


Check Point Harmony Email & Collaboration and Cisco Secure Email Threat Defense are competitors in enterprise email security. Check Point has an advantage thanks to its AI-driven threat intelligence and seamless integration with collaboration platforms.
Features: Check Point Harmony Email & Collaboration integrates AI for threat intelligence which enhances its email threat-blocking capabilities. It provides phishing protection and malware defense while seamlessly integrating with Microsoft Office 365. Cisco Secure Email Threat Defense offers robust filtering, malware protection, and focuses on domain reputation with automated response features.
Room for Improvement: Check Point could improve its dashboard for easier customization and enhance integration with more third-party services. Users also report challenges with false positives. Cisco could enhance its threat intelligence integration and refine its setup requirements. Expanding support for legacy email services would also benefit Cisco's user experience.
Ease of Deployment and Customer Service: Check Point Harmony is primarily deployed in public clouds and lacks hybrid or on-premises support. Its customer service is generally responsive, though some report delays in critical situations. Cisco offers deployment across public, private, and hybrid clouds, with customer service praised for availability, albeit at a higher cost.
Pricing and ROI: Check Point is competitively priced, appealing to mid-sized organizations with significant ROI reported due to reduced incidents. Cisco's premium pricing is justified by its feature set and support but may be less accessible for smaller businesses. Both solutions demonstrate strong ROI, with Check Point's cost-effectiveness bringing a broader appeal.
| Product | Mindshare (%) |
|---|---|
| Check Point Email Security (formerly Harmony Email & Collaboration) | 4.5% |
| Cisco Secure Email Threat Defense | 1.1% |
| Cloudflare One | 1.7% |
| Other | 92.7% |

| Company Size | Count |
|---|---|
| Small Business | 10 |
| Midsize Enterprise | 2 |
| Large Enterprise | 11 |
| Company Size | Count |
|---|---|
| Small Business | 63 |
| Midsize Enterprise | 27 |
| Large Enterprise | 30 |
| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 6 |
| Large Enterprise | 7 |
Cloudflare One is a comprehensive platform for security, performance, and connectivity. It provides features like rate limiting, DDoS protection, and application access, tailored to enhance user experience while securing internet access and accelerating communications.
Designed to integrate security measures with ease of use and scalability, Cloudflare One offers a secure web gateway and zero trust network access. These features ensure seamless setup and operation, making connectivity reliable and protected. Users appreciate its integrated console, intuitive interface, and the ability to manage risk effectively. It offers straightforward deployment, improves latency, and boasts cost-effectiveness. While its onboarding process and documentation need enhancement, its value in content delivery and application shielding is notable. Despite challenges in integrating Cloudflare Access with existing VPNs and the need for better automation and support, it remains vital for DNS and infrastructure protection.
What features make Cloudflare One stand out?In industries like finance, retail, and technology, Cloudflare One is crucial for enabling secure remote access and protecting web applications against dynamic threats. It supports compliance access policies and enhances content delivery, playing a key role in safeguarding digital infrastructure.
Check Point Harmony Email & Collaboration provides AI-powered security features for email and collaboration platforms, integrating with Microsoft 365 for comprehensive protection against phishing and malware threats.
Designed for seamless deployment, Check Point Harmony Email & Collaboration offers advanced protection with minimal false positives. Users benefit from real-time alerts, granular threat analysis, and intuitive operation. It supports API-based email security, ensuring safe communication channels and data protection. While it integrates smoothly with Microsoft 365, improvements in dashboard usability, stability, false positive reduction, and expanded integrations with non-Microsoft platforms can enhance the experience.
What are the key features of Check Point Harmony Email & Collaboration?In finance, healthcare, and education industries, Check Point Harmony Email & Collaboration is deployed to safeguard sensitive information and ensure unrestricted communication flow. These sectors value its ability to block suspicious emails, prevent data loss, and maintain compliance with industry regulations.
Cisco Secure Email Threat Defense offers robust email security with features like east-west traffic visibility and seamless SaaS deployment. It enhances cloud email protection by integrating Threat Grid sandboxing and AMP for malware defense, supported by Cisco Talos threat intelligence.
Enhancing email security for Microsoft 365 and cloud emails, Cisco Secure Email Threat Defense acts as an email gateway, blocking phishing, malware, and business email compromise. Users benefit from a centralized management console, efficient graymail administration, and strong filtering capabilities. Despite its strengths, it requires improvements in integration, spam detection accuracy, and enhances phishing protection.
What are the most important features of Cisco Secure Email Threat Defense?Cisco Secure Email Threat Defense is highly applicable in industries requiring stringent data protection, such as finance and healthcare. It serves cloud-based environments by closely monitoring email activity to prevent unauthorized access and breaches. Tailored deployment options cater to both on-premise and cloud architectures, allowing flexible integration in existing workflows.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.