No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Email Security (formerly Harmony Email & Collaboration) vs Cisco Secure Workload comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 24, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.6
Reviews Sentiment
7.4
Number of Reviews
122
Ranking in other categories
Vulnerability Management (4th), Cloud and Data Center Security (3rd), Container Security (3rd), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (1st), AI Observability (2nd)
Check Point Email Security ...
Ranking in Cloud Workload Protection Platforms (CWPP)
7th
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
96
Ranking in other categories
Email Security (3rd), Data Loss Prevention (DLP) (5th)
Cisco Secure Workload
Ranking in Cloud Workload Protection Platforms (CWPP)
15th
Average Rating
8.6
Reviews Sentiment
7.7
Number of Reviews
15
Ranking in other categories
Cloud and Data Center Security (8th), Microsegmentation Software (4th), Cisco Security Portfolio (7th)
 

Mindshare comparison

As of April 2026, in the Cloud Workload Protection Platforms (CWPP) category, the mindshare of SentinelOne Singularity Cloud Security is 4.9%, up from 2.6% compared to the previous year. The mindshare of Check Point Email Security (formerly Harmony Email & Collaboration) is 1.1%, up from 0.7% compared to the previous year. The mindshare of Cisco Secure Workload is 2.2%, down from 3.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Workload Protection Platforms (CWPP) Mindshare Distribution
ProductMindshare (%)
SentinelOne Singularity Cloud Security4.9%
Check Point Harmony Email & Collaboration1.1%
Cisco Secure Workload2.2%
Other91.8%
Cloud Workload Protection Platforms (CWPP)
 

Featured Reviews

Sreeraj Mohandas - PeerSpot reviewer
Security Engineer at HashXpert
Consolidated cloud security has reduced manual work and has automated vulnerability remediation
I elaborate on my rating of SentinelOne support by mentioning that there was some time where the troubleshooting took a longer time. In fact, there were many meetings going on. The availability of the document on the internet is on a lesser side because as an engineer, I would want to know about the troubleshooting aspects of this particular tool. When I am facing a customer, I do not prefer to bring the vendor to every call and try to resolve it, as it takes months and months. It would be better to have a training session with the engineer on site to explain and train properly. This is not the case with SentinelOne, so this is the only thing I have a complaint about. I do not have any other room for improvement to suggest within SentinelOne itself. However, I would really want the AI assistant for the threat hunting part to be more accessible. They have it, but they are making it licensed, so it is a bit on the higher end.
Nasseer Qureshi - PeerSpot reviewer
Pre Sales Consultant at Redington Group
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.
Raj Metkar - PeerSpot reviewer
Director, Head of Networks at MUFG, EMEA
Discover internal application dependencies and create a dependency map
We actively seek improvements in integrating the Infoblox DDI platform with Cisco Secure Workload. This integration allows Cisco Secure Workload to learn about our networks and network tags, providing valuable insights into vulnerabilities related to the operating system and various applications installed on our servers. Recently, Cisco announced a new product called HyperShield, an AI-based autonomous micro-segmentation solution. While Cisco has not stated that HyperShield will replace Cisco Secure Workload, it represents a natural evolution for the company. HyperShield features dynamic policy discovery and enforcement; however, once policies are enforced, they do not change until a discovery occurs, requiring a re-enforcement process. This new platform operates autonomously, minimizing the need for user or security engineer intervention. I would have expected Cisco to incorporate more automatic discovery and enforcement features within the existing Cisco Secure Workload product. Instead of enhancing the current product, they have introduced a new solution. Cisco plans to honor existing Tetration licenses, allowing users to transition to HyperShield without additional costs, reflecting the investment enterprises have already made. From Cisco’s perspective, this represents a natural progression in their product line. While the product name changes, it seems more of a rebranding effort. The enhancements are greater autonomy, improved discovery, and automatic enforcement, which are now being introduced in HyperShield. Cisco Secure Workload offers automatic policy enforcement but cannot adjust policies dynamically as the application needs to change. Having used the platform for the past five years, the recent announcement has been reassuring. Cisco has confirmed that our investment in the platform will not go to waste. They will honor our existing licenses, providing a natural migration path to the new solution without any disruption

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I did a lot of research before signing up and doing the demo. They have a good reputation as far as catching threats early on."
"The UI is responsive and user-friendly."
"The cooperative nature of SentinelOne has influenced our decision not to shift."
"The remediation process is good."
"The ease of use of the platform is very nice."
"Singularity Cloud Security's most valuable features are its ease of scalability and comprehensive security measures."
"Singularity Cloud Workload Security provides us with better security detection and more visibility. It is another resource that we can use to detect vulnerabilities in our company's systems. For example, it can help us detect new file processes that we are not familiar with, which could be used by attackers to exploit our systems. Singularity Cloud Workload Security can also help us diagnose and analyze data to determine whether it is malicious or not. Singularity Cloud Workload Security is like another pair of eyes that can help us protect our systems from cyberattacks."
"The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."
"The sanitization feature of Check Point Harmony Email and Collaboration is valuable."
"Check Point Harmony Email and Collaboration is a one-stop solution for providing the best enterprise security and protecting systems and mail servers from malware and threat attacks."
"The product is reliable and sturdy."
"The API is its most valuable feature; on the API side, relative to the rest of the market, Check Point is decades ahead of its competitors."
"The solution is easy to customize and the options available on the portal are easily accessible to all technicians."
"The product's environment is easy to work and comprehensive."
"This product enhances faster and more secure sharing of information among colleagues from different departments."
"Checkpoint Harmony Email and Collaboration has significantly improved our email security by effectively blocking phishing, malware and ransomware threats."
"Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations."
"The solution offers 100% telemetry coverage; the telemetry you collect is not sampled, it's not intermittent, it's complete, and you see everything in it, including full visibility of all activities on your endpoints and in your network."
"The most valuable feature right now is to do with having visibility on the network — especially on our servers — and to be able to enforce some type of security measures."
"Scalability is its most valuable feature."
"By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself."
"It's stable."
"The most valuable feature of this solution is security."
"Secure Workload's best feature is that it's an end-to-end offering from Cisco."
 

Cons

"Crafting customized policies can be tricky."
"Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time."
"We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization."
"The Infrastructure as Code service available in SentinelOne Singularity Cloud Security and the services available in AWS cloud security can be merged so that we can get the security data directly from AWS cloud in SentinelOne Singularity Cloud Security. This way, all the data related to security will be in one single place. Currently, we have to check a couple of things on SentinelOne Singularity Cloud Security, and we have to validate that same data on the AWS Cloud to be sure. If they can collaborate like that, it will be great."
"A two-month grace period for extended searches would be a valuable improvement."
"It would be really helpful if the solution improves its agent deployment process."
"Whenever I view the processes and the process aspect, it takes a long time to load."
"SentinelOne Singularity Cloud Security is on the costlier side."
"They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response."
"The next release should focus more on email categorization and provide options for unlocking blocked safe emails."
"They could continue to offer more stringent security policy measures for threat point management."
"The left-hand feature can be made more granular for the implementation of the policy."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"The reporting could be improved."
"Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix."
"We still get some false positives. There are times when legitimate stuff gets flagged and it could be that somebody is expecting a very important email but they don't end up getting it. On the flip side, when we alert Check Point about stuff like this, it is corrected, so they are improving. That's a plus."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem."
"The integration could be better, especially with different types of solutions."
"Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem."
"It has an uninviting interface."
"A feature that I was looking for was emailed alerts and notifications so we'd get them right away."
"Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it."
"The entire interface could be improved; it's ugly and uninviting, and Tetration tends to be a lot more cumbersome and not very intuitive compared to the biggest competitor's modern-looking GUI."
 

Pricing and Cost Advice

"SentinelOne provided competitive pricing compared to other vendors, and we are satisfied with the deal."
"PingSafe is fairly priced."
"The cost for PingSafe is average when compared to other CSPM tools."
"Singularity Cloud Security by SentinelOne is cost-efficient."
"PingSafe is cost-effective for the amount of infrastructure we have. It's reasonable for what they offer compared to our previous solution. It's at least 25 percent to 30 percent less."
"Its pricing is constant. It has been constant over the previous year, so I am happy with it. However, price distribution can be better explained. That is the only area I am worried about. Otherwise, the pricing is very reasonable."
"SentinelOne is quite costly compared to other security platforms."
"PingSafe falls within the typical price range for cloud security platforms."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
"The cost is similar to other competitors. It's not much higher."
"Cost is the main concern that every customer takes into consideration, and Check Point always negotiates a price that is affordable."
"This is a very good product if you are on the cloud, but the price is a little more expensive."
"Due to its pricing, I would say that Check Point Harmony Email & Collaboration is more suitable for medium to enterprise organizations."
"The product is expensive compared to some competitors, especially for the SME segment."
"The pricing and licensing are always negotiable."
"The pricing is in the middle. Check Point's pricing is not the highest in the competitive market."
"It is not cheap and pricing may limit scalability."
"The price is based on how many computers you're going to install it on."
"The price is outrageous. If you have money to throw at the product, then do it."
"The cost for the hardware is around 300k."
"Pricing depends on the scope of the application and the features. Larger installations save more."
"Regarding price, Cisco Secure Workload can be expensive if you don't have a budget. If you're not doing micro-segmentation, every extra security measure or enforcement you're putting on top of your existing environment will be an extra cost. It's not a cheap solution at all. But from my point of view, if you need to do micro-segmentation, this is one of the best tools I've seen for it. I can't compare that to Microsoft's solution because I haven't looked into it. I've looked into VMware and Cisco. Those are the only two that I know of. I didn't know that Microsoft could do micro-segmentation at all. Maybe they can, but I haven't heard anything about it."
"The pricing is a bit higher than we anticipated."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
890,027 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
9%
Government
5%
Computer Software Company
12%
Financial Services Firm
9%
Manufacturing Company
7%
Construction Company
7%
Manufacturing Company
13%
Financial Services Firm
9%
Government
8%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business51
Midsize Enterprise22
Large Enterprise57
By reviewers
Company SizeCount
Small Business63
Midsize Enterprise27
Large Enterprise30
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise3
Large Enterprise8
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
Regarding the pricing for SentinelOne Singularity Cloud Security, I do not think it is something I can compare.
What needs improvement with PingSafe?
I do not see room for improvement in SentinelOne Singularity Cloud Security. In the future, I would like to see the i...
What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
I am not the person to say what cost Check Point has for their products. However, for partners like us, if we could g...
What is your primary use case for Check Point Harmony Email & Office?
We are working with Check Point Harmony Email & Collaboration not only for Harmony, but also for their SaaS solut...
What needs improvement with Check Point Harmony Email & Office?
Check Point must develop one mobile app for iPhone users, Android phone users, and Windows phone users or at least fo...
What is your experience regarding pricing and costs for Cisco Secure Workload?
CloudStrike offers antivirus capabilities and firewall features for servers and VDI but lacks automatic policy discov...
What needs improvement with Cisco Secure Workload?
We actively seek improvements in integrating the Infoblox DDI platform with Cisco Secure Workload. This integration a...
What is your primary use case for Cisco Secure Workload?
When we onboarded Cisco Secure Workload, the usual use case was to discover internal application dependencies and cre...
 

Comparisons

 

Also Known As

PingSafe
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
Cisco Tetration
 

Overview

 

Sample Customers

Information Not Available
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
ADP, University of North Carolina Charlotte (UNCC)
Find out what your peers are saying about Check Point Email Security (formerly Harmony Email & Collaboration) vs. Cisco Secure Workload and other solutions. Updated: April 2026.
890,027 professionals have used our research since 2012.