We performed a comparison between Check Point Harmony Endpoint and Elastic Security based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"The most valuable feature is the analysis, because of the beta structure."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"The product's initial setup phase is very easy."
"The stability is very good."
"The setup is pretty simple."
"Fortinet is very user-friendly for customers."
"We had a ransomware attack and the SandBlast agent automatically picked up the ransomware."
"It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks."
"There's the possibility of being able to do the administration from the Check Point portal, maintaining control and visibility of the different security events at all times."
"It monitors data flow across the networking system to enhance comprehensive workflow infrastructure."
"The solution has good threat intelligence features."
"It has a great ability to detect threats and keep us safe."
"The SandBlast agent is the most valuable feature for Check Point Endpoint Security. We've found that the Check Point SandBlast agent is mature."
"Its ease of use is the most valuable feature. We had existing endpoints and it was an easy upgrade process. The interface board is also easy to use."
"ELK Logstash is easy and fast, at least for the initial setup with the out of box uses."
"The performance is good and it is faster than IBM QRadar."
"Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because of Elastic's efficient search engine."
"Elastic Security is very easy to adapt."
"I can look at events from more than one source across multiple different locations and find patterns or anomalies. The machine learning capabilities are helpful, and I can create rules for notifications to be more proactive rather than responding after something has gone wrong."
"Stability-wise, I rate the solution a ten out of ten."
"The stability of the solution is good."
"It is very quick to react. I can set it to check anomalies or suspicious behavior every 30 seconds. It is very fast."
"The only minor concern is occasional interference with desired programs."
"Making the portal mobile friendly would be helpful when I am out of office."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"The support needs improvement."
"The solution should address emerging threats like SQL injection."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"I haven't seen the use of AI in the solution."
"There was a learning curve for our general population of employees (the user)."
"The Infinity Portal login is "iffy" at times."
"It would be useful if you could also mark blocks as safe from a client. Now users always have to ask an admin to make exclusions."
"It gives you an alert for malicious sites, which, after searching on the Google database, don't come out to be the same."
"Technical support can be a bit slow at times."
"There are still functionalities that I have not been able to fully test and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
"We would like to make the documentation for more modern solutions like the Harmony family easier to find."
"The network monitoring features must be improved."
"Elastic Security can be a bit difficult to use if a person only has experience in SMBs with tools like Zoho. The product can also be difficult for those who have never dealt with query language."
"The training that is offered for Elastic is in need of improvement because there is no depth to it."
"It's a little bit of a learning curve to understand the logic of searching for things and trying to find what you're looking for in Elastic Security."
"The solution's query building is not that intuitive compared to other solutions."
"Technical support could respond faster."
"The solution could also use better dashboards. They need to be more graphical, more matrix-like."
"Their visuals and graphs need to be better."
"Better integration with third-party APMs would be really good."
Check Point Harmony Endpoint is ranked 8th in Endpoint Detection and Response (EDR) with 104 reviews while Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 59 reviews. Check Point Harmony Endpoint is rated 8.8, while Elastic Security is rated 7.6. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint. See our Check Point Harmony Endpoint vs. Elastic Security report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.