We performed a comparison between Check Point Harmony Email & Collaboration and Cisco Secure Workload based on real PeerSpot user reviews.
Find out in this report how the two Cloud Workload Protection Platforms (CWPP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
"All the features we use are equal and get the job done."
"We like the platform and its response time. We also like that its console is user-friendly as well as modern and sleek."
"The mean time to detect has been reduced."
"It is very straightforward. It is not complicated. For the information that it provides, it does a pretty good job."
"The real-time detection and response capabilities overall are great."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"PingSafe offers three key features: vulnerability management notifications, cloud configuration assistance, and security scanning."
"The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour."
"It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
"It is very intuitive. It is a point and click type of deal."
"The dashboard provides information to investigate more about malicious activity and blocked emails."
"Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure."
"The ease of management and intuitive administration are excellent."
"The product offers good and easy integration capabilities with other products."
"In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication."
"Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time."
"The product offers great visibility into the network so we can enforce security measures."
"It's stable."
"Secure Workload's best feature is that it's an end-to-end offering from Cisco."
"The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network."
"By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself."
"The product provides multiple-device integration."
"The most valuable feature is micro-segmentation, which is the most important with respect to visibility."
"I would like PingSafe's detections to be openly available online instead of only accessible through their portal. Other tools have detections that are openly available without going through the tool."
"I used to work on AWS. At times, I would generate a normal bug in my system, and then I would check PingSafe. The alert used to come after about three and a half hours. It used to take that long to generate the alert about the vulnerability in my system. If a hacker attacks a system and PingSafe takes three to four hours to generate an alert, it will not be beneficial for the company. It would be helpful if we get the alert in five to ten minutes."
"We've found a lot of false positives."
"They could generally give us better comprehensive rules."
"The Kubernetes scanning on the Oracle Cloud needs to be improved. It's on the roadmap. AWS has this capability, but it's unavailable for Oracle Cloud."
"I export CSV. I cannot export graphs. Restricting it to the CSV format has its own disadvantages. These are all machine IP addresses and information. I cannot change it to the JSON format. The export functionality can be improved."
"Whenever I view the processes and the process aspect, it takes a long time to load."
"When we get a new finding from PingSafe, I wish we could get an alert in the console, so we can work on it before we see it in the report. It would be very useful for the team that is actively working on the PingSafe platform, so we can close the issue the same day before it appears in the daily report."
"Stability has been a pain point. I was going back and forth with my product engineer and project manager for a couple of months. I had the product in a demonstration mode and wasn't satisfied with the results initially. After a few alterations and a few revisions later, it is fine."
"Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix."
"The implementation could definitely be better."
"There are sometimes leakages of viruses when the system is experiencing network failures."
"The product's pricing needs improvement."
"Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"Check Point could improve its marketing strategy."
"The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes."
"It has an uninviting interface."
"The interface is really helpful for technical people, but it is not user-friendly."
"The integration could be better, especially with different types of solutions."
"Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it."
"It is highly scalable, but there is a limitation that it is only available on Cisco devices."
"It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 9th in Cloud Workload Protection Platforms (CWPP) with 49 reviews while Cisco Secure Workload is ranked 20th in Cloud Workload Protection Platforms (CWPP) with 13 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Cisco Secure Workload is rated 8.4. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Cisco Secure Workload writes "A solution that provides good technical support but its high cost makes it challenging for users to adopt it". Check Point Harmony Email & Collaboration is most compared with Microsoft Defender for Office 365, Avanan, Microsoft Defender for Cloud, Mimecast Email Security and Cisco Secure Email, whereas Cisco Secure Workload is most compared with Akamai Guardicore Segmentation, Illumio, VMware NSX, Prisma Cloud by Palo Alto Networks and Nutanix Flow Network Security. See our Check Point Harmony Email & Collaboration vs. Cisco Secure Workload report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.