Check Point Harmony Endpoint vs. Microsoft Defender for Endpoint

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point Harmony Endpoint
Score 9.6 out of 10
N/A
Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features.N/A
Microsoft Defender for Endpoint
Score 8.8 out of 10
N/A
Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection and response (EDR), automatic investigation and remediation, managed hunting services, rich APIs, and unified security management.
$2.50
per user/per month
Pricing
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Editions & Modules
No answers on this topic
Academic
$2.50
per user/per month
Standalone
$5.20
per user/per month
Offerings
Pricing Offerings
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Free Trial
YesYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Considered Both Products
Check Point Harmony Endpoint

No answer on this topic

Microsoft Defender for Endpoint
Chose Microsoft Defender for Endpoint
Microsoft comes as a bundle suite and for other solutions the purchasing needs to be done separately.
Features
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Check Point Harmony Endpoint
10.0
1 Ratings
16% above category average
Microsoft Defender for Endpoint
8.7
78 Ratings
2% above category average
Anti-Exploit Technology10.01 Ratings8.975 Ratings
Endpoint Detection and Response (EDR)10.01 Ratings9.177 Ratings
Centralized Management10.01 Ratings8.777 Ratings
Hybrid Deployment Support10.01 Ratings7.210 Ratings
Infection Remediation10.01 Ratings9.075 Ratings
Vulnerability Management10.01 Ratings8.672 Ratings
Malware Detection10.01 Ratings9.276 Ratings
Best Alternatives
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Small Businesses
ThreatLocker
ThreatLocker
Score 9.2 out of 10
ThreatLocker
ThreatLocker
Score 9.2 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 10.0 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 10.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Likelihood to Recommend
9.0
(4 ratings)
9.0
(133 ratings)
Likelihood to Renew
-
(0 ratings)
8.4
(10 ratings)
Usability
-
(0 ratings)
8.6
(10 ratings)
Availability
-
(0 ratings)
9.1
(1 ratings)
Performance
-
(0 ratings)
9.1
(1 ratings)
Support Rating
-
(0 ratings)
9.0
(7 ratings)
Implementation Rating
-
(0 ratings)
7.3
(1 ratings)
Configurability
-
(0 ratings)
8.2
(1 ratings)
Product Scalability
-
(0 ratings)
9.1
(1 ratings)
User Testimonials
Check Point Harmony EndpointMicrosoft Defender for Endpoint
Likelihood to Recommend
Check Point Software Technologies
Check Point Endpoint Media Encryption and Port Protection (Pointsec) is well suited for Microsoft Windows environment. While, for MacOS it is less appropriate.
Read full review
Microsoft
I can definitely tell you where it’s more suited, because we haven’t come across any less appropriate scenarios. But definitely in regard to how we centrally manage our user space and our endpoints, it’s been beneficial from an API perspective and is really transferable, with strong collaboration with our Azure stack. It works very well.
Read full review
Pros
Check Point Software Technologies
  • Requires authorized passwords and logins from end users.
  • Utilizes voiceprint recognition to validate users.
  • Allows for a one time login from end users working remotely away from their desks.
Read full review
Microsoft
  • Definitely on the threat action and response. We didn't have a stress-response option before, but the dependent brand point provided it instantly. Also, it's doing UVA and machine learning, which we didn't have before. So it's definitely providing more sophisticated threat-detection capabilities than we had before.
Read full review
Cons
Check Point Software Technologies
  • Types of devices to control needs to be added like McAfee and GFI Endpoint Security.
  • Device whitelisting needs more granular level like by Vendor ID, Serial Number, Device ID etc.
  • Device Control and Media Protection on MacOS to be added.
Read full review
Microsoft
  • The only thing is sometimes, because Microsoft has so many platforms, it gets a little confusing, like am I in the security platform? Am I in Purview? Where am I at right now? Because there's so many sites that are kind of doing a lot of the same thing, and so that does get a little confusing from time to time, but outside of that, it's a pretty good product.
Read full review
Likelihood to Renew
Check Point Software Technologies
No answers on this topic
Microsoft
Cost add-ons for Security features is nickel and diming the process to keep pace with cybercrime. Limited Education budgets require us to be more pro-active in finding cost-effective measures to protect our devices, staff and students. Defender is a strong, well-featured product that is pricing itself out of the education market
Read full review
Usability
Check Point Software Technologies
No answers on this topic
Microsoft
Microsoft Defender for Endpoint is a great EDR to have that works quickly and silently in the background and it integrates well with other Microsoft services. As an IT manager, I can appreciate that I do not get bombarded by alerts for every small detail. On the flipside, the management site can use some work in being more clear and should be more streamlined so I'm not clicking through multiple pages to figure out what happened
Read full review
Reliability and Availability
Check Point Software Technologies
No answers on this topic
Microsoft
Microsoft Defender for Endpoint chugs along just fine no matter what we throw at it and what systems it's running on. It doesn't take up a lot of resources either, so that's welcomed.
Read full review
Performance
Check Point Software Technologies
No answers on this topic
Microsoft
Microsoft Defender for Endpoint is easy on memory and resources on clients.
Read full review
Support Rating
Check Point Software Technologies
No answers on this topic
Microsoft
The first time I tried to onboard my macOS endpoints to MDE I struggled for quite a bit. I had to reach out to Microsoft's MDE support team. The tech was very helpful in walking me through the steps during a screen share session
Read full review
Implementation Rating
Check Point Software Technologies
No answers on this topic
Microsoft
Deployment was handled by our team here and everything went pretty smoothly. We did have a few hiccups in our test group, but that only took a bit to get ironed out.
Read full review
Alternatives Considered
Check Point Software Technologies
Symantec Encryption, a few management points led me to evaluate and not go with it.
Read full review
Microsoft
Previously, we've used Sophos. We've used, way back when, McAfee, Norton, Symantec, all those. And we finally settled on Microsoft Defender for Endpoint. We're a Microsoft technology stack shop. So obviously it was natural. It's built into Windows, so we're not adding additional agents. Some of the other vendors and their agents, for a while, would compete with CPU usage. And so it actually slowed down the machines. Because Microsoft Defender for Endpoint is built into the Windows product, Microsoft is going to ensure that it does not affect the other productivity tools that a user may use.
Read full review
Scalability
Check Point Software Technologies
No answers on this topic
Microsoft
Microsoft Defender for Endpoint is easily scaled from small orgs to giant enterprises.
Read full review
Return on Investment
Check Point Software Technologies
  • Stops Ransomware attacks
  • Easy to manage
  • Easy to deploy
Read full review
Microsoft
  • Reduced incidents of security breaches lead to lower remediation costs and avoid potential financial losses and reputational damage.
  • Reduces the need for additional third-party security solutions and training, thereby lowering overall security management costs.
  • Increased efficiency and productivity of IT staff lead to better allocation of resources and cost savings.
  • Reduces the risk of fines and sanctions associated with non-compliance, ensuring business continuity and protecting revenue.
Read full review
ScreenShots

Check Point Harmony Endpoint Screenshots

Screenshot of a dashboard viewScreenshot of Harmony Endpoint's threat huntingScreenshot of a report, in Harmony EndpointScreenshot of Harmony Endpoint's analyticsScreenshot of a platform overview

Microsoft Defender for Endpoint Screenshots

Screenshot of blocked activitiesScreenshot of Detects & respondsScreenshot of discovers vulnerabilityScreenshot of Eliminates blind spotsScreenshot of Risk management