We performed a comparison between Check Point Harmony Endpoint and Trend Micro Smart Protection based on real PeerSpot user reviews.
Find out in this report how the two EPP (Endpoint Protection for Business) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."This is stable and scalable."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"Additionally, when it comes to EDR, there are more tools available to assist with client work."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"The product detects and blocks threats and is more proactive than firewalls."
"The most valuable feature is the analysis, because of the beta structure."
"Fortinet is very user-friendly for customers."
"The main advantage of the solution is the ability to implement complete security policies for the terminals in order to address how apps are installed on corporate devices."
"The solution has all the standard features you would expect for endpoint protection."
"Few solutions on the market perform tasks as efficiently as those performed and executed by Check Point Harmony Endpoint."
"It is quite easy to use and deploy the agent on endpoints to protect them from bad actors."
"We're able to secure all endpoints and manage them from a single console."
"They have a great knowledge base that you can leverage as a user."
"The technical support is good."
"The tool minimizes the impact of a breach with autonomous detection and response."
"What I like the most is the customer pricing because it's a great value."
"The next-generation antivirus features are excellent."
"As a Japanese company, it doesn't have any restrictions on usage in our country."
"Trend Micro Smart Protection has good features like malware analysis, C-to-C connection and detection, workbench, auto security play with features, and lots of DDI features."
"Trend Micro Smart Protection includes compliance features where you can establish rules against endpoint vulnerabilities and attack parameters. It offers Smart Detection, Smart Update, and sandboxing to detect and analyze suspicious files, providing a smart approach to zero-day threat detection. Trend Micro Smart Protection offers rapid response to zero-day threats with a strong team backing up the discovery process. Virtual patching is a crucial feature, effectively closing vulnerable ports and access points. Regarding web reputation services, aggregating data from multiple sources, including Trend Micro, Proofpoint, and others, helps inform threat prevention efforts and automate responses."
"The scalability works well."
"The most valuable feature of the solution is its simplicity."
"The most valuable aspect of the solution is that it also protects our smartphones. It's one of the reasons we use Trend Micro specifically."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"The SIEM could be improved."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"I think cloud security and SASE are areas of concern in the product where improvements are required. The tool's cloud version has to be improved in terms of the security it offers."
"The support needs improvement."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"The remote deployment with Check Point Endpoint Security requires improvement. We have to depend on some of their deployment tools. I would like a system endpoint protection management tool or a remote deployment tool."
"It needs more documentation and better ease of deployment. For documentation, it needs more information about integrating the endpoints on SandBlast Agent mobile as well as on desktop platforms."
"The management in Check Point Harmony Endpoint could be improved."
"If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents."
"Enhanced behavioral analytics would provide a deeper understanding of endpoint activities, fortifying our defenses against sophisticated cyber adversaries."
"There should be some way of managing this solution outside the organization's network, possibly with some type of remote access. For example, if I'm the admin of Check Point who manages the entire network, I would like to have access on my home device or maybe a mobile app to get reports, etc."
"The product updates are a manual process for my administrator and can take several hours out of his day."
"Check Point offers solutions with only a few features for our company's customers' sites."
"The solution should improve its mobile management solution."
"Trend Micro Smart Protection could improve the false positive with some integrations with other solutions and automated reporting. The reports should allow the user to set up some customer trigger alerts instead of the user having to look at the report manually. Additionally, the responses from sender detection and response feature could improve."
"No online encryption or cloud services are available for the tool, so my company has to install it mostly in an on-premises environment. Encryption or cloud services need to be made available in the product."
"The only notable concern is the level of support in the particular region of Sri Lanka. Following events in the past two years, the quality of technical support has regrettably declined."
"There is room for improvement to make it better for customers."
"In the next release, I would like to see a combination of the different features from Apex One and OfficeScan in Trend Micro Smart, rather than as upgraded features."
"I cannot recall noticing any missing features."
"We found an issue on the server-side. Sometimes, it slows down the servers if you install it on the SQL."
Check Point Harmony Endpoint is ranked 8th in EPP (Endpoint Protection for Business) with 99 reviews while Trend Micro Smart Protection is ranked 31st in EPP (Endpoint Protection for Business) with 38 reviews. Check Point Harmony Endpoint is rated 8.8, while Trend Micro Smart Protection is rated 8.0. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Trend Micro Smart Protection writes "Offers strong, all-around cybersecurity but is expensive". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Trend Micro Smart Protection is most compared with Trend Micro Apex One, Microsoft Defender for Endpoint, CrowdStrike Falcon, Symantec Endpoint Security and Trend Micro ServerProtect. See our Check Point Harmony Endpoint vs. Trend Micro Smart Protection report.
See our list of best EPP (Endpoint Protection for Business) vendors.
We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.