Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Cloudflare One comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 12, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
47
Ranking in other categories
Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (11th)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
58
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
Cloudflare One
Ranking in Email Security
12th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
20
Ranking in other categories
Secure Web Gateways (SWG) (7th), Data Loss Prevention (DLP) (7th), Cloud Access Security Brokers (CASB) (7th), Distributed Denial-of-Service (DDoS) Protection (5th), Access Management (5th), Bot Management (3rd), ZTNA as a Service (3rd), ZTNA (2nd), Secure Access Service Edge (SASE) (7th), Remote Browser Isolation (RBI) (2nd)
 

Mindshare comparison

As of February 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 13.7%, down from 20.4% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.9%, up from 2.4% compared to the previous year. The mindshare of Cloudflare One is 1.7%, up from 1.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Carlos Alam Hernandez Baruch - PeerSpot reviewer
The solution enables seamless security management and fosters a learning environment
Feedback could be enhanced. While I work efficiently with Clover as a partner in Mexico City, sometimes the information and requests are easier to manage with more concrete solutions. For the solution stopping us for e-learning, I appreciate the concept yet need more resources or courses in Mexico, preferably in Spanish. Certifications are easy, however, I require more real-world environments and instructors.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It also gives me good visibility because, with Defender, I'm using a Microsoft product to defend Microsoft products. The integration was really seamless and I have wide visibility because it picks up almost everything. Literally, I can see almost every activity that happens, from the e-mail to the workstation itself."
"Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various email campaigns, pinpointing where they emanate from, and identifying the individuals within our organization who are affected."
"Defender for Office 365 has helped eliminate having to look at multiple dashboards and that is the aspect I like most about it. It is simpler, effective, and convenient. The users like the process efficiency."
"Microsoft Defender has a feature to protect each and every attachment. Even if it's an encrypted attachment, it will check for any potential threats."
"Microsoft Defender for Office 365 is a stable solution."
"The deployment capability is a great feature."
"The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time."
"Defender is a SaaS platform, so it offers more flexibility. Managing the permissions is easier. The solution's automated detection and response features are scalable."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"The main benefit is that hackers can't steal information."
"I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats."
"It seems quite scalable. We don't anticipate any scaling issues. We have it deployed in the cloud."
"As a comprehensive solution, Check Point offers a very granular and best-in-class experience."
"The option to set a copy is beneficial."
"The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user."
"The anti-phishing feature is the solution's best feature."
"It is a stable solution."
"Cloudflare DDoS is better than its competitors for its security, deployment, and scalability."
"Cloudflare Access is part of the Zero Trust philosophy."
"Clover is the best product globally."
"It will take the blow rather than our applications should an attack occur."
"Enables me to work from two locations."
"Cloudflare Zero Trust Platform removes the risk of exposing the applications to the public."
"The blocking feature is very good."
 

Cons

"One area for improvement is integration. For example, when it comes to external SaaS platforms, we were not able to get a lot of information on integrations with such apps for security and authentication."
"One area for improvement is support, in terms of being able to reach them and, especially, technical support for configuration."
"The changes to customer service, specifically the new model for support agreements, are not favorable."
"We noticed that from time to time, Microsoft's stability does have problems. Sometimes the service goes up and down. Sometimes they change without prior notice."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"The custom alerts have to improve a lot."
"I'd like some additional features any product can give me to protect our environment in a better way."
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."
"Check Point has to continue refining the intelligence engine to minimize the number of false positives."
"They must provide security to more email service providers."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents."
"The product's pricing needs improvement."
"There are a few areas for improvement. One is the occasional sluggishness or latency, which is likely due to the cloud-based nature of the solution. So, the performance can be better."
"They could continue to offer more stringent security policy measures for threat point management."
"If Check Point finds something to be described as a clean email, it should have the option to automatically release it to the user. At the moment, we don't have that option."
"They don't have a person to provide support for customers using the solution under their free plan."
"There are premium tier live service and lower tier live service, so we opted for the lower tier. But there is no medium tier where we pay a little extra and get a bit more service. So if that can be improved."
"Our subscription plan for the solution has a limitation of bot signatures."
"The free plan has limitations. For example, I can only set up three rules, and the application firewall is unavailable."
"Feedback could be enhanced."
"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"Lacks a VPN feature to provide a secure connection to the data center."
"The response time for support must be reduced."
 

Pricing and Cost Advice

"It is much more expensive than using another solution because we have had to include some options and upgrade our license."
"For large enterprise organizations, they can definitely afford it, but for small and medium organizations, they might struggle to cover the expenses."
"The product is expensive."
"Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
"The product is very expensive."
"Compared to other brands, Microsoft Defender for Office 365's pricing is competitive."
"The pricing has become expensive."
"I was working in the government and it was too expensive for us to use our Microsoft products."
"Having information stolen by a hacker would be more expensive than purchasing a license."
"The cost is similar to other competitors. It's not much higher."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"Due to its pricing, I would say that Check Point Harmony Email & Collaboration is more suitable for medium to enterprise organizations."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
"I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers."
"The pricing is competitive."
"Cost is the main concern that every customer takes into consideration, and Check Point always negotiates a price that is affordable."
"The solution's pricing lacks transparency."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The solution is not that expensive."
"Cloudflare Zero Trust Platform's pricing is good."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The prices are slightly expensive."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
838,640 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
19%
Financial Services Firm
9%
Manufacturing Company
9%
Healthcare Company
5%
Computer Software Company
16%
Financial Services Firm
10%
Comms Service Provider
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
I don't have detailed specifics on pricing, setup cost, or licensing.
What needs improvement with Microsoft Defender for Office 365?
I am generally satisfied with how it currently is. If I could improve anything, I would reduce the cost.
What is your primary use case for Check Point Harmony Email & Office?
I use Check Point Harmony Email and Collaboration to protect email security. It is used as an email secure gateway to...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about Cloudflare Access?
The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good.
What is your experience regarding pricing and costs for Cloudflare Access?
The price of Cloudflare Access is the same as compared to Akamai, but I get better performance from Cloudflare. My co...
What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
23andMe
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Cloudflare One and other solutions. Updated: January 2025.
838,640 professionals have used our research since 2012.