Try our new research platform with insights from 80,000+ expert users

Check Point CloudGuard CNAPP vs Check Point Harmony Email & Collaboration comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.6
Reviews Sentiment
8.3
Number of Reviews
94
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Container Security (3rd), Cloud Security Posture Management (CSPM) (4th), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (3rd)
Check Point CloudGuard CNAPP
Ranking in Cloud Workload Protection Platforms (CWPP)
6th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
69
Ranking in other categories
Vulnerability Management (8th), Cloud and Data Center Security (9th), Container Security (6th), Cloud Security Posture Management (CSPM) (5th), Cloud-Native Application Protection Platforms (CNAPP) (5th), Data Security Posture Management (DSPM) (4th), Compliance Management (5th)
Check Point Harmony Email &...
Ranking in Cloud Workload Protection Platforms (CWPP)
11th
Average Rating
8.8
Reviews Sentiment
7.8
Number of Reviews
58
Ranking in other categories
Email Security (6th), Data Loss Prevention (DLP) (5th)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Yokesh Mani - PeerSpot reviewer
Easy to write custom rules and policies in the UI with limited coding knowledge
The user interface could be improved. Sometimes, the visibility is not immediately available for the environment. We have the native servers that come with the solutions, but we cannot see them in the Check Point log. Another issue is with the integrated file monitoring. It would make sense to have stuff like file integrity monitoring and malware scanning available within this module because we don't want to integrate another product. For example, let's say it's showing a process violation. It should be able to do some additional malware scanning in that particular bucket to get some additional information. I don't want to integrate with another third-party tool or go to the native server to check something. It would be helpful to have integrated monitoring and malware scanning for the file types. There are a few flaws with the security management portal where I have limited visibility into the workload protection features. There is no error visibility where I can see the communication and workflow between services. Some of the dashboards need to be fine-tuned if they are not customized. For example, I cannot customize anything on the effective risk management dashboard. Some of the information is not correct for my tenant. With respect to passwords and user management, there are no policies I can measure at the user level. If the user was created more than six months ago, you don't need to worry about that password or do anything like two-factor authentication associated with that user. They can still log in after six months or one year. It's also a challenge to use CloudGuard's agentless workload posture with AWS. An Azure storage is summed up with a CNAPP encryption by default. We tried onboarding this data, but the problem is the attachment is not done. After a few days, we identified that it was impossible to do the encryption detection. But CloudGuard's default rules say that this has to be encrypted. The AWS module says that we cannot access this volume with this encryption, so we cannot use an agentless workload posture with AWS because of this. It is a best practice to ensure that all the volumes are being encrypted. Without the encryption, how can I do this? It is a big challenge for CloudGuard.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"SentinelOne stands out with its responsiveness to feature requests for Singularity Cloud Security."
"The visibility is the best part of the solution."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"The solution is a good alerting tool."
"It's helped free up staff time so that they can work on other projects."
"PingSafe has a dashboard that can detect the criticality of a particular problem, whether it falls under critical, medium, or low vulnerability."
"We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment."
"PingSafe offers comprehensive security posture management."
"The most valuable feature is the ability to apply common tools across all accounts."
"Alerts of cloud activity happening across all accounts is helpful."
"The product enables us to check the information that goes out of the company."
"The solution is scalable."
"Cloud security posture management is the feature we've been using the longest."
"The most valuable feature is the CloudBots for auto-remediation of security findings."
"CloudGuard's best feature is real-time detection. We can detect incidents and vulnerabilities in our code with one click."
"We know the vulnerability in advance, so we can take some action for that vulnerability."
"It is the collaboration between users inside the company. It is a big advantage with Check Point to be able to work together on the same document."
"Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
"Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size."
"For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good."
"We need the phishing detection and email quarantine. Once an email is considered malicious, it stays in the quarantine where we can interrogate it. We can check out why it was quarantined and see if it should be delivered to the individual."
"This DLP is very useful, as it gives our users additional protection."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"The API is its most valuable feature. On the API side, relative to the rest of the market, Check Point is decades ahead of its competitors."
 

Cons

"There is a bit of a learning curve for new users."
"They can work on policies based on different compliance standards."
"The alerting system of the product is an area that I look at and sometimes get confused about. I feel the alerting feature needs improvement."
"The Automation tab is an add-on that doesn’t work properly. They provide a list of scripts that don’t work and I have asked support to assist but they won’t help. When running on various endpoints the script doesn’t work and if it does, it’s only a couple. There are a lot of useful scripts that would be beneficial to run forensics, event logs, and process lists running on the endpoint."
"Implementing single sign-on requires a pre-class account feature, which is currently not available."
"There is room for improvement in the current active licensing model for PingSafe."
"Once all components, including the cloud piece and container runtime piece, integrate further and incorporate an AI layer for better comprehension, it will greatly enhance the utility of Singularity Cloud Security."
"They need more experienced support personnel."
"The guidelines to implement or to link with the clouds are not complete."
"Scalability, particularly in workload protection, is an area that needs improvement."
"The entire system is complicated, and the setup process may not cater to the company's demands."
"The Check Point solution is somewhat expensive."
"The setup can be better. With every other Check Point product, the setup is scripted. You just approve versions, and then you are off. The setup for this solution is still very much manual. I would like to see that transition to more of a scripted setup."
"I am not a technical person, but generically, the user interface can be a little more intuitive. Our staff has trained network security and cloud security professionals, and they get it, but when you are trying to get to the customers to be able to pick it up and maintain it, it can be a bit difficult."
"The software configurations theory is complicated, and without proper planning and a well-skilled technical team, it cannot perform its tasks properly."
"CloudGuard CNAPP could be enhanced by increasing the number of components that run natively on Azure."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."
"The solution fails to support hybrid deployments."
"Harmony Email & Collaboration could be improved by making the whitelist available on the website and application level."
"Check Point needs to address the pricing segment for SMEs."
"The next release should focus more on email categorization and provide options for unlocking blocked safe emails."
"Maybe Check Point can work on the DLP part."
"I have learned enough to make the product stable. However, the stability has some challenges."
 

Pricing and Cost Advice

"PingSafe falls somewhere in the middle price range, neither particularly cheap nor expensive."
"PingSafe is cost-effective for the amount of infrastructure we have. It's reasonable for what they offer compared to our previous solution. It's at least 25 percent to 30 percent less."
"The tool is cost-effective."
"As a partner, we receive a discount on the licenses."
"It is cheap."
"Its pricing is constant. It has been constant over the previous year, so I am happy with it. However, price distribution can be better explained. That is the only area I am worried about. Otherwise, the pricing is very reasonable."
"The features included in PingSafe justify its price point."
"SentinelOne provided competitive pricing compared to other vendors, and we are satisfied with the deal."
"The pricing is tremendous and super cheap. It is shockingly cheap for what you get out of it. I am happy with that. I hope that doesn't get reported back and they increase the prices. I love the pricing and the licensing makes sense. It is just assets: The more stuff that you have, the more you pay."
"Everything in this field is very expensive."
"The pricing is extremely competitive."
"It is difficult to contextualize the pricing because we are used to Indian pricing and licensing."
"Licensing and costs are straightforward, as they have a baseline of 100 workloads within one license and no additional charges."
"Check Point CloudGuard Posture Management is always known as a good solution but an expensive one. When you're using Cisco, Check Point, or Palo Alto, you know that you will pay more, but you know that it will work."
"We have the enterprise-level license and we renew it annually because it is worth the cost."
"Its price is very fair."
"The pricing is expensive."
"Usually, we pay for the licensing part on a yearly basis and not on a monthly basis. If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts."
"The pricing and licensing are always negotiable."
"The pricing is in the middle. Check Point's pricing is not the highest in the competitive market."
"I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive."
"The product is expensive compared to some competitors, especially for the SME segment."
"Due to its pricing, I would say that Check Point Harmony Email & Collaboration is more suitable for medium to enterprise organizations."
"The pricing is competitive."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
817,354 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Financial Services Firm
15%
Computer Software Company
14%
Manufacturing Company
8%
Security Firm
6%
Computer Software Company
18%
Financial Services Firm
9%
Manufacturing Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
SentinelOne provided competitive pricing compared to other vendors, and we are satisfied with the deal.
What needs improvement with PingSafe?
Sometimes, I am not able to see the flow when there is an issue. When anyone complains and I have to troubleshoot it,...
What is your primary use case for Check Point Harmony Email & Office?
We were using Google Email earlier and wanted to move from Google to Microsoft. Knowing the vulnerability issues with...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
 

Also Known As

PingSafe
Check Point CloudGuard Posture Management, Dome9, Check Point CloudGuard Workload Protection, Check Point CloudGuard Intelligence
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
 

Overview

 

Sample Customers

Information Not Available
Symantec, Citrix, Car and Driver, Virgin, Cloud Technology Partners
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Find out what your peers are saying about Check Point CloudGuard CNAPP vs. Check Point Harmony Email & Collaboration and other solutions. Updated: October 2024.
817,354 professionals have used our research since 2012.