We performed a comparison between Check Point Harmony Endpoint and Trellix Endpoint Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. The solution is praised for its forensic analysis and VPN connectivity. Trellix Endpoint Security is highly valued for its easy administration options and reliability. Users say Check Point could improve its endpoint vulnerability management and threat-hunting features. Reviews suggest that Trellix could reduce resource consumption and improve user-friendliness.
Service and Support: While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement. Some users have found the support for Trellix Endpoint Security helpful and reliable, while others have encountered ineffective assistance and communication problems.
Ease of Deployment: Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades. The setup process for Trellix Endpoint Security varies in difficulty, depending on the user's experience with McAfee and general technical expertise.
Pricing: Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower. Some find Trellix’s price reasonable and competitive, while others feel there is room for improvement.
ROI: Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow. Trellix Endpoint Security provides significant time savings.
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"Ability to get forensics details and also memory exfiltration."
"It is stable and scalable."
"The price is low and quite competitive with others."
"The stability is very good."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"The product's initial setup phase is very easy."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today's complex threat landscape."
"The dashboard is user-friendly and easy to understand."
"It provides remote access for the staff and increases their productivity."
"Harmony's endpoint sandboxing is really good."
"With the prevention blade, Harmony scales higher than many other solutions."
"It's pretty complete for preventing threats to endpoints. Its capabilities are great."
"Check Point Harmony Endpoint can be easily deployed and is cost effective and more secure."
"The most valuable feature is Harmony Endpoint's encapsulation system which captures the whole system and protects it against other functions. It is really good for the Check Point Harmony specialists."
"The package of protection that it provides is useful. It has antivirus, malware protection, VPN, and a whole bunch of other features."
"The solution offers very good endpoint security."
"The initial setup of Trellix Endpoint Security was straightforward."
"The detection is great and the solution is constantly improving."
"It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts."
"This is a good solution for antivirus and malware protection."
"I like trap prevention DNS and threat prevention."
"Anyone can use it, the protection is good, and they have all of the features."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"Cannot be used on mobile devices with a secure connection."
"We find the solution to be a bit expensive."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"Detections could be improved."
"The support needs improvement."
"Specifically, there are gaps when it comes to security."
"There needs to be compatibility with the most recent versions of the various operating systems."
"The management in Check Point Harmony Endpoint could be improved."
"I would like to see is this same solution being able to link with the services of different corporate networks as if they were a remote access VPN extension and thus not require additional licenses."
"I would like to see more automation."
"Areas that have room for improvement are the scope of the product and, while I think the support is good, they can improve support as well."
"We would like to have the ability to stop and restart the service remotely, which is something that we can do easily with Symantec but have a hard time with when using Check Point."
"They should also add new functions such as threat hunting."
"The initial setup isn't so easy. You need to know what you are doing."
"The solution has problematic encryption, which needs reforming."
"The solution consumes a lot of end user memory and CPU. Trellix doesn't really focus much on the anti-malware side."
"The vendor should simplify the way they bundle the products because it's very hard to explain to customers what products contain which features."
"McAfee GW Security and McAfee Child Safety need some improvement as they are relatively new."
"The resolution time should be faster."
"We know that McAfee isn't the best antivirus and it can't protect us 100%, although we are okay with the level of protection that it gives us."
"I would like to have the ability to have more control over the deployment in the next release. If you have this console in the cloud, you cannot make pilot groups for deploying the agents. We only have the current group. So, as soon as you inject the software, it will go directly into production, which doesn't work for us. We need to build up pilot groups slowly. We already requested to have this feature on the cloud, and we are still waiting."
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 101 reviews while Trellix Endpoint Security is ranked 12th in Endpoint Protection Platform (EPP) with 94 reviews. Check Point Harmony Endpoint is rated 8.8, while Trellix Endpoint Security is rated 8.0. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Trellix Endpoint Security writes "Good user behavioral analysis and helpful patching but needs better support services". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Trellix Endpoint Security is most compared with Microsoft Defender for Endpoint, Trellix Endpoint Security (ENS), CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and Cisco Secure Endpoint. See our Check Point Harmony Endpoint vs. Trellix Endpoint Security report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.