Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Cisco Secure Email Threat Defense comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
50
Ranking in other categories
Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (11th)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
59
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
Cisco Secure Email Threat D...
Ranking in Email Security
20th
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
13
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 12.9%, down from 18.3% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.7%, up from 3.3% compared to the previous year. The mindshare of Cisco Secure Email Threat Defense is 1.1%, down from 1.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Mike Bulyk - PeerSpot reviewer
Can quickly identify, track, tag, and categorize internal emails. Reporting accessibly via the main dashboard would be a great addition.
If Cisco could continue to develop integrations, whether it's internal tooling, Threat Grid, or AMP reporting which could be accessible via a single web page, that would be helpful. This would essentially add additional context on messages as well as files or links being detected. Potentially adding additional context on why certain messages are tagged as spam or malware. In our case, malware hasn't been detected yet, but spam certainly has been. Knowing what engines or which components of the message make it identifiable as spam, that could be useful. Additional context and reporting accessibly via the main dashboard would be great. There is still room for improvement in terms of integrations with other Cisco tools and non-Cisco tools. There is also some room for improvement needed in terms of the reporting.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The product's scalability is good."
"Microsoft Defender for Office 365 has improved my organization's security. It makes it easier to manage the infrastructure without the help of third-party applications."
"We use Microsoft Defender for its ability to integrate with existing business technologies, which is beneficial for protecting business areas."
"There are several features that I consider valuable."
"The deployment capability is a great feature."
"Defender helps us prioritize threats across our organization."
"Microsoft Defender for Office 365 helps people to work remotely. It is a secure solution. We don't need to use our company's computers or get VPN connections to the networks. I can control how they share screens and what they send to the devices. It keeps our organizations confidential and sensitive information safe."
"The two main features that prove most beneficial for us are URL scanning and attachment scanning."
"The product's initial setup phase is very simple and automated. Everything can be made ready within a few clicks."
"Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble."
"As a comprehensive solution, Check Point offers a very granular and best-in-class experience."
"The most valuable feature is the sandboxing feature. It provides a sandboxing environment where you can open links and see where they lead. You can see what is presented in the link after opening it."
"The product is a fairly complete and centralized solution accessible through the Infinity Portal."
"The product offers good and easy integration capabilities with other products."
"The most valuable feature is spam detection and phishing site prevention, which Microsoft couldn't catch, yet Check Point does."
"Getting reports and finding threats in the console is easy."
"Cisco has a threat mechanism called cloud-based Talos, where all the threats are inbuilt."
"The product offers protection, email security, anti-spam, and antivirus."
"The ability to see east-west traffic is its most valuable feature. Traditionally, email defense focuses on north-south, inbound-outbound, egress-ingress traffic. With Cisco Secure Email Cloud Mailbox, it's able to quickly identify, track, tag, and categorize emails that are internal. That can typically give us visibility into if there's an internal compromised account (for example). Someone can then use that internal compromised account to email additional accounts with either malicious software or links, but internal within that Office tenant. Effectively, that email message never leaves the tenant. Any of the mail gateways really do not have any method or way of seeing this traffic since it's not leaving the environment."
"Secure Email Threat Defense's scalability is good."
"It's very easy to deploy and configure."
"I would say it's very comprehensive, with multiple antivirus OEMs, virus encrypt features, encryption, and more."
"I highly recommend it as one of the best choices."
"The solution is stable."
 

Cons

"Microsoft needs to broaden its global support presence by establishing teams of subject-matter experts in all regions."
"Several simulation options are available within 365, and the phishing simulation could be better."
"Microsoft Defender for Office 365 should be more proactive."
"The UI needs to be more user-friendly."
"The GUI is sometimes slow to fetch the device report and could be improved."
"The XDR dashboard has room for improvement."
"Microsoft sometimes has downtime, and we'll get several incidents coming in back to back. We have a huge backlog of notifications, many of which may be false positives. However, there might be serious alerts, so we can't risk dismissing all of them at once."
"Sometimes, phishing emails manage to pass through the filter, so the system needs to enhance its phishing email detection capabilities."
"The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported. If they were to add report exporting capabilities on each of metric objects on the dashboard, that would be awesome."
"It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"They could help us be integrating features with solutions from third parties."
"Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix."
"There is always room for improvement and growth."
"Cisco Secure Email Cloud Mailbox can improve by adding advanced phishing, then the solution would become the best in the market. However, this could increase the price even more. Additionally, if CES with domain protection could be added it would be an even better solution."
"From a technical point of view, Cisco is far behind in terms of cybersecurity, and it has to improve very much."
"There is still room for improvement in terms of integrations with other Cisco tools and non-Cisco tools. There is also some room for improvement needed in terms of the reporting."
"Customers will benefit greatly from monthly billing because the majority of customers today use the cloud, be it Office 365, or Google Cloud."
"We encounter issues while searching for missing emails."
"Cisco's multiple product lines and verticals made this just one of their many verticals, and we could see a shift in focus."
"This solution could be improved by integration with Sandbox."
"The search area has room for improvement. When you go to the next page, it remains at the bottom of the current page that you're on. Also, under the reports section, it allows you to see any "convictions," but if you want to search for those convictions you have to remember when they all came in and go back and edit the search accordingly. You cannot click on the list of convictions to actually see if you had a spike at a certain time."
 

Pricing and Cost Advice

"The pricing is normal. Considering its popularity, it's not overpriced."
"I was working in the government and it was too expensive for us to use our Microsoft products."
"The product is expensive."
"It's a user-base subscription."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
"Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
"The solution could be better by simplifying the business model of their licensing. It was hard to figure out how to get the licensing done for the environment, initially."
"The pricing is expensive."
"The product is expensive."
"Usually, we pay for the licensing part on a yearly basis and not on a monthly basis. If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts."
"This is a very good product if you are on the cloud, but the price is a little more expensive."
"Having information stolen by a hacker would be more expensive than purchasing a license."
"As we are a non-profit organization, we got the tool with a good offer. On a yearly basis, we pay 10,000 Euro for 500 users, which also includes the technical support part."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"The cost is similar to other competitors. It's not much higher."
"Cisco Secure Email Cloud Mailbox does not have any competition with Sophos, Trend Micro, or other vendors of the world. However, there is a pricing premium for the solution. One has to look at it from that angle that while they are buying Cisco, there will be a premium, and Cisco justifies that premium value. That's why they're charging a high price."
"The solution’s pricing is manageable."
"It is expensive compared to other vendors."
"The feedback from vendors and customer is that it is expensive."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
850,043 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
18%
Financial Services Firm
9%
Manufacturing Company
8%
Healthcare Company
5%
Computer Software Company
36%
Healthcare Company
5%
Manufacturing Company
5%
Comms Service Provider
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
Money-wise, it is a part of the Office 365 ( /products/office-365-reviews ) suite, making it slightly more expensive ...
What needs improvement with Microsoft Defender for Office 365?
The main area for improvement is simplifying the implementation and rollout process. There are many conditions to be ...
What is your primary use case for Check Point Harmony Email & Office?
We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For exa...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about Secure Email Threat Defense?
Secure Email Threat Defense's scalability is good.
What is your experience regarding pricing and costs for Secure Email Threat Defense?
Cisco's closest competition is Proofpoint. Both are in the same range in terms of pricing. Pricing is on the higher s...
What needs improvement with Secure Email Threat Defense?
The physical appliance has been discontinued, although the platform still exists. Improvements here and there could b...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
Cisco Secure Email Cloud Mailbox, Cisco CMD, Cisco Cloud Mailbox Defense
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Luiss University, Lone Star College, T-Systems, Magyar Telekom
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Cisco Secure Email Threat Defense and other solutions. Updated: April 2025.
850,043 professionals have used our research since 2012.