


Check Point Harmony Email & Collaboration and Microsoft Defender for Cloud compete in the cybersecurity category. While both products have their strengths, the one that seems to have an edge is Microsoft Defender for Cloud due to its comprehensive threat detection and multi-cloud integration, offering more extensive protection for organizational infrastructures.
Features: Check Point Harmony Email & Collaboration offers robust AI-driven threat intelligence, proactive phishing protection, and high security for cloud emails. It effectively integrates with Microsoft 365, enhancing protection against various email threats. On the other hand, Microsoft Defender for Cloud excels with its advanced threat detection capabilities and offers seamless multi-cloud integration, providing comprehensive protection across various infrastructures and platforms.
Room for Improvement: Check Point Harmony Email & Collaboration could enhance its integration with other email platforms beyond Microsoft and Google, improve dashboard customization, and address latency issues. Microsoft Defender for Cloud needs better integration with third-party tools and should optimize its licensing policies to improve overall user experience.
Ease of Deployment and Customer Service: Check Point Harmony Email & Collaboration provides robust technical support and flexible deployment options, though there can be occasional delays. Similarly, Microsoft Defender for Cloud offers excellent customer support but may face complexity issues in larger deployments. Both platforms support flexible deployment in public or hybrid cloud environments, with Microsoft providing a broader range of integration capabilities.
Pricing and ROI: Check Point Harmony Email & Collaboration is competitively priced, with users reporting high ROI due to enhanced email security and reduced incidents. In contrast, Microsoft Defender for Cloud, while considered expensive, justifies its cost through comprehensive capabilities and similarly shows significant potential ROI with its advanced security measures.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
The time saved during investigations is significant due to the neat dashboard that organizes everything related to alerts.
We have gone from three to four successful phishing attacks every year to a maximum of one.
There has been a 70% decrease in phishing emails and data breaches since implementing Check Point Harmony Email Security.
Defender proactively indexes and analyzes documents, identifying potential threats even when inactive, enhancing preventative security.
Identifying potential vulnerabilities has helped us avoid costly data losses.
Compared to not having Microsoft Defender for Cloud in place, we definitely saw an advantage by not having downtime due to a security threat.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
Their technical support is proficient at resolving issues within their scope, providing excellent problem-solving assistance and guidance.
We opted for the 24/7 premium support, which is very responsive and quick whenever we have configuration challenges or other inquiries.
We understand that with respect to SLA, but we expect they can go beyond SLA and provide quick support for the client.
Since security is critical, we prefer a quicker response time.
The support team was very responsive to queries.
They understand their product, but much like us, they struggle with the finer details, especially with new features.
I would rate the scalability of PingSafe 10 out of 10.
The SentinelOne Singularity Cloud exhibits high scalability.
We've automated in our MDM so any device that we start in our MDM automatically installs SentinelOne.
I would rate the scalability of Check Point Harmony Email and Collaboration as nine out of ten, indicating high scalability.
Scalability is limited, being only integrated with Microsoft Office 365 and G Suite at present.
As we have reduced our on-premises infrastructure, it is about how we can migrate workloads to the cloud to make it easier, and then having everything fully encompassed and secured within that area makes it much easier for us to scale as needed and grow.
We are using infrastructure as a code, so we do not have any scalability issues with Microsoft Defender for Cloud implementation because our cloud automatically does it.
It has multiple licenses and features, covering infrastructures from a hundred to five hundred virtual machines, without any issues.
SentinelOne Singularity Cloud is incredibly reliable.
The only downtime we had was when switching from V1 to V2 but it was smooth.
I would rate it a ten out of ten for stability.
The platform is very stable; we have not encountered any downtime or stability-related issues.
Defender's stability has been flawless for us.
I have not experienced any crashes or downtime.
Microsoft Defender for Cloud is very stable.
Detection should be in near real-time.
If notifications are available, then it will be more helpful, easy, and time-saving.
To differentiate themselves, PingSafe should focus on two key areas: security and workload protection within the CI/CD pipeline.
Updates based on AI and reduced administrative overhead by adding or bulk adding new users, along with graphical enhancements to the GUI, would also be beneficial.
Enhancing reporting capabilities with customizable and advanced analytics features would greatly improve our ability to detect trends and proactively address emerging threats.
The current system, being tied directly to the mailbox instead of requiring MX record verification, allows new mailboxes to function immediately after Microsoft activation.
Microsoft, in general, could significantly improve its communication and support.
It would be beneficial to streamline recommendations to avoid unnecessary alerts and to refine the severity of alerts based on specific environments or environmental attributes.
The artificial intelligence features could be expanded to allow the system to autonomously manage security issues without needing intervention from admins.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
This would have been a poor return on investment, especially considering Wiz's high cost.
If the 2 solutions are integrated into a package, the cost of PingSafe should be reduced.
Pricing is a bit expensive, but it is worth it considering the features that Check Point provides.
I consider the pricing to be a bit expensive, similar to other solutions.
The pricing is lower compared to what I used before.
Security has essentially no cost when compared to the cost of a breach.
Every time we consider expanding usage, we carefully evaluate the necessity due to cost concerns.
We appreciate the licensing approach based on employee count rather than a big enterprise license.
This tool has been helpful for us. It allows us to search for vulnerabilities and provides evidence directly on the screen.
The cloud misconfiguration feature gave us almost zero false positives.
PingSafe proactively detects and alerts us to such accidental exposures of sensitive information, including SaaS credentials.
I haven't had any users accidentally click on something problematic since implementing the product, which speaks to its efficacy.
For us, I prefer Check Point before Palo Alto and before other brands because Check Point is most effective in attack mitigation and attack detection.
The most valuable feature is spam detection and phishing site prevention, which Microsoft couldn't catch, yet Check Point does.
The most valuable feature for me is the variety of APIs available.
This feature significantly aids in threat detection and enhances the user experience by streamlining security management.
The most valuable feature is the recommendations provided on how to improve security.
| Product | Mindshare (%) |
|---|---|
| Microsoft Defender for Cloud | 15.1% |
| SentinelOne Singularity Cloud Security | 4.9% |
| Check Point Harmony Email & Collaboration | 1.1% |
| Other | 78.9% |


| Company Size | Count |
|---|---|
| Small Business | 51 |
| Midsize Enterprise | 22 |
| Large Enterprise | 57 |
| Company Size | Count |
|---|---|
| Small Business | 63 |
| Midsize Enterprise | 27 |
| Large Enterprise | 30 |
| Company Size | Count |
|---|---|
| Small Business | 29 |
| Midsize Enterprise | 10 |
| Large Enterprise | 49 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?
What benefits should users expect from SentinelOne Singularity Cloud Security?
SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Check Point Harmony Email & Collaboration provides AI-powered security features for email and collaboration platforms, integrating with Microsoft 365 for comprehensive protection against phishing and malware threats.
Designed for seamless deployment, Check Point Harmony Email & Collaboration offers advanced protection with minimal false positives. Users benefit from real-time alerts, granular threat analysis, and intuitive operation. It supports API-based email security, ensuring safe communication channels and data protection. While it integrates smoothly with Microsoft 365, improvements in dashboard usability, stability, false positive reduction, and expanded integrations with non-Microsoft platforms can enhance the experience.
What are the key features of Check Point Harmony Email & Collaboration?In finance, healthcare, and education industries, Check Point Harmony Email & Collaboration is deployed to safeguard sensitive information and ensure unrestricted communication flow. These sectors value its ability to block suspicious emails, prevent data loss, and maintain compliance with industry regulations.
Microsoft Defender for Cloud is a comprehensive security solution that provides advanced threat protection for cloud workloads. It offers real-time visibility into the security posture of cloud environments, enabling organizations to quickly identify and respond to potential threats. With its advanced machine learning capabilities, Microsoft Defender for Cloud can detect and block sophisticated attacks, including zero-day exploits and fileless malware.
The solution also provides automated remediation capabilities, allowing security teams to quickly and easily respond to security incidents. With Microsoft Defender for Cloud, organizations can ensure the security and compliance of their cloud workloads, while reducing the burden on their security teams.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.