Try our new research platform with insights from 80,000+ expert users

Abnormal Security vs Check Point Harmony Email & Collaboration comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
47
Ranking in other categories
Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (11th)
Abnormal Security
Ranking in Email Security
5th
Average Rating
9.6
Reviews Sentiment
7.9
Number of Reviews
10
Ranking in other categories
Secure Email Gateway (SEG) (2nd)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
59
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
 

Mindshare comparison

As of March 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 13.5%, down from 19.7% compared to the previous year. The mindshare of Abnormal Security is 7.0%, up from 2.7% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.9%, up from 2.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
William Schellhaas - PeerSpot reviewer
Provides comprehensive email security management, effective in detecting a wide range of email threats
The ideal scenario would be for Abnormal Security to work in tandem with Microsoft to analyze incoming emails. This means Abnormal Security would assess emails before they reach my inbox, even if it happens slightly after Microsoft's initial scan. Currently, the process isn't seamless. Microsoft analyzes emails and delivers legitimate ones to my inbox. Abnormal Security then scans these delivered emails, and if flagged as malicious, they disappear. This creates a problem for our ticketing system mailbox, which is a third-party service. Emails sent to the ticketing system address are automatically forwarded by Microsoft. However, if these emails are malicious, Abnormal Security only cleans them from my Outlook mailbox after they've been forwarded. Since we primarily rely on the ticketing system and not the Outlook mailbox, these malicious emails still reach the ticketing system.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The initial setup is straightforward. You just add the license, click it, and then you can set up the rules. It is quite simple."
"The technical support is good and quick to resolve issues."
"Defender for Office 365 has helped eliminate having to look at multiple dashboards and that is the aspect I like most about it. It is simpler, effective, and convenient. The users like the process efficiency."
"Does a thorough job of examining email and URLs for malicious content."
"The good part is that you don't have to configure it, which is very convenient."
"It also gives the vulnerability status according to the versions you have selected. Let's say you have Google Chrome. It mentions the versions it has, and it updates. Within two hours of an update, it is reflected in the dashboard. That's really nice to have."
"The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time."
"Since we have started using the solution, there have been fewer compromises."
"I have never encountered any stability issues with Abnormal."
"Their ability to take things out of the mailbox and catch things much faster than users is excellent."
"What I like about Abnormal Security is that it notifies me if any of my partners or suppliers are experiencing a security breach by analyzing their database and identifying potential cyber threats."
"It protects us from being business email compromised, which is invaluable for maintaining our security."
"It does some really cool stuff that other tools aren't doing. We found it to be really effective, and the AI/ML functionality is really what differentiates them."
"One of the things that I love about them is that the setup and installation are super easy. All you do is give them access to your Microsoft 365 tenant, and through APIs, they are able to do their work. They are doing all this through APIs, so you do not have to install the software and take a month to get it all set up to even see the value of the solution. You could be up and running in less than an hour."
"The features that appeal to me most are the combination of auto-remediation and Detection 360."
"Initial auto-remediation allows us to auto-remediate before the email lands in the end user's inbox for a split second."
"The solution has a very effective anti-phishing algorithm that detects a significantly higher number of phishing emails compared to the default Microsoft solution."
"It seems quite scalable. We don't anticipate any scaling issues. We have it deployed in the cloud."
"The ease of management and intuitive administration are excellent."
"The email security solution boasts an exceptional success rate in filtering out junk, spam, and phishing emails while ensuring that legitimate emails reach their intended recipients. The setup process is straightforward and user-friendly"
"The setup is very easy. I haven't faced any complexity with the setup of the solution."
"I can count the number of endpoints, emails, and collaborations being used in the environment."
"The API is its most valuable feature. On the API side, relative to the rest of the market, Check Point is decades ahead of its competitors."
"The most valuable feature is the sandboxing feature. It provides a sandboxing environment where you can open links and see where they lead. You can see what is presented in the link after opening it."
 

Cons

"The GUI is sometimes slow to fetch the device report and could be improved."
"Sometimes, phishing emails manage to pass through the filter, so the system needs to enhance its phishing email detection capabilities."
"The pre-sales cost calculations could be more transparent."
"The product must provide better malware detection."
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."
"There is room for improvement in terms of reporting."
"The XDR dashboard has room for improvement."
"The changes to customer service, specifically the new model for support agreements, are not favorable."
"There could be room for improvement in enhancing integration with other cybersecurity tools."
"When we're working on something as engineers, and we find an idea or a method of doing something that would be greatly improved by doing it another way, there should be an ability for me to click the ideas button, type in an idea that I have, and submit it to a product review team or developers to have them think through the process a little bit more."
"One feature I'd love to see is outbound scanning."
"I, as such, do not have anything that I do not like or would like to add, but you could argue that because they are doing it API-based, there is a chance that something could slip through temporarily before they are able to pull it out. In theory, it could happen just because of the nature of the system. They are not in line with the delivery of the mail. They are kind of asynchronous, which is a pro as well as a con. If it is synchronous, then I know it would always stop them, but because it is asynchronous, things could get through temporarily or because of some system issues on the Microsoft side or their side. It is the nature of the beast, but it is a little bit of a con."
"Abnormal should add more automatic reports. I have an open request to our account team for more notification and report types that can be sent automatically. For example, they have an awesome report that gets sent weekly, and I also want them monthly, so I don't need to do so much adding up when my director wants numbers over time."
"The pricing for academic institutions and student mailboxes is challenging."
"The biggest pain point for us is the lack of support for on-premise email systems."
"The ideal scenario would be for Abnormal Security to work in tandem with Microsoft to analyze incoming emails."
"Check Point could improve its marketing strategy."
"After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."
"There could be more automation features included for it."
"The solution fails to support hybrid deployments."
"The reporting could be improved."
"It's not fully integrated with Google Workspace, and the statistics don't update in real-time."
"There is a need for improvement in handling business email compromise."
"Check Point should integrate with features available in Barracuda."
 

Pricing and Cost Advice

"The product is expensive."
"The pricing has become expensive."
"The pricing is normal. Considering its popularity, it's not overpriced."
"Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
"I was working in the government and it was too expensive for us to use our Microsoft products."
"I know that the product is incredibly expensive."
"The product is very expensive."
"Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
"Overall, we'd certainly prefer lower pricing, but Abnormal Security doesn't seem unreasonable compared to similar offerings in the market."
"Abnormal Security, on the other hand, provides the same level of functionality for just over $60,000 – that's half the price!"
"The pricing appears fair, and they demonstrate a genuine willingness to work with us on it."
"The license is based on the user count, so the number of users that have an email address in the organization."
"The product’s price is very high."
"There are absolutely no additional costs to the standard licensing fees. One of the wonderful pieces is that CloudGuard SaaS is all-inclusive in its licensing. There's no a-la-carte functionality. You're getting 100 percent of the product for the licensing that you're paying."
"The pricing is expensive."
"The price is very good, based on what they deliver."
"Cost is the main concern that every customer takes into consideration, and Check Point always negotiates a price that is affordable."
"Usually, we pay for the licensing part on a yearly basis and not on a monthly basis. If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts."
"Due to its pricing, I would say that Check Point Harmony Email & Collaboration is more suitable for medium to enterprise organizations."
"Do a full feature evaluation (interactive) with a support person. That is what I did."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
842,388 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
15%
Financial Services Firm
9%
Manufacturing Company
7%
Government
7%
Computer Software Company
19%
Financial Services Firm
10%
Manufacturing Company
8%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
I don't have detailed specifics on pricing, setup cost, or licensing.
What needs improvement with Microsoft Defender for Office 365?
I am generally satisfied with how it currently is. If I could improve anything, I would reduce the cost.
What do you like most about Abnormal Security?
The features that appeal to me most are the combination of auto-remediation and Detection 360.
What is your experience regarding pricing and costs for Abnormal Security?
I find the pricing to be favorable, but I did not disclose the exact cost.
What needs improvement with Abnormal Security?
There could be more selectable options and more granular selections available.
What is your primary use case for Check Point Harmony Email & Office?
We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For exa...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
 

Also Known As

MS Defender for Office 365
No data available
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Foot Lcoker, Xerox, Liberty Mutual, Mattel, Boston Scientific
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Find out what your peers are saying about Abnormal Security vs. Check Point Harmony Email & Collaboration and other solutions. Updated: March 2025.
842,388 professionals have used our research since 2012.