Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
48
Ranking in other categories
Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (11th)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
59
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
Trellix Collaboration Security
Ranking in Email Security
19th
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Secure Email Gateway (SEG) (7th)
 

Mindshare comparison

As of March 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 13.5%, down from 19.7% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.9%, up from 2.8% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.1%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Amey Darekar - PeerSpot reviewer
Has an easy implementation phase to deal with for users
I primarily use the product in our daily security operations since it is implemented in all of our company's systems and is used in our environment. Normally, email security tools like FireEye or Trellix help to protect ourselves from spam, malware, and other email-oriented threats. The tool is used extensively in our company's environment. It is more like a collaboration email security that is used in our company. Whether my company plans to increase the number of users of the product or not is something that depends on the growth of the organization. I recommend the product to those who plan to use it. The product is stable and reliable, considering the results my company gets out of it. When it comes to Trellix or FireEye Endpoint Security (HX), the tools offer antivirus as well as the modern real-time security feature, which is used to automate the detection and protection of the endpoints against all the security threats that are currently there in the industry. I don't see any challenges with the integration part of the product, but since a different team manages it, I don't have visibility into it. In terms of the value offered by the product, the solution does help our company protect data and the complete infrastructure. I rate the tool a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Defender helps us prioritize threats across our organization."
"The deployment capability is a great feature."
"The initial setup was easy."
"The most valuable aspect of Microsoft Defender for Office 365 is its ability to protect us from malware."
"At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."
"We use Microsoft Defender for its ability to integrate with existing business technologies, which is beneficial for protecting business areas."
"The product's scalability is good."
"Microsoft Defender for Office 365 helps people to work remotely. It is a secure solution. We don't need to use our company's computers or get VPN connections to the networks. I can control how they share screens and what they send to the devices. It keeps our organizations confidential and sensitive information safe."
"Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
"Check Point's technical support is very good."
"Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble."
"For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good."
"It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
"The most valuable feature is the sandboxing feature. It provides a sandboxing environment where you can open links and see where they lead. You can see what is presented in the link after opening it."
"Check Point Harmony Email and Collaboration offers online support and has tight integration with Microsoft."
"I can count the number of endpoints, emails, and collaborations being used in the environment."
"We can control this solution from the cloud and are able to access it from wherever we are."
"The solution's most valuable feature is its simplicity. It's very user-friendly."
"The auto-remediation feature is valuable."
"FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks."
"FireEye is good for malware depicting and security."
"The product helps reduce the number of malicious emails reaching the user's inbox."
"One of the most valuable features is the protection against vulnerabilities, particularly through virtual patching."
"Before installing, consider potential challenges with system performance, especially when integrating multiple tools, which could slow down performance."
 

Cons

"The changes to customer service, specifically the new model for support agreements, are not favorable."
"Microsoft Defender for Office 365 must improve the overall management style, including the GUI. It also needs to change the filters so that it is easy to whitelist and blacklist data."
"The certification training for Defender for 365 needs to be deeper and incorporate Sentinel. I took all the security courses except one, and Sentinel isn't included."
"The visibility for the weaknesses in the system and unauthorized access can be improved."
"The only thing they should improve is the licensing model. They should stop changing it. A year ago, the five features I mentioned were included in one product. Now, three of them are bundled into one product, and you have to pay extra for the other two. I don't mind paying extra, but I don't want them to change it every year or every six months. I need to know what I'm looking at and not worry about it next year."
"The product must provide better malware detection."
"Microsoft should provide more documentation for users so they can self-educate. I would like to see more documentation for advanced security features."
"Microsoft security solutions work as expected. They are constantly updating the solutions to make them better. At the same time, the changes can impact a customer's environment, and we need to adjust settings. Sometimes we aren't aware of the changes, and nothing is pushed from the backend automatically."
"A signature-based filter could improve the solution's AI model for spam email."
"A phishing simulator would be helpful as a user training module."
"There could be more automation features included for it."
"Its guides are not great."
"Check Point could improve its marketing strategy."
"Check Point needs to address the pricing segment for SMEs."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"There is always room for improvement and growth."
"Sometimes, integration can be challenging, impacting its stability, which is why I rate it a five out of ten."
"The solution must provide features to scan QR codes for threats."
"Sometimes especially zero-day spam emails can be passed to the user's inbox."
"I would like to see this solution become more flexible."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"There is a need for improved integration with totally different products, such as a rapid server."
"If they want to be the primary or best solution, they need to have better email management features."
"The reporting aspect of the solution needs improvement."
 

Pricing and Cost Advice

"Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
"The product is expensive."
"The solution could be better by simplifying the business model of their licensing. It was hard to figure out how to get the licensing done for the environment, initially."
"Microsoft Defender is expensive. I typically recommend it only if clients have the budget. Otherwise, I would suggest an alternative."
"Compared to other brands, Microsoft Defender for Office 365's pricing is competitive."
"Defender for 365 comes in various plans and licenses, along with other Microsoft security solutions. Purchasing this kind of package or security bundle gives good value for money, and that's what I recommend."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"The pricing has become expensive."
"The pricing is competitive."
"I rate the platform’s pricing a seven and a half."
"Check Point is more expensive. That's the honest truth. So far, it's a good value for the money."
"Usually, we pay for the licensing part on a yearly basis and not on a monthly basis. If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts."
"The cost is similar to other competitors. It's not much higher."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"Cost is the main concern that every customer takes into consideration, and Check Point always negotiates a price that is affordable."
"Due to its pricing, I would say that Check Point Harmony Email & Collaboration is more suitable for medium to enterprise organizations."
"The cost is very high."
"The licensing is on a yearly basis."
"The solution requires a license to be purchased for every user."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
842,466 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
19%
Financial Services Firm
10%
Manufacturing Company
8%
Healthcare Company
5%
Manufacturing Company
15%
Financial Services Firm
13%
Computer Software Company
12%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
I don't have detailed specifics on pricing, setup cost, or licensing.
What needs improvement with Microsoft Defender for Office 365?
I am generally satisfied with how it currently is. If I could improve anything, I would reduce the cost.
What is your primary use case for Check Point Harmony Email & Office?
We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For exa...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
There is a need for improved integration with totally different products, such as a rapid server. This is currently c...
What is your primary use case for FireEye Email Security?
I primarily use it to monitor database access, particularly in banking and similar environments. It ensures that IT p...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
FireEye Email Security
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Trellix Collaboration Security and other solutions. Updated: March 2025.
842,466 professionals have used our research since 2012.