Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Cloudflare One comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 12, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
47
Ranking in other categories
Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (10th)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
59
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
Cloudflare One
Ranking in Email Security
12th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
19
Ranking in other categories
Secure Web Gateways (SWG) (8th), Data Loss Prevention (DLP) (7th), Cloud Access Security Brokers (CASB) (7th), Distributed Denial-of-Service (DDoS) Protection (5th), Access Management (5th), Bot Management (3rd), ZTNA as a Service (3rd), ZTNA (2nd), Secure Access Service Edge (SASE) (7th), Remote Browser Isolation (RBI) (2nd)
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Leandro Soares Costa - PeerSpot reviewer
Replaces traditional VPN and enables endpoint exposition
It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Microsoft Defender has a feature to protect each and every attachment. Even if it's an encrypted attachment, it will check for any potential threats."
"Defender for 365 is a comprehensive cloud-based solution. The value of the cloud is that you aren't alone. Threat intelligence and analytics are shared in the cloud. We don't have to find the solution alone. If you face an unknown threat with traditional solutions like Trend Micro and Symantec, you need to open a case and send your information to them to analyze forensically and identify the source of the attack."
"The most valuable feature of Microsoft Defender for Office 365 is data backups that we can provide through ticket requests."
"The technical support is good and quick to resolve issues."
"Our customers are satisfied with Defender for 365 because Microsoft products are easy to use and customize to meet the client's needs. Everything is in one place, so we can adjust policies as needed for phishing, DLP, ATP, or any other security features that our clients want to apply."
"Defender is a SaaS platform, so it offers more flexibility. Managing the permissions is easier. The solution's automated detection and response features are scalable."
"The email protection is excellent, especially in terms of anti-phishing policies."
"I would say that 90% of the spam and phishing attack emails get blocked right off the bat."
"The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc."
"Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure."
"The product is a fairly complete and centralized solution accessible through the Infinity Portal."
"The most valuable feature is the sandboxing feature. It provides a sandboxing environment where you can open links and see where they lead. You can see what is presented in the link after opening it."
"Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size."
"I like the fact that having granular information about the potential threats is received in email."
"The product's environment is easy to work and comprehensive."
"The initial setup is easy."
"The solution has different options that can be used to differentiate DDoS attacks."
"Cloudflare Zero Trust Platform removes the risk of exposing the applications to the public."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"Enables me to work from two locations."
"Cloudflare is by far the most effective solution that I have come across."
"Cloudflare Access is part of the Zero Trust philosophy."
"The capabilities of the software are strong enough for me to do what it's supposed to do. For me, we don't need to do a lot of configuration on our site. We just enable it and monitor it."
"Cloudflare DDoS mitigates DDoS attacks."
 

Cons

"Microsoft needs to broaden its global support presence by establishing teams of subject-matter experts in all regions."
"Several simulation options are available within 365, and the phishing simulation could be better."
"One area for improvement is support, in terms of being able to reach them and, especially, technical support for configuration."
"We noticed that from time to time, Microsoft's stability does have problems. Sometimes the service goes up and down. Sometimes they change without prior notice."
"Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment."
"I am generally satisfied with how it currently is. If I could improve anything, I would reduce the cost."
"There is room for improvement in terms of reporting."
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."
"After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."
"Initial Learning Mode takes a while."
"Check Point should integrate with features available in Barracuda."
"Stability has been a pain point. I was going back and forth with my product engineer and project manager for a couple of months. I had the product in a demonstration mode and wasn't satisfied with the results initially. After a few alterations and a few revisions later, it is fine."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"The implementation could definitely be better."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"There is a need for improvement in handling business email compromise."
"The software has automated alerts, but the automated alerts are not available in the mobile app."
"Lacks a VPN feature to provide a secure connection to the data center."
"Our subscription plan for the solution has a limitation of bot signatures."
"Cloudflare DDoS has poor technical support."
"Cloudflare Zero Trust Platform needs to improve its documentation. It took time to do the implementation."
"The free plan has limitations. For example, I can only set up three rules, and the application firewall is unavailable."
"Operating and tuning the product is difficult."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
 

Pricing and Cost Advice

"It's a user-base subscription."
"Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
"The product is very expensive."
"The pricing is normal. Considering its popularity, it's not overpriced."
"While Microsoft Defender for Office 365 necessitates pricier E3 or E5 subscriptions, the extensive functionality offered by these licenses across various Microsoft products justifies the investment."
"The pricing has become expensive."
"The solution could be better by simplifying the business model of their licensing. It was hard to figure out how to get the licensing done for the environment, initially."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"Check Point is more expensive. That's the honest truth. So far, it's a good value for the money."
"Cost is the main concern that every customer takes into consideration, and Check Point always negotiates a price that is affordable."
"I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive."
"The product is expensive."
"There are absolutely no additional costs to the standard licensing fees. One of the wonderful pieces is that CloudGuard SaaS is all-inclusive in its licensing. There's no a-la-carte functionality. You're getting 100 percent of the product for the licensing that you're paying."
"Reasonable cost, quick and easy implementation, and transparent."
"The cost is similar to other competitors. It's not much higher."
"The solution's pricing lacks transparency."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The prices are slightly expensive."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The solution is not that expensive."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"Cloudflare Zero Trust Platform's pricing is good."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
831,020 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
18%
Financial Services Firm
9%
Manufacturing Company
9%
Healthcare Company
5%
Computer Software Company
16%
Financial Services Firm
10%
Comms Service Provider
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
I don't have detailed specifics on pricing, setup cost, or licensing.
What needs improvement with Microsoft Defender for Office 365?
I am generally satisfied with how it currently is. If I could improve anything, I would reduce the cost.
What is your primary use case for Check Point Harmony Email & Office?
I use Check Point Harmony Email and Collaboration to protect email security. It is used as an email secure gateway to...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about Cloudflare Access?
The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good.
What is your experience regarding pricing and costs for Cloudflare Access?
The price of Cloudflare Access is the same as compared to Akamai, but I get better performance from Cloudflare. My co...
What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
23andMe
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Cloudflare One and other solutions. Updated: January 2025.
831,020 professionals have used our research since 2012.