Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
47
Ranking in other categories
Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (10th)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
59
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
Trellix Collaboration Security
Ranking in Email Security
19th
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
14
Ranking in other categories
Secure Email Gateway (SEG) (6th)
 

Mindshare comparison

As of January 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 15.4%, down from 21.8% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 5.3%, up from 2.2% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.5%, down from 2.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Amey Darekar - PeerSpot reviewer
Has an easy implementation phase to deal with for users
I primarily use the product in our daily security operations since it is implemented in all of our company's systems and is used in our environment. Normally, email security tools like FireEye or Trellix help to protect ourselves from spam, malware, and other email-oriented threats. The tool is used extensively in our company's environment. It is more like a collaboration email security that is used in our company. Whether my company plans to increase the number of users of the product or not is something that depends on the growth of the organization. I recommend the product to those who plan to use it. The product is stable and reliable, considering the results my company gets out of it. When it comes to Trellix or FireEye Endpoint Security (HX), the tools offer antivirus as well as the modern real-time security feature, which is used to automate the detection and protection of the endpoints against all the security threats that are currently there in the industry. I don't see any challenges with the integration part of the product, but since a different team manages it, I don't have visibility into it. In terms of the value offered by the product, the solution does help our company protect data and the complete infrastructure. I rate the tool a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features."
"Defender for 365 is a comprehensive cloud-based solution. The value of the cloud is that you aren't alone. Threat intelligence and analytics are shared in the cloud. We don't have to find the solution alone. If you face an unknown threat with traditional solutions like Trend Micro and Symantec, you need to open a case and send your information to them to analyze forensically and identify the source of the attack."
"The most valuable aspect of Microsoft Defender for Office 365 is its ability to protect us from malware."
"The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time."
"Our customers are satisfied with Defender for 365 because Microsoft products are easy to use and customize to meet the client's needs. Everything is in one place, so we can adjust policies as needed for phishing, DLP, ATP, or any other security features that our clients want to apply."
"The technical support is good and quick to resolve issues."
"Microsoft Defender for Office 365 helps people to work remotely. It is a secure solution. We don't need to use our company's computers or get VPN connections to the networks. I can control how they share screens and what they send to the devices. It keeps our organizations confidential and sensitive information safe."
"The benefit that stands out to me is the ability for multiple individuals to collaborate simultaneously within the same document. Additionally, there is the option to save the document directly in the integrated OneDrive or SharePoint."
"The most valuable feature is spam detection and phishing site prevention, which Microsoft couldn't catch, yet Check Point does."
"Check Point adds value with east-west protection in the data center."
"The program has a nice interface and it is easy to use."
"It helped us to bring security compliance and ensure system robustness throughout."
"The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour."
"In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication."
"The sanitization feature of Check Point Harmony Email and Collaboration is valuable."
"It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use."
"The product helps reduce the number of malicious emails reaching the user's inbox."
"The initial setup is simple."
"The product protects my email."
"Before installing, consider potential challenges with system performance, especially when integrating multiple tools, which could slow down performance."
"We can control this solution from the cloud and are able to access it from wherever we are."
"FireEye is good for malware depicting and security."
"One of the most valuable features is the protection against vulnerabilities, particularly through virtual patching."
 

Cons

"Microsoft Defender for Office 365 could improve by giving customers information on techniques to prevent threats. For example, information about best practices on how to protect their own devices against hackers and scammers, such as educational information or training. This would help others have a better understanding of cyber security. Additionally, there can be more security features added."
"We noticed that from time to time, Microsoft's stability does have problems. Sometimes the service goes up and down. Sometimes they change without prior notice."
"The visibility for the weaknesses in the system and unauthorized access can be improved."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"Microsoft Defender for Office 365 should be more proactive."
"Configuration requires going to a lot of places rather than just accessing one tab."
"There is room for improvement in terms of reporting."
"The custom alerts have to improve a lot."
"There is a need for improvement in handling business email compromise."
"Check Point could improve its marketing strategy."
"At this time, the two-factor authentication does not work for Active Directory."
"After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."
"The sanitization on the file needs improvement."
"There are sometimes leakages of viruses when the system is experiencing network failures."
"Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier."
"FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA."
"The reporting aspect of the solution needs improvement."
"The solution must provide features to scan QR codes for threats."
"Sometimes, integration can be challenging, impacting its stability, which is why I rate it a five out of ten."
"Sometimes especially zero-day spam emails can be passed to the user's inbox."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"There is a need for improved integration with totally different products, such as a rapid server."
 

Pricing and Cost Advice

"It is much more expensive than using another solution because we have had to include some options and upgrade our license."
"Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
"Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
"Microsoft Defender is expensive. I typically recommend it only if clients have the budget. Otherwise, I would suggest an alternative."
"Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
"For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
"I was working in the government and it was too expensive for us to use our Microsoft products."
"The license is expensive because the cost is based on the number of users."
"Check Point is more expensive. That's the honest truth. So far, it's a good value for the money."
"The product is expensive compared to some competitors, especially for the SME segment."
"Due to its pricing, I would say that Check Point Harmony Email & Collaboration is more suitable for medium to enterprise organizations."
"This is a very good product if you are on the cloud, but the price is a little more expensive."
"There are absolutely no additional costs to the standard licensing fees. One of the wonderful pieces is that CloudGuard SaaS is all-inclusive in its licensing. There's no a-la-carte functionality. You're getting 100 percent of the product for the licensing that you're paying."
"Do a full feature evaluation (interactive) with a support person. That is what I did."
"The pricing and licensing are always negotiable."
"I rate the platform’s pricing a seven and a half."
"The licensing is on a yearly basis."
"The cost is very high."
"The solution requires a license to be purchased for every user."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
831,158 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
18%
Financial Services Firm
9%
Manufacturing Company
9%
Healthcare Company
5%
Financial Services Firm
15%
Manufacturing Company
13%
Computer Software Company
12%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
I don't have detailed specifics on pricing, setup cost, or licensing.
What needs improvement with Microsoft Defender for Office 365?
I am generally satisfied with how it currently is. If I could improve anything, I would reduce the cost.
What is your primary use case for Check Point Harmony Email & Office?
I use Check Point Harmony Email and Collaboration to protect email security. It is used as an email secure gateway to...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
There is a need for improved integration with totally different products, such as a rapid server. This is currently c...
What is your primary use case for FireEye Email Security?
I primarily use it to monitor database access, particularly in banking and similar environments. It ensures that IT p...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
FireEye Email Security
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Trellix Collaboration Security and other solutions. Updated: January 2025.
831,158 professionals have used our research since 2012.