Software Alternatives & Reviews

Check Point Endpoint Security VS Portnox CORE

Compare Check Point Endpoint Security VS Portnox CORE and see what are their differences

Check Point Endpoint Security logo Check Point Endpoint Security

Check Point Infinity is the first consolidated security across networks, cloud and mobile, providing the highest level of threat prevention against both known and unknown targeted attacks to keep you protected now and in the future.

Portnox CORE logo Portnox CORE

Portnox CORE offers next-gen on-premise security for all network access layers, including wireless, VPN, wired, virtual & cloud. Find out how Portnox is cutting to the CORE of network security.
  • Check Point Endpoint Security Landing page
    Landing page //
    2023-09-18
  • Portnox CORE Landing page
    Landing page //
    2023-08-02

Category Popularity

0-100% (relative to Check Point Endpoint Security and Portnox CORE)
Monitoring Tools
68 68%
32% 32
Identity And Access Management
Security & Privacy
100 100%
0% 0
Online Services
0 0%
100% 100

User comments

Share your experience with using Check Point Endpoint Security and Portnox CORE. For example, how are they different and which one is better?
Log in or Post with

What are some alternatives?

When comparing Check Point Endpoint Security and Portnox CORE, you can also consider the following products

Symantec Endpoint Encryption - Symantec Endpoint Encryption protects the sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.

PacketFence - PacketFence is a Free and Open Source network access control (NAC) system.

Sophos Endpoint Protection - Sophos Endpoint Protection helps secure your workstation.

Coveo - Enterprise search technology for better customer support, customer self-service, and knowledge management in the digital workplace.

Kaspersky Endpoint Security - Our HuMachine™-based, Next Generation endpoint security delivers multi-layered protection for multiple platforms – including Linux servers and endpoints – to detect suspicious behavior and block threats, including ransomware.

FortiNAC - FortiNAC | Documentation