
What is Check Point Endpoint Security?
Check Point endpoint security solutions include data security, network security, advanced threat prevention, forensics and remote access VPN for complete endpoint protection. To simplify security administration, our endpoint suite products can be managed using a single console.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceCheck Point Endpoint Security Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on Check Point Endpoint Security.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
90 Likeliness to Recommend
1
Since last award
98 Plan to Renew
87 Satisfaction of Cost Relative to Value
1
Since last award
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+95 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love Check Point Endpoint Security?
Pros
- Enables Productivity
- Fair
- Security Protects
- Reliable
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Endpoint Detection and Response
Centralized Management Portal
Dynamic Malware Detection
Port and Device Control
Host NGFW Functionality
Kernel Monitoring
Ransomware Recovery and Removal
Automated Remediation
Application Containment Mechanisms
System Hardening
Mac OS support
Vendor Capability Ratings
Quality of Features
Business Value Created
Ease of Implementation
Ease of IT Administration
Breadth of Features
Product Strategy and Rate of Improvement
Vendor Support
Ease of Data Integration
Usability and Intuitiveness
Ease of Customization
Availability and Quality of Training
Check Point Endpoint Security Reviews
Evans V.
- Role: Information Technology
- Industry: Technology
- Involvement: IT Leader or Manager
Submitted Mar 2025
Powerful, Unified Defense for Modern Threats
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
Check Point's Endpoint Security is tightly integrated with its broader security management platform, which allows for centralized visibility, control, and management across all security layers. This enables businesses to manage their endpoint, network, and mobile security from a single console, improving efficiency and reducing operational overhead.
What is your favorite aspect of this product?
If I had to pick a favorite aspect of Check Point Endpoint Security, it would probably be the integration with Check Point's broader security ecosystem. The fact that it works seamlessly with Check Point鈥檚 firewall, mobile security, and cloud solutions provides an extra layer of protection and simplifies management for organizations.
What do you dislike most about this product?
There is no dislike as such
What recommendations would you give to someone considering this product?
Consider the size of your organization and the complexity of your security needs. If you're managing a large or diverse environment (with endpoints across various networks, devices, and locations), Check Point鈥檚 integrated and scalable platform will likely be a good fit due to its centralized management and broad coverage.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing

Priyanka J.
- Role: Human Resources
- Industry: Not for Profit
- Involvement: IT Leader or Manager
Submitted Mar 2025
AI Driven Protection for Complex Environment
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
1) Unified Security Architecture. 2) Threat Prevention and AI Driven Protection 3) Comprehensive Threat Intelligence
What is your favorite aspect of this product?
Favourite aspect about the product is its integration with threat cloud. This gives the product a significant edge as it continuously updates in real time with the latest data on emerging threats.
What do you dislike most about this product?
High Cost
What recommendations would you give to someone considering this product?
Highly recommend for organization looking for a robust, integrated solution that combines threat intelligence, prevention and centralized management.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing

Maheshwar B.
- Role: Information Technology
- Industry: Other
- Involvement: IT Development, Integration, and Administration
Submitted Feb 2025
Reliable Endpoint Security with Deep Protection
Likeliness to Recommend
What differentiates Check Point Endpoint Security from other similar products?
This endpoint solution uses ThreatCloud intelligence for real-time threat detection and response.
What is your favorite aspect of this product?
Its anti-ransomware and behavioral protection proactively blocks threats, ensuring smooth business operations.
What do you dislike most about this product?
Smaller organizations might struggle to budget for this.
What recommendations would you give to someone considering this product?
Highly Recommended for those who need robust endpoint and consider the licensing costs before buy.
Pros
- Saves Time
- Security Protects
- Reliable
- Performance Enhancing