Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Mimecast Email Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Average Rating
8.2
Number of Reviews
45
Ranking in other categories
Email Security (1st), Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (10th)
Check Point Harmony Email &...
Average Rating
8.8
Reviews Sentiment
7.8
Number of Reviews
57
Ranking in other categories
Email Security (5th), Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (9th)
Mimecast Email Security
Average Rating
8.0
Number of Reviews
28
Ranking in other categories
Office 365 Protection (5th), Secure Email Gateway (SEG) (4th)
 

Featured Reviews

Luis-Brown - PeerSpot reviewer
Aug 8, 2023
Allows for easy reporting of problems, valuable anti-phishing, and anti-malware support
Microsoft Defender for Office 365 lacks proactivity in assisting us with preparing for potential threats before they occur. While they employ a substantial amount of threat intelligence to preemptively prevent incidents, their effectiveness diminishes when it comes to delivering proactive threat intelligence alerts from Microsoft. Their focus primarily revolves around managing the internal environment. On the other hand, my other vendor, Check Point, along with my membership in MS-ISAC, supplements me with this type of information. The phishing and spam filters could use some improvement. It is adequate, but it doesn't match the quality of Proofpoint or Mimecast. However, it comes close in effectiveness. Plus, if we're obtaining it for free, investing in the other products seems impractical.
Rahul Kamble. - PeerSpot reviewer
May 3, 2024
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Frank Rawson - PeerSpot reviewer
May 26, 2023
It gives clients peace of mind and helps them educate their users about threats
A few years ago, our team found the implementation to be somewhat challenging. It has gotten easier as we've grown more experienced. The difficulty depends on the expertise of the person doing it. I don't work with Mimecast every day, so it might be more difficult for me than it is for one of my techs who regularly does Mimecast implementations. It requires some specific in-depth product knowledge and an understanding of email solutions. The deployment time varies. In South Africa, it depends on who you use to deploy it. If you use one of Mimecast's local partners, it can take up to two weeks because of their process. However, it's only about four to eight hours of work. After deployment, there isn't much maintenance aside from supporting and educating your customers. Users require constant education on how to use the Mimecast client and release an email that has been blocked.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It also gives me good visibility because, with Defender, I'm using a Microsoft product to defend Microsoft products. The integration was really seamless and I have wide visibility because it picks up almost everything. Literally, I can see almost every activity that happens, from the e-mail to the workstation itself."
"I would say that 90% of the spam and phishing attack emails get blocked right off the bat."
"There are several features that I consider valuable."
"Microsoft Defender has a feature to protect each and every attachment. Even if it's an encrypted attachment, it will check for any potential threats."
"The good part is that you don't have to configure it, which is very convenient."
"Defender for Office 365 has helped eliminate having to look at multiple dashboards and that is the aspect I like most about it. It is simpler, effective, and convenient. The users like the process efficiency."
"Microsoft Defender for Office 365's most valuable feature is its performance."
"The email protection is excellent, especially in terms of anti-phishing policies."
"The ease of management and intuitive administration are excellent."
"The threat management database provides consistent updates."
"This product enhances faster and more secure sharing of information among colleagues from different departments."
"It protects cloud email and collaboration suites from cyber-attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365, G-Suite, Teams, and Slack."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"The most valuable feature is spam detection and phishing site prevention, which Microsoft couldn't catch, yet Check Point does."
"The solution helps to block spam emails."
"I can count the number of endpoints, emails, and collaborations being used in the environment."
"The product's most valuable features are impersonation protection and phishing countermeasures."
"The setup was easy."
"The product is good. To date, we have not faced any challenges."
"The most valuable feature is the DMARC Analyzer."
"The solution is pretty straightforward to use and easy to set up."
"Email security is the most valuable feature of the solution."
"The biggest advantage of Mimecast Email Security is its spam filtering. Its filtering feature is interesting."
"The integration is straightforward."
 

Cons

"Microsoft Defender for Office 365 should be more proactive."
"You should be able to deploy Defender for every subscription without the need to add servers."
"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"Configuring the default strategies and policies in Microsoft Defender for Cloud Apps generates a lot of noise and false positives."
"There's room for improvement regarding the time frame for retrieving emails."
"Configuration at the mid-level could be improved for the support team."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products."
"It's not fully integrated with Google Workspace, and the statistics don't update in real-time."
"There are sometimes leakages of viruses when the system is experiencing network failures."
"Support can be a bit quicker in helping the customer."
"A phishing simulator would be helpful as a user training module."
"They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."
"Check Point needs to address the pricing segment for SMEs."
"If Check Point finds something to be described as a clean email, it should have the option to automatically release it to the user. At the moment, we don't have that option."
"I'd like to have better support from the product in the future."
"Its pricing can be improved. It is a bit expensive."
"The reaction time between a new threat being identified and Mimecast picking it up needs to be narrowed a bit."
"The tool can be challenging because it relies on rule-based configurations, especially for addressing impersonation threats. This approach requires setting up numerous rules to ensure filtering. It should work based on behavior-based analytics."
"They could provide a unified licensing model, including all the security features."
"The feature that should be included is to remove the block on the encrypted files."
"As a user, the user interface of the management console could be upgraded, for example."
"The solution's console interface was recently changed for the admins, but the previous one was much better because we could open tabs on it."
 

Pricing and Cost Advice

"While Microsoft Defender for Office 365 necessitates pricier E3 or E5 subscriptions, the extensive functionality offered by these licenses across various Microsoft products justifies the investment."
"I was working in the government and it was too expensive for us to use our Microsoft products."
"The product is expensive."
"The pricing is normal. Considering its popularity, it's not overpriced."
"The solution saves money so we have seen a return on investment."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"For large enterprise organizations, they can definitely afford it, but for small and medium organizations, they might struggle to cover the expenses."
"Compared to other brands, Microsoft Defender for Office 365's pricing is competitive."
"Being able to keep the phishing campaigns out of my company has been ROI for me."
"Do a full feature evaluation (interactive) with a support person. That is what I did."
"The product is expensive."
"Check Point is more expensive. That's the honest truth. So far, it's a good value for the money."
"There are absolutely no additional costs to the standard licensing fees. One of the wonderful pieces is that CloudGuard SaaS is all-inclusive in its licensing. There's no a-la-carte functionality. You're getting 100 percent of the product for the licensing that you're paying."
"The price is very good, based on what they deliver."
"Having information stolen by a hacker would be more expensive than purchasing a license."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"I'm always going to say the price needs to be lower, but it's reasonable."
"The product price is moderate. I rate the pricing a five out of ten."
"For what it is, the product is overpriced."
"We pay monthly fees to our provider."
"The licensing costs are per-user for the product that you get with them."
"Compared to the other products in the market, it is neither cheap but nor very expensive. I would rate it somewhere in the middle, 5 out of 10."
"On a scale of one to ten, where one is cheap, and ten is expensive, I rate the pricing a ten."
"The product has good pricing in terms of return on investment."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
18%
Financial Services Firm
9%
Manufacturing Company
9%
Government
5%
Computer Software Company
16%
Manufacturing Company
7%
Financial Services Firm
7%
Retailer
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
The pricing is reasonable since it comes integrated with our Office 365 license.
What needs improvement with Microsoft Defender for Office 365?
Sometimes, phishing emails manage to pass through the filter, so the system needs to enhance its phishing email detec...
What is your primary use case for Check Point Harmony Email & Office?
The use cases include anti-spam and anti-phishing. We have Email Collaboration for the anti-spam solution and anti-ph...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about Mimecast Email Security with Targeted Threat Protection?
The interface of this solution is very easy to navigate and user-friendly. There is no delivery in email and other co...
What needs improvement with Mimecast Email Security with Targeted Threat Protection?
The product's interface could be improved to be more user-friendly.
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
Mimecast Email Security with Targeted Threat Protection
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Azizi Developments, Affinity Credit Union, Aftercare, Al Abbar Group
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Mimecast Email Security and other solutions. Updated: January 2024.
815,854 professionals have used our research since 2012.