


Illumio and Check Point Harmony Email & Collaboration compete in the cybersecurity category, specifically focusing on network security and email security, respectively. Illumio appears to have the upper hand in micro-segmentation and network visibility, while Check Point excels in comprehensive email threat protection and integration features.
Features: Illumio provides the Application Dependency Map, a visual tool offering insights into network traffic. Its micro-segmentation capabilities enhance security by allowing granular control over network communications. The platform's traffic analysis and application grouping features give a clear view of network interactions. Check Point Harmony Email & Collaboration offers advanced threat protection with phishing detection, malware sandboxing, and API integration. It prevents data loss and integrates efficiently with cloud services like Microsoft Office 365, ensuring high email security.
Room for Improvement: Illumio could broaden its operating system support and improve technical support response times. Enhancing integration and labeling could further optimize its user experience. Check Point Harmony Email & Collaboration experiences occasional false positives and limited support for non-Microsoft and Google services. Expanding integration abilities to more collaborative tools and improving documentation navigation could boost user satisfaction.
Ease of Deployment and Customer Service: Illumio is commonly deployed in on-premises and public cloud environments, with user feedback indicating mixed experiences with support responsiveness. Check Point Harmony Email & Collaboration is typically used in public and hybrid clouds, providing flexible integration options. Its customer service is highly praised for being responsive and helpful.
Pricing and ROI: Illumio is viewed as cost-effective compared to alternatives like Guardicore, with users noting a good ROI from its operational advantages. Check Point Harmony Email & Collaboration is more expensive but offers significant value for medium to large enterprises through its comprehensive features. The flexible pricing model can be challenging for smaller businesses, with ROI taking longer to realize but offering substantial overall security value.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
The time saved during investigations is significant due to the neat dashboard that organizes everything related to alerts.
We have gone from three to four successful phishing attacks every year to a maximum of one.
There has been a 70% decrease in phishing emails and data breaches since implementing Check Point Harmony Email Security.
Illumio is known to be the cheapest solution among the security solutions we evaluated.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
Their technical support is proficient at resolving issues within their scope, providing excellent problem-solving assistance and guidance.
We opted for the 24/7 premium support, which is very responsive and quick whenever we have configuration challenges or other inquiries.
We understand that with respect to SLA, but we expect they can go beyond SLA and provide quick support for the client.
Even if we raise an issue on non-working days like Saturdays or Sundays, we receive prompt responses.
From my experience, they are very responsive.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
I would rate the scalability of PingSafe 10 out of 10.
I would rate the scalability of Check Point Harmony Email and Collaboration as nine out of ten, indicating high scalability.
Scalability is limited, being only integrated with Microsoft Office 365 and G Suite at present.
Scaling it to a large level is not an issue for us.
SentinelOne Singularity Cloud is incredibly reliable.
We contacted Cloud Native Security, and they addressed it in a day.
The only downtime we had was when switching from V1 to V2 but it was smooth.
The platform is very stable; we have not encountered any downtime or stability-related issues.
Illumio is a stable solution with no glitches or bugs reported, making it a reliable product for us.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
I would also like to see Cloud Native Security offer APIs that allow us to directly build dashboards within the platform.
Updates based on AI and reduced administrative overhead by adding or bulk adding new users, along with graphical enhancements to the GUI, would also be beneficial.
Enhancing reporting capabilities with customizable and advanced analytics features would greatly improve our ability to detect trends and proactively address emerging threats.
The current system, being tied directly to the mailbox instead of requiring MX record verification, allows new mailboxes to function immediately after Microsoft activation.
There could also be more examples of how the automations can be done using Illumio.
That's why I'm looking for comparisons with other products.
There should be an option to upgrade from the console to the latest version instead of performing manual upgrades.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
There are some tools that are double the cost of Cloud Native Security.
I recall Cloud Native Security charging a slightly higher premium previously.
Pricing is a bit expensive, but it is worth it considering the features that Check Point provides.
I consider the pricing to be a bit expensive, similar to other solutions.
The pricing is lower compared to what I used before.
I know that Illumio is the cheapest solution in the security area.
I think it's not very expensive if we compare it with Guardicore.
This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.
The infrastructure-as-code feature is helpful for discovering open ports in some of the modules.
This tool has been helpful for us. It allows us to search for vulnerabilities and provides evidence directly on the screen.
I haven't had any users accidentally click on something problematic since implementing the product, which speaks to its efficacy.
The most valuable feature is spam detection and phishing site prevention, which Microsoft couldn't catch, yet Check Point does.
Check Point Harmony Email and Collaboration offers online support and has tight integration with Microsoft.
Illumio helps in audit purposes by saving data and showing blocked traffic, ensuring no outside traffic is allowed.
The most important feature is the traffic review analysis, where we use the draft view and the reported view that helps us understand how the application interacts with other applications in the environment, and based on that, we are able to define the policies.
The dependency map is the most valuable aspect.
| Product | Market Share (%) |
|---|---|
| SentinelOne Singularity Cloud Security | 3.6% |
| Check Point Harmony Email & Collaboration | 0.7% |
| Illumio | 5.9% |
| Other | 89.8% |

| Company Size | Count |
|---|---|
| Small Business | 47 |
| Midsize Enterprise | 20 |
| Large Enterprise | 53 |
| Company Size | Count |
|---|---|
| Small Business | 58 |
| Midsize Enterprise | 25 |
| Large Enterprise | 29 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 8 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Check Point Harmony Email and Office is a cloud-based software offering complete protection to stop malware attacks through emails. The software is designed to provide protection for organizations using Office 365, G Suite, Google Workspace, and all other collaboration and file-sharing apps. Access permissions can be granted and custom policies can be defined for any user of choice.
Check Point Harmony Email and Office identifies and blocks advanced malware, phishing, and ransomware attacks in real time before they reach the user’s inbox. In turn, this also helps protect sensitive business data from breaches. Harmony Email and Office was the first solution to implement machine learning, API, and AI for email security, and will ultimately prevent any attempts at account takeover via agentless multi-factor authentication.
What is Complete Protection?
Check Point Harmony Email and Office offers a superior catch rate for collaboration apps and cloud email with their API-based solution that detects attacks that other solutions miss, including account takeover, supply chain attacks, ransomware, and BEC. The complete protection offers:
Reviews from Real Users
Check Point Harmony Email and Office offers a revolutionary prevention solution to stop malware attacks through emails. Users particularly like its visibility and the ability to protect sensitive business data.
David U., a CISO at IMC companies, notes, "It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
Mantu S., a senior technology architect at Incedo Inc., writes, "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
Illumio Zero Trust Segmentation is a cloud and data center security solution that helps stop breaches from spreading across hybrid and multi cloud IT environments. The solution is designed to stop ransomware, contain cyber attacks, and reduce risk. With Illumio Zero Trust Segmentation, users can understand relationships and communications to map exposure risk of systems and data, identify the right security posture and secure applications through least-privilege policies, and ensure a Zero Trust security posture.
Illumio Zero Trust Segmentation Features
Illumio Zero Trust Segmentation has many valuable key features. Some of the most useful ones include:
Illumio Zero Trust Segmentation Benefits
There are many benefits to implementing Illumio Zero Trust Segmentation. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Illumio Zero Trust Segmentation is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has a good auto policy writing feature, great mapping, and useful monitoring.
Shashi, Technical Consultant at a financial services firm, explains which features she really likes. “The auto policy writing is great. The feature will give you the option of inbound-outbound traffic. The Explorer allows you to know the traffic between source and destination. The illumination definitely stands out. Mapping is great. The application group mapping is useful.”
The solution has “helpful support, useful monitoring, and high availability,” according to Edwin L., Security Architect at MGM.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.