We performed a comparison between Check Point Harmony Endpoint and Trend Micro Deep Security based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Protection Platform (EPP)."The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"Fortinet is very user-friendly for customers."
"It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks."
"The most useful feature so far has been having a functioning and up-to-date anti-malware scanner."
"The level of security and visibility they provide is great and it is very easy to configure and maintain."
"I have found the Zero phishing and IPS features the most useful in Check Point Harmony Endpoint. Additionally, threat emulation sandboxing is effective."
"The product improved the overall security of our organization with the features like sandboxing and phishing prevention."
"Check Point Endpoint Security really helped the business stop various malware attacks throughout the time we used it, including a ransomware attack, which was stopped in minutes."
"The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers."
"It's easy to scale as needed."
"The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it."
"It helps with virtual patching and IDS fetching."
"Their support is good. They are responsive, which is nice."
"You can scale the solution to different versions."
"Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product."
"I like the anti-malware features."
"The file integrity and log inspection are game-changing features for us."
"The VPN is the most prized characteristic of Trend Micro Deep Security, which in addition addresses all zero-day vulnerabilities. This allows us to confidently transfer our system physically, as it presents to the external world, whether it be an intruder or a hacker, that our system is completely secure without any weak spots. Even if the latest security patches have not been installed or updated, the software virtually covers them for you."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"The solution should address emerging threats like SQL injection."
"Cannot be used on mobile devices with a secure connection."
"The support needs improvement."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"Making the portal mobile friendly would be helpful when I am out of office."
"I still don't have a clear opinion of the possible improvements that the tool may need. There are still functionalities that I have not been able to try completely and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
"They could be focused on the analysis of USB devices."
"It needs to include built-in deployment. This will make the job easier rather than having to go and dig up an Active Directory deployment along with policy objects."
"It gives you an alert for malicious sites, which, after searching on the Google database, don't come out to be the same."
"They need to make the user interface on the server more intuitive and user-friendly."
"It would be useful if you could also mark blocks as safe from a client. Now users always have to ask an admin to make exclusions."
"I would like to see more automation."
"The heartbeat interval must be improved."
"Installation and operations may have issues on some machines owing to their configuration of the network cards as the product is a DPI driver."
"It needs to improve its integration with a lot of other products. This should be in the road map because we have a lot of SaaS-based appliances which are not connected with each other."
"Their automation needs improvement."
"The support for email protection can be improved."
"f it had the capability of generating retroactive alerts it would be helpful."
"Sometimes the patching is a bit slow."
"Post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring."
"I've not worked with CrowdStrike Falcon, but one of our customers also had CrowdStrike Falcon on some of the devices. I was only supporting Trend Micro. They had a ransomware attack, but Trend Micro didn't detect that particular ransomware attack, whereas CrowdStrike did."
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 103 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 80 reviews. Check Point Harmony Endpoint is rated 8.8, while Trend Micro Deep Security is rated 8.6. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Trend Micro Deep Security writes "Offers excellent endpoint protection and great stability ". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and Trellix Endpoint Security.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.