Prisma Cloud by Palo Alto Networks and Check Point Harmony Email & Collaboration compete in the cybersecurity space. Prisma Cloud has an edge due to its comprehensive multi-cloud security, dynamic identity features, and strong integrations, while Check Point is strong in email security, especially in phishing threat prevention.
Features: Prisma Cloud offers extensive security capabilities for multi-cloud environments with features like dynamic workload identity, robust compliance solutions, and seamless integration with AWS for cryptographic identity and network authentication. Check Point Harmony excels in email protection, leveraging features such as sandboxing and data loss prevention to secure collaborative tools effectively.
Room for Improvement: Prisma Cloud can enhance its documentation, user experience, and API security. Improvements in integration and automation, along with pricing transparency, are also needed. Check Point could refine its documentation, improve application integration, and resolve performance issues, including reducing false positives and enhancing customer support responsiveness.
Ease of Deployment and Customer Service: Prisma Cloud supports hybrid, on-premises, and multiple cloud deployments, making it versatile, though its customer service reviews are mixed, with noted responsiveness delays. Check Point Harmony is cloud-focused with hybrid options, and its customer service is often praised for effectiveness and prompt resolution.
Pricing and ROI: Prisma Cloud is priced higher due to its broad capabilities, offering significant ROI through enhanced security and automation which justify the initial investment. Check Point Harmony's pricing is more accessible, especially for medium to large enterprises, with straightforward ROI from its email security and DLP features, making it cost-effective for securing enterprise communications.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
The return on value is in the securing of the applications that we are deploying, as well as through a better understanding of the types of issues in the type of environment.
Before, we had a few staff members who monitored our environment, but now the alerting and other processes happen automatically, so there is a good ROI in terms of resources.
It eliminates the need for additional hardware, making it a financially and technically sound investment.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
Customer support is of high quality.
Support issues exist with the Check Point company itself, not necessarily the product.
Whenever I have issues with the solution, I will get an immediate response from the product team and they will try to close the issue as soon as possible.
When you send them a message, you get a response in a minute or two.
They can respond with technical documentation or pass on the case to the next level because it requires the development of a new feature or changing a feature due to a bug.
As soon as we need to add somebody, we just add them to NinjaOne, and then we have a script set up where it automatically deploys and adds them to whichever group we need.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
I would rate the scalability of Check Point Harmony Email and Collaboration as nine out of ten, indicating high scalability.
It's very scalable and very easy to use.
You can use it to onboard any cloud account no matter how many resources are in it.
It's the type of tool that is constantly improving, and its scalability suits our environment well.
In my experience, there has been 100 percent uptime.
SentinelOne Singularity Cloud is incredibly reliable.
The cloud console is very resilient.
I cannot recall any downtime with the solution.
I would rate it a ten out of ten for stability.
I haven't seen any outages with Prisma Cloud.
If I had to ask for anything to make it easier, it would be signed images that are GPG signed and a public repository where we can get the bits from.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
Check Point should integrate with features available in Barracuda - like more advanced threat management.
Currently, it requires programming knowledge, so if someone without hardware programming knowledge could customize certain features to their requirements, it would be very helpful.
It is a SaaS solution, but some of my clients have a local regulatory requirement, and they want to install it locally on their premises.
From a developer's perspective, especially for organizations like banks developing their applications, ensuring API security before deploying them to the cloud is crucial.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
The price was very, very important to us, and it came down to the price when we were doing our evaluations WatchGuard and SentinelOne.
Covering our 50,000 endpoints would have nearly bankrupted most security programs, even well-funded ones like ours.
I consider the pricing to be a bit expensive, similar to other solutions.
The pricing is lower compared to what I used before.
The pricing is reasonable, rated five out of ten for affordability.
There are no additional costs beyond the standard fees.
A strategy to optimize costs will save you money.
The licensing model for data security should be compared to the native security offered by AWS and Azure.
The real-time detection and response capabilities of SentinelOne Singularity Cloud impressive because it is a platform that uses artificial intelligence to determine what is normal and what is abnormal and can lock down any virus it may encounter.
We were shown how ransomware can be immediately stopped in real-time. That was huge.
Our previous product took a lot of man hours to manage. Once we got Singularity Cloud Workload Security, it freed up our time to work on other tasks.
The most valuable feature is spam detection and phishing site prevention, which Microsoft couldn't catch, yet Check Point does.
Check Point Harmony Email and Collaboration offers online support and has tight integration with Microsoft.
The protection and scanning of emails are also appreciated, as they secure everything in the email spectrum.
Prisma Cloud is a single tool that protects cloud resources and applications without having to manage and reconcile disparate security and compliance reports.
Prisma offers visibility to developers and high-level leadership because the dashboard is excellent and the alerts are comprehensive.
This alerting system allows me to take the necessary steps to secure it before any attack can occur, making it the best preventive measure for our cloud.
SentinelOne Singularity Cloud Security protects cloud workloads, offering advanced threat detection and automated response. It integrates seamlessly with cloud environments and secures containerized applications and virtual machines against vulnerabilities.
SentinelOne Singularity Cloud Security is renowned for its efficiency in mitigating threats in real-time. The platform integrates effortlessly with existing cloud environments, ensuring robust cloud security management with minimal manual intervention. Securing containerized applications and virtual machines, it excels in threat intelligence and endpoint protection. However, improvements are needed in performance during high workload periods, and more integrations with third-party tools and better documentation would be beneficial. Users often find the installation process complex, support response times slow, and the dashboard's navigation unintuitive.
What are the key features of SentinelOne Singularity Cloud Security?In specific industries, SentinelOne Singularity Cloud Security is implemented to safeguard critical data and infrastructure. Organizations in finance, healthcare, and technology depend on its real-time threat detection and automated response to protect sensitive information. Its ability to secure containerized applications and virtual machines is particularly valuable in dynamic environments where rapid scaling is necessary.
Check Point Harmony Email and Office is a cloud-based software offering complete protection to stop malware attacks through emails. The software is designed to provide protection for organizations using Office 365, G Suite, Google Workspace, and all other collaboration and file-sharing apps. Access permissions can be granted and custom policies can be defined for any user of choice.
Check Point Harmony Email and Office identifies and blocks advanced malware, phishing, and ransomware attacks in real time before they reach the user’s inbox. In turn, this also helps protect sensitive business data from breaches. Harmony Email and Office was the first solution to implement machine learning, API, and AI for email security, and will ultimately prevent any attempts at account takeover via agentless multi-factor authentication.
What is Complete Protection?
Check Point Harmony Email and Office offers a superior catch rate for collaboration apps and cloud email with their API-based solution that detects attacks that other solutions miss, including account takeover, supply chain attacks, ransomware, and BEC. The complete protection offers:
Reviews from Real Users
Check Point Harmony Email and Office offers a revolutionary prevention solution to stop malware attacks through emails. Users particularly like its visibility and the ability to protect sensitive business data.
David U., a CISO at IMC companies, notes, "It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
Mantu S., a senior technology architect at Incedo Inc., writes, "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
Prisma Cloud by Palo Alto Networks is used for managing cloud security posture, container security, and compliance monitoring in multi-cloud environments.
Prisma Cloud by Palo Alto Networks provides tools for vulnerability management, misconfiguration detection, and compliance with standards like HIPAA and CIS. It offers near real-time inventory and alerting, enhancing cloud configuration audits and security across AWS, Azure, and GCP. Its automated security features offer real-time protection and integration into CI/CD pipelines, optimizing visibility, control, and risk identification without manual steps. Despite its capabilities, improvement areas include documentation, pricing clarity, usability, security automation, dashboard customization, and API functionality. Slow support and integration challenges with AWS and third-party tools are noted.
What are the key features of Prisma Cloud?In industries such as healthcare and finance, Prisma Cloud by Palo Alto Networks enhances security by aligning with strict compliance standards and safeguarding sensitive data. Its tools adapt to rapid cloud service updates and enable secure deployment across diverse cloud infrastructures.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.