Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs CloudPassage comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.6
Reviews Sentiment
7.8
Number of Reviews
103
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Container Security (3rd), Cloud Security Posture Management (CSPM) (4th), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (3rd)
Check Point Harmony Email &...
Ranking in Cloud Workload Protection Platforms (CWPP)
11th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
59
Ranking in other categories
Email Security (7th), Data Loss Prevention (DLP) (5th)
CloudPassage
Ranking in Cloud Workload Protection Platforms (CWPP)
42nd
Average Rating
8.0
Number of Reviews
2
Ranking in other categories
Cloud Security Posture Management (CSPM) (48th)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
AA
​CloudPassage has a bunch of features. Be sure you understand all of them and how to extract value to your organization.
Policies are very easy to manage on a day-to-day basis. With few clicks in their cloud management portal, you can implement and change security policies in thousand of servers. This feature allowed us to implement changes in our environment much faster Before CloudPassage, the management of…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is the ability to gain deep visibility into the workloads inside containers."
"The offensive security feature is valuable because it publicly detects the offensive and vulnerable things present in our domain or applications. It checks any applications with public access. Some of the applications give public access to certain files or are present over a particular domain. It detects and lets us know with evidence. That is quite good. It is protecting our infrastructure quite well."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"It is very straightforward. It is not complicated. For the information that it provides, it does a pretty good job."
"All the features we use are equal and get the job done."
"PingSafe's most valuable feature is its unified console."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"SentinelOne Singularity Cloud Security is excellent, and I highly recommend it."
"The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user."
"The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great."
"As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts."
"In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication."
"The program has a nice interface and it is easy to use."
"Overall, I would rate it ten out of ten."
"As a comprehensive solution, Check Point offers a very granular and best-in-class experience."
"The most valuable feature is spam detection and phishing site prevention, which Microsoft couldn't catch, yet Check Point does."
"Policies are very easy to manage on a day-to-day basis."
"Key features are the Software Vulnerability Assessment and the CSM, which is the configuration check."
 

Cons

"For vulnerabilities, they are showing CVE ID. The naming convention should be better so that it indicates the container where a vulnerability is present. Currently, they are only showing CVE ID, but the same CVE ID might be present in multiple containers. We would like to have the container name so that we can easily fix the issue."
"Sometimes the Storyline ID is a bit wacky."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in PingSafe."
"The main area for improvement I want to see is for the platform to become less resource-intensive. Right now, it can slow down processes on the machine, and it would be a massive improvement if it were more lightweight than it currently is."
"We've found a lot of false positives."
"PingSafe filtering has some areas that cause problems, and to achieve single sign-on functionality, a break-glass feature, which is currently unavailable, is necessary."
"If I had to pick a complaint, it would be the way the hosts are listed in the tool. You have different columns separated by endpoint name, Cloud Account, and Cloud Instances ID. I wish there was something where we could change the endpoint name and not use just the IP address. We would like to have custom names or our own names for the instances. If I had a complaint, that would be it, but so far, it meets all the needs that we have."
"The categorization of the results from the vulnerability assessment could be improved."
"The sanitization on the file needs improvement."
"It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files."
"Check Point needs to address the pricing segment for SMEs."
"They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."
"There are a few areas for improvement. One is the occasional sluggishness or latency, which is likely due to the cloud-based nature of the solution. So, the performance can be better."
"There is a need for improvement in handling business email compromise."
"Support can be a bit quicker in helping the customer."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"In the CSM module the policies are really hard to work with it. It is not very flexible at all. I would suggest that they change that. Right now, the scan is based on the group that the server is in. What happens if the server is in multiple groups?"
"Of all the advertised functions, I only find two things that really work in my environment, even though I wanted to use all of them. They're not flexible enough to be used."
"Anything outside of the software vulnerability management and the CSM, things like the GhostPort, need some improvement. The dashboard is in beta. It looks really good, I wish it would come out of beta."
"The reports and graphs are unintuitive."
 

Pricing and Cost Advice

"We found it to be fine for us. Its price was competitive. It was something we were happy with. We are not a Fortune 500 company, so I do not know how pricing scales at the top end, but for our cloud environment, it works very well."
"I wasn't sure what to expect from the pricing, but I was pleasantly surprised to find that it was a little less than I thought."
"The features included in PingSafe justify its price point."
"I am not involved in the pricing, but it is cost-effective."
"Pricing is based on modules, which was ideal for us."
"It is a little expensive. I would rate it a four out of ten for pricing."
"The licensing is easy to understand and implement, with some flexibility to accommodate dynamic environments."
"SentinelOne Singularity Cloud Security is costly."
"I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers."
"The product’s price is very high."
"Being able to keep the phishing campaigns out of my company has been ROI for me."
"The product is expensive."
"Reasonable cost, quick and easy implementation, and transparent."
"I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive."
"Cost is the main concern that every customer takes into consideration, and Check Point always negotiates a price that is affordable."
"There are absolutely no additional costs to the standard licensing fees. One of the wonderful pieces is that CloudGuard SaaS is all-inclusive in its licensing. There's no a-la-carte functionality. You're getting 100 percent of the product for the licensing that you're paying."
"CloudPassage is a little bit on the expensive side. So my suggestion is that the company lower its price point a wee bit or sell modules, separate them in modules, because I only find two things that are useful to me, yet I pay for four or five modules. It didn't seem like it was a fair deal."
"We also evaluated VMware NSX, but the pricing and features available in a CloudPassage implementation were decisive in deciding to go with CP."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
829,634 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Computer Software Company
18%
Financial Services Firm
9%
Manufacturing Company
9%
Healthcare Company
5%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
The pricing is somewhat high compared to other market tools. This cost can be particularly prohibitive for small busi...
What needs improvement with PingSafe?
SentinelOne Singularity Cloud Security has limited legacy system support and may not fully support older operating sy...
What is your primary use case for Check Point Harmony Email & Office?
We were using Google Email earlier and wanted to move from Google to Microsoft. Knowing the vulnerability issues with...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
Ask a question
Earn 20 points
 

Also Known As

PingSafe
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
CloudPassage Halo
 

Overview

 

Sample Customers

Information Not Available
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Citrix
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. CloudPassage and other solutions. Updated: December 2024.
829,634 professionals have used our research since 2012.