Check Point Endpoint Security Pros and Cons

Check Point Endpoint Security Pros

TonyPegrum
Head of IT at a real estate/law firm with 11-50 employees
The biggest value we found was ease of deployment. I haven't really used it much, so I can't really comment beyond that. I haven't used it much, but it's working.
View full review »
BalaKrishna
Director at eSupport
The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature.
View full review »
mckenn
Team Lead Implementation Services/Systems Integration Engineer at Trinidad Systems Limited
One of the most valuable features is the Threat Emulation and Threat Extraction. These features are able to scan email attachments before the user is able to access the file and then provide a safe copy of the attachment. Malicious files never get to the users machine. This is a very valuable feature of this solution.
View full review »
Learn what your peers think about Check Point Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
441,672 professionals have used our research since 2012.
GeraldChege
ICT Officer at Kenyatta National Hospital
Before we used this solution, our mail was blacklisted. Now we are white listed by all organizations, including Google. Also the security of our institution has really improved.
View full review »
Jose-Cristovao
Novell, Microsoft, and UNIX Network Administration at GDDC
We were under an attack in our environment, and the Check Point response was good because we didn't lose anything.
View full review »
CTIo67
CIO / CTO at a financial services firm with 51-200 employees
The most valuable feature is the integration with CheckPoint's firewalls. You can have one port, and follow the logs from both Endpoint and firewall security.
View full review »
seniorse527517
Senior Security Consultant - Checkpoint Technologies at a tech services company with 11-50 employees
We had a ransomware attack and the SandBlast agent automatically picked up the ransomware.
View full review »
MauricioTorres
Operations Director at a tech services company with 1-10 employees
The end-user facilities for managing the tool are good.
View full review »
reviewer1375017
Senior Solution Architect at a comms service provider with 51-200 employees
Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum.
View full review »
JaapGiliam
Owner at Giliam Network & System Solutions
The most valuable feature of this solution is the VPN.
View full review »

Check Point Endpoint Security Cons

TonyPegrum
Head of IT at a real estate/law firm with 11-50 employees
I'd also love to see them add full MDM support, but I appreciate that that's not the product market. If it did come in, I'd be more than happy to look at additional modules. It was probably one of the easiest products I've ever had to deploy it, but if it's not capable of doing MD, then that's going to impact its usefulness to us.
View full review »
BalaKrishna
Director at eSupport
The remote deployment with Check Point Endpoint Security requires improvement. We have to depend on some of their deployment tools. I would like a system endpoint protection management tool or a remote deployment tool.
View full review »
mckenn
Team Lead Implementation Services/Systems Integration Engineer at Trinidad Systems Limited
As I understand there will be a URL filtering feature included with the browser agent in the future. This will allow URL filtering without the need for a Gateway Device. This is something I am looking forward to and would be a great addition to list of features.
View full review »
Learn what your peers think about Check Point Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
441,672 professionals have used our research since 2012.
GeraldChege
ICT Officer at Kenyatta National Hospital
They should provide bandwidth regulation, so we can monitor and regulate bandwidth.
View full review »
Jose-Cristovao
Novell, Microsoft, and UNIX Network Administration at GDDC
We would like to have the ability to stop and restart the service remotely, which is something that we can do easily with Symantec but have a hard time with when using Check Point.
View full review »
CTIo67
CIO / CTO at a financial services firm with 51-200 employees
The solution could improve VPN functionality and the VPN user-interface.
View full review »
seniorse527517
Senior Security Consultant - Checkpoint Technologies at a tech services company with 11-50 employees
One area of this product that has room for improvement is the disc encryption.
View full review »
MauricioTorres
Operations Director at a tech services company with 1-10 employees
Areas that have room for improvement are the scope of the product and, while I think the support is good, they can improve support as well.
View full review »
reviewer1375017
Senior Solution Architect at a comms service provider with 51-200 employees
I would like to see simple sandboxing for malware analysis.
View full review »
JaapGiliam
Owner at Giliam Network & System Solutions
I would like to see support for a policy in the appliance that will refuse to create a connection if it does not detect an active virus scanner.
View full review »
Learn what your peers think about Check Point Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
441,672 professionals have used our research since 2012.