its forensic analysis and VPN connectivity. ESET Endpoint Security is highly regarded for its encryption capabilities, effortless automatic updates, and intuitive interface. Users say Check Point could improve its endpoint vulnerability management and threat-hunting features. ESET Endpoint Security has room for improvement in terms of faster threat alerts, automation, and ransomware protection.
Service and Support: While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement. ESET's customer service is praised for its helpfulness and quick response.
Ease of Deployment: Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades. The setup process for ESET Endpoint Security is generally regarded as effortless.
Pricing: Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower. ESET Endpoint Security is considered to be reasonably priced with various licensing options.
ROI: Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow. Some reported a high ROI from ESET Endpoint Security due to cost savings, while others find it difficult to measure its effectiveness.
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"Ability to get forensics details and also memory exfiltration."
"The product's initial setup phase is very easy."
"The most valuable feature is the analysis, because of the beta structure."
"The setup is pretty simple."
"The stability is very good."
"The solution was relatively easy to deploy."
"SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth."
"It's great for securing our endpoints from any external attacks."
"Resource overheads have been reduced and we are overall more secure as a business."
"Forensic Analysis provides a complete analysis of threats via detailed reports."
"We were under an attack in our environment, and the Check Point response was good because we didn't lose anything."
"The most valuable feature of this solution is the VPN."
"The level of security and visibility they provide is great and it is very easy to configure and maintain."
"Deploying new versions of the endpoint are easy."
"They do a program where you can renew for three years. It's very reasonable, as far as the cost per year, because you can renew for three years. They will also do multiple computers, so I actually protect all my family computers, as well as my work computers, all under one license. This means I only have to deal with re-upping my license once every three years. That's the big thing for me."
"The pricing, if compared to other products, is cheap."
"The most valuable features of ESET Endpoint Antivirus are the search engine, easy firewall setup, and ransomware scans."
"The pricing is good."
"It is a scalable solution."
"It's easy to set up and quick to deploy."
"I have found ESET Endpoint Antivirus is light on system resources compared with other antivirus solutions that tend to be very heavy on the computers system resources. Additionally, the solution is very secure."
"The protection and device control features are the most valuable. I found its user interface and integration pretty good. It is very user friendly as compared to other products."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"We find the solution to be a bit expensive."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"The solution is not stable."
"Detections could be improved."
"The SIEM could be improved."
"FortiEDR can be improved by providing more detailed reporting."
"I haven't seen the use of AI in the solution."
"The solution could improve VPN functionality and the VPN user-interface."
"Compared to other brands, we would like a dedicated anti-spam to be included in order to close the full circle."
"We would like to have the ability to stop and restart the service remotely, which is something that we can do easily with Symantec but have a hard time with when using Check Point."
"Technical support can be a bit slow at times."
"It needs more documentation and better ease of deployment. For documentation, it needs more information about integrating the endpoints on SandBlast Agent mobile as well as on desktop platforms."
"Areas that have room for improvement are the scope of the product and, while I think the support is good, they can improve support as well."
"Technical support needs to be improved, along with the response time."
"There are still functionalities that I have not been able to fully test and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
"The management of the solution isn't as clear as it could be. They could adjust that to make it a better product."
"I'm not aware of any areas that need improvement."
"The stability needs to be improved. There are bugs that you have to deal with."
"The solution could have a more user-friendly interface."
"The console or GUI of ESET Endpoint Antivirus should improve. Additionally, they should provide an addon feature for HyperV and VMware."
"They could improve the solution by adding better ransomware features."
"The update process can be improved, and there could be an automatic update process when a new version comes out. For system updates or program updates, there could be more automation."
"It would be great to have VIP functions added to the solution in a future release."
More ESET Endpoint Protection Platform Pricing and Cost Advice →
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 104 reviews while ESET Endpoint Protection Platform is ranked 11th in Endpoint Protection Platform (EPP) with 99 reviews. Check Point Harmony Endpoint is rated 8.8, while ESET Endpoint Protection Platform is rated 8.2. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of ESET Endpoint Protection Platform writes "Easy to set up with good security and rapidly improving capabilities". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and Cortex XDR by Palo Alto Networks, whereas ESET Endpoint Protection Platform is most compared with Microsoft Defender for Endpoint, Kaspersky Endpoint Security for Business, CrowdStrike Falcon, SentinelOne Singularity Complete and Fortinet FortiClient. See our Check Point Harmony Endpoint vs. ESET Endpoint Protection Platform report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.