We performed a comparison between Check Point Harmony Endpoint and Symantec Endpoint Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. The solution is praised for its forensic analysis and VPN connectivity. Users praised Symantec Endpoint Security for its regular virus signature updates and comprehensive administrator's console. Check Point users say it could improve its endpoint vulnerability management and threat-hunting features. Reviewers said Symantec Endpoint Security could improve its graphical interface, Linux support, and scanning capabilities.
Service and Support: While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement. Some users said Symantec customer service was helpful but slow, while others have expressed general dissatisfaction with support.
Ease of Deployment: Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades. Some users said Symantec Endpoint Security was easy to set up, while others struggled with the installation. Deployment time varies depending on the customer’s environment.
Pricing: Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower. The cost of Symantec Endpoint Security depends on the licensing terms and necessary security components. While some users find the price acceptable, others believe it could be more affordable.
ROI: Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow. Symantec Endpoint Security demonstrates strong stability and incident prevention, leading to reduced downtime. It offers a favorable return on investment.
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"The product detects and blocks threats and is more proactive than firewalls."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"Forensics is a valuable feature of Fortinet FortiEDR."
"The setup is pretty simple."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"Stability-wise, I rate the solution a ten out of ten."
"The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry."
"The product is stable."
"It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks."
"The product improved the overall security of our organization with the features like sandboxing and phishing prevention."
"It is a stable solution. My company has not received any complaints regarding the product's stability from our customers who use the solution."
"The reporting feature where we can see and monitor what happened on our client computers is useful."
"The initial setup is very easy."
"The most valuable feature of Symantec Endpoint Security is the protection of our systems."
"The solution can scale."
"It's good at detecting signature-based stuff and stopping that."
"It's good for large organizations. It's able to handle a lot of users."
"Scalability."
"The single-pane management is the solution's most valuable feature. It makes administrative control very easy."
"I like the additional features that come with it. The firewall feature and the encryption feature that they throw in are good as well. Another thing that I like about Symantec is that it runs on different platforms, not just on Windows."
"I think the key thing for me, is interoperability, in that you can deploy it to Windows, Mac, and Linux. That's been a really important feature in the last two years. Now there's one management console to cover all three OSs."
"The support needs improvement."
"The solution is not stable."
"I haven't seen the use of AI in the solution."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"Detections could be improved."
"It takes about two business days for initial support, which is too slow in urgent situations."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"The solution should address emerging threats like SQL injection."
"The management in Check Point Harmony Endpoint could be improved."
"Endpoint vulnerability management is one of the modules I believe is missing and it is something that is required."
"The product updates are a manual process for my administrator and can take several hours out of his day."
"We need a higher maximum file size in the sandboxing feature."
"I would like to see them add features where we can use this license for mobile browsers, too."
"Off the top of my head, I can't think of a way it has improved my organization."
"Sometimes, the Cloud Management Portal can become unresponsive or take a long time to process a query. This in turn will cause the browser to freeze, which will require closing and reopening of your browser."
"Technical support can be a bit slow at times."
"It is only available to use on computers with higher-end specs."
"There are a few negative points. They should separate the feature for each separate solution for mobile devices. The second one is about the price, it's expensive. Finally, the third would be the complexity of implementation."
"Since the division of the company, we have experienced a lack of support."
"The platform itself can be improved as there's no way to track how infections get into the organization."
"The solution could improve by having a better graphical interface."
"If there is a suspicious file, it is put into a sandbox where Symantec does an analysis. After the analysis, Symantec marks the file as a risk, but it doesn't blacklist or block the file. If a file is already known to be harmful, I would like them to automatically block or blacklist it to reduce the damage."
"I would like to see fileless attack protection."
"It's not cheap."
Check Point Harmony Endpoint is ranked 8th in EPP (Endpoint Protection for Business) with 99 reviews while Symantec Endpoint Security is ranked 5th in EPP (Endpoint Protection for Business) with 138 reviews. Check Point Harmony Endpoint is rated 8.8, while Symantec Endpoint Security is rated 7.6. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Symantec Endpoint Security writes "The solution has given us visibility into compliance within our whole system and helped us ensure everything is updated". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Symantec Endpoint Security is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and Trend Micro Deep Security. See our Check Point Harmony Endpoint vs. Symantec Endpoint Security report.
See our list of best EPP (Endpoint Protection for Business) vendors.
We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.