We performed a comparison between Check Point Harmony Endpoint and Microsoft Defender for Endpoint based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Comparison Results: Check Point Harmony has a slight edge in this comparison. According to its reviewers, its interface is friendlier than that of Defender for Endpoint.
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"Fortinet is very user-friendly for customers."
"Ability to get forensics details and also memory exfiltration."
"The setup is pretty simple."
"This is stable and scalable."
"The product detects and blocks threats and is more proactive than firewalls."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"Data security analytics enable us to prepare and take suitable precautions before landing in trouble and exposing confidential information."
"Scalability-wise, I rate the solution a ten out of ten."
"Its most valuable feature is being able to integrate cloud services and centralize the protection policy from a single administration dashboard."
"Check Point Harmony Endpoint has one of the most user-friendly dashboards I've seen."
"The biggest value we found was ease of deployment. I haven't really used it much, so I can't really comment beyond that. I haven't used it much, but it's working."
"It is integrated with a cloud platform that takes advantage of many emulation features in real-time filtering of malicious attacks."
"The main advantage of the solution is the ability to implement complete security policies for the terminals in order to address how apps are installed on corporate devices."
"It prevents the most imminent threats to the endpoint such as ransomware, phishing or drive-by malware, while quickly minimizing breach impact with autonomous detection and response."
"I like the fact that it has the ransomware solution in there. I'm glad that the ransomware solution is built into it. That's probably the biggest thing that I see in Microsoft Defender."
"The solution has an easy-to-use interface, is always updated, and is user-friendly."
"The most valuable feature is ransomware protection, which can detect malicious activity from IPs or a malicious payload in DLLs, or other things that can corrupt the system."
"The antivirus features are very useful."
"Auto-remediation: When the product sees malware, it resolves the issue immediately. This protects the machine."
"It captures data through machine learning, which is built-in on the back-end. It also provides built-in analytics and a threat intelligence feature. It is a one-stop solution that doesn't require an antivirus because it comes prebuilt into Windows 10."
"The most valuable features are that it's easy to use and the updates are very simple."
"The patch management is very easy, as it can be done automatically or added to a schedule."
"Cannot be used on mobile devices with a secure connection."
"I think cloud security and SASE are areas of concern in the product where improvements are required. The tool's cloud version has to be improved in terms of the security it offers."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"Detections could be improved."
"The solution is not stable."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"We'd like to see more one-to-one product presentations for the distribution channels."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"Configuration with some applications did not take place effectively due to setup complications."
"It would be useful if you could also mark blocks as safe from a client. Now users always have to ask an admin to make exclusions."
"It blocks safe URLs sometimes when there are network interruptions."
"Technical support can be a bit slow at times."
"This is one of the most innovative solutions due to the fact that it includes many real-time content filtering features, management, and assurance of the transactions of what went in or out of our peripherals. That said, it is important to integrate other solutions to continue innovating in the market."
"In terms of improvement, the ticketing system could be better. It is a little tricky to try to open a case and give it to an engineer."
"From an improvement perspective, the major challenge we've faced with Harmony is the support."
"The solutions agent could have better performance, it is a little slow sometimes."
"Defender could be more secure and stable."
"It's not easy to create special allowances for certain groups of users. It can be a little heavy-handed in some areas where Microsoft has decided to lock a feature out, meaning they make it hard to make an exception... One company we work with needed to use about 20 different thumb drives for about 20 users. To make that exception for them was very difficult. In fact, you can't really make an exception. But what you can do is allow them to use it and, while it will still alert, you can actually suppress those alerts."
"The detection of viruses could be a little bit better."
"The management console is something that can be improved."
"They're in the process of pulling more things together. They can continue with the integrations and provide a better way of seeing the impact of security changes, especially on the endpoint side. Before we actually flip the switch, we should be able to see the impact of security changes on the business or business applications. It would prevent breaking any business applications."
"The UI for Microsoft Defender for Endpoint needs to be better. Integration with client dashboards is also lacking in this product, e.g. client dashboards shouldn't just be viewable from the cloud, because when the client's computer is offline, you won't be able to see the client dashboard."
"Microsoft Defender for Endpoint should include better automation that will make it faster to detect the latest threats happening across the world."
"It would be helpful if they included XDR features, on top of the EDR functionality."
More Microsoft Defender for Endpoint Pricing and Cost Advice →
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 101 reviews while Microsoft Defender for Endpoint is ranked 1st in Endpoint Protection Platform (EPP) with 182 reviews. Check Point Harmony Endpoint is rated 8.8, while Microsoft Defender for Endpoint is rated 8.0. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Microsoft Defender for Endpoint writes "Eliminates the need to look at multiple dashboards by automatically providing one XDR dashboard to show the security score of each subscription". Check Point Harmony Endpoint is most compared with CrowdStrike Falcon, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Cortex XDR by Palo Alto Networks, whereas Microsoft Defender for Endpoint is most compared with Symantec Endpoint Security, Intercept X Endpoint, CrowdStrike Falcon, SentinelOne Singularity Complete and Trend Micro Apex One. See our Check Point Harmony Endpoint vs. Microsoft Defender for Endpoint report.
See our list of best Endpoint Protection Platform (EPP) vendors and best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.