Check Point Harmony Endpoint vs. ThreatLocker
Check Point Harmony Endpoint vs. ThreatLocker
| Product | Rating | Most Used By | Product Summary | Starting Price |
|---|---|---|---|---|
![]() Check Point Harmony Endpoint | N/A | Check Point Harmony Endpoint (formerly Sandblast Agent) is an enterprise class endpoint protection suite combining antivirus and advanced threat protection, full disk encryption (FDE), remote access VDN, and zero-day phishing prevention, among other features. | N/A | |
ThreatLocker | N/A | ThreatLocker Inc. is a security platform used to stop misuse and vulnerable software as well as control application elevation, storage and network traffic. | N/A |
| Check Point Harmony Endpoint | ThreatLocker | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Editions & Modules | No answers on this topic | No answers on this topic | ||||||||||||||
| Offerings |
| |||||||||||||||
| Entry-level Setup Fee | Optional | No setup fee | ||||||||||||||
| Additional Details | — | Contact vendor for pricing information. | ||||||||||||||
| More Pricing Information | ||||||||||||||||
| Check Point Harmony Endpoint | ThreatLocker |
|---|
| Check Point Harmony Endpoint | ThreatLocker | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Endpoint Security |
|
| Check Point Harmony Endpoint | ThreatLocker | |
|---|---|---|
| Small Businesses | ThreatLocker Score 9.4 out of 10 | ![]() Malwarebytes Score 8.8 out of 10 |
| Medium-sized Companies | ![]() BlackBerry Protect (CylancePROTECT) Score 9.1 out of 10 | ![]() BlackBerry Protect (CylancePROTECT) Score 9.1 out of 10 |
| Enterprises | BeyondTrust Endpoint Privilege Management Score 9.9 out of 10 | BeyondTrust Endpoint Privilege Management Score 9.9 out of 10 |
| All Alternatives | View all alternatives | View all alternatives |
| Check Point Harmony Endpoint | ThreatLocker | |
|---|---|---|
| Likelihood to Recommend | 9.0 (4 ratings) | 9.6 (10 ratings) |
| Likelihood to Renew | - (0 ratings) | 10.0 (1 ratings) |
| Usability | - (0 ratings) | 8.8 (6 ratings) |
| Availability | - (0 ratings) | 10.0 (1 ratings) |
| Performance | - (0 ratings) | 10.0 (1 ratings) |
| Support Rating | - (0 ratings) | 10.0 (1 ratings) |
| In-Person Training | - (0 ratings) | 10.0 (1 ratings) |
| Online Training | - (0 ratings) | 10.0 (1 ratings) |
| Implementation Rating | - (0 ratings) | 10.0 (1 ratings) |
| Product Scalability | - (0 ratings) | 10.0 (1 ratings) |
| Vendor post-sale | - (0 ratings) | 10.0 (1 ratings) |
| Vendor pre-sale | - (0 ratings) | 10.0 (1 ratings) |
| Check Point Harmony Endpoint | ThreatLocker | |
|---|---|---|
| Likelihood to Recommend | ![]() Check Point Software Technologies
| ThreatLocker
|
| Pros | ![]() Check Point Software Technologies
| ThreatLocker
|
| Cons | ![]() Check Point Software Technologies
| ThreatLocker
|
| Likelihood to Renew | ![]() Check Point Software Technologies No answers on this topic | ThreatLocker
|
| Usability | ![]() Check Point Software Technologies No answers on this topic | ThreatLocker
|
| Reliability and Availability | ![]() Check Point Software Technologies No answers on this topic | ThreatLocker
|
| Performance | ![]() Check Point Software Technologies No answers on this topic | ThreatLocker
|
| Support Rating | ![]() Check Point Software Technologies No answers on this topic | ThreatLocker
|
| In-Person Training | ![]() Check Point Software Technologies No answers on this topic | ThreatLocker
|
| Online Training | ![]() Check Point Software Technologies No answers on this topic | ThreatLocker
|
| Implementation Rating | ![]() Check Point Software Technologies No answers on this topic | ThreatLocker
|
| Alternatives Considered | ![]() Check Point Software Technologies
| ThreatLocker
|
| Scalability | ![]() Check Point Software Technologies No answers on this topic | ThreatLocker
|
| Return on Investment | ![]() Check Point Software Technologies
| ThreatLocker
|
| ScreenShots | Check Point Harmony Endpoint Screenshots | ThreatLocker Screenshots |













