Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs ESET Cloud Apps Protection comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
48
Ranking in other categories
Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (11th)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
59
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
ESET Cloud Apps Protection
Ranking in Email Security
29th
Average Rating
9.6
Reviews Sentiment
7.4
Number of Reviews
2
Ranking in other categories
Vulnerability Management (37th), Patch Management (22nd)
 

Mindshare comparison

As of April 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 13.1%, down from 19.0% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.8%, up from 3.1% compared to the previous year. The mindshare of ESET Cloud Apps Protection is 0.4%, down from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
LA
Great protection, good privacy, and helpful support
The only thing I would like is a way to open the email that is going to quarantine. Based on the level of security, they cannot open the email to check the message. Even for the administrator, you have to create a security copy to be sent, which will lock the log support. It's not easy for an admin to check and decide if the email is good or not. That is the only thing that I'm seeing could be improved. Basically, ESET doesn't have the ability to let the administrator release an email showing the message on the email. It's not possible. If you want to have an email review, you have to select an option to send a copy. In the way that they designed the system, for security, they are not letting anyone even have the admin privileges to make this happen. Privacy is at a really high level.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The deployment capability is a great feature."
"Defender is a SaaS platform, so it offers more flexibility. Managing the permissions is easier. The solution's automated detection and response features are scalable."
"Defender for 365 is a comprehensive cloud-based solution. The value of the cloud is that you aren't alone. Threat intelligence and analytics are shared in the cloud. We don't have to find the solution alone. If you face an unknown threat with traditional solutions like Trend Micro and Symantec, you need to open a case and send your information to them to analyze forensically and identify the source of the attack."
"The product's scalability is good."
"Since we have started using the solution, there have been fewer compromises."
"Microsoft Defender for Office 365's most valuable features are safe attachments and safe links."
"It also gives the vulnerability status according to the versions you have selected. Let's say you have Google Chrome. It mentions the versions it has, and it updates. Within two hours of an update, it is reflected in the dashboard. That's really nice to have."
"The benefit that stands out to me is the ability for multiple individuals to collaborate simultaneously within the same document. Additionally, there is the option to save the document directly in the integrated OneDrive or SharePoint."
"The threat management database provides consistent updates."
"The most valuable feature of the solution is the phishing protection it offers."
"This product enhances faster and more secure sharing of information among colleagues from different departments."
"Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure."
"The main benefit is that hackers can't steal information."
"Check Point adds value with east-west protection in the data center."
"Based on domain and URL reputation, it will allow traffic to flow."
"For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good."
"We are close to having 99% or 98% detection."
"The most valuable features are the precision of detection and the level of customization of the policy."
 

Cons

"The only thing they should improve is the licensing model. They should stop changing it. A year ago, the five features I mentioned were included in one product. Now, three of them are bundled into one product, and you have to pay extra for the other two. I don't mind paying extra, but I don't want them to change it every year or every six months. I need to know what I'm looking at and not worry about it next year."
"We need to be able to whitelist data at the backend."
"I am generally satisfied with how it currently is. If I could improve anything, I would reduce the cost."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"Microsoft Defender for Office 365's Mac functionality requires improvement to deliver the same level of protection found on Windows devices."
"The UI needs to be more user-friendly."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"Configuration at the mid-level could be improved for the support team."
"if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"Some files are not scanned thoroughly due to occasional network failures."
"The reporting could be improved."
"Maybe Check Point can work on the DLP part."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"There are a few areas for improvement. One is the occasional sluggishness or latency, which is likely due to the cloud-based nature of the solution. So, the performance can be better."
"The left-hand feature can be made more granular for the implementation of the policy."
"It's not easy for an admin to check and decide if the email is good or not."
"The specific domain file for Apache needs to be well-defined."
 

Pricing and Cost Advice

"The pricing is normal. Considering its popularity, it's not overpriced."
"It is much more expensive than using another solution because we have had to include some options and upgrade our license."
"The license is expensive because the cost is based on the number of users."
"Defender for 365 comes in various plans and licenses, along with other Microsoft security solutions. Purchasing this kind of package or security bundle gives good value for money, and that's what I recommend."
"While Microsoft Defender for Office 365 necessitates pricier E3 or E5 subscriptions, the extensive functionality offered by these licenses across various Microsoft products justifies the investment."
"For large enterprise organizations, they can definitely afford it, but for small and medium organizations, they might struggle to cover the expenses."
"Compared to other brands, Microsoft Defender for Office 365's pricing is competitive."
"Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"The cost is similar to other competitors. It's not much higher."
"Cost is the main concern that every customer takes into consideration, and Check Point always negotiates a price that is affordable."
"The pricing is competitive."
"This is a very good product if you are on the cloud, but the price is a little more expensive."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"The product is expensive compared to some competitors, especially for the SME segment."
"The price is very good, based on what they deliver."
"The solution provides affordable pricing for medium sized industries."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
847,646 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
18%
Financial Services Firm
10%
Manufacturing Company
8%
Healthcare Company
5%
Computer Software Company
12%
Comms Service Provider
8%
Media Company
8%
Wholesaler/Distributor
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
I don't have detailed specifics on pricing, setup cost, or licensing.
What needs improvement with Microsoft Defender for Office 365?
I am generally satisfied with how it currently is. If I could improve anything, I would reduce the cost.
What is your primary use case for Check Point Harmony Email & Office?
We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For exa...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about ESET Mail Security?
The most valuable features are the precision of detection and the level of customization of the policy.
What is your experience regarding pricing and costs for ESET Mail Security?
The solution provides affordable pricing for medium sized industries.
What needs improvement with ESET Mail Security?
The specific domain file for Apache needs to be well-defined.
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
ESET Mail Security
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Information Not Available
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. ESET Cloud Apps Protection and other solutions. Updated: April 2025.
847,646 professionals have used our research since 2012.