Introducing G2.ai, the future of software buying.Try now

Compare Check Point Harmony Endpoint and ESET PROTECT

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Star Rating
(289)4.5 out of 5
Market Segments
Mid-Market (51.8% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Check Point Harmony Endpoint
ESET PROTECT
ESET PROTECT
Star Rating
(917)4.6 out of 5
Market Segments
Small-Business (45.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Free Trial is available
Browse all 5 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Check Point Harmony Endpoint excels in providing robust protection against advanced threats, including ransomware and zero-day attacks, with users appreciating its minimal false positives and high detection rates.
  • Users say ESET PROTECT stands out for its seamless integration with operating systems, which significantly reduces deployment time. One reviewer noted that it came with the OS, eliminating the need for extensive setup, making it a great choice for those looking for quick implementation.
  • Reviewers mention that Check Point Harmony Endpoint offers a centralized and easy-to-manage console, providing clear visibility across all endpoints. This feature is particularly valued by users who need to monitor multiple devices efficiently.
  • According to verified reviews, ESET PROTECT is praised for its comprehensive suite of cybersecurity solutions, which enables informed decision-making during risk assessments. Users highlighted its high-quality performance throughout the entire process.
  • G2 reviewers note that both products have similar scores for ease of use, but Check Point Harmony Endpoint is particularly appreciated for its lightweight agent that combines EPP, EDR, and XDR functionalities without slowing down devices.
  • Users report that while Check Point Harmony Endpoint has a strong focus on threat prevention, ESET PROTECT's scripting capabilities, such as the kusto query language, allow for advanced customization and deeper insights into potential security issues, appealing to more technical users.
Pricing
Entry-Level Pricing
Check Point Harmony Endpoint
No pricing available
ESET PROTECT
ESET PROTECT Advanced
Contact Us
Browse all 5 pricing plans
Free Trial
Check Point Harmony Endpoint
No trial information available
ESET PROTECT
Free Trial is available
Ratings
Meets Requirements
9.0
212
9.2
786
Ease of Use
8.9
218
8.9
788
Ease of Setup
8.6
185
8.7
526
Ease of Admin
8.6
139
8.5
414
Quality of Support
8.7
206
8.9
726
Has the product been a good partner in doing business?
8.8
133
8.9
404
Product Direction (% positive)
9.4
203
8.7
779
Features by Category
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.9
127
9.2
238
Administration
8.8
107
9.2
192
8.8
105
9.1
200
8.9
107
9.0
201
8.5
103
8.8
193
8.8
107
9.0
197
Functionality
8.8
101
9.0
201
8.9
105
9.1
203
9.1
103
9.2
204
9.3
106
9.3
204
Analysis
9.0
104
9.0
197
8.7
104
9.1
196
8.9
102
Feature Not Available
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Malware Analysis ToolsHide 11 FeaturesShow 11 Features
Not enough data
9.4
94
Detection
Not enough data
9.5
76
Not enough data
Feature Not Available
Not enough data
9.3
74
Analysis
Not enough data
9.5
76
Not enough data
9.0
74
Not enough data
9.4
74
Not enough data
9.4
75
Response
Not enough data
9.2
75
Not enough data
9.5
76
Not enough data
9.4
75
Generative AI
Not enough data
Feature Not Available
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
9.6
19
Detection & Response
Not enough data
9.6
14
Not enough data
9.8
14
Not enough data
9.8
14
Not enough data
9.9
14
Management
Not enough data
9.5
13
Not enough data
9.8
14
Not enough data
9.2
13
Analytics
Not enough data
9.4
15
Not enough data
9.0
14
Not enough data
9.3
14
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
9.4
9
Not enough data
9.8
8
Not enough data
9.7
10
Services - Extended Detection and Response (XDR)
Not enough data
9.7
6
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.9
16
Platform Features
Not enough data
8.3
14
Not enough data
9.4
13
Not enough data
9.2
13
Not enough data
9.4
14
Not enough data
9.1
13
Not enough data
9.5
14
Not enough data
8.5
8
Automation Capabilities
Not enough data
9.6
13
Not enough data
9.0
13
Not enough data
6.7
8
8.0
41
Not enough data
Generative AI
8.0
40
Feature Not Available
8.0
39
Feature Not Available
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.8
35
Not enough data
Generative AI
7.8
33
Not enough data
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.7
19
Services - Endpoint Detection & Response (EDR)
Not enough data
9.7
10
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Check Point Harmony Endpoint
Check Point Harmony Endpoint
ESET PROTECT
ESET PROTECT
Unique Categories
Check Point Harmony Endpoint
Check Point Harmony Endpoint is categorized as Digital Forensics and Endpoint Management
Reviews
Reviewers' Company Size
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Small-Business(50 or fewer emp.)
20.6%
Mid-Market(51-1000 emp.)
51.8%
Enterprise(> 1000 emp.)
27.7%
ESET PROTECT
ESET PROTECT
Small-Business(50 or fewer emp.)
45.4%
Mid-Market(51-1000 emp.)
44.3%
Enterprise(> 1000 emp.)
10.3%
Reviewers' Industry
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Information Technology and Services
20.2%
Computer & Network Security
18.2%
Telecommunications
4.7%
Financial Services
4.3%
Defense & Space
4.0%
Other
48.6%
ESET PROTECT
ESET PROTECT
Information Technology and Services
12.4%
Computer Software
5.3%
Computer & Network Security
3.9%
Construction
3.8%
Internet
3.3%
Other
71.2%
Alternatives
Check Point Harmony Endpoint
Check Point Harmony Endpoint Alternatives
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
ESET PROTECT
ESET PROTECT Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatDown
ThreatDown
Add ThreatDown
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
SentinelOne Singularity Endpoint
SentinelOne Singularity Endpoint
Add SentinelOne Singularity Endpoint
Discussions
Check Point Harmony Endpoint
Check Point Harmony Endpoint Discussions
Monty the Mongoose crying
Check Point Harmony Endpoint has no discussions with answers
ESET PROTECT
ESET PROTECT Discussions
How can I backup the encryption key?
2 Comments
GABI C.
GC
It's critical to have backups of encryption keys. If the lone copy of a key is lost, data encrypted with that key cannot be accessed. When you initially turn...Read more
Does ESET nod32 protect against malware?
2 Comments
DM
Not allRead more
How to acquire paid licenses more quickly?
1 Comment
MV
Hi Brayan, the fastest way to acquire new license up to 100 seats is to purchase online. To purchase more than 100 seats, please contact local...Read more