We performed a comparison between CrowdStrike Falcon and Check Point Harmony Endpoint based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: CrowdStrike Falcon stands out for its machine-learning capabilities, optimal resource utilization, and precise threat detection. Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. CrowdStrike Falcon could benefit from adding a sandbox feature and more detailed firewall management options. The solution is praised for its forensic analysis and VPN connectivity. Users say Check Point could improve its endpoint vulnerability management and threat-hunting features.
Service and Support: CrowdStrike Falcon's customer service is considered prompt and helpful. While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement.
Ease of Deployment: CrowdStrike Falcon's setup is considered to be simple and efficient, with deployment times ranging from a few days to a month. While there may be some challenges during installation, they are generally manageable. Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades.
Pricing: Some users find CrowdStrike Falcon costly and think the price should be lowered to make it more competitive. Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower.
ROI: CrowdStrike Falcon offers cost savings by decreasing the required number of engineers and eliminating the need for onsite servers. Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow.
Comparison Results: Our users prefer Check Point Harmony Endpoint over CrowdStrike Falcon. Check Point Harmony Endpoint provides a robust defense against ransomware and phishing attacks. While CrowdStrike Falcon receives praise for its lightweight design, user reviews indicate that Check Point Harmony Endpoint offers a more comprehensive and effective solution for endpoint security.
"It is very easy to set up. I would rate my experience with the initial setup a ten out of ten, with ten being very easy to set up."
"This is stable and scalable."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"The product detects and blocks threats and is more proactive than firewalls."
"The most valuable feature is the analysis, because of the beta structure."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"Fortinet is very user-friendly for customers."
"The stability is very good."
"The product is stable."
"It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks."
"When sending emails to my colleagues, it detects any virus and blocks any spam that may be shared."
"Administratively, it's easy to control."
"Check Point Harmony Endpoint features different types of features but one of the most useful is an up-to-date and working anti-malware scanner."
"There's the possibility of being able to do the administration from the Check Point portal, maintaining control and visibility of the different security events at all times."
"Check Point Harmony Endpoint can be easily deployed and is cost effective and more secure."
"The solution has all the standard features you would expect for endpoint protection."
"The solution can scale easily."
"The CS falcon agent is a lightweight agent compared with other agents of EDR products."
"The most valuable feature is the indicator of compromise, which show you what file was either quarantined or removed."
"Since we deployed CrowdStrike, the network has become much calmer, and we now understand the sources of infections, which helps us prevent them from spreading."
"I like the overall reports of this solution. They are crisp, and to the point."
"The most valuable feature is the machine learning that they use to check certain patterns in the endpoint devices. It checks the whole ecosystem or entire environment."
"We are now able to find the root cause analysis on any threat. We can figure out where the issue came in versus just dealing with where it is at the moment."
"The features we showcase to potential customers are prevention, malware protection, zero-day protection, and application scripting. Vulnerability assessment is another valuable feature."
"We find the solution to be a bit expensive."
"The SIEM could be improved."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"Detections could be improved."
"I think cloud security and SASE are areas of concern in the product where improvements are required. The tool's cloud version has to be improved in terms of the security it offers."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"Improvements are required in two key areas: notifications and setup simplification."
"Sometimes the portal loads slowly which should be improved."
"I would like to see more automation."
"In terms of improvement, the ticketing system could be better. It is a little tricky to try to open a case and give it to an engineer."
"Technical support can be a bit slow at times."
"They should provide bandwidth regulation, so we can monitor and regulate bandwidth."
"We would also like the application control module to be further developed in future versions to include applications commonly used or maintained by Check Point in order to be able to configure blocking policies more quickly."
"Legacy VPNs and digital footprints should be minimized."
"Sometimes CrowdStrike changes the GUI, and they need to be better at informing us and providing guidance concerning that."
"The content-filtering features for children could be improved. We have young grandchildren aged 12 and 8. My daughter, their mother, wants to keep them from getting in trouble on the net. She looked at all these other solutions from Google, Microsoft, etc., and she couldn't figure out how to make any of those work. I told her that I bet CrowdStrike could handle this. Sure enough, CrowdStrike can do exactly that. It's the same solution that the Defense Department gets. It works, but it's a little complicated to implement. It could be simpler to set the policies."
"The pricing is a bit too high."
"The portal can be clunky to navigate at times and has room for improvement."
"The management of log aggregation is in need of improvement."
"There are some aspects of the UI that could use some improvement, e.g., working in groups. I build a group, then I have to manually assign prevention policies, update policies, etc., but there is no function to copy that group. So, if I wanted to make a subgroup for troubleshooting or divide workstations into groups of laptops and desktops, then I have to manually build a brand new group. I can't just copy a build from one to another. Additionally, in order to do any work within a group, I have to first do the work on the respective prevention policy page or individual policy page, then remove the group if the group is assigned to a different prevention policy, remove the prevention policy, and then add the new one in. So, it can get a little hectic. It would be easier if I could add and remove things from the group page rather than having to go into the policy pages to do it."
"The management reporting functionality needs to be improved."
"There are some areas where some customers would prefer a different service."
Protect your organization from all threats - not just malware - even when computers and servers aren’t connected to the internet. Start your free trial and deploy CrowdStrike Falcon within minutes to start receiving full threat protection.
Check Point Harmony Endpoint is ranked 8th in EPP (Endpoint Protection for Business) with 99 reviews while CrowdStrike Falcon is ranked 3rd in EPP (Endpoint Protection for Business) with 101 reviews. Check Point Harmony Endpoint is rated 8.8, while CrowdStrike Falcon is rated 8.6. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Cortex XDR by Palo Alto Networks, whereas CrowdStrike Falcon is most compared with Microsoft Defender XDR, Darktrace, Microsoft Defender for Endpoint, Trend Micro Deep Security and Trellix Endpoint Security. See our Check Point Harmony Endpoint vs. CrowdStrike Falcon report.
See our list of best EPP (Endpoint Protection for Business) vendors and best EDR (Endpoint Detection and Response) vendors.
We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.