BMC Helix Cloud Security vs Check Point Harmony Email & Collaboration comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BMC Helix Cloud Security and Check Point Harmony Email & Collaboration based on real PeerSpot user reviews.

Find out in this report how the two CWPP (Cloud Workload Protection Platforms) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed BMC Helix Cloud Security vs. Check Point Harmony Email & Collaboration Report (Updated: March 2024).
765,386 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It's also multi-cloud. You can look at several cloud providers: AWS, Azure, or GCP.""The best feature is time to value. With very minimal effort, you are able to have a cohesive view into your security posture on one or multiple cloud accounts, particularly if you are dealing with multicloud. If you have Azure and AWS deployments, you might have multiple subscriptions in Azure and usually multiple accounts in AWS. You may even be doing some GCP work (around Google Cloud Platform). It's very difficult to manage a common set of policies, even less reporting, across multiple subscriptions, accounts, and cloud environments. What BMC Helix Cloud Security does is provide a unified view or single pane of glass as to your baseline. Then, it also facilitates the ability for Level 1 or 2 operations support to take action and report on security vulnerabilities.""The features that I've found most valuable are its container security aspect. I also like its vulnerability management tools.""The cool feature of Helix Cloud Security is that you can do all that — understand and remediate issues — in one dashboard, based on the different policies that are available for security, out-of-the-box.""The most valuable aspects of BMC Helix Cloud Security are its security features and regulatory compliance capabilities.""Role-based security is a valuable feature."

More BMC Helix Cloud Security Pros →

"The anti-phishing feature is the solution's best feature.""The ease of management and intuitive administration are excellent.""Encryption of emails enhances safe communication that ransomware attacks cannot compromise.""Email security has improved since we deployed this platform.""We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP).""I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats.""It is fast and has a very simple, easy integration.""The product is a fairly complete and centralized solution accessible through the Infinity Portal."

More Check Point Harmony Email & Collaboration Pros →

Cons
"The UI could be more user-friendly.""We've had some with issues connectors. The connectors have seemed to have caused a little bit of trouble, perhaps with the APIs trying to scan the environment. The only time I've had to reach out to tech support was for that. It seems it may not have been scanning correctly or I wasn't seeing data within a specific time. But we've set up a couple of connectors in the past couple of weeks and they actually scanned the AWS environment and we had data within about 10 minutes. It's working a lot faster and I think they're making improvements as they go.""BMC Helix Cloud Security has room for improvement in terms of integrating its various features.""I want the role-based security feature to be improved.""Every organization out there doesn't rely on just one control body. They use FISMA control. They may use HIPAA, CIS, PCI, or SOX, then blend them. One of the things that is now in big demand for BMC Helix Cloud Security is content. That's the next journey in its lifespan, making it easier for the community to share and collaborate on content for security controls that can be measured and remediated."

More BMC Helix Cloud Security Cons →

"There is too much functionality, which makes it difficult to use. More guidance for users would be helpful.""Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs.""It's not fully integrated with Google Workspace, and the statistics don't update in real-time.""They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment).""Check Point has to continue refining the intelligence engine to minimize the number of false positives.""Stability has been a pain point. I was going back and forth with my product engineer and project manager for a couple of months. I had the product in a demonstration mode and wasn't satisfied with the results initially. After a few alterations and a few revisions later, it is fine.""The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally.""Some files are not scanned thoroughly due to occasional network failures."

More Check Point Harmony Email & Collaboration Cons →

Pricing and Cost Advice
  • "It is a subscription model with term licensing that is usually yearly. This includes, not only the product, but support and maintenance. It is based on cloud assets. Therefore, if you have 100 cloud assets, those cloud assets are measured based on evaluation or transactions. For example, if I'm evaluating that cloud asset for CIS compliance, PCI compliance, and AWS best practices, that asset gets evaluated three times, as those are three transactions. However, the license model is based on peak asset usage. So, over a year, if you deploy 100, 1000, 500, and then 2000 assets, you will be charged for the 2000 peak of assets managed by Helix Cloud Security."
  • "The pricing is based on an annual subscription, upfront, and it's based on cloud assets. Whether your assets are in Azure and AWS combined, the tool tells you how many assets are being scanned and that's the number used for pricing."
  • More BMC Helix Cloud Security Pricing and Cost Advice →

  • "Having information stolen by a hacker would be more expensive than purchasing a license."
  • "Being able to keep the phishing campaigns out of my company has been ROI for me."
  • "Do a full feature evaluation (interactive) with a support person. That is what I did."
  • "The price is very good, based on what they deliver."
  • "One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
  • "There are absolutely no additional costs to the standard licensing fees. One of the wonderful pieces is that CloudGuard SaaS is all-inclusive in its licensing. There's no a-la-carte functionality. You're getting 100 percent of the product for the licensing that you're paying."
  • "The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
  • "The pricing and licensing are always negotiable."
  • More Check Point Harmony Email & Collaboration Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which CWPP (Cloud Workload Protection Platforms) solutions are best for your needs.
    765,386 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable aspects of BMC Helix Cloud Security are its security features and regulatory compliance capabilities.
    Top Answer:I would rate the price of BMC Helix Cloud Security as a seven in terms of costliness. It is not the cheapest option available, as it tends to be more expensive than some competitors, but it offers… more »
    Top Answer:BMC Helix Cloud Security has room for improvement in terms of integrating its various features. It currently consists of separate point solutions that don't flow together as seamlessly as they could… more »
    Top Answer:I don't even have details of the product's single license purchased by my company.
    Top Answer:I use the solution in my company to secure the users' environment so that there are no phishing attacks. The tool operates as an anti-spam solution for the users in our company. Each and every email… more »
    Top Answer:The product offers good and easy integration capabilities with other products.
    Ranking
    Views
    270
    Comparisons
    208
    Reviews
    2
    Average Words per Review
    453
    Rating
    7.5
    Views
    1,708
    Comparisons
    938
    Reviews
    24
    Average Words per Review
    494
    Rating
    8.7
    Comparisons
    Also Known As
    TrueSight Cloud Security, SecOps Policy Service
    Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
    Learn More
    Overview

    BMC Helix Cloud Security is a SaaS tool designed to help organizations reduce compliance and security lapses resulting from next-gen container and cloud technologies. The solution offers a fully transparent, user-friendly view of all compliance data gathered throughout container resources, cloud, and data centers. BMC Helix Cloud Security can be used to insert compliance inquiries precisely in DevOps workflows for immediate assessment in relation to critical “go, no-go” conclusions throughout  the entire workflow. 

    BMC Helix Cloud Security offers enterprise organizations a unique compliance solution with robust functionalities to concentrate on numerous use processes that may interfere with digital transfigurations, such as:

    • Discovering resources, accounts, and configurations that are non-compliant with standard regulations or the organization's own policies and protocols.

    • Multi-source cloud compliance for PaaS service infrastructures, networks, storage, and containers.

    • DevOps workflows with melded security and compliance for WebApp application blueprints and weaknesses, and all application libraries.

    • Out-of-box capabilities for immediate compliance integration for DevOps workflows.

    BMC Helix Cloud Security is SaaS, which makes it a very flexible solution. It is able to integrate seamlessly with many of today’s enterprises’ demands. BMC Helix Cloud Security can easily perform as a policy-as-code (YAML) based protocol language, open RESTful APIs, or by seamlessly compiling extensible data connectors.

    Many of today's enterprise organizations must comply with numerous policies and regulations to maintain effective operations. BMC Helix Cloud Security ensures an enterprise organization is able to satisfy regulatory standards such as Sarbanes-Oxley (SOX) Act, Defense Information System Agency (DISA), or any other stringent government or internal organizational compliance standards. The solution has a comprehensive compliance policy that utilizes mode-two capabilities and will ensure that an enterprise organization will greatly minimize or even negate the threat of ransomware and data breaches throughout its network. 

    BMC Helix Cloud Security will also see that container and container hosts are configured correctly and will then regularly audit to ensure compliance at the three important levels of compliance - images, daemon configuration, and host configuration.

    BMC Helix Cloud Security is designed to identify vulnerabilities by dissecting and thoroughly investigating compliance data for container and cloud resources and delivering the outcomes through a friendly, easy-to-understand dashboard. The solution can also provide support for unique or custom sources, provided that data is in a JavaScript Object Notation (JSON) format.

    BMC Helix Cloud security is also able to help discover and minimize vulnerabilities created by new services, objects, and resources instituted by containers and public clouds. These can sometimes be forgotten, creating a tremendous risk to an organization. BMC Helix Cloud Security will ensure these new services will be carefully and continually monitored to ensure industry and government standards and regulations are not being compromised. The solution is continually dissecting data and then will deliver outcomes in a dynamic, easy-to-understand dashboard.

    BMC Helix Cloud Security offers a user-friendly, robust, complete compliance strategy to ensure organizations maintain the highest levels of productivity and profitability while negating the risk of any type of compliance vulnerabilities.

    Check Point Harmony Email and Office is a cloud-based software offering complete protection to stop malware attacks through emails. The software is designed to provide protection for organizations using Office 365, G Suite, Google Workspace, and all other collaboration and file-sharing apps. Access permissions can be granted and custom policies can be defined for any user of choice.

    Check Point Harmony Email and Office identifies and blocks advanced malware, phishing, and ransomware attacks in real time before they reach the user’s inbox. In turn, this also helps protect sensitive business data from breaches. Harmony Email and Office was the first solution to implement machine learning, API, and AI for email security, and will ultimately prevent any attempts at account takeover via agentless multi-factor authentication.

    What is Complete Protection?

    Check Point Harmony Email and Office offers a superior catch rate for collaboration apps and cloud email with their API-based solution that detects attacks that other solutions miss, including account takeover, supply chain attacks, ransomware, and BEC. The complete protection offers:

    • Malware Protection - Recognized by NSS Labs as “most effective in breach prevention,” the solution leverages technologies to bring clean files to users within 1.5 seconds. In addition, enterprises can be safer as the solution prevents malicious messages and files from reaching the user’s inbox.
    • Data Leakage Protection - Any confidential or sensitive information will be marked and have a classified suffix added to the end of the message or file to help keep those materials safe. Those files are encrypted, and the user will be alerted to any attempted breach of those messages.
    • Phishing Protection - Before advanced phishing attacks reach the end user, Harmony Email and Office detects and blocks them, including outbound, inbound, and internal communications.
    • Account Takeover Protection - After a user connects their cloud app, the solution captures the user's history and creates a profile and a custom threat profile. In the event of a suspected account takeover, threat intelligence is leveraged through millions of Check Point-secured gateways and endpoints and is blocked.

    Reviews from Real Users

    Check Point Harmony Email and Office offers a revolutionary prevention solution to stop malware attacks through emails. Users particularly like its visibility and the ability to protect sensitive business data.

    David U., a CISO at IMC companies, notes, "It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."

    Mantu S., a senior technology architect at Incedo Inc., writes, "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."

    Sample Customers
    NHS, Vodafone, Kansas City Life, SKY Italia, Cybera
    Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm22%
    Computer Software Company16%
    Energy/Utilities Company7%
    Real Estate/Law Firm6%
    REVIEWERS
    Energy/Utilities Company18%
    Computer Software Company15%
    Security Firm10%
    Healthcare Company8%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Manufacturing Company8%
    Financial Services Firm8%
    Real Estate/Law Firm6%
    Company Size
    VISITORS READING REVIEWS
    Small Business21%
    Midsize Enterprise8%
    Large Enterprise70%
    REVIEWERS
    Small Business51%
    Midsize Enterprise17%
    Large Enterprise32%
    VISITORS READING REVIEWS
    Small Business37%
    Midsize Enterprise17%
    Large Enterprise46%
    Buyer's Guide
    BMC Helix Cloud Security vs. Check Point Harmony Email & Collaboration
    March 2024
    Find out what your peers are saying about BMC Helix Cloud Security vs. Check Point Harmony Email & Collaboration and other solutions. Updated: March 2024.
    765,386 professionals have used our research since 2012.

    BMC Helix Cloud Security is ranked 24th in CWPP (Cloud Workload Protection Platforms) with 5 reviews while Check Point Harmony Email & Collaboration is ranked 9th in CWPP (Cloud Workload Protection Platforms) with 47 reviews. BMC Helix Cloud Security is rated 8.0, while Check Point Harmony Email & Collaboration is rated 8.8. The top reviewer of BMC Helix Cloud Security writes "A highly scalable and straightforward solution with a knowledgeable support team". On the other hand, the top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". BMC Helix Cloud Security is most compared with Red Hat Advanced Cluster Security for Kubernetes, CloudBolt, Prisma Cloud by Palo Alto Networks, Zscaler Internet Access and VMware Aria Cost powered by CloudHealth, whereas Check Point Harmony Email & Collaboration is most compared with Microsoft Defender for Office 365, Avanan, Microsoft Defender for Cloud, Mimecast Email Security and Cisco Secure Email. See our BMC Helix Cloud Security vs. Check Point Harmony Email & Collaboration report.

    See our list of best CWPP (Cloud Workload Protection Platforms) vendors.

    We monitor all CWPP (Cloud Workload Protection Platforms) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.