Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Menlo Protect comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
50
Ranking in other categories
Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (11th)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
59
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
Menlo Protect
Ranking in Email Security
43rd
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
2
Ranking in other categories
Internet Security (12th), Enterprise Browsers (8th), Remote Browser Isolation (RBI) (3rd)
 

Mindshare comparison

As of May 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 12.9%, down from 18.3% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.7%, up from 3.3% compared to the previous year. The mindshare of Menlo Protect is 0.3%, down from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Gerard GLOWKA - PeerSpot reviewer
Stable and scalable solution with a great threat isolation engine
Menlo Security RBI is mainly used to do basic cloud migrationary technologies Menlo Security RBI's best feature is its threat isolation engine. Menlo Security RBI could be more cloud-friendly, and its mobility could be improved. In the next release, I'd like Menlo Security RBI to include a…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."
"Defender is a SaaS platform, so it offers more flexibility. Managing the permissions is easier. The solution's automated detection and response features are scalable."
"The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time."
"I like its investigation capabilities, as that is what is most important to me. It is fairly simple with a user-friendly interface."
"Microsoft Defender has a feature to protect each and every attachment. Even if it's an encrypted attachment, it will check for any potential threats."
"The benefit that stands out to me is the ability for multiple individuals to collaborate simultaneously within the same document. Additionally, there is the option to save the document directly in the integrated OneDrive or SharePoint."
"Microsoft Defender for Office 365's most valuable feature is its performance."
"One of the best features of the tool is its capability to aggregate insights from different workloads, basically from the Office 365 and endpoints part."
"It is fast and has a very simple, easy integration."
"The anti-phishing feature is the solution's best feature."
"Check Point's technical support is very good."
"Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size."
"For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good."
"The setup is very easy. I haven't faced any complexity with the setup of the solution."
"The dashboard provides information to investigate more about malicious activity and blocked emails."
"The API is its most valuable feature. On the API side, relative to the rest of the market, Check Point is decades ahead of its competitors."
"Menlo Security RBI's best feature is its threat isolation engine."
"I can't say that there is one specific feature that is most valuable. It's the overall platform that is well-suited to our needs. It's something that is different from a lot of other products or platforms in the marketplace."
 

Cons

"Several simulation options are available within 365, and the phishing simulation could be better."
"Configuring the default strategies and policies in Microsoft Defender for Cloud Apps generates a lot of noise and false positives."
"Microsoft Defender for Office 365 should be more proactive."
"We noticed that from time to time, Microsoft's stability does have problems. Sometimes the service goes up and down. Sometimes they change without prior notice."
"The pre-sales cost calculations could be more transparent."
"We need a separate license and we don't know how to get the license that is required."
"Microsoft should provide more documentation for users so they can self-educate. I would like to see more documentation for advanced security features."
"They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not."
"The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"There are sometimes leakages of viruses when the system is experiencing network failures."
"They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response."
"Stability has been a pain point. I was going back and forth with my product engineer and project manager for a couple of months. I had the product in a demonstration mode and wasn't satisfied with the results initially. After a few alterations and a few revisions later, it is fine."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"I would like Check Point to extend its coverage to include more cloud applications."
"They could help us be integrating features with solutions from third parties."
"There are several features, such as supporting web technologies, that the company is working on implementing in the platform. There are a lot of backend web technologies in use on various websites, for example, two-way audio/video and WebGL, for which support may not be fully implemented in the product."
"Menlo Security RBI could be more cloud-friendly, and its mobility could be improved."
 

Pricing and Cost Advice

"Microsoft Defender is expensive. I typically recommend it only if clients have the budget. Otherwise, I would suggest an alternative."
"The product is very expensive."
"For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
"I know that the product is incredibly expensive."
"The license is expensive because the cost is based on the number of users."
"I was working in the government and it was too expensive for us to use our Microsoft products."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"The pricing is normal. Considering its popularity, it's not overpriced."
"The pricing and licensing are always negotiable."
"I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers."
"I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive."
"I rate the platform’s pricing a seven and a half."
"As we are a non-profit organization, we got the tool with a good offer. On a yearly basis, we pay 10,000 Euro for 500 users, which also includes the technical support part."
"Being able to keep the phishing campaigns out of my company has been ROI for me."
"The product is expensive compared to some competitors, especially for the SME segment."
"This is a very good product if you are on the cloud, but the price is a little more expensive."
"Menlo Security RBI can be very costly."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
850,043 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
18%
Financial Services Firm
9%
Manufacturing Company
8%
Healthcare Company
5%
Computer Software Company
14%
Financial Services Firm
13%
Government
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
Money-wise, it is a part of the Office 365 ( /products/office-365-reviews ) suite, making it slightly more expensive ...
What needs improvement with Microsoft Defender for Office 365?
The main area for improvement is simplifying the implementation and rollout process. There are many conditions to be ...
What is your primary use case for Check Point Harmony Email & Office?
We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For exa...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
Ask a question
Earn 20 points
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
Menlo Security Email Security, Menlo Security Remote Browser Isolation
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Macy's, HSBC, Bank of Hawaii
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Menlo Protect and other solutions. Updated: April 2025.
850,043 professionals have used our research since 2012.