We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The entirety of our network infrastructure is Cisco and the most valuable feature is the integration."
"The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
"It is a very stable program."
"The most valuable feature is signature-based malware detection."
"Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations."
"If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that."
"The ability to detonate a particular problem in a sandbox environment and understand what the effects are, is helpful. We're trying, for example, to determine, when people send information in, if an attachment is legitimate or not. You just have to open it. If you can do that in a secure sandbox environment, that's an invaluable feature. What you would do otherwise would be very risky and tedious."
"It doesn't impact the devices. It is an agent-based solution, and we see no performance knock on cell phones. That was a big thing for us, especially in the mobile world. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That can shorten the useful life of a device."
"The communication with the console is very dynamic and remote, without the need to return to the computer locally."
"SandBlast Agent is always working in the background collecting sensitive data, forensics, and notifying users whenever there is a chance of a brute-force attack into our systems. Otherwise, it has been protecting our data at various geographies along with the endpoints that we set up on the cloud. They have been able to filter out or thwart any attacks from the very word, "Go," and make our work very safe and smooth."
"Harmony's endpoint sandboxing is really good."
"Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum."
"It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks."
"The most useful feature so far has been having a functioning and up-to-date anti-malware scanner."
"Check Point Harmony Endpoint can be easily deployed and is cost effective and more secure."
"In terms of network usage, it actually reduced the amount of malicious attacks that we had. Before, we really didn't have a secure network. Each endpoint had to protect itself and probably most of them were not actually protected. Now, it's an entire process in which we've been able to cut down significantly the amount of malicious attacks by 60 percent that we get in the organization. It helps us to adequately monitor what has been going on with our network traffic and stopping individual attacks from accessing certain sites where we want to have restrictions or limitations."
"What I like best is the integrated end-to-end security that works with the security information and events manager."
"The product is quite user-friendly."
"The solution scales well."
"The package of protection that it provides is useful. It has antivirus, malware protection, VPN, and a whole bunch of other features."
"The most valuable features are reporting from the ePO console and the advanced threat protection (ATP)."
"This product has the capability to check a wide range of vulnerabilities and devices."
"It provides a lot of information and great visibility, with really great options for managing the environment."
"The solution is stable."
"We have had some problems with updates not playing nice with our environment. This is important, because if there is a new version, we need to test it thoroughly before it goes into production. We cannot just say, "There's a new version. It's not going to give us any problems." With the complexity of the solution using multiple engines for multiple tasks, it can sometimes cause performance issues on our endpoints. Therefore, we need to test it before we deploy. That takes one to three days before we can be certain that the new version plays nice with our environment."
"...the greatest value of all, would be to make the security into a single pane of glass. Whilst these products are largely integrated from a Talos perspective, they're not integrated from a portal perspective. For example, we have to look at an Umbrella portal and a separate AMP portal. We also have to look at a separate portal for the firewalls. If I could wave a magic wand and have one thing, I would put all the Cisco products into one, simple management portal."
"The technical support is very slow."
"I would recommend that the solution offer more availability in terms of the product portfolio and integration with third-party products."
"The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on."
"The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console. If you have a computer and you upgrade from Windows 7 to Windows 10, or you upgrade your agent from version 6 to 7, it creates a new instance in there instead of updating the information. Instead of paying a license for one computer, I have to license two computers until I manually go in, search for all the duplicate entries, and clean them out myself."
"The connector updates are very easily done now, and that's improving. Previously, the connector had an issue, where almost every time it needed to be updated, it required a machine reboot. This was always a bit of an inconvenience and a bug. Because with a lot of software now, you don't need to do that and shouldn't need to be rebooting all the time."
"We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way."
"As I understand there will be a URL filtering feature included with the browser agent in the future. This will allow URL filtering without the need for a Gateway Device. This is something I am looking forward to and would be a great addition to list of features."
"The solution could be improved in the future with a way to provide online training to customers for free, as other providers do."
"I would like to see simple sandboxing for malware analysis."
"Sometimes, the Cloud Management Portal can become unresponsive or take a long time to process a query. This in turn will cause the browser to freeze, which will require closing and reopening of your browser."
"The solutions agent could have better performance, it is a little slow sometimes."
"SandBlast Agent had moments in which it had a high load, we escalated it to the CheckPoint support that helped us to stabilize it. We had a problem with the parameterization of the solution. Once corrected by following the CheckPoint instructions, everything worked normally again."
"It needs more documentation and better ease of deployment. For documentation, it needs more information about integrating the endpoints on SandBlast Agent mobile as well as on desktop platforms."
"We use a couple of Check Point products, like SmartEvent, and SandBlast Agent is not really integrated into that. We haven't gotten the reports working yet. We are working with the account team and trying. As I said, it's still relatively new in terms of what we're trying to achieve."
"There are more secure featured solutions from McAfee on the market but for smaller companies like ours, they are too expensive."
"The initial setup isn't so easy. You need to know what you are doing."
"We would like to see all the features available on cloud."
"I would like this solution to do what Palo Alto traps does because I would only need to run this one product."
"It would be nice if the solution was a bit more stable."
"We know that McAfee isn't the best antivirus and it can't protect us 100%, although we are okay with the level of protection that it gives us."
"They can make it free, but that's not going to happen."
"The resolution time should be faster."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"There is also the Cisco annual subscription plus my management time in terms of what I do with the Cisco product. I spend a minimal amount of time on it though, just rolling out updates as they need them and monitoring the console a couple of times a day to ensure nothing is out of control. Cost-wise, we are quite happy with it."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"We can know if something bad is potentially happening instantaneously and prevent it from happening. We can go to a device and isolate it before it infects other devices. In our environment, that's millions of dollars saved in a matter of seconds."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"The pricing and licensing are reasonable. The cost of AMP for Endpoints is inline with all the other software that has a monthly endpoint cost. It might be a little bit higher than other antivirus type products, but we're only talking about a dollar a month per user. I don't see that cost as being an issue if it's going to give us the confidence and security that we're looking for. We have had a lot of success and happiness with what we're using, so there's no point in changing."
"Licensing fees are on a yearly basis and I am happy with the pricing."
"In terms of licensing, have a buffer zone around your projects in terms of the amount of endpoints that you want to have. You can always have more, but it is best to leave room for a little increase or growth."
"One of the key factors that made us go with this solution was the pricing. On the licensing part, there was an initial complementary set of licenses offered in the initial onboarding package, either 15 or 20. Then, we had some complementary licenses in the initial purchase of the package. That was pretty useful."
"Initial monies replacing all AVs with a single product is about £10k."
"Check Point Harmony Endpoint is cost effective."
"The licensing cost for Check Point is $3 USD or $4 USD per end-user."
"There are three different licensing models including basic, advanced, and complete, and it needs to be selected according to the endpoint."
"The cost is huge compared to other products that are available on market."
"The price is good."
"There is a one-year and a three-year license available for this solution, we are currently on a three-year license."
"Since the maintenance is done by our own team, the price of the subscription should really be cheaper."
"The pricing is great and licensing fees are billed on a yearly basis."
"Its price is reasonable, but it could be made free."
"When comparing the solution to others it is a bit expensive. We are on a monthly license."
"Licensing is paid yearly."
"Its price is very high. It is higher than its competitors, and it should be less."
"The price of the solution is fair, we have a complete security package."
Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.
Check Point Harmony is the industry’s first unified security solution for users, devices and access.
The solution protects devices and internet connections from the most sophisticated attacks while ensuring Zero-Trust Access to corporate applications.
McAfee Complete Endpoint Protection allows you to protect all of your devices with intelligent, collaborative security, in one easy-to-manage, integrated solution. Our integrated endpoint security framework helps remove redundancies, enables fast, proven performance and offers an architecture to align both current and future security investments. With a flexible choice of cloud-based or a local management console, security administrators also get true centralized management that simplifies ongoing tasks, deployment and monitoring.
Check Point Harmony Endpoint is ranked 9th in Endpoint Protection for Business (EPP) with 30 reviews while McAfee Endpoint Security is ranked 14th in Endpoint Protection for Business (EPP) with 37 reviews. Check Point Harmony Endpoint is rated 9.2, while McAfee Endpoint Security is rated 8.0. The top reviewer of Check Point Harmony Endpoint writes "Enables us to integrate endpoints into our IPS and we are seeing things which, without this tool, we would be exposed to". On the other hand, the top reviewer of McAfee Endpoint Security writes "Protect your business against a wide variety of threats". Check Point Harmony Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, SentinelOne, Cortex XDR by Palo Alto Networks and Carbon Black CB Defense, whereas McAfee Endpoint Security is most compared with McAfee MVISION Endpoint, Symantec End-User Endpoint Security, Microsoft Defender for Endpoint, CrowdStrike Falcon and Kaspersky Endpoint Security for Business. See our Check Point Harmony Endpoint vs. McAfee Endpoint Security report.
See our list of best Endpoint Protection for Business (EPP) vendors.
We monitor all Endpoint Protection for Business (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.