No more typing reviews! Try our Samantha, our new voice AI agent.

BigID Next vs Check Point Email Security (formerly Harmony Email & Collaboration) comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 24, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Data Loss Prevention (DLP)
20th
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Email Security (20th), Secure Web Gateways (SWG) (13th), Cloud Access Security Brokers (CASB) (12th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (12th), Access Management (11th), Bot Management (3rd), ZTNA as a Service (9th), ZTNA (4th), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
BigID Next
Ranking in Data Loss Prevention (DLP)
8th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Data Governance (4th), Data Privacy Management Software (1st), Data Security Posture Management (DSPM) (4th), AI Data Analysis (3rd)
Check Point Email Security ...
Ranking in Data Loss Prevention (DLP)
3rd
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
96
Ranking in other categories
Email Security (3rd), Cloud Workload Protection Platforms (CWPP) (6th)
 

Mindshare comparison

As of May 2026, in the Data Loss Prevention (DLP) category, the mindshare of Cloudflare One is 2.1%, up from 1.4% compared to the previous year. The mindshare of BigID Next is 2.7%, down from 4.4% compared to the previous year. The mindshare of Check Point Email Security (formerly Harmony Email & Collaboration) is 1.5%, down from 1.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Loss Prevention (DLP) Mindshare Distribution
ProductMindshare (%)
Check Point Email Security (formerly Harmony Email & Collaboration)1.5%
BigID Next2.7%
Cloudflare One2.1%
Other93.7%
Data Loss Prevention (DLP)
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
Aniruddha Nath - PeerSpot reviewer
Senior Security Consultant at a consultancy with 10,001+ employees
Data discovery has transformed compliance workflows and automation now speeds up requests and remediation
The best feature that BigID offers is data discovery and classification, which is the most powerful engine. It allows connecting to many different data sources, ranging from cloud to on-premises to structured to unstructured data. If there is no connector available, you can build your own classifiers as well. Regarding the custom classifier option, you can build custom classifiers using regular expressions, and I have done that if you know how to create regular expressions. Custom connectors are something you create to connect to a database where the connector is not available. BigID has positively impacted my organization as it's a very powerful tool, especially with the increasing regulatory compliances for different countries such as GDPR, CCPA, and India's recent DPDPA act. Having these tools in place greatly helps organizations avoid any penal charges for not being compliant with the regulatory compliances. For example, regarding compliance or reduced risks for my clients, the DSAR process I was talking about allows organizations to respond quickly to user data deletion requests under GDPR law, which traditionally has a 30-day or 60-day timeline. In larger organizations, when the number of requests is high, it becomes tedious. However, using DSAR automation with BigID, it's almost instantaneous; instead of 30 days, you can respond in just one day to what users have requested.
Nasseer Qureshi - PeerSpot reviewer
Pre Sales Consultant at Redington Group
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloudflare Zero Trust Platform removes the risk of exposing the applications to the public."
"Cloudflare, in my opinion, was easy to implement."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"This solution is easy to understand and easy to configure."
"Cloudflare DDoS mitigates DDoS attacks."
"Cloudflare Access is a stable solution."
"It will take the blow rather than our applications should an attack occur."
"The solution has different options that can be used to differentiate DDoS attacks."
"BigID is more advanced than Microsoft Purview when it comes to machine learning and AI development tools."
"I like BigID's in-depth discovery and scanning capabilities, especially for unstructured data. This feature is a standout compared to competitors. The tool's data classification capabilities are impressive. It offers custom classifiers and a blend of regular exploration and artificial intelligence, making it a next-generation solution. This enhances data security, and its security posture management is straightforward and user-friendly."
"BigID's scanning feature is its most valuable component."
"BigID has one of the best technical support teams."
"BigID offers different scan types for data discovery. The most powerful one is the full scan, which scans both data and metadata. However, the metadata scan is faster in comparison."
"The features that I have found most valuable are the user experience, the credentialing, and that BigID is user friendly. Additionally, you can deploy to several other Microsoft platforms and you can use it for other things, like a bigger element or a report."
"The most valuable feature of BigID is its large number of classifiers, which allow us to scan for specific data such as SSN numbers."
"The features that I have found most valuable are the user experience, the credentialing, and that BigID is user friendly."
"It is fast and quite effective in terms of preventing any security incidents."
"The most valuable feature is spam detection and phishing site prevention, which Microsoft couldn't catch, yet Check Point does."
"As a comprehensive solution, Check Point offers a very granular and best-in-class experience."
"We can say that with Check Point Cloud Guard SaaS, we have improved our security to the next level."
"Being able to keep the phishing campaigns out of my company has been ROI for me."
"The ease of management and intuitive administration are excellent."
"The solution has a very effective anti-phishing algorithm that detects a significantly higher number of phishing emails compared to the default Microsoft solution."
"The threat management database provides consistent updates."
 

Cons

"The onboarding process can be improved a little bit."
"From a logging perspective, it is still a bit difficult to see exactly what users are being blocked with the current views."
"Our subscription plan for the solution has a limitation of bot signatures."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"Cloudflare One is not very powerful, but for what we require, it is basic and sufficient."
"I would like them to include a VPN feature to provide a secure connection to the data center."
"They don't have a person to provide support for customers using the solution under their free plan."
"Feedback could be enhanced. While I work efficiently with Clover as a partner in Mexico City, sometimes the information and requests are easier to manage with more concrete solutions."
"Improvement could be made in data consent management and data privacy impact assessment."
"One concern I have with BigID is regarding certain scans, like the multi-scan. The issue is that we can stop and retrieve these scans, but once they start, they go through an enumeration process."
"More classifications about different states are needed"
"The tool currently lacks security features."
"There are some shortcomings when it comes to Calvirus authentication, which is not yet supported by BigID."
"In terms of what could be improved, when you're looking in a BigID file, you cannot really get the whole file. You have to export it to download it to another platform that allows you to completely view it, or run a program. That was one of the things that was really a disappointing point for me. Not to be able to view everything. There's a lot more data, but you can't get it all at once."
"One improvement I would suggest is addressing the intermittent failures of BigID scans, as there are times when some errors occur."
"BigID is expensive. I prefer McAfee."
"There is too much functionality, which makes it difficult to use. More guidance for users would be helpful."
"Check Point has to continue refining the intelligence engine to minimize the number of false positives."
"The reporting could be improved."
"The documentation is a little unintuitive, and I make an additional effort for the first deployment."
"The documentation is a little unintuitive, and I make an additional effort for the first deployment."
"There is always room for improvement and growth."
"if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."
"Navigating between quarantine, threat logs, and policy settings sometimes feels clunky, requiring too many clicks to get to commonly used features."
 

Pricing and Cost Advice

"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"Cloudflare Zero Trust Platform's pricing is good."
"The prices are slightly expensive."
"The solution is not that expensive."
"The solution's pricing lacks transparency."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The pricing depends. If you have thousands of data sources to connect and manage, and you struggled with an MDM package in the past, you'll find BigID valuable and even cheap. But if you're a small business, it's probably not the right tool for you."
"The product is expensive, but so are all competitor tools"
"I think that BigID's pricing is very reasonable."
"The solution is not licensed per user but rather based on capacity. For instance, organizations with large amounts of data, such as 50 GB or more, are the ones that typically qualify for BigID."
"The solution is expensive."
"As we are a non-profit organization, we got the tool with a good offer. On a yearly basis, we pay 10,000 Euro for 500 users, which also includes the technical support part."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"The pricing is in the middle. Check Point's pricing is not the highest in the competitive market."
"The pricing is competitive."
"Being able to keep the phishing campaigns out of my company has been ROI for me."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
"The product is expensive."
"This is a very good product if you are on the cloud, but the price is a little more expensive."
report
Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
20%
Comms Service Provider
11%
Financial Services Firm
9%
Manufacturing Company
6%
Financial Services Firm
20%
Manufacturing Company
8%
Insurance Company
8%
Comms Service Provider
6%
Computer Software Company
12%
Financial Services Firm
9%
Manufacturing Company
7%
Construction Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise1
Large Enterprise12
By reviewers
Company SizeCount
Small Business5
Large Enterprise11
By reviewers
Company SizeCount
Small Business63
Midsize Enterprise27
Large Enterprise30
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What do you like most about BigID?
I like BigID's in-depth discovery and scanning capabilities, especially for unstructured data. This feature is a stan...
What needs improvement with BigID?
One improvement I would suggest is addressing the intermittent failures of BigID scans, as there are times when some ...
What is your primary use case for BigID?
BigID's main use case is connecting to various data sources to perform the data discovery process, classify the data ...
What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
I am not the person to say what cost Check Point has for their products. However, for partners like us, if we could g...
What is your primary use case for Check Point Harmony Email & Office?
We are working with Check Point Harmony Email & Collaboration not only for Harmony, but also for their SaaS solut...
What needs improvement with Check Point Harmony Email & Office?
Check Point must develop one mobile app for iPhone users, Android phone users, and Windows phone users or at least fo...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
No data available
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
 

Overview

 

Sample Customers

23andMe
Home Depot, Grant Thornton LLP, Cimpress, Fidelity Investments
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Find out what your peers are saying about BigID Next vs. Check Point Email Security (formerly Harmony Email & Collaboration) and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.