Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Illumio comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.6
Reviews Sentiment
8.1
Number of Reviews
93
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Container Security (3rd), Cloud Security Posture Management (CSPM) (4th), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (3rd)
Check Point Harmony Email &...
Ranking in Cloud Workload Protection Platforms (CWPP)
9th
Average Rating
8.8
Reviews Sentiment
7.8
Number of Reviews
57
Ranking in other categories
Email Security (5th), Data Loss Prevention (DLP) (5th)
Illumio
Ranking in Cloud Workload Protection Platforms (CWPP)
14th
Average Rating
8.0
Number of Reviews
9
Ranking in other categories
Cloud and Data Center Security (3rd), Microsegmentation Software (3rd)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Aug 29, 2024
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Rahul Kamble. - PeerSpot reviewer
May 3, 2024
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Vincent TOH - PeerSpot reviewer
Aug 15, 2024
Offers real-time application dependency mapping that is useful
The product's initial setup phase is not difficult. We are using a cloud version of the tool. Picking up the PC for the setup was difficult because Illumio's service provider took care of it. In our company, we only installed the tool on our devices, so it wasn't much of a difficult process. On a scale of one to ten, one is difficult, and ten is easy, I rate the setup phase as nine. I didn't deploy Illumio. My company uses the cloud version of the tool. I created my account and paired my device, which was all that was required.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"The solution is a good alerting tool."
"Cloud Native Security's best feature is its ability to identify hard-coded secrets during pull request reviews."
"The UI is responsive and user-friendly."
"It has a user-friendly dashboard that I can access without any difficulty."
"You not only get to know about vulnerabilities and misconfigurations but also some of the actual"
"The most valuable feature is the ability to gain deep visibility into the workloads inside containers."
"When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"This DLP is very useful, as it gives our users additional protection."
"The option to set a copy is beneficial."
"The email security solution boasts an exceptional success rate in filtering out junk, spam, and phishing emails while ensuring that legitimate emails reach their intended recipients. The setup process is straightforward and user-friendly"
"The solution helps to block spam emails."
"The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc."
"The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour."
"The API is its most valuable feature. On the API side, relative to the rest of the market, Check Point is decades ahead of its competitors."
"The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies."
"The most valuable feature of Illumio Adaptive Security Platform is monitoring. When I have no requirement from the other application, I can use the web block traffic to build."
"The Explorer allows you to know the traffic between source and destination."
"It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation."
"The flexibility of the solution is its most valuable feature."
"The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files."
"The solution is easy to use."
"The tool helps with my company's security posture."
 

Cons

"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"SentinelOne currently lacks a break glass account feature, which is critical for implementing Single Sign-On."
"PingSafe filtering has some areas that cause problems, and to achieve single sign-on functionality, a break-glass feature, which is currently unavailable, is necessary."
"If I had to pick a complaint, it would be the way the hosts are listed in the tool. You have different columns separated by endpoint name, Cloud Account, and Cloud Instances ID. I wish there was something where we could change the endpoint name and not use just the IP address. We would like to have custom names or our own names for the instances. If I had a complaint, that would be it, but so far, it meets all the needs that we have."
"It does not bring much threat intel from the outside world. All it does is scan. If it can also correlate things, it will be better."
"I would like PingSafe to add real-time detection of vulnerabilities and cloud misconfigurations."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"For vulnerabilities, they are showing CVE ID. The naming convention should be better so that it indicates the container where a vulnerability is present. Currently, they are only showing CVE ID, but the same CVE ID might be present in multiple containers. We would like to have the container name so that we can easily fix the issue."
"The solution fails to support hybrid deployments."
"Check Point needs to address the pricing segment for SMEs."
"If Check Point finds something to be described as a clean email, it should have the option to automatically release it to the user. At the moment, we don't have that option."
"Check Point has to continue refining the intelligence engine to minimize the number of false positives."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"Some files are not scanned thoroughly due to occasional network failures."
"There could be more automation features included for it."
"The implementation could definitely be better."
"It requires a low-level re-architecting of the product."
"Illumio Adaptive Security Platform could improve by supporting more operating systems. For example, Cisco and Apache appliances."
"The customer service is lagging a bit. It could be better."
"We need more details on areas where there is an error or a traffic blockage. I would like the tool to offer a more detailed view."
"The interaction we've had with the support team hasn't been ideal. Technical support should be improved."
"I would like to see better data security in the product."
"The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules."
"Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial."
 

Pricing and Cost Advice

"The tool is cost-effective."
"The price depends on the extension of the solution that you want to buy. If you want to buy just EDR, the price is less. XDR is a little bit more expensive. There are going to be different add-ons for Singularity."
"The features included in PingSafe justify its price point."
"As a partner, we receive a discount on the licenses."
"It's a fair price for what you get. We are happy with the price as it stands."
"The licensing is easy to understand and implement, with some flexibility to accommodate dynamic environments."
"Pricing is based on modules, which was ideal for us."
"I am not involved in the pricing, but it is cost-effective."
"As we are a non-profit organization, we got the tool with a good offer. On a yearly basis, we pay 10,000 Euro for 500 users, which also includes the technical support part."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"Check Point is more expensive. That's the honest truth. So far, it's a good value for the money."
"I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive."
"The pricing is competitive."
"I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis."
"There is a subscription needed to use Illumio Adaptive Security Platform and we pay every three years. Overall the solution is expensive."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
16%
Manufacturing Company
10%
Insurance Company
5%
Computer Software Company
18%
Financial Services Firm
9%
Manufacturing Company
9%
Government
5%
Financial Services Firm
19%
Computer Software Company
17%
Manufacturing Company
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
SentinelOne provided competitive pricing compared to other vendors, and we are satisfied with the deal.
What needs improvement with PingSafe?
Sometimes, I am not able to see the flow when there is an issue. When anyone complains and I have to troubleshoot it,...
What is your primary use case for Check Point Harmony Email & Office?
The use cases include anti-spam and anti-phishing. We have Email Collaboration for the anti-spam solution and anti-ph...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about Illumio Adaptive Security Platform?
The features that I have found most useful is the ability to centralize all the rules and then distribute them across...
What is your experience regarding pricing and costs for Illumio Adaptive Security Platform?
The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis.
What needs improvement with Illumio Adaptive Security Platform?
The log collection part needs improvement, and the tool should offer more details about the logs. We need more detail...
 

Also Known As

PingSafe
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
Illumio Adaptive Security Platform, Illumio ASP
 

Overview

 

Sample Customers

Information Not Available
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Plantronics, NTT Innovation Institute Inc.
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Illumio and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.