No more typing reviews! Try our Samantha, our new voice AI agent.

Abnormal Security vs Check Point Email Security (formerly Harmony Email & Collaboration) comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 24, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Email Security
21st
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Secure Web Gateways (SWG) (15th), Data Loss Prevention (DLP) (20th), Cloud Access Security Brokers (CASB) (11th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (13th), Access Management (13th), Bot Management (3rd), ZTNA as a Service (9th), ZTNA (4th), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Abnormal Security
Ranking in Email Security
6th
Average Rating
9.4
Reviews Sentiment
7.5
Number of Reviews
11
Ranking in other categories
Secure Email Gateway (SEG) (4th)
Check Point Email Security ...
Ranking in Email Security
3rd
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
96
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (7th)
 

Mindshare comparison

As of April 2026, in the Email Security category, the mindshare of Cloudflare One is 1.5%, down from 1.7% compared to the previous year. The mindshare of Abnormal Security is 4.8%, down from 7.4% compared to the previous year. The mindshare of Check Point Email Security (formerly Harmony Email & Collaboration) is 4.7%, down from 4.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Mindshare Distribution
ProductMindshare (%)
Check Point Harmony Email & Collaboration4.7%
Abnormal Security4.8%
Cloudflare One1.5%
Other89.0%
Email Security
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
reviewer2251509 - PeerSpot reviewer
Senior Director, Information Technology at a insurance company with 51-200 employees
AI has helped classify threat types more accurately but product ownership can improve
Ease of use is important, and Abnormal Security's responsiveness and ability to deliver solutions when issues arise are crucial. However, there is always room for improvement, as achieving a perfect 10 means there is no more room for enhancement. For Abnormal Security, it's about leveraging AI even more, which they are already working on in their roadmap.
Nasseer Qureshi - PeerSpot reviewer
Pre Sales Consultant at Redington Group
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloudflare DDoS is better than its competitors for its security, deployment, and scalability."
"For Cloudflare Access, I am using the free plan...The most valuable feature is their protection."
"The best feature is rate limiting. If I'm expecting 500 visits per hour, Cloudflare will limit the requests if I suddenly get 50,000."
"What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection."
"Cloudflare Zero Trust Platform removes the risk of exposing the applications to the public."
"The simplicity of the solution is its valuable features as almost no effort was needed to learn the configurations. It is also one of the cheapest firewalls available in this category."
"Cloudflare is simple to use."
"Enables me to work from two locations."
"It protects us from being business email compromised, which is invaluable for maintaining our security."
"Abnormal Security's AI capabilities are what we like most, as they can categorize and classify the emails, and based on the context of the email, understand if it's a graymail, a bulk mail, or a phish."
"I have never encountered any stability issues with Abnormal."
"I like Abnormal's threat protection with auto-remediation, but I also love its abuse mailbox feature, which automatically responds to the end user. That feature has a super-valuable security component and helps improve the user experience."
"I would recommend Abnormal Security."
"It does some really cool stuff that other tools aren't doing. We found it to be really effective, and the AI/ML functionality is really what differentiates them."
"The features that appeal to me most are the combination of auto-remediation and Detection 360."
"Ease of use is undoubtedly one of the most valuable features of Abnormal Security."
"Getting reports and finding threats in the console is easy."
"This product enhances faster and more secure sharing of information among colleagues from different departments."
"Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size."
"As Check Point is a leading technology in the industry, it provides maximum protection against email phishing attacks and provides the identity of users and visibility over shadow IT applications."
"It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
"It's very easy to use, and the onboarding process is straightforward."
"The advanced phishing protection is proactive in catching threats before users even see them; it does not just block obvious spam, it can spot subtle impersonation attempts and suspicious links that appear legitimate at first glance."
"For us, I prefer Check Point before Palo Alto and before other brands because Check Point is most effective in attack mitigation and attack detection."
 

Cons

"I would like them to include a VPN feature to provide a secure connection to the data center."
"Cloudflare One is not very powerful, but for what we require, it is basic and sufficient."
"They don't have a person to provide support for customers using the solution under their free plan."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"Feedback could be enhanced."
"The response time for support must be reduced."
"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"Operating and tuning the product is difficult."
"For Abnormal Security as a product, I would say probably somewhere around a seven, as there are some other areas where they can improve to achieve a higher rating."
"There could be room for improvement in enhancing integration with other cybersecurity tools."
"There could be more selectable options and more granular selections available."
"When we're working on something as engineers, and we find an idea or a method of doing something that would be greatly improved by doing it another way, there should be an ability for me to click the ideas button, type in an idea that I have, and submit it to a product review team or developers to have them think through the process a little bit more."
"Abnormal should add more automatic reports. I have an open request to our account team for more notification and report types that can be sent automatically. For example, they have an awesome report that gets sent weekly, and I also want them monthly, so I don't need to do so much adding up when my director wants numbers over time."
"I would like to have the ability to customize the auto-remediation feature."
"One feature I'd love to see is outbound scanning."
"The biggest pain point for us is the lack of support for on-premise email systems."
"The implementation could definitely be better. We had great support from Check Point, but there were some "got-you" moments where we got surprises as we were setting it up."
"The documentation is a little unintuitive, and I make an additional effort for the first deployment."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"We have only encountered some false positives that required us to whitelist certain third-party domains, mostly due to their poor email configuration preventing DMARC or SPF alerts."
"There is a need for improvement in handling business email compromise."
"I have learned enough to make the product stable. However, the stability has some challenges."
"The next release should focus more on email categorization and provide options for unlocking blocked safe emails."
"The reporting could be improved."
 

Pricing and Cost Advice

"The prices are slightly expensive."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"Cloudflare Zero Trust Platform's pricing is good."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The solution's pricing lacks transparency."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The solution is not that expensive."
"Abnormal Security, on the other hand, provides the same level of functionality for just over $60,000 – that's half the price!"
"The pricing appears fair, and they demonstrate a genuine willingness to work with us on it."
"Overall, we'd certainly prefer lower pricing, but Abnormal Security doesn't seem unreasonable compared to similar offerings in the market."
"The license is based on the user count, so the number of users that have an email address in the organization."
"The price is very good, based on what they deliver."
"Having information stolen by a hacker would be more expensive than purchasing a license."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"The pricing is expensive."
"This is a very good product if you are on the cloud, but the price is a little more expensive."
"Being able to keep the phishing campaigns out of my company has been ROI for me."
"The product is expensive."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
890,027 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
21%
Comms Service Provider
10%
Financial Services Firm
8%
Manufacturing Company
6%
Computer Software Company
10%
Financial Services Firm
10%
Manufacturing Company
8%
Government
6%
Computer Software Company
12%
Financial Services Firm
9%
Manufacturing Company
7%
Construction Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise11
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise2
Large Enterprise8
By reviewers
Company SizeCount
Small Business63
Midsize Enterprise27
Large Enterprise30
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What is your experience regarding pricing and costs for Abnormal Security?
I find the pricing to be favorable, but I did not disclose the exact cost.
What needs improvement with Abnormal Security?
Ease of use is important, and Abnormal Security's responsiveness and ability to deliver solutions when issues arise a...
What is your primary use case for Abnormal Security?
The main use case for Abnormal Security is as a spam filter and for mail hygiene. This use case is for the finance in...
What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
I am not the person to say what cost Check Point has for their products. However, for partners like us, if we could g...
What is your primary use case for Check Point Harmony Email & Office?
We are working with Check Point Harmony Email & Collaboration not only for Harmony, but also for their SaaS solut...
What needs improvement with Check Point Harmony Email & Office?
Check Point must develop one mobile app for iPhone users, Android phone users, and Windows phone users or at least fo...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
No data available
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
 

Overview

 

Sample Customers

23andMe
Foot Lcoker, Xerox, Liberty Mutual, Mattel, Boston Scientific
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Find out what your peers are saying about Abnormal Security vs. Check Point Email Security (formerly Harmony Email & Collaboration) and other solutions. Updated: April 2026.
890,027 professionals have used our research since 2012.