We performed a comparison between Check Point Harmony Endpoint and Intercept X Endpoint based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. The solution is praised for its forensic analysis and VPN connectivity. Intercept X Endpoint combines two products into one solution, offering strong performance, server protection, and efficient threat management capabilities. Users say Check Point could improve its endpoint vulnerability management and threat-hunting features. Intercept X Endpoint could benefit from better integration with third-party vendors and improved support for virtual infrastructures.
Service and Support: While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement. Some users found Intercept X Endpoint's support team knowledgeable and supportive, while others expressed dissatisfaction with responsiveness.
Ease of Deployment: Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades. Intercept X Endpoint has a straightforward initial setup, with quick installation and simple configuration and maintenance. Some users said they occasionally encountered issues that required reinstallation.
Pricing: Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower. Intercept X Endpoint is generally seen as fairly priced, but some users think it’s on the higher end of the price scale.
ROI: Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow. Users say that Intercept X Endpoint offers exceptional defense against ransomware and zero-day threats, leading to a positive return on investment.
Comparison Results: Our users prefer Check Point Harmony Endpoint over Intercept X Endpoint. Check Point Harmony Endpoint provides a robust defense against ransomware and phishing attacks. While Intercept X earned high marks for its threat management capabilities, user reviews indicate that Check Point Harmony Endpoint offers a more comprehensive and effective solution for endpoint security.
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"Fortinet is very user-friendly for customers."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"It is stable and scalable."
"This is stable and scalable."
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"The product's initial setup phase is very easy."
"It has a great ability to detect threats and keep us safe."
"It scans all the endpoints in your cloud and on-premises for vulnerabilities, threats, and malware attacks."
"The biggest value we found was ease of deployment. I haven't really used it much, so I can't really comment beyond that. I haven't used it much, but it's working."
"The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options."
"Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information."
"It's easy to scale as needed."
"It provides remote access for the staff and increases their productivity."
"We have found the stability to be very reliable."
"The most valuable feature is the supervisory side of it where we can watch the throughputs, and even the loading of the device, to see how much traffic is happening."
"Machine learning is used to detect the threat and it does so by prioritizing the suspicious activities."
"The most valuable features are the range and restriction."
"The client isolation feature is a very effective feature."
"The most valuable features of Sophos Intercept X are the ease of use and the policy options that are simple to understand. Overall, the protection is good."
"There are additional security features in Sophos Intercept X as well as proxy rules and settings that help us in minimizing the sites that our agents can go to, even after their work hours."
"It's quite simple to use and user friendly."
"The most valuable feature of Intercept X its ability to stay ahead of the infection. By the time the ransomware spreads to the next machine in line, the data has already been encrypted on that workstation. It didn't matter what the ransomware did because could go in and get it back."
"It takes about two business days for initial support, which is too slow in urgent situations."
"The only minor concern is occasional interference with desired programs."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"Cannot be used on mobile devices with a secure connection."
"I haven't seen the use of AI in the solution."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"It's not easy to investigate an incident that you find in the company. Users often face trouble when downloading files, so it is very slow in terms of how it works."
"We would also like the application control module to be further developed in future versions to include applications commonly used or maintained by Check Point in order to be able to configure blocking policies more quickly."
"If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents."
"Check Point Harmony Endpoint's agent is a bit heavy."
"We would like to make the documentation for more modern solutions like the Harmony family easier to find."
"Infinity Portal sometimes requires more performance."
"I think some work needs to be done to improve the integration with other third-party products, namely SIEM solutions."
"There are still functionalities that I have not been able to fully test and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
"I'm not clear on what features need improvement. Everything is mostly fine."
"The initial setup can be difficult if you don't come in with at least some knowledge about the product."
"The tool should be made compatible with Linux and Microsoft operating systems."
"Sophos has a lot of different features. Some of them are tied to different clients, which may mean that different prices or licenses have to be added on. It can be a little bit confusing if you're not familiar with the logic of how they work. They can make it a little bit clearer."
"The security is good but the feature set is limited."
"The pricing could be a bit lower to match the normal retail pricing."
"The EDR could be improved, and perhaps the User Interface."
"When we load Intercept X, it puts a load on the device. When it is scanning, it slows down the device. A system with basic specifications completely slows down till the scan is complete. They should improve this part."
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 103 reviews while Intercept X Endpoint is ranked 7th in Endpoint Protection Platform (EPP) with 101 reviews. Check Point Harmony Endpoint is rated 8.8, while Intercept X Endpoint is rated 8.4. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Intercept X Endpoint writes "A standard offering with good threat analysis but reduces machine performance". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Intercept X Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Symantec Endpoint Security. See our Check Point Harmony Endpoint vs. Intercept X Endpoint report.
See our list of best Endpoint Protection Platform (EPP) vendors and best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.