We performed a comparison between CrowdStrike Falcon and Check Point Harmony Endpoint based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: CrowdStrike Falcon stands out for its machine-learning capabilities, optimal resource utilization, and precise threat detection. Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. CrowdStrike Falcon could benefit from adding a sandbox feature and more detailed firewall management options. The solution is praised for its forensic analysis and VPN connectivity. Users say Check Point could improve its endpoint vulnerability management and threat-hunting features.
Service and Support: CrowdStrike Falcon's customer service is considered prompt and helpful. While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement.
Ease of Deployment: CrowdStrike Falcon's setup is considered to be simple and efficient, with deployment times ranging from a few days to a month. While there may be some challenges during installation, they are generally manageable. Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades.
Pricing: Some users find CrowdStrike Falcon costly and think the price should be lowered to make it more competitive. Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower.
ROI: CrowdStrike Falcon offers cost savings by decreasing the required number of engineers and eliminating the need for onsite servers. Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow.
Comparison Results: Our users prefer Check Point Harmony Endpoint over CrowdStrike Falcon. Check Point Harmony Endpoint provides a robust defense against ransomware and phishing attacks. While CrowdStrike Falcon receives praise for its lightweight design, user reviews indicate that Check Point Harmony Endpoint offers a more comprehensive and effective solution for endpoint security.
"It is stable and scalable."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"The setup is pretty simple."
"The product's initial setup phase is very easy."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"Forensics is a valuable feature of Fortinet FortiEDR."
"NGAV and EDR features are outstanding."
"The solution has all the standard features you would expect for endpoint protection."
"Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner."
"Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved."
"It scans all the endpoints in your cloud and on-premises for vulnerabilities, threats, and malware attacks."
"The reporting feature where we can see and monitor what happened on our client computers is useful."
"The most valuable feature is the Zero-day protection, which covers our on-premises users, and well as those users who are outside of our network."
"One of the coolest features is that it provides an HTML report on the laptop and the endpoint console for the administrator."
"Administratively, it's easy to control."
"CrowdStrike Falcon offers a comprehensive dashboard that is highly effective in protecting against and blocking external infiltration attempts."
"I like the feature called RTC, the remote time connector."
"The solution can scale easily."
"Probably the most valuable thing to me is the real-time response piece. The fact that I can connect to an endpoint as long as it is on the Internet, no matter where it is globally. I can remove files from the endpoint, drop files on the endpoint, stop processes, reboot it, run custom scripts, and deploy software. Pretty much no other tool can do all that."
"The most valuable feature is the activity dashboard because it gives you a holistic view of your environment from a security standpoint."
"Because it is security product and acts like an AIML smart product, not merely based on daily/weekly updates and signatures."
"The detection is very effective."
"From what we have seen, it is very scalable. We have recently acquired a company where someone had a ransomware attack when we joined networks. Within the course of just a few days, we were able to easily get CrowdStrike rolled out to about 300 machines. That also included the removal of that company's legacy anti-malware tool."
"ZTNA can improve latency."
"The solution is not stable."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"The only minor concern is occasional interference with desired programs."
"The solution should address emerging threats like SQL injection."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"I think cloud security and SASE are areas of concern in the product where improvements are required. The tool's cloud version has to be improved in terms of the security it offers."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"The Infinity Portal login is "iffy" at times."
"If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents."
"The application control and URL filtering features are not very strong."
"The patch management and upgrades are not timely."
"The management in Check Point Harmony Endpoint could be improved."
"There was a learning curve for our general population of employees (the user)."
"As I understand there will be a URL filtering feature included with the browser agent in the future. This will allow URL filtering without the need for a Gateway Device. This is something I am looking forward to and would be a great addition to list of features."
"The solution needs more alerts to warn of attacks."
"It can be expensive depending on the features you select."
"The technical support could improve because I am in India and the support I receive is from the UK or Australia. It is difficult to manage the time difference. The service could be faster. However, when we do have the support they are knowledgeable."
"They respond quickly on the weekdays, but the weekend response times are slower."
"If CrowdStrike can further expand its support for XDR compatibility, that would give it an edge over all the other competing new products."
"I would like them to improve the correlation of data in the search algorithms. When we run an investigation, malware, phishing, etc., I want to look at multiple endpoints at once to correlate that data to see the likenesses, e.g., how are they not alike or what systems and processes are running across those systems? I don't want to have to run the same search in their Spotlight module five, 10, 15, or 100 times to get 100 different results, copy that data out, and then correlate it on my own. In a very simple way, I want to be able to load up a comma-delimited list giving me the spotlight data on these X amount of hosts, letting me search for it quickly. We have had to go back to CrowdStrike, and say, "Our search are taking far too long for even one host." They did bump up the cores and that did improve performance, but it is still kind of slow to get that Spotlight data. That is probably our biggest pain point. I think that needs some help. I understand this kind of information access is probably not the easiest thing to do. It is probably a big ask depending on how their back-end is setup."
"This solution is relatively expensive."
"They offered a white glove service that was extremely costly. When we got into it, we saw it was relatively easy. If I was being nitpicky, I'd say that I don't like being sold something that's unnecessary. That's the only downside I've seen to the solution."
"Forensic controls have room for improvement."
Check Point Harmony Endpoint is ranked 8th in Endpoint Detection and Response (EDR) with 104 reviews while CrowdStrike Falcon is ranked 3rd in Endpoint Detection and Response (EDR) with 107 reviews. Check Point Harmony Endpoint is rated 8.8, while CrowdStrike Falcon is rated 8.8. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Cortex XDR by Palo Alto Networks, whereas CrowdStrike Falcon is most compared with Microsoft Defender XDR, Darktrace, Microsoft Defender for Endpoint, Trend Micro Deep Security and Kaspersky Endpoint Security for Business. See our Check Point Harmony Endpoint vs. CrowdStrike Falcon report.
See our list of best Endpoint Detection and Response (EDR) vendors and best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.