We performed a comparison between Check Point Harmony Endpoint and Trend Micro Deep Security based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Protection Platform (EPP)."The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"Ability to get forensics details and also memory exfiltration."
"It is stable and scalable."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"The product detects and blocks threats and is more proactive than firewalls."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"The biggest value we found was ease of deployment. I haven't really used it much, so I can't really comment beyond that. I haven't used it much, but it's working."
"It's easy to scale as needed."
"Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum."
"The product is stable."
"With the prevention blade, Harmony scales higher than many other solutions."
"Cost-wise it's cheaper than other options."
"The most valuable feature of Check Point Harmony Endpoint is centralized management."
"We had a ransomware attack and the SandBlast agent automatically picked up the ransomware."
"Deep Security is a good product for managing a few servers."
"Automated virtual patching is a good feature."
"We find that their technical support team is always accessible and willing to assist."
"The most valuable features are web security, email filtering, and content filtering."
"It is a stable solution...The solution's initial setup was straightforward."
"There are compliance issues for legacy applications and after applying OS security patches. The product's HIPS (Host Intrusion Prevention System) modules do the job for you automatically, without any downtime."
"The most valuable feature of the product is vulnerability detection."
"There is no competition for this product, as no other product provides HIPS, host-firewall, and anti-malware together."
"The dashboard isn't easy to access and manage."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"Cannot be used on mobile devices with a secure connection."
"The solution should address emerging threats like SQL injection."
"The SIEM could be improved."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"ZTNA can improve latency."
"The support needs improvement."
"Check Point Harmony Endpoint could improve by allowing it to work on older systems by reducing the system requirements. Since our systems are dated we can only use the antivirus module features."
"They could be focused on the analysis of USB devices."
"There should be some way of managing this solution outside the organization's network, possibly with some type of remote access. For example, if I'm the admin of Check Point who manages the entire network, I would like to have access on my home device or maybe a mobile app to get reports, etc."
"The solution has limitations if it's hosted on-prem or as a SaaS."
"The solution needs more alerts to warn of attacks."
"I have a few issues when attempting to install Harmony on some of the machines."
"Some of the less tech-savvy users sometimes find it difficult in adjusting and learning how to use the platform."
"An additional feature I would like to see involves the VPN."
"AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro."
"Enhancements in agent performance are needed, specifically in reducing server utilization during scanning."
"I would like to see better pricing. The pricing could be lower."
"The default reports provided don't provide much insight."
"We are not very happy with Trend Micro Deep Security since it is not able to detect many viruses and bugs."
"The working interface and the reports for non-technical people could use improvement. They are a bit scary."
"Deep Security's reporting functionality could be improved."
"I would like to see an EDR function for the servers, as that would be useful for us."
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 101 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 80 reviews. Check Point Harmony Endpoint is rated 8.8, while Trend Micro Deep Security is rated 8.6. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Trend Micro Deep Security writes "Offers excellent endpoint protection and great stability ". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and VMware Carbon Black Endpoint.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.