# Check Point Harmony Endpoint, Cisco Secure Client vs FortiClient Comparison

| | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Star Rating** | 4.5 out of 5 | 4.5 out of 5 | 4.4 out of 5 | 
| **Total Reviews** | 284 | 345 | 274 | 
| **Largest Market Segment** | Mid-Market (51.2% of reviews) | Enterprise (56.5% of reviews) | Mid-Market (57.2% of reviews) | 
| **Entry Level Price** | No pricing available | No pricing available | No pricing available | 

---
## Top Pros & Cons

### Check Point Harmony Endpoint

Pros:
- Security (73 reviews)
- Features (57 reviews)

Cons:
- Slow Performance (27 reviews)
- High Resource Usage (25 reviews)

### Cisco Secure Client

Pros:
- Ease of Use (4 reviews)
- Security (4 reviews)

Cons:
- Authentication Issues (4 reviews)
- Slow Performance (3 reviews)

### FortiClient

Pros:
- Ease of Use (40 reviews)
- Security (38 reviews)

Cons:
- Unstable Connection (21 reviews)
- Slow Performance (20 reviews)

---
## Ratings Comparison
| Rating | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
  | **Meets Requirements** | 9.0 (211 reviews) | 9.3 (280 reviews) | 9.2 (227 reviews) | 
  | **Ease of Use** | 8.9 (217 reviews) | 9.1 (280 reviews) | 9.0 (227 reviews) | 
  | **Ease of Setup** | 8.6 (184 reviews) | 8.7 (59 reviews) | 8.7 (124 reviews) | 
  | **Ease of Admin** | 8.7 (140 reviews) | 8.7 (34 reviews) | 9.0 (80 reviews) | 
  | **Quality of Support** | 8.7 (205 reviews) | 9.0 (231 reviews) | 8.7 (197 reviews) | 
  | **Has the product been a good partner in doing business?** | 8.8 (134 reviews) | 9.3 (34 reviews) | 8.6 (76 reviews) | 
  | **Product Direction (% positive)** | 9.4 (202 reviews) | 8.5 (270 reviews) | 8.8 (218 reviews) | 

---
## Pricing

### Check Point Harmony Endpoint

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### Cisco Secure Client

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### FortiClient

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

---
## Features Comparison By Category

### Zero Trust Networking

| Product | Score | Reviews |
|---|---|---|
| **Check Point Harmony Endpoint** | N/A | N/A |
| **Cisco Secure Client** | N/A | N/A |
| **FortiClient** | 9.0/10 | 11 |

#### Network Management

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Network Segmentation** | Not enough data | Not enough data | 9.3 (9 reviews) | 
| **Network Mapping** | Not enough data | Not enough data | 7.9 (7 reviews) | 
| **Security Analytics** | Not enough data | Not enough data | 8.3 (7 reviews) | 
| **API/Integrations** | Not enough data | Not enough data | 9.2 (8 reviews) | 

#### Security

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Security Automation** | Not enough data | Not enough data | 8.1 (8 reviews) | 
| **Application Security** | Not enough data | Not enough data | 9.3 (5 reviews) | 
| **Workload Protection** | Not enough data | Not enough data | 10.0 (5 reviews) | 
| **Data Protection** | Not enough data | Not enough data | 9.5 (7 reviews) | 

#### Identity Management

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Adaptive Access Control** | Not enough data | Not enough data | 9.4 (6 reviews) | 
| **Identity Scoring** | Not enough data | Not enough data | 9.4 (6 reviews) | 
| **User Monitoring** | Not enough data | Not enough data | 8.3 (7 reviews) | 

#### Generative AI

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **AI Text Summarization** | Not enough data | Not enough data | Not enough data | 
| **AI Text Generation** | Not enough data | Not enough data | Not enough data | 

### Endpoint Protection Platforms

| Product | Score | Reviews |
|---|---|---|
| **Check Point Harmony Endpoint** | 8.9/10 | 128 |
| **Cisco Secure Client** | N/A | N/A |
| **FortiClient** | 8.9/10 | 115 |

#### Administration

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Compliance** | 8.8 (104 reviews) | Not enough data | 9.1 (80 reviews) | 
| **Web Control** | 8.8 (103 reviews) | Not enough data | 9.1 (80 reviews) | 
| **Application Control** | 8.9 (104 reviews) | Not enough data | 9.1 (79 reviews) | 
| **Asset Management** | 8.5 (100 reviews) | Not enough data | 8.6 (67 reviews) | 
| **Device Control** | 8.8 (104 reviews) | Not enough data | 9.0 (89 reviews) | 

#### Functionality

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **System Isolation** | 8.8 (98 reviews) | Not enough data | 9.0 (64 reviews) | 
| **Firewall** | 8.8 (103 reviews) | Not enough data | 9.6 (83 reviews) | 
| **Endpoint Intelligence** | 9.1 (100 reviews) | Not enough data | 9.1 (66 reviews) | 
| **Malware Detection** | 9.4 (104 reviews) | Not enough data | 9.0 (74 reviews) | 

#### Analysis

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Automated Remediation** | 8.9 (101 reviews) | Not enough data | 8.5 (64 reviews) | 
| **Incident Reports** | 8.7 (101 reviews) | Not enough data | 8.3 (64 reviews) | 
| **Behavioral Analysis** | 8.9 (99 reviews) | Not enough data | 8.4 (62 reviews) | 

### Digital Forensics

| Product | Score | Reviews |
|---|---|---|
| **Check Point Harmony Endpoint** | N/A | N/A |
| **Cisco Secure Client** | N/A | N/A |
| **FortiClient** | N/A | N/A |

#### Analysis

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **File Analysis** | Not enough data | Not enough data | Not enough data | 
| **Memory Analysis** | Not enough data | Not enough data | Not enough data | 
| **Registry Analysis** | Not enough data | Not enough data | Not enough data | 
| **Email Analysis** | Not enough data | Not enough data | Not enough data | 
| **Linux Analysis** | Not enough data | Not enough data | Not enough data | 

#### Functionality

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Incident Alerts** | Not enough data | Not enough data | Not enough data | 
| **Anomaly Detection** | Not enough data | Not enough data | Not enough data | 
| **Continuous Analysis** | Not enough data | Not enough data | Not enough data | 
| **Decryption** | Not enough data | Not enough data | Not enough data | 

#### Remediation

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Incident Reports** | Not enough data | Not enough data | Not enough data | 
| **Remediation Suggestions** | Not enough data | Not enough data | Not enough data | 
| **Response Automation** | Not enough data | Not enough data | Not enough data | 

#### Generative AI

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **AI Text Generation** | Not enough data | Not enough data | Not enough data | 
| **AI Text Summarization** | Not enough data | Not enough data | Not enough data | 

### Extended Detection and Response (XDR) Platforms

| Product | Score | Reviews |
|---|---|---|
| **Check Point Harmony Endpoint** | N/A | N/A |
| **Cisco Secure Client** | N/A | N/A |
| **FortiClient** | N/A | N/A |

#### Detection &amp; Response

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Response Automation** | Not enough data | Not enough data | Not enough data | 
| **Threat Hunting** | Not enough data | Not enough data | Not enough data | 
| **Rule-Based Detection** | Not enough data | Not enough data | Not enough data | 
| **Real-Time Detection** | Not enough data | Not enough data | Not enough data | 

#### Management

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Extensibility** | Not enough data | Not enough data | Not enough data | 
| **Workflow Automation** | Not enough data | Not enough data | Not enough data | 
| **Unified Visibility** | Not enough data | Not enough data | Not enough data | 

#### Analytics

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Threat Intelligence** | Not enough data | Not enough data | Not enough data | 
| **Artificial Intelligence &amp; Machine Learning** | Not enough data | Not enough data | Not enough data | 
| **Data Collection** | Not enough data | Not enough data | Not enough data | 

#### Agentic AI - Extended Detection and Response (XDR) Platforms

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 
| **Decision Making** | Not enough data | Not enough data | Not enough data | 

#### Services - Extended Detection and Response (XDR)

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Managed Services** | Not enough data | Not enough data | Not enough data | 

### Antivirus

| Product | Score | Reviews |
|---|---|---|
| **Check Point Harmony Endpoint** | 7.9/10 | 41 |
| **Cisco Secure Client** | N/A | N/A |
| **FortiClient** | 8.3/10 | 11 |

#### Generative AI

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **AI Text Generation** | 7.9 (36 reviews) | Not enough data | 8.2 (11 reviews) | 
| **AI Text Summarization** | 7.9 (35 reviews) | Not enough data | 8.3 (11 reviews) | 

### Endpoint Management

| Product | Score | Reviews |
|---|---|---|
| **Check Point Harmony Endpoint** | 7.5/10 | 35 |
| **Cisco Secure Client** | N/A | N/A |
| **FortiClient** | 7.6/10 | 32 |

#### Generative AI

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **AI Text Summarization** | 7.5 (29 reviews) | Not enough data | 7.6 (32 reviews) | 

### Zero Trust Platforms

| Product | Score | Reviews |
|---|---|---|
| **Check Point Harmony Endpoint** | N/A | N/A |
| **Cisco Secure Client** | N/A | N/A |
| **FortiClient** | N/A | N/A |

#### Identity and Access Management - Zero Trust Platforms

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Single sign-on (SSO)** | Not enough data | Not enough data | Not enough data | 
| **Multi-factor authentication (MFA)** | Not enough data | Not enough data | Not enough data | 
| **Role-based access control (RBAC)** | Not enough data | Not enough data | Not enough data | 
| **Identity federation** | Not enough data | Not enough data | Not enough data | 

#### Security - Zero Trust Platforms

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Encryption** | Not enough data | Not enough data | Not enough data | 
| **Endpoint detection and response (EDR)** | Not enough data | Not enough data | Not enough data | 
| **Device posture assessment** | Not enough data | Not enough data | Not enough data | 
| **Micro-segmentation** | Not enough data | Not enough data | Not enough data | 
| **Zero trust network access (ZTNA)** | Not enough data | Not enough data | Not enough data | 

#### Data Security - Zero Trust Platforms

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Data loss prevention (DLP)** | Not enough data | Not enough data | Not enough data | 
| **Data classification** | Not enough data | Not enough data | Not enough data | 

#### Application Visibility - Zero Trust Platforms

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **API support** | Not enough data | Not enough data | Not enough data | 
| **Application-level controls** | Not enough data | Not enough data | Not enough data | 
| **Secure application access** | Not enough data | Not enough data | Not enough data | 
| **User and entity behavior analytics (UEBA)** | Not enough data | Not enough data | Not enough data | 
| **Continuous monitoring** | Not enough data | Not enough data | Not enough data | 

#### Reporting and Policies - Zero Trust Platforms

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Policy automation** | Not enough data | Not enough data | Not enough data | 
| **Regulatory compliance** | Not enough data | Not enough data | Not enough data | 
| **Cross-platform compatibility** | Not enough data | Not enough data | Not enough data | 
| **Policy enforcement** | Not enough data | Not enough data | Not enough data | 
| **Comprehensive reporting** | Not enough data | Not enough data | Not enough data | 

#### Agentic AI - Zero Trust Platforms

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Autonomous Task Execution** | Not enough data | Not enough data | Not enough data | 
| **Cross-system Integration** | Not enough data | Not enough data | Not enough data | 
| **Adaptive Learning** | Not enough data | Not enough data | Not enough data | 
| **Proactive Assistance** | Not enough data | Not enough data | Not enough data | 

### Endpoint Detection &amp; Response (EDR)

| Product | Score | Reviews |
|---|---|---|
| **Check Point Harmony Endpoint** | N/A | N/A |
| **Cisco Secure Client** | N/A | N/A |
| **FortiClient** | N/A | N/A |

#### Services - Endpoint Detection &amp; Response (EDR) 

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Managed Services** | Not enough data | Not enough data | Not enough data | 

### Cloud Security

| Product | Score | Reviews |
|---|---|---|
| **Check Point Harmony Endpoint** | N/A | N/A |
| **Cisco Secure Client** | N/A | N/A |
| **FortiClient** | N/A | N/A |

#### Cloud Visibility

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Data Discovery** | Not enough data | Not enough data | Not enough data | 
| **Cloud Registry** | Not enough data | Not enough data | Not enough data | 
| **Cloud Gap Analytics** | Not enough data | Not enough data | Not enough data | 

#### Security

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Data Security** | Not enough data | Not enough data | Not enough data | 
| **Data loss Prevention** | Not enough data | Not enough data | Not enough data | 
| **Security Auditing** | Not enough data | Not enough data | Not enough data | 

#### Identity

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **SSO** | Not enough data | Not enough data | Not enough data | 
| **Governance** | Not enough data | Not enough data | Not enough data | 
| **User Analytics** | Not enough data | Not enough data | Not enough data | 

### Business VPN

| Product | Score | Reviews |
|---|---|---|
| **Check Point Harmony Endpoint** | N/A | N/A |
| **Cisco Secure Client** | N/A | N/A |
| **FortiClient** | N/A | N/A |

#### Usage

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Multi-Device Usage** | Not enough data | Not enough data | Not enough data | 
| **Multiple Concurrent Connections** | Not enough data | Not enough data | Not enough data | 
| **Protocol Choices** | Not enough data | Not enough data | Not enough data | 
| **Unlimited Bandwidth** | Not enough data | Not enough data | Not enough data | 
| **No Log Storage** | Not enough data | Not enough data | Not enough data | 
| **Varied Server Locations** | Not enough data | Not enough data | Not enough data | 
| **Unlimited Server Switches** | Not enough data | Not enough data | Not enough data | 

#### Miscellaneous

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Live Customer Support** | Not enough data | Not enough data | Not enough data | 
| **Open Source Code** | Not enough data | Not enough data | Not enough data | 
| **Multiple Payment Methods** | Not enough data | Not enough data | Not enough data | 

### Endpoint Protection

| Product | Score | Reviews |
|---|---|---|
| **Check Point Harmony Endpoint** | N/A | N/A |
| **Cisco Secure Client** | N/A | N/A |
| **FortiClient** | N/A | N/A |

#### System Control

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Device Control** | Not enough data | Not enough data | Not enough data | 
| **Web Control** | Not enough data | Not enough data | Not enough data | 
| **Application Control** | Not enough data | Not enough data | Not enough data | 
| **Asset Management** | Not enough data | Not enough data | Not enough data | 
| **System Isolation** | Not enough data | Not enough data | Not enough data | 

#### Vulnerability Prevention

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Endpoint Intelligence** | Not enough data | Not enough data | Not enough data | 
| **Firewall** | Not enough data | Not enough data | Not enough data | 
| **Malware Detection** | Not enough data | Not enough data | Not enough data | 

#### Security Management

| Feature | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Incident Reports** | Not enough data | Not enough data | Not enough data | 
| **Security Validation** | Not enough data | Not enough data | Not enough data | 
| **Compliance ** | Not enough data | Not enough data | Not enough data | 

---
## Categories

**Unique to Check Point Harmony Endpoint (6):** [Digital Forensics Software](https://www.g2.com/categories/digital-forensics), [Endpoint Protection Platforms](https://www.g2.com/categories/endpoint-protection-platforms), [Endpoint Management Software](https://www.g2.com/categories/endpoint-management), [Antivirus Software](https://www.g2.com/categories/antivirus), [Endpoint Detection &amp; Response (EDR) Software](https://www.g2.com/categories/endpoint-detection-response-edr), [Extended Detection and Response (XDR) Platforms](https://www.g2.com/categories/extended-detection-and-response-xdr-platforms)

**Unique to Cisco Secure Client (1):** [Business VPN Software](https://www.g2.com/categories/business-vpn)

**Unique to FortiClient (5):** [Endpoint Protection Platforms](https://www.g2.com/categories/endpoint-protection-platforms), [Endpoint Management Software](https://www.g2.com/categories/endpoint-management), [Antivirus Software](https://www.g2.com/categories/antivirus), [Zero Trust Networking Software](https://www.g2.com/categories/zero-trust-networking), [Zero Trust Platforms](https://www.g2.com/categories/zero-trust-platforms)


---
## Reviewer Demographics

### By Company Size

| Segment | Check Point Harmony Endpoint | Cisco Secure Client | FortiClient | 
|---|---|---|---|
| **Small-Business** | 21.0% | 8.9% | 17.5% | 
| **Mid-Market** | 51.2% | 34.5% | 57.2% | 
| **Enterprise** | 27.8% | 56.5% | 25.3% | 

### By Industry

#### Check Point Harmony Endpoint

- **Information Technology and Services:** 20.2%
- **Computer &amp; Network Security:** 17.9%
- **Telecommunications:** 4.8%
- **Financial Services:** 4.4%
- **Defense &amp; Space:** 4.0%
- **Banking:** 3.6%
- **Government Administration:** 3.2%
- **Computer Software:** 2.8%
- **Computer Networking:** 2.0%
- **Retail:** 2.0%
- **Other:** 35.3%

#### Cisco Secure Client

- **Information Technology and Services:** 22.6%
- **Computer Software:** 9.2%
- **Telecommunications:** 6.3%
- **Hospital &amp; Health Care:** 5.7%
- **Computer &amp; Network Security:** 3.6%
- **Education Management:** 3.6%
- **Financial Services:** 3.0%
- **Accounting:** 2.7%
- **Outsourcing/Offshoring:** 2.7%
- **Higher Education:** 2.4%
- **Other:** 38.4%

#### FortiClient

- **Information Technology and Services:** 18.3%
- **Computer Software:** 8.6%
- **Computer &amp; Network Security:** 7.8%
- **Hospitality:** 5.1%
- **Telecommunications:** 4.3%
- **Insurance:** 3.9%
- **Financial Services:** 3.9%
- **Hospital &amp; Health Care:** 2.7%
- **Automotive:** 2.3%
- **Banking:** 1.9%
- **Other:** 41.2%

---
## Alternatives

### Alternatives to Check Point Harmony Endpoint

- [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews) — 4.7/5 stars (201 reviews)
- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) — 4.6/5 stars (408 reviews)
- [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews) — 4.7/5 stars (826 reviews)
- [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews) — 4.6/5 stars (971 reviews)
- [Microsoft Defender for Endpoint](https://www.g2.com/products/microsoft-defender-for-endpoint/reviews) — 4.4/5 stars (310 reviews)
- [Symantec End-user Endpoint Security](https://www.g2.com/products/symantec-end-user-endpoint-security/reviews) — 4.4/5 stars (553 reviews)
- [Bitdefender GravityZone XDR](https://www.g2.com/products/bitdefender-gravityzone-xdr/reviews) — 4.0/5 stars (85 reviews)
- [ThreatDown](https://www.g2.com/products/threatdown/reviews) — 4.6/5 stars (1083 reviews)
- [Cortex XDR](https://www.g2.com/products/palo-alto-networks-cortex-xdr/reviews) — 4.6/5 stars (53 reviews)
- [Acronis Cyber Protect](https://www.g2.com/products/acronis-acronis-cyber-protect/reviews) — 4.3/5 stars (742 reviews)

### Alternatives to Cisco Secure Client

- [OpenVPN Access Server](https://www.g2.com/products/openvpn-access-server/reviews) — 4.5/5 stars (339 reviews)
- [Netgate pfSense](https://www.g2.com/products/netgate-pfsense/reviews) — 4.7/5 stars (325 reviews)
- [Absolute Secure Access](https://www.g2.com/products/absolute-secure-access/reviews) — 4.7/5 stars (225 reviews)
- [Check Point SASE](https://www.g2.com/products/check-point-sase/reviews) — 4.5/5 stars (215 reviews)
- [GoodAccess](https://www.g2.com/products/goodaccess/reviews) — 4.7/5 stars (166 reviews)
- [Zscaler Private Access](https://www.g2.com/products/zscaler-private-access/reviews) — 4.4/5 stars (135 reviews)
- [NordLayer](https://www.g2.com/products/nordlayer/reviews) — 4.3/5 stars (126 reviews)
- [OpenVPN CloudConnexa](https://www.g2.com/products/openvpn-cloudconnexa/reviews) — 4.6/5 stars (124 reviews)
- [Check Point Remote Access VPN](https://www.g2.com/products/check-point-remote-access-vpn/reviews) — 4.5/5 stars (98 reviews)
- [Twingate](https://www.g2.com/products/twingate/reviews) — 4.7/5 stars (76 reviews)

### Alternatives to FortiClient

- [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews) — 4.7/5 stars (201 reviews)
- [ThreatDown](https://www.g2.com/products/threatdown/reviews) — 4.6/5 stars (1083 reviews)
- [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews) — 4.6/5 stars (971 reviews)
- [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews) — 4.7/5 stars (826 reviews)
- [Symantec End-user Endpoint Security](https://www.g2.com/products/symantec-end-user-endpoint-security/reviews) — 4.4/5 stars (553 reviews)
- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) — 4.6/5 stars (408 reviews)
- [Webroot Business Endpoint Protection](https://www.g2.com/products/webroot-business-endpoint-protection/reviews) — 4.5/5 stars (532 reviews)
- [TeamViewer](https://www.g2.com/products/teamviewer/reviews) — 4.5/5 stars (3938 reviews)
- [Avast Small Business Cybersecurity](https://www.g2.com/products/avast-small-business-cybersecurity/reviews) — 4.4/5 stars (102 reviews)
- [Check Point Next Generation Firewalls (NGFWs)](https://www.g2.com/products/check-point-next-generation-firewalls-ngfws/reviews) — 4.5/5 stars (583 reviews)

---
## Top Discussions

### Check Point Harmony Endpoint

No discussions available for this product.

### Cisco Secure Client

- Title: [What is Cisco Anyconnect Secure Mobility Client used for?](https://www.g2.com/discussions/what-is-cisco-anyconnect-secure-mobility-client-used-for) — 1 comment
  > **Top comment:** "It allows encrypted and secure connections from clients from all over the internet and not just from within the company&#39;s ring fenced intranet, thereby..."
- Title: [Is Cisco AnyConnect encrypted?](https://www.g2.com/discussions/is-cisco-anyconnect-encrypted) — 1 comment
  > **Top comment:** "Yes, Cisco AnyConnect is encrypted. It ensures secure and encrypted connections between client devices and VPN servers to protect data transmitted over the..."
- Title: [What is the latest version of Cisco AnyConnect secure mobility client?](https://www.g2.com/discussions/what-is-the-latest-version-of-cisco-anyconnect-secure-mobility-client) — 1 comment
  > **Top comment:** "4.10.06090"
- Title: [How do I check my connection statistics?](https://www.g2.com/discussions/12438-how-do-i-check-my-connection-statistics) — 1 comment, 1 upvote
  > **Top comment:** "Hello Jose, 
At the left bottom corner of the Cisco AnyConnect Secure Mobility Client box you will find a blue gear icon. If you click this icon a new..."

### FortiClient

- Title: [Is FortiClient free?](https://www.g2.com/discussions/is-forticlient-free) — 2 comments
  > **Top comment:** "No, I believe it&#39;s freemium"
- Title: [What is FortiClient VPN used for?](https://www.g2.com/discussions/what-is-forticlient-vpn-used-for) — 2 comments
  > **Top comment:** "FortiClient VPN is used to establish secure connections, or virtual private networks (VPNs), between devices and a remote network or server. This allows..."
- Title: [What is FortiClient used for?](https://www.g2.com/discussions/what-is-forticlient-used-for) — 1 comment
  > **Top comment:** "VPN"
- Title: [How do I use FortiClient VPN?](https://www.g2.com/discussions/how-do-i-use-forticlient-vpn) — 1 comment
  > **Top comment:** "Head over to https://www.fortinet.com/support/product-downloads and download the free vpn client.

Once downloaded, accept the terms and configure your vpn..."
- Title: [What&#39;s FortiClient?](https://www.g2.com/discussions/what-s-forticlient) — 1 comment
  > **Top comment:** "FortiClient is an endpoint protection software developed by Fortinet. It provides a range of security features for devices such as computers, laptops, and..."

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/check-point-harmony-endpoint-vs-cisco-secure-client-vs-forticlient)

