We performed a comparison between Check Point Harmony Email & Collaboration, CloudPassage, and Threat Stack Cloud Security Platform based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Microsoft, Wiz and others in Cloud Workload Protection Platforms (CWPP)."The anti-phishing feature is the solution's best feature."
"It is fast and has a very simple, easy integration."
"It is very intuitive. It is a point and click type of deal."
"The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user."
"The product's environment is easy to work and comprehensive."
"The main benefit is that hackers can't steal information."
"Its characteristics are adapted to the most modern threats."
"The product offers good and easy integration capabilities with other products."
"Key features are the Software Vulnerability Assessment and the CSM, which is the configuration check."
"Policies are very easy to manage on a day-to-day basis."
"There has been a measurable decrease in the meantime to remediation... because we have so many different tech verticals already collated in one place, our ability to respond is drastically different than it used to be."
"The number-one feature is the monitoring of interactive sessions on our Linux machines. We run an immutable environment, so that nothing is allowed to be changed in production... We're constantly monitoring to make sure that no one is violating that. Threat Stack is what allows us to do that."
"We like the ability of the host security module to monitor the processes running on our servers to help us monitor activity."
"It has been quite helpful to have the daily alerts coming to my email, as well as the Sev 1 Alerts... We just went through a SOX audit and those were pivotal."
"An important feature of this solution is monitoring. Specifically, container monitoring."
"Every other security tool we've looked is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that's really where Threat Stack shines."
"It is scalable. It deploys easily with curl and yum."
"We're using it on container to see when activity involving executables happens, and that's great."
"It's not fully integrated with Google Workspace, and the statistics don't update in real-time."
"Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix."
"There are a few areas for improvement. One is the occasional sluggishness or latency, which is likely due to the cloud-based nature of the solution. So, the performance can be better."
"It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"There could be more automation features included for it."
"At this time, the two-factor authentication does not work for Active Directory."
"The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."
"Anything outside of the software vulnerability management and the CSM, things like the GhostPort, need some improvement. The dashboard is in beta. It looks really good, I wish it would come out of beta."
"In the CSM module the policies are really hard to work with it. It is not very flexible at all. I would suggest that they change that. Right now, the scan is based on the group that the server is in. What happens if the server is in multiple groups?"
"Of all the advertised functions, I only find two things that really work in my environment, even though I wanted to use all of them. They're not flexible enough to be used."
"The reports and graphs are unintuitive."
"The reports aren't very good. We've automated the report generation via the API and replaced almost all the reports that they generate for us using API calls instead."
"I would like further support of Windows endpoint agents or the introduction of support for Windows endpoint agents."
"The API - which has grown quite a bit, so we're still learning it and I can't say whether it still needs improvement - was an area that had been needing it."
"Some features do not work as expected."
"They could give a few more insights into security groups and recommendations on how to be more effective. That's getting more into the AWS environment, specifically. I'm not sure if that's Threat Stack's plan or not, but I would like them to help us be efficient about how we're setting up security groups. They could recommend separation of VPCs and the like - really dig into our architecture. I haven't seen a whole lot of that and I think that's something that, right off the bat, could have made us smarter."
"The solution’s ability to consume alerts and data in third-party tools (via APIs and export into S3 buckets) is moderate. They have some work to do in that area... The API does not mimic the features of the UI as far as reporting and pulling data out go. There's a big discrepancy there."
"The user interface can be a little bit clunky at times... There's a lot of information that needs to be waded through, and the UI just isn't great."
"The compliance and governance need improvement."
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
More Threat Stack Cloud Security Platform Pricing and Cost Advice →
Earn 20 points