We compared Check Point Harmony Email and Collaboration and Microsoft Defender for Office 365 across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Features: Check Point Harmony Email and Collaboration offers exceptional integration through APIs, advanced protection against data leaks, and the ability to detect complex social engineering attacks. Microsoft Defender for Office 365 stands out for its thorough email scanning, ease of use, and anti-phishing capabilities.
Room for Improvement: Check Point Harmony Email and Collaboration could improve integration with Exchange and other SaaS clouds while enhancing its threat clouds and AI engines. On the other hand, Microsoft Defender for Office 365 can improve integration with non-Microsoft solutions and offer better documentation for its advanced security features.
Service and Support: Check Point has earned mixed reviews for its customer service. Some customers appreciate the technical support provided, while others are dissatisfied with response times. Microsoft customer service has received mixed feedback. While some customers find it responsive and prompt, others believe it could be more advanced and attentive.
Ease of Deployment: Check Point Harmony Email is considered relatively easy to implement. The setup for Microsoft Defender for Office 365 is generally considered effortless. Users appreciate its seamless integration with Office 365 and the minimal maintenance it requires.
Pricing: Check Point Harmony Email and Collaboration is a cost-effective option. It offers competitive prices and is suitable for small to medium-sized organizations. Some reviewers found Microsoft Defender for Office 365 to be reasonably priced, and others consider it expensive. Defender is typically sold in a bundle, so it’s challenging to compare the cost to other solutions.
ROI: Check Point Harmony Email and Collaboration delivers superior return on investment compared to other options. Microsoft Defender for Office 365 helps users prevent ransomware and malware while enhancing email security and providing cost savings through its subscription-based service.
Comparison Results: Check Point Harmony Email and Collaboration is an effective solution for blocking malicious attachments and detecting social engineering attacks. However, there is room for improvement in terms of integration and support, reducing false positives, and enhancing response times. Defender is praised for its thorough email scanning and integration into a single console. Defender users desire a more centralized interface and improved spam and malware detection.
"The product's environment is easy to work and comprehensive."
"The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user."
"Getting reports and finding threats in the console is easy."
"I can count the number of endpoints, emails, and collaborations being used in the environment."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
"Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
"The product is reliable and sturdy."
"The product is not resource-intensive."
"Our customers are satisfied with Defender for 365 because Microsoft products are easy to use and customize to meet the client's needs. Everything is in one place, so we can adjust policies as needed for phishing, DLP, ATP, or any other security features that our clients want to apply."
"Defender for 365 is a comprehensive cloud-based solution. The value of the cloud is that you aren't alone. Threat intelligence and analytics are shared in the cloud. We don't have to find the solution alone. If you face an unknown threat with traditional solutions like Trend Micro and Symantec, you need to open a case and send your information to them to analyze forensically and identify the source of the attack."
"The two main features that prove most beneficial for us are URL scanning and attachment scanning."
"I like its investigation capabilities, as that is what is most important to me. It is fairly simple with a user-friendly interface."
"Microsoft Defender has a feature to protect each and every attachment. Even if it's an encrypted attachment, it will check for any potential threats."
"There are several features that I consider valuable."
"The product's scalability is good."
"It's not fully integrated with Google Workspace, and the statistics don't update in real-time."
"Check Point has to continue refining the intelligence engine to minimize the number of false positives."
"We have used technical support, but their response time is very slow. It needs to be improved."
"Harmony Email & Collaboration could be improved by making the whitelist available on the website and application level."
"I would love it if they would do some work on the Postgres definition on the back-end."
"Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"The implementation could definitely be better."
"Microsoft should provide more documentation for users so they can self-educate. I would like to see more documentation for advanced security features."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment."
"You should be able to deploy Defender for every subscription without the need to add servers."
"The phishing and spam filters could use some improvement."
"There's room for improvement regarding the time frame for retrieving emails."
"Microsoft Defender for Office 365 should be more proactive."
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
More Microsoft Defender for Office 365 Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 7th in Email Security with 48 reviews while Microsoft Defender for Office 365 is ranked 1st in Email Security with 41 reviews. Check Point Harmony Email & Collaboration is rated 8.8, while Microsoft Defender for Office 365 is rated 8.4. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Microsoft Defender for Office 365 writes "Allows for easy reporting of problems, valuable anti-phishing, and anti-malware support". Check Point Harmony Email & Collaboration is most compared with Avanan, Microsoft Defender for Cloud, Mimecast Email Security, Cisco Secure Email and Barracuda Email Protection, whereas Microsoft Defender for Office 365 is most compared with Proofpoint Email Protection, Mimecast Email Security, Microsoft Exchange Online Protection (EOP), Cisco Secure Email and Fortinet FortiMail. See our Check Point Harmony Email & Collaboration vs. Microsoft Defender for Office 365 report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.