Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Kiteworks comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
49
Ranking in other categories
Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (11th)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
59
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
Kiteworks
Ranking in Email Security
27th
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
13
Ranking in other categories
Enterprise Content Management (14th), Managed File Transfer (MFT) (9th), Content Collaboration Platforms (14th), Secure Email Gateway (SEG) (11th)
 

Mindshare comparison

As of May 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 12.9%, down from 18.3% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.7%, up from 3.3% compared to the previous year. The mindshare of Kiteworks is 0.3%, up from 0.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Sukkanta Banerjee - PeerSpot reviewer
Two-factor authentication and .ZIP format make large file transfers very secure
The most valuable feature is the ability to send a large file of 30 GB in size and more. In Outlook and other email applications, you cannot send files that are larger than 20 MB. But with Kiteworks, 30 GB is transferable by default and, with the proper approval, a file of up to 100 GB can be sent. It makes file transfer very easy and smooth. Also, only the .ZIP format is supported because it is a very secure mode of file transfer, and that is why it is recommended. It also has built-in antivirus, so if it detects any malware it will quarantine the file and it won't be delivered. This is really important to keep the service up and running in a proper and secure manner. With people working from home, the data needs to be checked to see what kind of data is being sent. It has a two-factor authentication mechanism. For example, if a person with a particular domain is using Kiteworks and sends a file to a party outside of his domain, that external party has to go through two-factor authentication. The receiver gets a link that takes them to the setup of a temporary account, which will be valid for three days. The recipient will also receive a customized password separately. Only after all these steps will they be able to access the file. That access is only available to a person with the mail ID to which the file was sent. In addition, admins can see who is sending sensitive content, what that content is, and to whom it is being sent, and can track emails. One week of good training will give a user complete knowledge for using the solution. The system is very easy to use. You just click on "Compose," attach a file, and send it. It's very easy compared to Outlook or Teams. It's quite simple, even for someone logging in for the first time. It is very smooth and easy to send files.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We use Microsoft Defender for its ability to integrate with existing business technologies, which is beneficial for protecting business areas."
"Defender for 365 is a comprehensive cloud-based solution. The value of the cloud is that you aren't alone. Threat intelligence and analytics are shared in the cloud. We don't have to find the solution alone. If you face an unknown threat with traditional solutions like Trend Micro and Symantec, you need to open a case and send your information to them to analyze forensically and identify the source of the attack."
"Since we have started using the solution, there have been fewer compromises."
"It also gives me good visibility because, with Defender, I'm using a Microsoft product to defend Microsoft products. The integration was really seamless and I have wide visibility because it picks up almost everything. Literally, I can see almost every activity that happens, from the e-mail to the workstation itself."
"The solution is very easy to use. All you have to do is to assign the license to the end-user and it's done. The customer will only have the feature activated, and the solution will monitor the emails to determine if they are a threat or not."
"The initial setup is straightforward. You just add the license, click it, and then you can set up the rules. It is quite simple."
"The email protection is excellent, especially in terms of anti-phishing policies."
"The most valuable feature is the integration. It's a single console, so we don't have to switch around between multiple products. Another valuable feature is the ease of operations and maintenance."
"The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc."
"The product is a fairly complete and centralized solution accessible through the Infinity Portal."
"It is fast and has a very simple, easy integration."
"For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good."
"The setup is very easy. I haven't faced any complexity with the setup of the solution."
"The main benefit is that hackers can't steal information."
"The dashboard provides information to investigate more about malicious activity and blocked emails."
"It is fast and quite effective in terms of preventing any security incidents."
"The top two features are the two-factor authentication, which is pretty good. It's easily understood by the users. And their API is rather robust. We have numerous integrations that work off the API."
"The benefits that Kiteworks has provided to its customers in terms of data sovereignty."
"The most valuable feature is the ability to allow end-users to manage their own information and data with minimal administration. That's the best feature from my perspective."
"The solution removes the limitations with file attachment size that is found with regular email."
"I like Kiteworks or Accellion because it's continuously upgraded. I also know that it probably works with a lot of clients."
"The most valuable aspect of Kiteworks is undoubtedly the private content network. This feature is particularly beneficial for us. Furthermore, it serves as a centralized platform that enables us to track and manage our information exchange."
"The most valuable feature is the ability to send a large file of 30 GB in size and more. In Outlook and other email applications, you cannot send files that are larger than 20 MB. But with Kiteworks, 30 GB is transferable by default and, with the proper approval, a file of up to 100 GB can be sent. It makes file transfer very easy and smooth."
"Scalability is impressive."
 

Cons

"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."
"We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email."
"Configuration requires going to a lot of places rather than just accessing one tab."
"You should be able to deploy Defender for every subscription without the need to add servers."
"Sometimes, phishing emails manage to pass through the filter, so the system needs to enhance its phishing email detection capabilities."
"The XDR dashboard has room for improvement."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"Microsoft Defender for Office 365's Mac functionality requires improvement to deliver the same level of protection found on Windows devices."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"We still get some false positives. There are times when legitimate stuff gets flagged and it could be that somebody is expecting a very important email but they don't end up getting it. On the flip side, when we alert Check Point about stuff like this, it is corrected, so they are improving. That's a plus."
"if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."
"Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"I need to go to Check Point's admin portal if I want to see the license list and the details of the users of the tool, making it an area of concern where some ease of process should be provided from an improvement perspective."
"The sanitization on the file needs improvement."
"There are sometimes leakages of viruses when the system is experiencing network failures."
"There is no offboarding process for end-users in Kiteworks. It's a manual process. There is no automated syncing with LDAP and checking to see if the account is still active. It's a manual process to get people out of here, which isn't the best way."
"We have experienced a few hiccups and bugs when using the admin console and from a user perspective."
"Perhaps there could be a notification to users about their bandwidth or network packet loss."
"Kiteworks could benefit from enhancing the proposal knowledge base section, specifically regarding the type of work involved. Currently, the knowledge base seems insufficiently dedicated to this topic, making it challenging for new users to access the relevant administrative law. Improving the visual aids and providing clearer explanations could alleviate this issue."
"I would like to see immediate releases of fixes because now it takes at least a week. If that time span can be reduced to one day or two days, that would be very helpful for users so that things are sorted and transactions work smoothly."
"In my experience, their technical support can be a little slow."
"It would be nice if Kiteworks could provide a free version of the platform so that it could be used for a certain number of file transfers. We could be charged a fee if we exceeded the number of allotted file transfers."
"There are always issues when there are bugs or upgrades. The challenge with upgrading is getting more storage from the customer. Every time we have a new version, it requires additional storage. This means that the customer would need to procure more storage for their server, which they don't like because it means additional cost to them. So, I think my request would be that the version upgrades don't require any significant storage requirement."
 

Pricing and Cost Advice

"Defender for 365 comes in various plans and licenses, along with other Microsoft security solutions. Purchasing this kind of package or security bundle gives good value for money, and that's what I recommend."
"Compared to other brands, Microsoft Defender for Office 365's pricing is competitive."
"The product is very expensive."
"The product is expensive."
"The pricing is normal. Considering its popularity, it's not overpriced."
"It is much more expensive than using another solution because we have had to include some options and upgrade our license."
"For large enterprise organizations, they can definitely afford it, but for small and medium organizations, they might struggle to cover the expenses."
"The pricing has become expensive."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
"The product is expensive."
"The product’s price is very high."
"Do a full feature evaluation (interactive) with a support person. That is what I did."
"This is a very good product if you are on the cloud, but the price is a little more expensive."
"Usually, we pay for the licensing part on a yearly basis and not on a monthly basis. If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts."
"I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers."
"Due to its pricing, I would say that Check Point Harmony Email & Collaboration is more suitable for medium to enterprise organizations."
"It is not really expensive. I mean, to me it's obviously expensive, but it's worth it."
"They changed it midstream. We were being charged a certain flat rate for SFTP traffic. For whatever reason, at the beginning of the year, our pricing changed, and we are now being charged more for using a feature of the product than we were when we first bought it. That has been our experience with billing. It turned out to be more expensive than when we started with it."
"The price of Kiteworks is reasonable."
"The license management is changing and confusing. If I could make one change to it, it would be better license management through the API."
"I believe it's a little costly, but given the faith that we put into it from a security perspective to maintain the integrity of our patient information that is being transferred through this system, that's a small price to pay. So, on the surface, it might look like a lot of money, but depending on the need for security, which is where we feel it shines, it's okay price-wise."
"The solution is very expensive because we are buying with Malaysian Ringgit and it's sold in US dollars."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
850,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
18%
Financial Services Firm
9%
Manufacturing Company
8%
Healthcare Company
5%
Government
13%
Financial Services Firm
13%
Computer Software Company
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
Money-wise, it is a part of the Office 365 ( /products/office-365-reviews ) suite, making it slightly more expensive ...
What needs improvement with Microsoft Defender for Office 365?
The main area for improvement is simplifying the implementation and rollout process. There are many conditions to be ...
What is your primary use case for Check Point Harmony Email & Office?
We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For exa...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What is Kiteworks?
Kiteworks is a secured file sharing platform that enables users to collaborate with different parties across a robust...
What do you like most about Kiteworks?
The benefits that Kiteworks has provided to its customers in terms of data sovereignty.
What needs improvement with Kiteworks?
I'm not a network expert, however, there must be some room for improvement. Perhaps there could be a notification to ...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
Accellion
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
United States Securities and Exchange Commission, National Health Service, Husch Blackwell LLP, NYC Health + Hospitals, Viatris, MITRE Corporation, Chubb, Kraft Heinz, KPMG, Kohler, National Institute of Standards and Technology, Purdue Pharma, AVL
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Kiteworks and other solutions. Updated: April 2025.
850,028 professionals have used our research since 2012.