Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Symantec Cloud Workload Protection comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
107
Ranking in other categories
Vulnerability Management (6th), Cloud and Data Center Security (5th), Container Security (2nd), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (3rd)
Check Point Harmony Email &...
Ranking in Cloud Workload Protection Platforms (CWPP)
11th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
59
Ranking in other categories
Email Security (7th), Data Loss Prevention (DLP) (5th)
Symantec Cloud Workload Pro...
Ranking in Cloud Workload Protection Platforms (CWPP)
37th
Average Rating
8.0
Number of Reviews
2
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2025, in the Cloud Workload Protection Platforms (CWPP) category, the mindshare of SentinelOne Singularity Cloud Security is 2.2%, up from 0.9% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 0.6%, down from 1.1% compared to the previous year. The mindshare of Symantec Cloud Workload Protection is 0.1%, down from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Workload Protection Platforms (CWPP)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Mahadi Ma - PeerSpot reviewer
Has a good active directory feature and good technical support
One area for improvement in Symantec Cloud Workload Protection is integration. Other features that could be improved are defense control and encryption, particularly in the USB. For example, users should be able to control the USB and have the capability of blocking and allowing USB reading and writing. Having a USB encryption feature in Symantec Cloud Workload Protection would also be very useful. An additional feature I'd like to see in the next release of Symantec Cloud Workload Protection is more advanced defense on mobile devices such as iOS and Android. For example, even offline or with no internet connection, it would be good if the solution could defend devices against malware and ransomware.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of PingSafe is its integration with most of our technology stack, specifically all of our cloud platforms and ticketing software."
"The visibility PingSafe provides into the Cloud environment is a valuable feature."
"Singularity Cloud Security offers autonomous response capabilities, automatically remediating threats and restoring affected files without manual intervention."
"PingSafe offers an intuitive user interface that lets us navigate quickly and easily."
"I rate SentinelOne Singularity Cloud Security ten out of ten."
"We liked the search bar in PingSafe. It is a global search. We were able to get some insights from there."
"We like the platform and its response time. We also like that its console is user-friendly as well as modern and sleek."
"It saves time, makes your environment more secure, and improves compliance. PingSafe helps with audits, ensuring that you are following best practices for cloud security. You don't need to be an expert to use it and improve your security."
"We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
"The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great."
"It helped us to bring security compliance and ensure system robustness throughout."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
"We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
"It is very intuitive. It is a point and click type of deal."
"The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour."
"The most valuable features in Symantec Cloud Workload Protection are endpoint protection and active directory features. The active directory features in the product are very good, and in terms of security, the most valuable feature in Symantec Cloud Workload Protection is threat defense or threat protection."
"It will read various logs, diagnose what is wrong, and then alert you."
 

Cons

"The application module focuses on the different codes and libraries that can be run on the machines. It is very important for Singularity EDR to detect what type of codes and what type of libraries can run in the machine. If they can implement a white list or a black list of codes or libraries that can be used in the machine, it would be very helpful. They can focus more on the application module."
"In version 2, a lot of rules have been deployed for Kubernetes security and CDR, which makes a lot of issues of critical severity, whereas they are not critical or of high severity. There is a mismatch of severities."
"They can add more widgets to its dashboard. A centralized dashboard with numerous metrics would improve user understanding."
"While the future roadmap presented by SentinelOne appears promising, I hope the envisioned advancements are realistically achievable and that the gap between current offerings and long-term goals is not too significant."
"The Automation tab is an add-on that doesn’t work properly. They provide a list of scripts that don’t work and I have asked support to assist but they won’t help. When running on various endpoints the script doesn’t work and if it does, it’s only a couple. There are a lot of useful scripts that would be beneficial to run forensics, event logs, and process lists running on the endpoint."
"One of the issues with the product stems from the fact that it clubs different resources under one ticket."
"It does not bring much threat intel from the outside world. All it does is scan. If it can also correlate things, it will be better."
"If something happens in our infrastructure, the alert appears on the dashboard, but I have to log in to the dashboard and refresh it. I would prefer it to provide better alerting and notifications so that I can resolve issues on priority."
"The sanitization on the file needs improvement."
"We still get some false positives. There are times when legitimate stuff gets flagged and it could be that somebody is expecting a very important email but they don't end up getting it. On the flip side, when we alert Check Point about stuff like this, it is corrected, so they are improving. That's a plus."
"Check Point should integrate with features available in Barracuda."
"The next release should focus more on email categorization and provide options for unlocking blocked safe emails."
"Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult."
"There is a need for improvement in handling business email compromise."
"It's not fully integrated with Google Workspace, and the statistics don't update in real-time."
"At this time, the two-factor authentication does not work for Active Directory."
"In the future, we may need to use features that are only available in one of the competing products."
"One area for improvement in Symantec Cloud Workload Protection is integration. Other features that could be improved are defense control and encryption, particularly in the USB. For example, users should be able to control the USB and have the capability of blocking and allowing USB reading and writing. Having a USB encryption feature in Symantec Cloud Workload Protection would also be very useful."
 

Pricing and Cost Advice

"The price depends on the extension of the solution that you want to buy. If you want to buy just EDR, the price is less. XDR is a little bit more expensive. There are going to be different add-ons for Singularity."
"Its pricing is okay. It is in line with what other providers were providing. It is not cheap. It is not expensive."
"The licensing is easy to understand and implement, with some flexibility to accommodate dynamic environments."
"The pricing is somewhat high compared to other market tools."
"The features included in PingSafe justify its price point."
"PingSafe is fairly priced."
"It is not that expensive. There are some tools that are double the cost of PingSafe. It is good on the pricing side."
"Its pricing was a little less than other providers."
"The pricing is competitive."
"This is a very good product if you are on the cloud, but the price is a little more expensive."
"As we are a non-profit organization, we got the tool with a good offer. On a yearly basis, we pay 10,000 Euro for 500 users, which also includes the technical support part."
"Having information stolen by a hacker would be more expensive than purchasing a license."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
"The product is expensive compared to some competitors, especially for the SME segment."
"Due to its pricing, I would say that Check Point Harmony Email & Collaboration is more suitable for medium to enterprise organizations."
"The product’s price is very high."
"The licensing cost for Symantec Cloud Workload Protection is paid yearly."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
842,592 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
15%
Manufacturing Company
9%
Government
5%
Computer Software Company
19%
Financial Services Firm
10%
Manufacturing Company
8%
Healthcare Company
5%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
It is cost-effective compared to other solutions in the market.
What needs improvement with PingSafe?
In version 2, a lot of rules have been deployed for Kubernetes security and CDR, which makes a lot of issues of criti...
What is your primary use case for Check Point Harmony Email & Office?
We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For exa...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
Ask a question
Earn 20 points
 

Also Known As

PingSafe
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
No data available
 

Overview

 

Sample Customers

Information Not Available
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
LifeLock
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Symantec Cloud Workload Protection and other solutions. Updated: March 2025.
842,592 professionals have used our research since 2012.