We compared Check Point Harmony Email and Collaboration and Cisco Secure Email across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Features: Check Point Harmony Email and Collaboration offers exceptional integration through APIs, advanced protection against data leaks, and the ability to detect complex social engineering attacks. Cisco Secure Email offers advanced protection against phishing attacks, reputation-based filtering, and robust tracking functionalities.
Room for Improvement: Check Point Harmony Email and Collaboration could improve integration with Exchange and other SaaS clouds while enhancing its threat clouds and AI engines. Cisco Secure Email should improve global malicious email defense, data loss prevention, and integration with third-party solutions.
Service and Support: Check Point has earned mixed reviews for its customer service. Some customers appreciate the technical support provided, while others are dissatisfied with response times. Cisco support is generally considered knowledgeable and helpful, but a few users reported slow response times and difficulty navigating the support process.
Ease of Deployment: Check Point Harmony Email is considered relatively easy to implement. Cisco Secure Email is generally straightforward and seamless to set up. It provides a modular and adaptable environment, but new users may need training.
Pricing: Check Point Harmony Email and Collaboration is a cost-effective option. It offers competitive prices and is suitable for small to medium-sized organizations. Opinions on the pricing of Cisco Secure Email are mixed. Some find it expensive but worth the investment, while others find it reasonably priced and competitive with other vendors.
ROI: Check Point Harmony Email and Collaboration delivers superior return on investment compared to other options. Cisco Secure Email's return on investment is influenced by factors such as use case, organization size, and industry.
Comparison Results: Check Point Harmony Email and Collaboration is an effective solution for blocking malicious attachments and detecting social engineering attacks. However, there is room for improvement in terms of integration and support, reducing false positives, and enhancing response times. Cisco Secure Email is highly regarded for its intelligence threat detection, reputation filtering, and robust tracking abilities. The solution’s areas for improvement include data loss prevention and third-party integration.
"Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features."
"It also gives me good visibility because, with Defender, I'm using a Microsoft product to defend Microsoft products. The integration was really seamless and I have wide visibility because it picks up almost everything. Literally, I can see almost every activity that happens, from the e-mail to the workstation itself."
"Our customers are satisfied with Defender for 365 because Microsoft products are easy to use and customize to meet the client's needs. Everything is in one place, so we can adjust policies as needed for phishing, DLP, ATP, or any other security features that our clients want to apply."
"The most valuable feature is protection against malicious links, fishing, and impersonation. You can train people to be aware of these threats, but they're not always careful. When they're using their phones between meetings, they click on a link, and it's game over."
"Microsoft Defender for Office 365 helps people to work remotely. It is a secure solution. We don't need to use our company's computers or get VPN connections to the networks. I can control how they share screens and what they send to the devices. It keeps our organizations confidential and sensitive information safe."
"Microsoft Defender for Office 365 is a stable solution."
"There are several features that I consider valuable."
"The benefit that stands out to me is the ability for multiple individuals to collaborate simultaneously within the same document. Additionally, there is the option to save the document directly in the integrated OneDrive or SharePoint."
"It seems quite scalable. We don't anticipate any scaling issues. We have it deployed in the cloud."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"This product enhances faster and more secure sharing of information among colleagues from different departments."
"It helped us to bring security compliance and ensure system robustness throughout."
"The product is reliable and sturdy."
"I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats."
"Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble."
"The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user."
"The solution is very configurable. It has enabled us to configure some specific filters to stop emails that general configurations didn't stop. It's a powerful solution. It can analyze a lot of emails simultaneously, with no problems of capacity or system load."
"The security features are valuable."
"This solution provides some benefits, like comfortable access to TAC support. You get prompt support when working directly with Cisco."
"The tool has a DLP solution which we can implement. Its database is updated regularly."
"ATP has been the most valuable in improving our email security posture."
"It is doing its work. It is doing what it was actually designed to do. It has ensured we don't have business email compromises, and it has also ensured that our brand Galaxy is unique all year round."
"The malicious URL scanning, as well as the anti-malware features, have been really useful for us in our environment."
"Spam controls are excellent because they are a powerful feature that operates almost effortlessly."
"Microsoft security solutions work as expected. They are constantly updating the solutions to make them better. At the same time, the changes can impact a customer's environment, and we need to adjust settings. Sometimes we aren't aware of the changes, and nothing is pushed from the backend automatically."
"We noticed that from time to time, Microsoft's stability does have problems. Sometimes the service goes up and down. Sometimes they change without prior notice."
"About eight months ago, we started to measure the quantity of phishing and spam that we have been receiving, and it has been increasing a lot. That means that protection for our email is not as good as we were expecting."
"The company should focus on adding threats that the solution is currently unable to detect."
"The phishing and spam filters could use some improvement."
"The visibility for the weaknesses in the system and unauthorized access can be improved."
"One area for improvement is support, in terms of being able to reach them and, especially, technical support for configuration."
"One area for improvement is integration. For example, when it comes to external SaaS platforms, we were not able to get a lot of information on integrations with such apps for security and authentication."
"The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported. If they were to add report exporting capabilities on each of metric objects on the dashboard, that would be awesome."
"Stability has been a pain point. I was going back and forth with my product engineer and project manager for a couple of months. I had the product in a demonstration mode and wasn't satisfied with the results initially. After a few alterations and a few revisions later, it is fine."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"There are sometimes leakages of viruses when the system is experiencing network failures."
"Some undefined threats can bypass the security system when there is a networking failure in the organization."
"There is always room for improvement and growth."
"A signature-based filter could improve the solution's AI model for spam email."
"The hardware is not up to the mark. Two to three times a year we have complete downtime."
"I would rate the stability a six out of ten. We had multiple issues with the stability."
"Many smaller businesses opt for more cost-effective solutions, such as Gmail or Hotmail accounts, instead of investing in Cisco Secure Email, given its higher cost."
"In future releases, I would like to see two main improvements come to mind. First, the current solution requires maintaining two separate operating systems for FTD, which can be cumbersome. I'd love to see a single operating system for the FTD box."
"There are some concerns in the way the architecture is set up, making it an area where improvements are required."
"The UI is definitely one area of improvement because it doesn't match other interfaces and the navigation can be a little clunky."
"Cisco Secure Email can be improved from the administrator's point of view. Usually, you have to work with different areas, and they can try to make it easy for the administrator to use different functions."
"We have Microsoft and we have the E5 licenses, they have more EDR responses on certain emails. That's something that Cisco ESA on the cloud doesn't have. They don't do anything about MITRE attacks. They only detect if there is a malicious email or a threat and they remove it."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 7th in Email Security with 49 reviews while Cisco Secure Email is ranked 2nd in Email Security with 56 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Cisco Secure Email is rated 8.4. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Cisco Secure Email writes "Has effortless spam control, improves security posture, and frees up our IT department's time". Check Point Harmony Email & Collaboration is most compared with Avanan, Microsoft Defender for Cloud, Mimecast Email Security, Barracuda Email Protection and Fortinet FortiMail Cloud, whereas Cisco Secure Email is most compared with Trellix Collaboration Security, Fortinet FortiMail, Microsoft Exchange Online Protection (EOP), Proofpoint Email Protection and Symantec Messaging Gateway. See our Check Point Harmony Email & Collaboration vs. Cisco Secure Email report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.