We performed a comparison between Check Point Harmony Endpoint and Symantec Endpoint Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. The solution is praised for its forensic analysis and VPN connectivity. Users praised Symantec Endpoint Security for its regular virus signature updates and comprehensive administrator's console. Check Point users say it could improve its endpoint vulnerability management and threat-hunting features. Reviewers said Symantec Endpoint Security could improve its graphical interface, Linux support, and scanning capabilities.
Service and Support: While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement. Some users said Symantec customer service was helpful but slow, while others have expressed general dissatisfaction with support.
Ease of Deployment: Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades. Some users said Symantec Endpoint Security was easy to set up, while others struggled with the installation. Deployment time varies depending on the customer’s environment.
Pricing: Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower. The cost of Symantec Endpoint Security depends on the licensing terms and necessary security components. While some users find the price acceptable, others believe it could be more affordable.
ROI: Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow. Symantec Endpoint Security demonstrates strong stability and incident prevention, leading to reduced downtime. It offers a favorable return on investment.
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"It is stable and scalable."
"NGAV and EDR features are outstanding."
"Ability to get forensics details and also memory exfiltration."
"The product detects and blocks threats and is more proactive than firewalls."
"The most valuable feature is the analysis, because of the beta structure."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"It provides remote access for the staff and increases their productivity."
"One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users machine. This is a very valuable feature of this solution."
"Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information."
"The most valuable feature of this solution is the VPN."
"The product is stable."
"The product improved the overall security of our organization with the features like sandboxing and phishing prevention."
"It has improved the detection of malware."
"The reporting feature where we can see and monitor what happened on our client computers is useful."
"It's a good proxy to control the user's access to the website."
"The mobile application is valuable. You are able to see the reports of intrusions and the like on mobile devices. That is one of the coolest aspects."
"The features are very nice. We are getting updates continuously from the Symantec side regarding any attacks, such as zero-day attacks. Symantec helps us in mitigating any attacks or threats early."
"The firewall, IPS and device control are useful at protecting the environment."
"The solution can scale."
"Scalability."
"It is a stable solution...It is a very scalable solution."
"The antivirus and antimalware features are good."
"The solution should address emerging threats like SQL injection."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"The support needs improvement."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"ZTNA can improve latency."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"Making the portal mobile friendly would be helpful when I am out of office."
"In terms of improvement, the ticketing system could be better. It is a little tricky to try to open a case and give it to an engineer."
"It would be useful if you could also mark blocks as safe from a client. Now users always have to ask an admin to make exclusions."
"They should also add new functions such as threat hunting."
"The patch management and upgrades are not timely."
"It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects."
"They need to make the user interface on the server more intuitive and user-friendly."
"I think some work needs to be done to improve the integration with other third-party products, namely SIEM solutions."
"Sometimes the portal loads slowly which should be improved."
"I think the CPU dependence should be enhanced."
"Technical support could be more responsive."
"The solution could improve by adding encryption. If it had encryption along with antivirus it would be better."
"The Sandboxing and ATP functionality does not integrate very well, improving this would be helpful."
"I would like to see improvements in the anti-virus and the device control features."
"Symantec has not properly promoted Symantec Endpoint Security in the market. In my opinion, the product should be properly promoted."
"It could use more feature parity between what is offered with their on-prem console as well as their hosted console."
"This latest version has proven unreliable for management and installation."
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 101 reviews while Symantec Endpoint Security is ranked 5th in Endpoint Protection Platform (EPP) with 139 reviews. Check Point Harmony Endpoint is rated 8.8, while Symantec Endpoint Security is rated 7.6. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Symantec Endpoint Security writes "The solution has given us visibility into compliance within our whole system and helped us ensure everything is updated". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Symantec Endpoint Security is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and Trend Micro Deep Security. See our Check Point Harmony Endpoint vs. Symantec Endpoint Security report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.