Check Point ThreatCloud vs. Webroot Endpoint Protection

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point ThreatCloud
Score 8.9 out of 10
N/A
Check Point Software Technologies provides threat intelligence via the Check Point ThreatCloud.N/A
Webroot Endpoint Protection
Score 7.9 out of 10
N/A
Webroot Endpoint Protection is the OpenText company's business class multi-vector endpoint protection application, providing centralized endpoint management, deep learning intelligence, and advanced behavioral analytics.
$150
per year per 5 seats
Pricing
Check Point ThreatCloudWebroot Endpoint Protection
Editions & Modules
No answers on this topic
Business Endpoint Protection
$150.00
per year per 5 seats
Business Endpoint Protection
$690.00
per year per 25 seats
Business Endpoint Protection
Contact sales team
per 50+ seats
Offerings
Pricing Offerings
Check Point ThreatCloudWebroot Endpoint Protection
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Check Point ThreatCloudWebroot Endpoint Protection
Features
Check Point ThreatCloudWebroot Endpoint Protection
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Check Point ThreatCloud
-
Ratings
Webroot Endpoint Protection
7.8
24 Ratings
8% below category average
Anti-Exploit Technology00 Ratings7.322 Ratings
Endpoint Detection and Response (EDR)00 Ratings8.019 Ratings
Centralized Management00 Ratings8.124 Ratings
Hybrid Deployment Support00 Ratings6.513 Ratings
Infection Remediation00 Ratings8.022 Ratings
Vulnerability Management00 Ratings8.220 Ratings
Malware Detection00 Ratings8.223 Ratings
Best Alternatives
Check Point ThreatCloudWebroot Endpoint Protection
Small Businesses
Egnyte
Egnyte
Score 9.4 out of 10
ThreatLocker
ThreatLocker
Score 9.4 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.0 out of 10
BlackBerry Protect (CylancePROTECT)
BlackBerry Protect (CylancePROTECT)
Score 9.1 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.0 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 9.9 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point ThreatCloudWebroot Endpoint Protection
Likelihood to Recommend
8.6
(2 ratings)
7.8
(29 ratings)
Likelihood to Renew
-
(0 ratings)
10.0
(1 ratings)
Usability
-
(0 ratings)
8.2
(8 ratings)
Support Rating
-
(0 ratings)
9.5
(8 ratings)
Implementation Rating
-
(0 ratings)
7.8
(7 ratings)
User Testimonials
Check Point ThreatCloudWebroot Endpoint Protection
Likelihood to Recommend
Check Point Software Technologies
If you have the Check Point environment and want to utilize the Checkpoint environment, you should use the [Check Point] ThreatCloud. Without [Check Point] ThreatCloud, there’s no way to stop the 0days or APTs. However, [Check Point] ThreatCloud relies on the Checkpoint infrastructure to be used and integrated. If you have other firewall and/or endpoint vendors, [Check Point] ThreatCloud is not the best service to be used. Checkpoint also offers 24x7 threat cloud-managed security services to [...] organizations. Threat cloud-managed security services leverage the threat cloud decreasing the detection time and false-positive rates via increasing protection rates.
Read full review
Webroot, an OpenText company
The software tends to do a good job of basic protection but is not the best for larger clients and is not as powerful as some others offered on the market today. The support is not the best either, have had a hard time getting assistance in the past trying to resolve issues.
Read full review
Pros
Check Point Software Technologies
  • anti virus
  • anti bot
Read full review
Webroot, an OpenText company
  • It is very light weight and does not tax the computers resources
  • Has a quick scan and does not take forevere when scanning
  • It's central management on the web makes it easy to use and gives tons of control for Admins
Read full review
Cons
Check Point Software Technologies
  • SOAR integration, Checkpoint does not have built in SOAR
  • Automation throughout the findings of [Check Point] ThreatCloud
  • Special team for threat intelligence
  • K8s threat cloud integration and K8S forensics
  • Native SIEM integration
Read full review
Webroot, an OpenText company
  • There are several configuration options for both end-point and DNS protection. Would like a more simple way to understand and validate settings.
  • Support is heavily video or FAQ based although you can submit a Support Ticket. Would like more availability to an actual support engineer.
  • Overtime you can forget how to change setting - a refresher course would be nice, especially as new features are added to the solution.
Read full review
Likelihood to Renew
Check Point Software Technologies
No answers on this topic
Webroot, an OpenText company
It has proven successful so far in our environment for controlling malware/virus outbreaks.
Read full review
Usability
Check Point Software Technologies
No answers on this topic
Webroot, an OpenText company
Webroot Endpoint Protection has been great for us, as its simple, cloud-based management console allows us to quickly deploy easily monitor all of our endpoints. However, it could improve by offering more customizable reporting options for deeper insights into security events and the interface could also use some updating, as it feels a bit dated.
Read full review
Support Rating
Check Point Software Technologies
No answers on this topic
Webroot, an OpenText company
Support has been reliable up to this point. A request can easily be generated via the console and support responding in a reasonable time. We have not had any major issues other than the basic agents not communicating with the console and the like.
Read full review
Implementation Rating
Check Point Software Technologies
No answers on this topic
Webroot, an OpenText company
I had some difficulties with remote users. I ended up needing to open a remote tech support session and finish the process. Other than a few speed bumps, I was impressed with the engineering of the install. Because of time differences, I was done installing in two days. The cost, per license, could be less.
Read full review
Alternatives Considered
Check Point Software Technologies
As Checkpoint next generation firewalls were already implemented in the network, ThreatCloud was easy to implement and had better features and reputation than competitors
Read full review
Webroot, an OpenText company
Webroot is good in a way that it is an all encompassing solution one stop shop for protecting endpoints but it needs to be managed and licensed. Some users do not need constant protection or need to have it on their machines in where the combination of Field Effect and Malwarebytes is more effective.
Read full review
Return on Investment
Check Point Software Technologies
  • High score rates [are] seen on breach systems after deploying systems integrated with [Check Point] ThreatCloud
  • Catch rates are very high compared to other vendors
  • One missing thing is the detection for localized URLs and IPs
  • Purchasing within the 3-year perspective is cheap compared to other solutions; ROI is generally six months
  • [Check Point] ThreatCloud eliminates the need [for] other additional services that may need to be deployed like dedicated IPS, Dedicated Sandbox, DNS solution, etc.
Read full review
Webroot, an OpenText company
  • The DNS filtering allows for a very granular configuration of endpoints
  • The cost to benefit ratio is good. It is not a real EDR player yet, but the development looks promising
  • Its best feature is integration with our MSP software, providing actionable tickets.
Read full review
ScreenShots