We performed a comparison between Check Point Harmony Endpoint and Intercept X Endpoint based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. The solution is praised for its forensic analysis and VPN connectivity. Intercept X Endpoint combines two products into one solution, offering strong performance, server protection, and efficient threat management capabilities. Users say Check Point could improve its endpoint vulnerability management and threat-hunting features. Intercept X Endpoint could benefit from better integration with third-party vendors and improved support for virtual infrastructures.
Service and Support: While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement. Some users found Intercept X Endpoint's support team knowledgeable and supportive, while others expressed dissatisfaction with responsiveness.
Ease of Deployment: Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades. Intercept X Endpoint has a straightforward initial setup, with quick installation and simple configuration and maintenance. Some users said they occasionally encountered issues that required reinstallation.
Pricing: Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower. Intercept X Endpoint is generally seen as fairly priced, but some users think it’s on the higher end of the price scale.
ROI: Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow. Users say that Intercept X Endpoint offers exceptional defense against ransomware and zero-day threats, leading to a positive return on investment.
Comparison Results: Our users prefer Check Point Harmony Endpoint over Intercept X Endpoint. Check Point Harmony Endpoint provides a robust defense against ransomware and phishing attacks. While Intercept X earned high marks for its threat management capabilities, user reviews indicate that Check Point Harmony Endpoint offers a more comprehensive and effective solution for endpoint security.
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"The stability is very good."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"The most valuable feature is the analysis, because of the beta structure."
"The solution was relatively easy to deploy."
"The setup is pretty simple."
"The platform's most valuable features are the ability to build API, which meets our business requirements, and the VPN client, which provides VPN access from a single client."
"The reporting feature where we can see and monitor what happened on our client computers is useful."
"The most useful feature so far has been having a functioning and up-to-date anti-malware scanner."
"The communication with the console is very dynamic and remote, without the need to return to the computer locally."
"Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved."
"Deploying new versions of the endpoint are easy."
"The most valuable feature of this solution is the VPN."
"The main advantage of the solution is the ability to implement complete security policies for the terminals in order to address how apps are installed on corporate devices."
"Since it's cloud-managed, the solution is easy to administer, especially if the person using it is in a different geophysical location."
"A valuable feature offered by Sophos is called Naked Security, and it entails the control managed by the firewall on the site regarding the desktop client interfacing with our cloud client."
"The solution is easy to install."
"The pricing is fair. It's not too costly for our small organization."
"The solution is scalable."
"Ransomware protection is the most valuable feature of this solution."
"It is easy to interact with, and its cost is also good."
"There are products that are technically stronger. However, this product has everything in one solution, which makes it a strong endpoint option."
"FortiEDR can be improved by providing more detailed reporting."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"We'd like to see more one-to-one product presentations for the distribution channels."
"The only minor concern is occasional interference with desired programs."
"Making the portal mobile friendly would be helpful when I am out of office."
"We would like to have the ability to stop and restart the service remotely, which is something that we can do easily with Symantec but have a hard time with when using Check Point."
"Check Point needs to work in areas like branding and other value propositions to make products stand out in the market despite the solutions being more affordable than the ones offered by competitors."
"An additional feature I would like to see involves the VPN."
"They could be focused on the analysis of USB devices."
"We have observed some policies are not working as expected."
"As of now, product-wise, we haven't found any major concern that needs to improve, although it does not support full MDM and this is something that should be there."
"For the future, I would like to see maybe a content-filtering emulation feature in Harmony Endpoint."
"There are a number of features behind paywalls which can be frustrating when you are already paying a premium."
"Mobile device management is a challenging area, and it can be improved. Some areas in the DLP solution can also be improved. It has the DLP capability, but it is not an all-out DLP program. I would like to see them improve the DLP solution in terms of reporting and possibly network monitoring. Currently, they only do the reporting parts of it."
"It's a bit heavy on the computers. So once you install it, the computer slows down. It is a resource-intensive solution."
"They should keep doing what they're doing. Both of them have entered the EDR/MDR space, and they're keeping up with their competitors. I have a hard time understanding why their capabilities aren't garnering more attention."
"We tried to set up Sophos Zero Trust within my Sophos central cloud. It only works with Microsoft and I use Google. I'd like to see Google added."
"It should offer better security updates."
"Should include additional integration."
"Intercept X Endpoint is a very heavy solution that consumes a lot of RAM and should be made lighter."
"The performance is very slow and should be faster."
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 103 reviews while Intercept X Endpoint is ranked 7th in Endpoint Protection Platform (EPP) with 101 reviews. Check Point Harmony Endpoint is rated 8.8, while Intercept X Endpoint is rated 8.4. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Intercept X Endpoint writes "A standard offering with good threat analysis but reduces machine performance". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Intercept X Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Symantec Endpoint Security. See our Check Point Harmony Endpoint vs. Intercept X Endpoint report.
See our list of best Endpoint Protection Platform (EPP) vendors and best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.