We performed a comparison between Check Point Harmony Endpoint and Trellix Endpoint Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. The solution is praised for its forensic analysis and VPN connectivity. Trellix Endpoint Security is highly valued for its easy administration options and reliability. Users say Check Point could improve its endpoint vulnerability management and threat-hunting features. Reviews suggest that Trellix could reduce resource consumption and improve user-friendliness.
Service and Support: While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement. Some users have found the support for Trellix Endpoint Security helpful and reliable, while others have encountered ineffective assistance and communication problems.
Ease of Deployment: Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades. The setup process for Trellix Endpoint Security varies in difficulty, depending on the user's experience with McAfee and general technical expertise.
Pricing: Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower. Some find Trellix’s price reasonable and competitive, while others feel there is room for improvement.
ROI: Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow. Trellix Endpoint Security provides significant time savings.
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"The most valuable feature is the analysis, because of the beta structure."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"It is stable and scalable."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"The rollout and management of devices were very simple."
"It's pretty complete for preventing threats to endpoints. Its capabilities are great."
"The initial setup is very easy."
"Cost-wise it's cheaper than other options."
"The end-user facilities for managing the tool are good."
"There's the possibility of being able to do the administration from the Check Point portal, maintaining control and visibility of the different security events at all times."
"The most valuable feature of this solution is the VPN."
"Forensic Analysis provides a complete analysis of threats via detailed reports."
"I think the costing is fine compared to other products. Cost-wise you definitely get value for your money."
"One valuable feature is Threat Prevention with the on-demand scan."
"We receive good protection with this solution."
"The solution is reliable."
"McAfee Complete Endpoint Protection is stable. We don't have any bugs being reported."
"It's easy to use and it's very powerful. It offers nice endpoint protection."
"McAfee EndPoint Security has a lot of good features that work well if they are implemented properly."
"I have found many of the features to be useful."
"The solution is not stable."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"Detections could be improved."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"Making the portal mobile friendly would be helpful when I am out of office."
"We'd like to see more one-to-one product presentations for the distribution channels."
"One area of this product that has room for improvement is the disc encryption."
"They should also add new functions such as threat hunting."
"The only thing that our customers want, is lower prices."
"Off the top of my head, I can't think of a way it has improved my organization."
"We cannot integrate this product with other solutions, which is something that should be improved."
"Check Point users a pattern-based security module, which is something that can be improved."
"The solution needs more alerts to warn of attacks."
"There are still functionalities that I have not been able to fully test and I would like to spend more time using the tool before offering an opinion to the IT Central community on this point."
"Sometimes, while installing the ePO, we were getting so many errors and I don't know why it happened."
"The management console is a little bit difficult to understand for admins. You need a lot of time in order to become familiar with that. It is a little bit complicated and not too easy to understand. Its price can also be improved. Its price is higher than its competitors. McAfee also needs to have better cloud integration and more data centers in the EU. The cloud center should be in Europe or in Germany. In Germany, it is really important to have access to your data within the same country. Customer data needs to be placed and processed in the same country."
"Tech support is not as helpful as they were in the past."
"The solution could use better updates and fewer bugs."
"One of the drawbacks is that it is not 100% secure."
"It would be nice if the solution was a bit more stable."
"Trying to move away from the signature model for antivirus and malware blocking is something that would be nice. Instead of having to update every day, which is signature-based, moving to more of a kernel or architecture-based model would probably be beneficial."
"They can make it free, but that's not going to happen."
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 104 reviews while Trellix Endpoint Security is ranked 10th in Endpoint Protection Platform (EPP) with 96 reviews. Check Point Harmony Endpoint is rated 8.8, while Trellix Endpoint Security is rated 8.0. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Trellix Endpoint Security writes "Good user behavioral analysis and helpful patching but needs better support services". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and Cortex XDR by Palo Alto Networks, whereas Trellix Endpoint Security is most compared with Microsoft Defender for Endpoint, Trellix Endpoint Security (ENS), CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and SentinelOne Singularity Complete. See our Check Point Harmony Endpoint vs. Trellix Endpoint Security report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.