What is our primary use case?
We are using Check Point Endpoint security to protect our remote users, as well as our roaming users that are accessing our on-premises resources externally.
We have come to know that our remote and roaming users are completely secure with Check Point Endpoint Security. With this confidence, we are now planning to roll out this solution for our on-premises resources, including machines and devices, as well. This will give us complete endpoint security.
How has it helped my organization?
Check Point Endpoint Security has improved our organization with features that include Security, Management, and Reporting. We have not yet rolled it out for all users, but that is our intention.
With this product, the data accessible by our endpoints is secure.
We have zero-day protection, which is not available with our other endpoint protection solution. That is the reason we preferred to implement Check Point Endpoint Security.
Finally, from a management perspective, the single point of control makes it more manageable.
What is most valuable?
The most valuable feature is the Zero-day protection, which covers our on-premises users, and well as those users who are outside of our network.
With Zero-day protection, we have complied with our customer-specific policies as well.
Most of our users are working on customer-related projects and today, everybody is looking to have zero-day protection at the endpoint level, as well as to protect against unknown threats or viruses.
What needs improvement?
As of now, product-wise, we haven't found any major concern that needs to improve, although it does not support full MDM and this is something that should be there.
For how long have I used the solution?
We have been using Check Point Endpoint Security for the last six months.
What do I think about the scalability of the solution?
Scalability is very good and there is no such concern for this solution.
What's my experience with pricing, setup cost, and licensing?
The cost is huge compared to other products that are available on market.
Which other solutions did I evaluate?
We haven't evaluated other products but we know there are many that are cheaper than Check Point.
What other advice do I have?
In my opinion, it is a very good solution for organizations with a complex environment. We can secure it. From a security perspective, we trust only Check Point endpoint security. This product is a market leader.
Which deployment model are you using for this solution?