Check Point Harmony Endpoint vs. Microsoft Defender for Endpoint

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point Harmony Endpoint
Score 9.5 out of 10
N/A
Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.N/A
Microsoft Defender for Endpoint
Score 8.9 out of 10
N/A
Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation and remediation, managed hunting services, rich APIs, and unified security management.
$2.50
per user/per month
Pricing
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Editions & Modules
No answers on this topic
Academic
$2.50
per user/per month
Standalone
$5.20
per user/per month
Offerings
Pricing Offerings
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Free Trial
YesYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Considered Both Products
Check Point Harmony Endpoint

No answer on this topic

Microsoft Defender for Endpoint
Chose Microsoft Defender for Endpoint
Microsoft comes as a bundle suite and for other solutions the purchasing needs to be done separately.
Features
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Check Point Harmony Endpoint
10.0
1 Ratings
17% above category average
Microsoft Defender for Endpoint
8.7
78 Ratings
3% above category average
Anti-Exploit Technology10.01 Ratings8.975 Ratings
Endpoint Detection and Response (EDR)10.01 Ratings9.277 Ratings
Centralized Management10.01 Ratings8.777 Ratings
Hybrid Deployment Support10.01 Ratings7.210 Ratings
Infection Remediation10.01 Ratings9.075 Ratings
Vulnerability Management10.01 Ratings8.772 Ratings
Malware Detection10.01 Ratings9.276 Ratings
Best Alternatives
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Small Businesses
ThreatLocker
ThreatLocker
Score 9.4 out of 10
ThreatLocker
ThreatLocker
Score 9.4 out of 10
Medium-sized Companies
BlackBerry Protect (CylancePROTECT)
BlackBerry Protect (CylancePROTECT)
Score 9.1 out of 10
BlackBerry Protect (CylancePROTECT)
BlackBerry Protect (CylancePROTECT)
Score 9.1 out of 10
Enterprises
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 10.0 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 10.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Likelihood to Recommend
9.0
(4 ratings)
8.9
(136 ratings)
Likelihood to Renew
-
(0 ratings)
8.4
(10 ratings)
Usability
-
(0 ratings)
8.7
(11 ratings)
Availability
-
(0 ratings)
9.1
(1 ratings)
Performance
-
(0 ratings)
9.1
(1 ratings)
Support Rating
-
(0 ratings)
9.0
(7 ratings)
Implementation Rating
-
(0 ratings)
7.3
(1 ratings)
Configurability
-
(0 ratings)
8.2
(1 ratings)
Product Scalability
-
(0 ratings)
9.1
(1 ratings)
User Testimonials
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Likelihood to Recommend
Check Point Software Technologies
Check Point Endpoint Media Encryption and Port Protection (Pointsec) is well suited for Microsoft Windows environment. While, for MacOS it is less appropriate.
Read full review
Microsoft
Microsoft Defender for Endpoint is easy to deployed across the entire organization. Having a cloud based solution with a single pane of glass to manage all assets is a real no-brainer. Being able to receive immediate alerts when suspicious activity occurs is extremely helpful in keeping risks at a minimum. Microsoft Defender for Endpoint management is also smart enough to not send several alerts when an attack could be hitting multiple targets within a certain time frame or when it's the same attack multiple times. However, be prepared to click through multiple pages all over the site to figure out what happened when an attack occurs.
Read full review
Pros
Check Point Software Technologies
  • Requires authorized passwords and logins from end users.
  • Utilizes voiceprint recognition to validate users.
  • Allows for a one time login from end users working remotely away from their desks.
Read full review
Microsoft
  • One, it's crazy lightweight, so compared to some of the competitors that we also have used with our security services, it's really lightweight and so I don't have a lot of overhead on the system that it's running on.
  • It does really fantastic PowerShell integration.
Read full review
Cons
Check Point Software Technologies
  • Types of devices to control needs to be added like McAfee and GFI Endpoint Security.
  • Device whitelisting needs more granular level like by Vendor ID, Serial Number, Device ID etc.
  • Device Control and Media Protection on MacOS to be added.
Read full review
Microsoft
  • It would be good to continue to minimize the amount of resources needed during a scan
  • Provide more integration with Outlook to scan attachments with a notification that everything is good
  • Provide a Click to Fix option when listing issues or high-risk problems on systems
Read full review
Likelihood to Renew
Check Point Software Technologies
No answers on this topic
Microsoft
Cost add-ons for Security features is nickel and diming the process to keep pace with cybercrime. Limited Education budgets require us to be more pro-active in finding cost-effective measures to protect our devices, staff and students. Defender is a strong, well-featured product that is pricing itself out of the education market
Read full review
Usability
Check Point Software Technologies
No answers on this topic
Microsoft
It offers multiple security features and integrates well with Microsoft ecosystems. A workflow for threat detection, investigation, automated remediation, and a centralized dashboard is an added advantage. This application is mainly designed for experienced users; new users may feel challenged.
Read full review
Reliability and Availability
Check Point Software Technologies
No answers on this topic
Microsoft
Microsoft Defender for Endpoint chugs along just fine no matter what we throw at it and what systems it's running on. It doesn't take up a lot of resources either, so that's welcomed.
Read full review
Performance
Check Point Software Technologies
No answers on this topic
Microsoft
Microsoft Defender for Endpoint is easy on memory and resources on clients.
Read full review
Support Rating
Check Point Software Technologies
No answers on this topic
Microsoft
The first time I tried to onboard my macOS endpoints to MDE I struggled for quite a bit. I had to reach out to Microsoft's MDE support team. The tech was very helpful in walking me through the steps during a screen share session
Read full review
Implementation Rating
Check Point Software Technologies
No answers on this topic
Microsoft
Deployment was handled by our team here and everything went pretty smoothly. We did have a few hiccups in our test group, but that only took a bit to get ironed out.
Read full review
Alternatives Considered
Check Point Software Technologies
Symantec Encryption, a few management points led me to evaluate and not go with it.
Read full review
Microsoft
Defender is far easier to deploy and manage than Sophos and tends to work without as many issues. The threat assessment portal provides an in-depth view of the organization's security posture, whereas Sophos only shows the patching status of the PCs. We did need Intune to get many of the control features (disabling USB drives) that Sophos offered out of the box.
Read full review
Scalability
Check Point Software Technologies
No answers on this topic
Microsoft
Microsoft Defender for Endpoint is easily scaled from small orgs to giant enterprises.
Read full review
Return on Investment
Check Point Software Technologies
  • Stops Ransomware attacks
  • Easy to manage
  • Easy to deploy
Read full review
Microsoft
  • Reduced incidents of security breaches lead to lower remediation costs and avoid potential financial losses and reputational damage.
  • Reduces the need for additional third-party security solutions and training, thereby lowering overall security management costs.
  • Increased efficiency and productivity of IT staff lead to better allocation of resources and cost savings.
  • Reduces the risk of fines and sanctions associated with non-compliance, ensuring business continuity and protecting revenue.
Read full review
ScreenShots

Check Point Harmony Endpoint Screenshots

Screenshot of a dashboard viewScreenshot of Harmony Endpoint's threat huntingScreenshot of a report, in Harmony EndpointScreenshot of Harmony Endpoint's analyticsScreenshot of a platform overview

Microsoft Defender for Endpoint Screenshots

Screenshot of blocked activitiesScreenshot of Detects & respondsScreenshot of discovers vulnerabilityScreenshot of Eliminates blind spotsScreenshot of Risk management