Check Point Anti-Spam and Email Security Software Blade vs Trellix Collaboration Security comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Anti-Spam and Email Security Software Blade and Trellix Collaboration Security based on real PeerSpot user reviews.

Find out in this report how the two Email Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
768,740 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The initial setup is straightforward. You just add the license, click it, and then you can set up the rules. It is quite simple.""The product is not resource-intensive.""Defender for Office 365 has helped eliminate having to look at multiple dashboards and that is the aspect I like most about it. It is simpler, effective, and convenient. The users like the process efficiency.""It also gives me good visibility because, with Defender, I'm using a Microsoft product to defend Microsoft products. The integration was really seamless and I have wide visibility because it picks up almost everything. Literally, I can see almost every activity that happens, from the e-mail to the workstation itself.""Microsoft Defender for Office 365 is a stable solution.""Defender helps us prioritize threats across our organization.""Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features.""The initial setup was easy."

More Microsoft Defender for Office 365 Pros →

"Check Point Anti-Spam and Email Security Software Blade provides an extra level of security against threats and malware along with 2FA support for multiple platform collaboration and integrations in a single click.""Anti-spam and malware phishing are valuable features of the solution.""Check Point Anti-Spam and Email Security Software Blade is quite reliable...It is a very stable solution.""It is a highly cost-effective solution for all kinds of small, marginal, and medium enterprises.""The solution can be monitored on a single dashboard with actionable insights and reporting.""Check Point offers us flexibility when it comes to customizing the configurations that we want to manage, thus allowing us to meet the specific needs of our company.""Mail sanitisation features are second to none.""DLP features can help prevent sensitive information from being leaked via email."

More Check Point Anti-Spam and Email Security Software Blade Pros →

"I like FireEye's filtering, spam digests, and its advanced threat review of email flow. It also has a broad range of riskware rules you can deploy.""FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks.""FireEye is good for malware depicting and security.""What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use.""The solution's most valuable feature is its simplicity. It's very user-friendly.""The auto-remediation feature is valuable.""FireEye Email Security is easy to use.""The initial setup is simple."

More Trellix Collaboration Security Pros →

Cons
"They have moved features from one console to another. Things have been moved around in the interface and it takes me time to find where certain features are.""This product's effectiveness could be improved, in terms of detecting unwanted spam or even malware between the emails, compared to other products.""There's room for improvement regarding the time frame for retrieving emails.""I'd like some additional features any product can give me to protect our environment in a better way.""Too many false positives and lacks an accurate capability to detect malicious SharePoint sites.""One area for improvement is integration. For example, when it comes to external SaaS platforms, we were not able to get a lot of information on integrations with such apps for security and authentication.""The company should focus on adding threats that the solution is currently unable to detect.""There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."

More Microsoft Defender for Office 365 Cons →

"The pattern used to filter emails could be improved""I can say that the solution's price level is a problematic area that needs to be considered for improvement.""The high-end protection of email servers from any advanced foreign agents and malware is not 100% there currently.""The technical team could improve services by ensuring when there are changes they inform enterprise users of effective upgrades.""The UX/UI could be more friendly.""Installation time could be improved as it takes too long to install.""If you face any configuration problems, Check Point is the only solution.""I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal."

More Check Point Anti-Spam and Email Security Software Blade Cons →

"Sometimes especially zero-day spam emails can be passed to the user's inbox.""The custom tailoring is limited.""The solution needs better support.""FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA.""I would like to see this solution become more flexible.""I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed.""The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier.""The solution must provide features to scan QR codes for threats."

More Trellix Collaboration Security Cons →

Pricing and Cost Advice
  • "It's a user-base subscription."
  • "From the pricing point of view, like any other product in the market, there is scope for negotiation."
  • "Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
  • "For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
  • "Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
  • "Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
  • "The solution saves money so we have seen a return on investment."
  • "Defender for 365 comes in various plans and licenses, along with other Microsoft security solutions. Purchasing this kind of package or security bundle gives good value for money, and that's what I recommend."
  • More Microsoft Defender for Office 365 Pricing and Cost Advice →

  • "Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
  • "The cost is competitive with other security products on the market."
  • "This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
  • "Reasonably priced solution."
  • "For licensing, my company makes yearly payments, which is expensive."
  • "I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
  • More Check Point Anti-Spam and Email Security Software Blade Pricing and Cost Advice →

  • "The solution requires a license to be purchased for every user."
  • "The licensing is on a yearly basis."
  • "The cost is very high."
  • More Trellix Collaboration Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Email Security solutions are best for your needs.
    768,740 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various… more »
    Top Answer:The product must provide better malware detection. The detection algorithms don't perform the way I hope they would.
    Top Answer:Installation time could be improved as it takes too long to install. With the software footprint, it should be taking… more »
    Top Answer:The solution must provide features to scan QR codes for threats. Nowadays, threats are embedded inside QR codes.
    Top Answer:The solution is used for email security. It streamlines our team’s collaboration and file-sharing efforts.
    Comparisons
    Also Known As
    MS Defender for Office 365
    FireEye Email Security
    Learn More
    Overview

    Microsoft Defender for Office 365 is a comprehensive security solution designed to protect organizations against advanced threats in their email, collaboration, and productivity environments. It combines the power of Microsoft's threat intelligence, machine learning, and behavioral analytics to provide real-time protection against phishing, malware, ransomware, and other malicious attacks.

    With Microsoft Defender for Office 365, organizations can safeguard their email communication by detecting and blocking malicious links, attachments, and unsafe email content. It employs advanced anti-phishing capabilities to identify and prevent sophisticated phishing attacks that attempt to steal sensitive information or compromise user credentials.

    This solution also offers robust protection against malware and ransomware. It leverages machine learning algorithms to analyze email attachments and URLs in real-time, identifying and blocking malicious content before it reaches users' inboxes. Additionally, it provides advanced threat-hunting capabilities, allowing security teams to proactively investigate and respond to potential threats.

    Microsoft Defender for Office 365 goes beyond email protection and extends its security features to other collaboration tools like SharePoint, OneDrive, and Teams. It scans files and documents stored in these platforms, ensuring that they are free from malware and other malicious content. It also provides visibility into user activities, helping organizations detect and mitigate insider threats.

    Furthermore, this solution offers rich reporting and analytics capabilities, providing organizations with insights into their security posture and threat landscape. It enables security administrators to monitor and manage security incidents, track trends, and take proactive measures to enhance their overall security posture.

    Check Point Anti-Spam and Email Security Software Blade is a comprehensive solution designed to protect organizations from the growing threat of spam and email-based attacks. With advanced threat prevention capabilities, it ensures that businesses can effectively manage their email security and prevent the infiltration of malicious content.

    This software blade offers a multi-layered approach to email security, combining anti-spam, anti-virus, and anti-phishing technologies to provide robust protection against a wide range of threats. It employs advanced machine learning algorithms to continuously analyze and identify new spam and phishing techniques, ensuring that organizations stay one step ahead of cybercriminals.

    The Anti-Spam and Email Security Software Blade also includes advanced content filtering capabilities, allowing organizations to define and enforce email policies based on specific criteria. This ensures that sensitive information is protected and that employees are not exposed to potentially harmful content.

    Furthermore, this software blade integrates seamlessly with existing email infrastructure, making deployment and management simple and efficient. It supports all major email platforms, including Microsoft Exchange and Office 365, ensuring compatibility with a wide range of environments.

    With real-time monitoring and reporting capabilities, organizations can gain valuable insights into their email security posture. This enables them to identify potential vulnerabilities and take proactive measures to mitigate risks.

    Trellix Collaboration Security is a comprehensive solution designed to protect sensitive data and ensure secure collaboration within organizations. With the increasing reliance on digital platforms for communication and collaboration, it is crucial to have robust security measures in place. Trellix Collaboration Security offers a range of features to safeguard data and prevent unauthorized access.

    One of the key features of Trellix Collaboration Security is its advanced encryption capabilities. All data transmitted and stored within the platform is encrypted using industry-standard encryption algorithms, ensuring that it remains secure and protected from potential threats. This encryption extends to all communication channels, including emails, file transfers, and instant messaging, providing end-to-end security.

    To further enhance security, Trellix Collaboration Security incorporates multi-factor authentication. This means that users are required to provide multiple forms of identification, such as passwords, biometrics, or security tokens, to access the platform. This significantly reduces the risk of unauthorized access, as even if one factor is compromised, the others provide an additional layer of protection.

    In addition to encryption and multi-factor authentication, Trellix Collaboration Security offers robust access controls. Administrators can define and enforce granular access permissions, ensuring that only authorized individuals can view, edit, or share specific documents or folders. This helps prevent data leakage and ensures that sensitive information is only accessible to those who need it.

    Trellix Collaboration Security also includes comprehensive auditing and monitoring capabilities. Administrators can track user activities, monitor file transfers, and generate detailed reports to identify any suspicious or unauthorized behavior. This proactive approach allows organizations to quickly detect and respond to potential security breaches, minimizing the impact on data integrity and confidentiality.

    Sample Customers
    Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
    SF Police Credit Union (SFPCU)
    Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
    Top Industries
    REVIEWERS
    Manufacturing Company16%
    Computer Software Company16%
    Comms Service Provider13%
    Logistics Company6%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm9%
    Manufacturing Company7%
    Government7%
    REVIEWERS
    Security Firm27%
    Financial Services Firm19%
    Cloud Provider19%
    Healthcare Company8%
    VISITORS READING REVIEWS
    Security Firm33%
    Financial Services Firm15%
    Computer Software Company9%
    Comms Service Provider7%
    VISITORS READING REVIEWS
    Computer Software Company15%
    Financial Services Firm15%
    Government8%
    Manufacturing Company8%
    Company Size
    REVIEWERS
    Small Business42%
    Midsize Enterprise16%
    Large Enterprise42%
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise19%
    Large Enterprise51%
    REVIEWERS
    Small Business45%
    Midsize Enterprise14%
    Large Enterprise40%
    VISITORS READING REVIEWS
    Small Business52%
    Midsize Enterprise9%
    Large Enterprise39%
    REVIEWERS
    Small Business42%
    Midsize Enterprise25%
    Large Enterprise33%
    VISITORS READING REVIEWS
    Small Business14%
    Midsize Enterprise13%
    Large Enterprise73%
    Buyer's Guide
    Check Point Anti-Spam and Email Security Software Blade vs. Trellix Collaboration Security
    March 2024
    Find out what your peers are saying about Check Point Anti-Spam and Email Security Software Blade vs. Trellix Collaboration Security and other solutions. Updated: March 2024.
    768,740 professionals have used our research since 2012.

    Check Point Anti-Spam and Email Security Software Blade is ranked 11th in Email Security with 32 reviews while Trellix Collaboration Security is ranked 17th in Email Security with 12 reviews. Check Point Anti-Spam and Email Security Software Blade is rated 8.2, while Trellix Collaboration Security is rated 8.6. The top reviewer of Check Point Anti-Spam and Email Security Software Blade writes "Effectively secures data centers against various threats, including spam emails and provides policy-based control". On the other hand, the top reviewer of Trellix Collaboration Security writes "Protects from advanced malware and phishing attacks; useful dashboard". Check Point Anti-Spam and Email Security Software Blade is most compared with Barracuda Email Security Gateway, Abnormal Security, Cisco Secure Email, Fortinet FortiMail and Sophos Email, whereas Trellix Collaboration Security is most compared with Cisco Secure Email, Proofpoint Email Protection, Microsoft Exchange Online Protection (EOP), Trend Micro Email Security and Fortinet FortiMail. See our Check Point Anti-Spam and Email Security Software Blade vs. Trellix Collaboration Security report.

    See our list of best Email Security vendors.

    We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.