We performed a comparison between Check Point Harmony Endpoint and ESET Endpoint Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. The solution is praised for its forensic analysis and VPN connectivity. ESET Endpoint Security is highly regarded for its encryption capabilities, effortless automatic updates, and intuitive interface. Users say Check Point could improve its endpoint vulnerability management and threat-hunting features. ESET Endpoint Security has room for improvement in terms of faster threat alerts, automation, and ransomware protection.
Service and Support: While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement. ESET's customer service is praised for its helpfulness and quick response.
Ease of Deployment: Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades. The setup process for ESET Endpoint Security is generally regarded as effortless.
Pricing: Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower. ESET Endpoint Security is considered to be reasonably priced with various licensing options.
ROI: Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow. Some reported a high ROI from ESET Endpoint Security due to cost savings, while others find it difficult to measure its effectiveness.
"This is stable and scalable."
"The stability is very good."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"The most valuable feature is the analysis, because of the beta structure."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"Forensics is a valuable feature of Fortinet FortiEDR."
"Ability to get forensics details and also memory exfiltration."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"It's pretty complete for preventing threats to endpoints. Its capabilities are great."
"Its ability to rollback anti-ransomware once an attack has started is the most valuable feature."
"We now feel more secure with our PCs, even more with the non-technical persons."
"The solution has good threat intelligence features."
"Information is easily managed and protected (which is particularly useful in lost or stolen endpoints)."
"It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution."
"It prevents the most imminent threats to the endpoint such as ransomware, phishing or drive-by malware, while quickly minimizing breach impact with autonomous detection and response."
"There's the possibility of being able to do the administration from the Check Point portal, maintaining control and visibility of the different security events at all times."
"ESET Endpoint Security’s most valuable feature is the management console."
"The maintenance is easy."
"This is a product at the top of its game. That is the reason we choose to support and sell it."
"The solution is easy to install and configure."
"A feature we like is setting the GUI of ESET Endpoint Security/ESET File Security to silent mode because some servers and clients can have performance issues."
"It has been working fine. It lets you know when it finds things. We didn't have any incident where the place had to shut down or was taken over by anything. We haven't had any issues that we know of."
"The most valuable feature of this solution is the ease of use."
"The most valuable features of ESET Endpoint Antivirus are the search engine, easy firewall setup, and ransomware scans."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"I haven't seen the use of AI in the solution."
"Making the portal mobile friendly would be helpful when I am out of office."
"The only minor concern is occasional interference with desired programs."
"We find the solution to be a bit expensive."
"Detections could be improved."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"There are still functionalities that I have not been able to fully test and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
"It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects."
"Support's service and the response times can be improved. The triaging of the tickets takes a long time and the tickets are only resolved with escalations."
"The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis."
"Legacy VPNs and digital footprints should be minimized."
"The solution has limitations if it's hosted on-prem or as a SaaS."
"It needs more documentation and better ease of deployment. For documentation, it needs more information about integrating the endpoints on SandBlast Agent mobile as well as on desktop platforms."
"Endpoint vulnerability management is one of the modules I believe is missing and it is something that is required."
"ESET should consider giving it application control."
"Data Leak Protection is is what we are searching for at the moment. It is not included with ESET."
"The solution’s console management and scalability should be improved."
"We would like to see more options in the help menu for users."
"The solution could be more user-friendly."
"There are other features you can add on to help make the security stronger, however, they should offer better security even on a basic level."
"The user interface of ESET Endpoint Security could be more user-friendly and more features could be added."
"I am a MAC user and my asset cybersecurity is continuously displaying warnings that I am not using their firewall."
More ESET Endpoint Protection Platform Pricing and Cost Advice →
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 101 reviews while ESET Endpoint Protection Platform is ranked 9th in Endpoint Protection Platform (EPP) with 96 reviews. Check Point Harmony Endpoint is rated 8.8, while ESET Endpoint Protection Platform is rated 8.2. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of ESET Endpoint Protection Platform writes "Easy to set up with good security and rapidly improving capabilities". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas ESET Endpoint Protection Platform is most compared with Microsoft Defender for Endpoint, Kaspersky Endpoint Security for Business, CrowdStrike Falcon, SentinelOne Singularity Complete and Fortinet FortiClient. See our Check Point Harmony Endpoint vs. ESET Endpoint Protection Platform report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.