Introducing G2.ai, the future of software buying.Try now

Compare Check Point Harmony Endpoint and WithSecure Elements Endpoint Protection

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Star Rating
(288)4.5 out of 5
Market Segments
Mid-Market (51.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Check Point Harmony Endpoint
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection
Star Rating
(108)4.4 out of 5
Market Segments
Mid-Market (43.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about WithSecure Elements Endpoint Protection
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that WithSecure Elements Endpoint Protection excels in Asset Management with a score of 9.6, highlighting its comprehensive tracking capabilities, while Check Point Harmony Endpoint received a lower score of 8.5, indicating potential gaps in asset visibility.
  • Reviewers mention that the Malware Detection feature is a strong point for both products, but Check Point Harmony Endpoint slightly outperforms with a score of 9.5 compared to WithSecure's 9.3, suggesting a more robust detection mechanism according to user feedback.
  • G2 users indicate that WithSecure's System Isolation feature is highly rated at 9.3, providing effective containment of threats, whereas Check Point Harmony Endpoint's score of 8.9 suggests it may not isolate threats as effectively.
  • Users on G2 report that the Automated Remediation capabilities of Check Point Harmony Endpoint are superior, scoring 9.2, which reviewers say leads to quicker recovery from incidents compared to WithSecure's score of 8.8.
  • Reviewers mention that both products have strong Compliance features, but WithSecure scored 9.0 while Check Point Harmony Endpoint slightly edged ahead with a score of 9.2, indicating a more thorough compliance management process.
  • Users say that the Behavioral Analysis in WithSecure Elements Endpoint Protection is rated highly at 9.3, which reviewers appreciate for its proactive threat detection, while Check Point Harmony Endpoint scored 9.0, suggesting it may not be as effective in identifying unusual behavior patterns.
Pricing
Entry-Level Pricing
Check Point Harmony Endpoint
No pricing available
WithSecure Elements Endpoint Protection
No pricing available
Free Trial
Check Point Harmony Endpoint
No trial information available
WithSecure Elements Endpoint Protection
Free Trial is available
Ratings
Meets Requirements
9.0
211
8.7
84
Ease of Use
8.9
217
9.1
85
Ease of Setup
8.6
184
8.5
26
Ease of Admin
8.6
138
8.4
25
Quality of Support
8.7
205
8.7
77
Has the product been a good partner in doing business?
8.8
132
8.3
23
Product Direction (% positive)
9.4
202
8.4
81
Features by Category
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
8.9
124
8.9
14
Administration
8.8
106
9.0
10
8.8
104
8.9
11
8.9
106
8.3
11
8.6
102
9.5
10
8.9
106
8.8
11
Functionality
8.8
100
9.1
9
8.9
104
8.8
10
9.1
102
8.3
10
9.4
105
9.2
11
Analysis
9.0
103
8.7
9
8.8
103
8.5
10
8.9
101
9.1
9
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
Not enough data
Detection & Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
8.0
37
Not enough data
Generative AI
8.1
39
Not enough data
8.1
38
Not enough data
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.9
34
7.7
5
Generative AI
7.9
32
7.7
5
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Services - Endpoint Detection & Response (EDR)
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Check Point Harmony Endpoint
Check Point Harmony Endpoint
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection
Check Point Harmony Endpoint and WithSecure Elements Endpoint Protection are categorized as Endpoint Protection Platforms, Endpoint Management, and Antivirus
Unique Categories
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection has no unique categories
Reviews
Reviewers' Company Size
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Small-Business(50 or fewer emp.)
20.6%
Mid-Market(51-1000 emp.)
51.6%
Enterprise(> 1000 emp.)
27.8%
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection
Small-Business(50 or fewer emp.)
35.5%
Mid-Market(51-1000 emp.)
43.0%
Enterprise(> 1000 emp.)
21.5%
Reviewers' Industry
Check Point Harmony Endpoint
Check Point Harmony Endpoint
Information Technology and Services
20.2%
Computer & Network Security
17.9%
Telecommunications
4.8%
Financial Services
4.4%
Defense & Space
4.0%
Other
48.8%
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection
Computer Software
19.4%
Information Technology and Services
16.1%
Computer & Network Security
9.7%
Food & Beverages
5.4%
Banking
3.2%
Other
46.2%
Alternatives
Check Point Harmony Endpoint
Check Point Harmony Endpoint Alternatives
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
SentinelOne Singularity
SentinelOne
Add SentinelOne Singularity
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Add CrowdStrike Falcon Endpoint Protection Platform
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection Alternatives
ThreatDown
ThreatDown
Add ThreatDown
SentinelOne Singularity
SentinelOne
Add SentinelOne Singularity
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
Discussions
Check Point Harmony Endpoint
Check Point Harmony Endpoint Discussions
Monty the Mongoose crying
Check Point Harmony Endpoint has no discussions with answers
WithSecure Elements Endpoint Protection
WithSecure Elements Endpoint Protection Discussions
With F-Secure I can block malware and threats from devices like pendrive
1 Comment
Rodney K.
RK
I am not sure about the virus or malware called pendrive but I've been using F-Prot since 1998 and fortunately have not had a virus infect my computer since...Read more
What does F Secure protect?
1 Comment
Official Response from WithSecure Elements Endpoint Protection
WithSecure™ (formerly F-Secure) Elements Endpoint Protection blocks advanced, automated and targeted threats like ransomware, exploits and fileless attacks....Read more
Monty the Mongoose crying
WithSecure Elements Endpoint Protection has no more discussions with answers