We performed a comparison between Check Point Harmony Endpoint and Trellix Endpoint Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point Harmony Endpoint provides a sophisticated defense against ransomware and phishing attacks. The solution is praised for its forensic analysis and VPN connectivity. Trellix Endpoint Security is highly valued for its easy administration options and reliability. Users say Check Point could improve its endpoint vulnerability management and threat-hunting features. Reviews suggest that Trellix could reduce resource consumption and improve user-friendliness.
Service and Support: While several users lauded Check Point support for its problem-solving skills, others said there is room for improvement. Some users have found the support for Trellix Endpoint Security helpful and reliable, while others have encountered ineffective assistance and communication problems.
Ease of Deployment: Setting up Check Point Harmony Endpoint is uncomplicated, and one admin is usually enough for the job. It may take time to configure the solution due to the wide range of available blades. The setup process for Trellix Endpoint Security varies in difficulty, depending on the user's experience with McAfee and general technical expertise.
Pricing: Users generally find the price of Check Point Harmony Endpoint to be reasonable and competitive. They perceive it as more cost-effective than other solutions, though some said it could be lower. Some find Trellix’s price reasonable and competitive, while others feel there is room for improvement.
ROI: Check Point Harmony Endpoint provides a comprehensive and economical solution, and customers say the product has helped them grow. Trellix Endpoint Security provides significant time savings.
"The solution was relatively easy to deploy."
"The price is low and quite competitive with others."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"Fortinet is very user-friendly for customers."
"Ability to get forensics details and also memory exfiltration."
"Forensics is a valuable feature of Fortinet FortiEDR."
"The most valuable feature is the analysis, because of the beta structure."
"It is very powerful tooling that can be tuned a lot."
"The most important characteristic of our requirements was the implementation of disk encryption."
"Information is easily managed and protected (which is particularly useful in lost or stolen endpoints)."
"It is minimally invasive. From a single installer, the equipment is protected and secured."
"The tool minimizes the impact of a breach with autonomous detection and response."
"The graphical interface is very easy to use and intuitive, which greatly facilitates the work and greatly facilitates the work and the location of threats on the users' computers."
"We are able to manage all our endpoints from a single cloud console."
"We have found the stability to be very reliable."
"Would benefit with the addition of DLP features."
"It is a stable solution...The solution's technical support is good."
"Technical support is always available and very helpful."
"We like the management of the ePO, and we like the management console."
"The endpoint security, antivirus and firewall are the most valuable features of Trellix Endpoint Security."
"The package of protection that it provides is useful. It has antivirus, malware protection, VPN, and a whole bunch of other features."
"The solution provides dashboard control, so we can centrally monitor the entire status of our organization."
"It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts."
"ZTNA can improve latency."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"The only minor concern is occasional interference with desired programs."
"We cannot integrate this product with other solutions, which is something that should be improved."
"For the future, I would like to see maybe a content-filtering emulation feature in Harmony Endpoint."
"The solutions agent could have better performance, it is a little slow sometimes."
"Check Point users a pattern-based security module, which is something that can be improved."
"The web filter service could be improved."
"It would be useful if you could also mark blocks as safe from a client. Now users always have to ask an admin to make exclusions."
"I would like to see support for a policy in the appliance that will refuse to create a connection if it does not detect an active virus scanner."
"They need to make the user interface on the server more intuitive and user-friendly."
"The solution takes up a high amount of memory and can cause the system to hang."
"Some agents become old and then they don't communicate well any longer."
"Its pricing needs to be improved."
"The VirusScan needs to improve in order to detect ransomware and other advanced threats."
"The solution's documentation is not streamlined and is in bits and pieces, which should be in a single format."
"We would like to see all the features available on cloud."
"The solution could use better updates and fewer bugs."
"The initial setup is complex. It is a very complex product. You must have experience with it."
Check Point Harmony Endpoint is ranked 8th in Endpoint Protection Platform (EPP) with 103 reviews while Trellix Endpoint Security is ranked 10th in Endpoint Protection Platform (EPP) with 95 reviews. Check Point Harmony Endpoint is rated 8.8, while Trellix Endpoint Security is rated 8.0. The top reviewer of Check Point Harmony Endpoint writes "Excellent anti-ransomware protection, zero-day phishing protection, and web browsing filtering". On the other hand, the top reviewer of Trellix Endpoint Security writes "Good user behavioral analysis and helpful patching but needs better support services". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business and SentinelOne Singularity Complete, whereas Trellix Endpoint Security is most compared with Microsoft Defender for Endpoint, Trellix Endpoint Security (ENS), CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and SentinelOne Singularity Complete. See our Check Point Harmony Endpoint vs. Trellix Endpoint Security report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.