Try our new research platform with insights from 80,000+ expert users

Check Point Anti-Spam and Email Security Software Blade vs Check Point Harmony Endpoint comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
47
Ranking in other categories
Email Security (1st), Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (10th)
Check Point Anti-Spam and E...
Average Rating
8.4
Reviews Sentiment
7.6
Number of Reviews
37
Ranking in other categories
Email Security (11th)
Check Point Harmony Endpoint
Average Rating
8.8
Reviews Sentiment
8.0
Number of Reviews
112
Ranking in other categories
Endpoint Protection Platform (EPP) (7th), Endpoint Detection and Response (EDR) (9th)
 

Mindshare comparison

Email Security
Endpoint Protection Platform (EPP)
 

Q&A Highlights

reviewer2132481 - PeerSpot reviewer
Aug 24, 2023
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Dushyant Trivedi - PeerSpot reviewer
Effectively secures data centers against various threats, including spam emails and provides policy-based control
It is a stable solution. We implemented the solution in HA. This is because the solution is highly available and can withstand hardware failures and software upgrades. Once the solution is implemented, there is no need for any further downtime for the Check Point server. Because once we change any policy, we can break the High Availability (HA) session and define the new policy on the Check Point Security Gateway (SGW) in isolation. This allows us to test the new policy without affecting the production traffic. Once the new policy is tested and active, we can then activate it on the HA pair and bring the HA session back up. This process ensures that we can make changes to the policy without any interruption to the user experience. It is a really stable solution. I would rate the stability a ten out of ten.
Alejandro Flores. - PeerSpot reviewer
Good visibility with cloud centralized management and several layers of security
There are some "weak points" that have to be mentioned, including: 1) If the IT department is used to "cloning" endpoints (making images) you are going to have a hard time trying to install the product and you are going to end up reading a lot of Check Point documents. 2) If you are used to the granularity of roles features in Check Point Quantums products you are going to be a little bit disappointed. You can't set customized roles with customized read/write permissions. 3) You need a mature security team to manage this solution in order to get the most value from it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"There are several features that I consider valuable."
"The technical support is good and quick to resolve issues."
"The most valuable feature is protection against malicious links, fishing, and impersonation. You can train people to be aware of these threats, but they're not always careful. When they're using their phones between meetings, they click on a link, and it's game over."
"One of the best features of the tool is its capability to aggregate insights from different workloads, basically from the Office 365 and endpoints part."
"Defender helps us prioritize threats across our organization."
"Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various email campaigns, pinpointing where they emanate from, and identifying the individuals within our organization who are affected."
"The stability of Microsoft Defender for Office 365 is fantastic."
"Defender enables us to secure all 365-related activity from a single place. It gives us visibility into everything happening in Outlook, protecting us against phishing and other email-based threats. Defender helps us detect any suspicious behaviors."
"It has provided us with an easy way to avoid invasive mail."
"The tool helps us see the behavior inside our environment, which is important to us. The solution's capacity integration features are great."
"Advanced Spam Filtering to identify and block unwanted email messages."
"Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network."
"It's a fairly old solution, however, that has been updated over time to become one of the best manufacturers of security solutions."
"One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."
"One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."
"This solution helped us lock down and have our infrastructure easier to manage."
"We had a ransomware attack and the SandBlast agent automatically picked up the ransomware."
"They have a great knowledge base that you can leverage as a user."
"The most valuable feature of this solution is the VPN."
"The best thing is that it fits into all environments, which gives any organization a chance to use it intuitively without worrying about the nature of their industry."
"It provides remote access for the staff and increases their productivity."
"Its ease of use is the most valuable feature. We had existing endpoints and it was an easy upgrade process. The interface board is also easy to use."
"The license plans are also very nice and distributed - allowing for a separation between types of users with more basic or more advanced options."
"It's pretty complete for preventing threats to endpoints. Its capabilities are great."
 

Cons

"Configuration requires going to a lot of places rather than just accessing one tab."
"One area for improvement is integration. For example, when it comes to external SaaS platforms, we were not able to get a lot of information on integrations with such apps for security and authentication."
"Microsoft needs to broaden its global support presence by establishing teams of subject-matter experts in all regions."
"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."
"Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment."
"Microsoft Defender for Office 365's Mac functionality requires improvement to deliver the same level of protection found on Windows devices."
"We need to be able to whitelist data at the backend."
"The pre-sales cost calculations could be more transparent."
"I can say that the solution's price level is a problematic area that needs to be considered for improvement."
"There could be an extension of the trial period to 60 days."
"The solution could be improved by reducing false positives."
"The pattern used to filter emails could be improved"
"The user should be able to perform a real-time search of the objects and see the messages."
"It is expensive but worth it."
"The anti-spam features could be upgraded to be able to detect unnoticeable spam."
"There's definitely room for improvement when it comes to adapting to different languages in one environment."
"Infinity Portal sometimes requires more performance."
"The product updates are a manual process for my administrator and can take several hours out of his day."
"The application control and URL filtering features are not very strong."
"It blocks safe URLs sometimes when there are network interruptions."
"We would like to make the documentation for more modern solutions like the Harmony family easier to find."
"Support needs improvement. Currently, support is primarily via email, which leads to longer response times."
"There was a learning curve for our general population of employees (the user)."
"There needs to be compatibility with the most recent versions of the various operating systems."
 

Pricing and Cost Advice

"Compared to other brands, Microsoft Defender for Office 365's pricing is competitive."
"The pricing has become expensive."
"The license is expensive because the cost is based on the number of users."
"Microsoft Defender is expensive. I typically recommend it only if clients have the budget. Otherwise, I would suggest an alternative."
"Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
"The pricing is normal. Considering its popularity, it's not overpriced."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"The solution could be better by simplifying the business model of their licensing. It was hard to figure out how to get the licensing done for the environment, initially."
"Reasonably priced solution."
"For licensing, my company makes yearly payments, which is expensive."
"I rate the product pricing a seven out of ten."
"The cost is competitive with other security products on the market."
"I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
"We implement this solution with a yearly subscription and there are no extra costs."
"The solution is too pricey."
"We pay on an annual basis. There are no additional fees, they mostly tell us what we have to pay. We have budgeted for it."
"The solution is reasonable, but there are cheaper solutions out there."
"The tool’s cost has increased by almost 300% in two years."
"One is the basic license, which only gives you threat prevention. In the second one, you will get port protection. In the complete license, you will get all the licenses, like anti-malware, sandboxing, port protection, and all the licenses. It is very easy to deploy the tool."
"Price-wise, the product is affordable. There are no additional costs apart from the licensing charges that are attached to the product."
"I rate Check Point Harmony Endpoint's pricing a seven out of ten because it is a little high."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
831,020 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Security Firm
28%
Financial Services Firm
14%
Computer Software Company
9%
Educational Organization
6%
Computer Software Company
17%
Government
8%
Manufacturing Company
7%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
I don't have detailed specifics on pricing, setup cost, or licensing.
What needs improvement with Microsoft Defender for Office 365?
I am generally satisfied with how it currently is. If I could improve anything, I would reduce the cost.
What needs improvement with Check Point Anti-Spam and Email Security Software Blade?
The solution could be improved by reducing false positives, optimizing performance, improving the user interface, and...
What is your primary use case for Check Point Anti-Spam and Email Security Software Blade?
The primary use cases for Check Point Anti-Spam and Email Security Software Blade are anti-spam, anti-malware, anti-p...
What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VP...
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability. It is suitable for...
What needs improvement with Check Point Harmony Endpoint?
Support needs improvement. Currently, support is primarily via email, which leads to longer response times. Fine-tuni...
 

Also Known As

MS Defender for Office 365
No data available
Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
SF Police Credit Union (SFPCU)
Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Find out what your peers are saying about Microsoft, Proofpoint, Cisco and others in Email Security. Updated: December 2024.
831,020 professionals have used our research since 2012.