We performed a comparison between Check Point Harmony Endpoint and Trend Micro Deep Security based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Protection Platform (EPP)."The most valuable feature is the analysis, because of the beta structure."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"The setup is pretty simple."
"NGAV and EDR features are outstanding."
"Compared to its competitors, Check Point Harmony Endpoint has advantages in areas like EDR and behavioral detection."
"The tool minimizes the impact of a breach with autonomous detection and response."
"It has improved the detection of malware."
"The remote support is good."
"In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations."
"The product improved the overall security of our organization with the features like sandboxing and phishing prevention."
"The communication with the console is very dynamic and remote, without the need to return to the computer locally."
"The real-time threat prevention capabilities stand out as a fortress against malware, ransomware, and evolving cyber threats, offering a proactive defense that safeguards our organization's critical assets."
"Aside from the basic antivirus features, there are additional features such as vulnerability protection, firewall, etc. which are helpful."
"It provides security and protection. The endpoint firewall is valuable."
"Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost. Big enterprises don't want to shut down their database or their data center for any kind of patch. Deep Security creates a wall and downloads all patches. You install it on the cloud. So, it saves your server from any kind of intrusion or any kind of penetration, and whenever you get a chance or time, in six, eight, or nine months, you can physically download or install all those patches in one go. So, it saves you time. It also saves your shutdown time and keeps your data center safe."
"It's scalable."
"We use the solution to detect malicious threats, secure the endpoints, and disable the UFT."
"The most valuable feature is the virtual patching."
"It provides the type of data and availability that we need to have. We don't have to worry about intrusions."
"Technical support is good."
"Cannot be used on mobile devices with a secure connection."
"ZTNA can improve latency."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"I think cloud security and SASE are areas of concern in the product where improvements are required. The tool's cloud version has to be improved in terms of the security it offers."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"The next release should consider a strong threat detection mechanism that can categorize various levels of attacks for faster analysis."
"A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings."
"The price of the product could be more friendly."
"Endpoint vulnerability management is one of the modules I believe is missing and it is something that is required."
"Unfortunately, the web (cloud) management system and log search performance are quite bad."
"There was a learning curve for our general population of employees (the user)."
"They could be focused on the analysis of USB devices."
"The web filter service could be improved."
"The price could be reduced."
"The initial setup was complex."
"I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved."
"A minor issue in Trend Micro Deep Security is that once the tool is upgraded, it shows some machines as offline or not reported while showing a recent update as outdated. The tool has some server connection issues."
"The solution could use more integration."
"Trend Micro is not government certified or federal complaint. If they could become compliant/certified, this would make it easier for us to use it for our government projects."
"In the solution, servers often go offline for various reasons, requiring us to manually check the cause or issue, such as connectivity issues, and to find out why the agent went offline."
"The solution should focus on the EDR part and probably have an integrated data leak prevention module."
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 104 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 81 reviews. Check Point Harmony Endpoint is rated 8.8, while Trend Micro Deep Security is rated 8.6. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Trend Micro Deep Security writes "High availability, effective VPM, and responsive support". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Trend Micro Deep Security is most compared with Trend Vision One Endpoint Security, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and Trellix Endpoint Security.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.