Check Point Harmony Email & Collaboration vs Microsoft Defender for Cloud comparison

You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Harmony Email & Collaboration and Microsoft Defender for Cloud based on real PeerSpot user reviews.

Find out in this report how the two CWPP (Cloud Workload Protection Platforms) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Check Point Harmony Email & Collaboration vs. Microsoft Defender for Cloud Report (Updated: March 2023).
687,256 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
"It is fast and has a very simple, easy integration.""The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great.""The product is a fairly complete and centralized solution accessible through the Infinity Portal.""It's easy to use and offers practical configuration and administration.""Email security has improved since we deployed this platform.""Encryption of emails enhances safe communication that ransomware attacks cannot compromise.""The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic.""It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."

More Check Point Harmony Email & Collaboration Pros →

"We can create alerts that trigger if there is any malicious activity happening in the workflow and these alerts can be retrieved using the query language.""The first valuable feature was the fact that it gave us a list of everything that users were surfing on the web. Having the list, we could make decisions about those sites.""When you have commissioned Defender, you have these things visible already on your dashboard. This gives the efficiency to the people to do their actual work rather than bothering about the email, sorting out the email, or looking at it through an ITSM solution, whey they have to look at the description and use cases. Efficiency increases with this optimized, ready-made solution since you don't need to invest in something externally. You can start using the dashboard and auditing capability provided from day one. Thus, you have fewer costs with a more optimized, easier-to-use solution, providing operational efficiency for your team.""Threat protection is comprehensive and simple.""One important security feature is the incident alerts. Now, with all these cyberattacks, there are a lot of incident alerts that get triggered. It is very difficult to keep monitoring everything automatically, instead our organization is utilizing the automated use case that we get from Microsoft. That has helped bring down the manual work for a lot of things.""The main feature is the security posture assessment through the security score. I find that to be very helpful because it gives us guidance on what needs to be secured and recommendations on how to secure the workloads that have been onboarded.""Most importantly, it's an integrated solution. We not only have Defender for Cloud, but we also have Defender for Endpoint, Defender for Office 365, and Defender for Identity. It's an integrated, holistic solution.""Everything is built into Azure, and if we go for cross-cloud development with Azure Arc, we can use most of the features. While it's possible to deploy and convert third-party applications, it is difficult to maintain, whereas Azure deployments to the cloud are always easier. Also, Microsoft is a big company, so they always provide enough support, and we trust the Microsoft brand."

More Microsoft Defender for Cloud Pros →

"They could continue to offer more stringent security policy measures for threat point management.""A phishing simulator would be helpful as a user training module.""The implementation could definitely be better.""Its guides are not great.""Some files are not scanned thoroughly due to occasional network failures.""The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally.""We understand that false positives are always there, but sometimes the notifications are more than expected.""After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."

More Check Point Harmony Email & Collaboration Cons →

"Sometimes, it's very difficult to determine when I need Microsoft Defender for Cloud for a special resource group or certain kinds of products. That's not an issue directly with the product, though.""After getting a recommendation, it takes time for the solution to refresh properly to show that the problem has been eliminated.""From my own perspective, they just need a product that is tailored to micro-segmentation so I can configure rules for multiple systems at once and manage it.""Another thing is that Defender for Cloud uses more resources than CrowdStrike, which my current company uses. Defender for Cloud has two or three processes running simultaneously that consume memory and processor time. I had the chance to compare that with CrowdStrike a few days ago, which was significantly less. It would be nice if Defender were a little lighter. It's a relatively large installation that consumes more resources than competitors do.""Microsoft can improve the pricing by offering a plan that is more cost-effective for small and medium organizations.""Most of the time, when we log into the support, we don't get a chance to interact with Microsoft employees directly, except having it go to outsource employees of Microsoft. The initial interaction has not been that great because outsourced companies cannot provide the kind of quality or technical expertise that we look for. We have a technical manager from Microsoft, but they are kind of average unless we make noise and ask them to escalate. We then can get the right people and the right solution, but it definitely takes time.""The solution's portal is very easy to use, but there's one key component that is missing when it comes to managing policies. For example, if I've onboarded my server and I need to specify antivirus policies, there's no option to do that on the portal. I will have to go to Intune to deploy them. That is one main aspect that is missing and it's worrisome.""Azure Security Center takes a long time to update, compared to the on-premises version of Microsoft Defender."

More Microsoft Defender for Cloud Cons →

Pricing and Cost Advice
  • "Reasonable cost, quick and easy implementation, and transparent."
  • "Check Point is more expensive. That's the honest truth. So far, it's a good value for the money."
  • More Check Point Harmony Email & Collaboration Pricing and Cost Advice →

  • "This is a worldwide service and depending on the country, there will be different prices."
  • "Security Center charges $15 per resource for any workload that you onboard into it. They charge per VM or per data-base server or per application. It's not like Microsoft 365 licensing, where there are levels like E3 and E5. Security Center is pretty straightforward."
  • "There is a helpful cost-reducing option that allows you to integrate production subscriptions with non-production subscriptions."
  • "Its pricing is a little bit high in terms of Azure Security Center, but the good thing is that we don't need to maintain and deploy it. So, while the pricing is high, it is native to Azure which is why we prefer using this tool."
  • "I am not involved in this area. However, I believe its price is okay because even small customers are using Azure Security Center. I don't think it is very expensive."
  • "The cost of the license is based on the subscriptions that you have."
  • "Although I am outside of the discussion on budget and costing, I can say that the importance of security provided by this solution is of such importance that whatever the cost is, it is not a factor."
  • "This solution is more cost-effective than some competing products. My understanding is that it is based on the number of integrations that you have, so if you have fewer subscriptions then you pay less for the service."
  • More Microsoft Defender for Cloud Pricing and Cost Advice →

    Use our free recommendation engine to learn which CWPP (Cloud Workload Protection Platforms) solutions are best for your needs.
    687,256 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:As for the cost, it is per protected user. It seems good to me in that aspect however, the issue of implementation sometimes costs a bit. That's okay if it can be done correctly. The licenses are easy… more »
    Top Answer:Our corporate environment requires business protection for email and our collaboration tools to avoid threats, spam, and ransomware, among other threats coming in through email. This could have great… more »
    Top Answer:We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point.
    Top Answer:Azure Security Center is very easy to use, integrates well, and gives very good visibility on what is happening across your ecosystem. It also has great remote workforce capabilities and supports a… more »
    Top Answer:The integration with Logic Apps allows for automated responses to incidents.
    Top Answer:This is a worldwide service and depending on the country, there will be different prices. There is a price calculator for Azure Services. You select the service that you are interested in, and the… more »
    Average Words per Review
    Average Words per Review
    Also Known As
    Check Point Harmony Email & Office, Check Point CloudGuard, Check Point CloudGuard SaaS
    Microsoft Azure Security Center, Azure Security Center, Microsoft ASC, Azure Defender
    Learn More
    Check Point
    Video Not Available

    Check Point Harmony Email and Office is a cloud-based software offering complete protection to stop malware attacks through emails. The software is designed to provide protection for organizations using Office 365, G Suite, Google Workspace, and all other collaboration and file-sharing apps. Access permissions can be granted and custom policies can be defined for any user of choice.

    Check Point Harmony Email and Office identifies and blocks advanced malware, phishing, and ransomware attacks in real time before they reach the user’s inbox. In turn, this also helps protect sensitive business data from breaches. Harmony Email and Office was the first solution to implement machine learning, API, and AI for email security, and will ultimately prevent any attempts at account takeover via agentless multi-factor authentication.

    What is Complete Protection?

    Check Point Harmony Email and Office offers a superior catch rate for collaboration apps and cloud email with their API-based solution that detects attacks that other solutions miss, including account takeover, supply chain attacks, ransomware, and BEC. The complete protection offers:

    • Malware Protection - Recognized by NSS Labs as “most effective in breach prevention,” the solution leverages technologies to bring clean files to users within 1.5 seconds. In addition, enterprises can be safer as the solution prevents malicious messages and files from reaching the user’s inbox.
    • Data Leakage Protection - Any confidential or sensitive information will be marked and have a classified suffix added to the end of the message or file to help keep those materials safe. Those files are encrypted, and the user will be alerted to any attempted breach of those messages.
    • Phishing Protection - Before advanced phishing attacks reach the end user, Harmony Email and Office detects and blocks them, including outbound, inbound, and internal communications.
    • Account Takeover Protection - After a user connects their cloud app, the solution captures the user's history and creates a profile and a custom threat profile. In the event of a suspected account takeover, threat intelligence is leveraged through millions of Check Point-secured gateways and endpoints and is blocked.

    Reviews from Real Users

    Check Point Harmony Email and Office offers a revolutionary prevention solution to stop malware attacks through emails. Users particularly like its visibility and the ability to protect sensitive business data.

    David U., a CISO at IMC companies, notes, "It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."

    Mantu S., a senior technology architect at Incedo Inc., writes, "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."

    Microsoft Defender for Cloud protects your Azure and hybrid resources. Microsoft uses a wide variety of physical, infrastructure, and operational controls to help secure Azure—but there are additional actions you need to take to help safeguard your workloads. Turn on Azure Security Center to strengthen your cloud security posture. Within Azure Security Center, use Azure Defender to protect your hybrid cloud workloads. With Azure Security Center, you can:

    - Assess and visualize the security state of your resources in Azure, on-premises, and in other clouds with Azure Secure Score

    - Simplify enterprise compliance and view your compliance against regulatory requirements

    - Protect all your hybrid cloud workloads with Azure Defender, which is integrated with Security Center

    - Use AI and automation to cut through false alarms, quickly identify threats, and streamline threat investigation

    To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.

    Learn more about Check Point Harmony Email & Collaboration
    Learn more about Microsoft Defender for Cloud
    Sample Customers
    Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
    Microsoft Defender for Cloud is trusted by companies such as ASOS, Vatenfall, SWC Technology Partners, and more.
    Top Industries
    Computer Software Company17%
    Energy/Utilities Company17%
    Security Firm14%
    Manufacturing Company7%
    Computer Software Company19%
    Comms Service Provider10%
    Security Firm7%
    Manufacturing Company6%
    Computer Software Company22%
    Consumer Goods Company11%
    Real Estate/Law Firm6%
    Computer Software Company20%
    Financial Services Firm12%
    Comms Service Provider6%
    Company Size
    Small Business39%
    Midsize Enterprise23%
    Large Enterprise39%
    Small Business33%
    Midsize Enterprise20%
    Large Enterprise47%
    Small Business26%
    Midsize Enterprise13%
    Large Enterprise62%
    Small Business19%
    Midsize Enterprise13%
    Large Enterprise67%
    Buyer's Guide
    Check Point Harmony Email & Collaboration vs. Microsoft Defender for Cloud
    March 2023
    Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Microsoft Defender for Cloud and other solutions. Updated: March 2023.
    687,256 professionals have used our research since 2012.

    Check Point Harmony Email & Collaboration is ranked 6th in CWPP (Cloud Workload Protection Platforms) with 19 reviews while Microsoft Defender for Cloud is ranked 2nd in CWPP (Cloud Workload Protection Platforms) with 32 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Microsoft Defender for Cloud is rated 8.2. The top reviewer of Check Point Harmony Email & Collaboration writes "Integrates with Office365, strengthens security, and provides visibility". On the other hand, the top reviewer of Microsoft Defender for Cloud writes "Provides good recommendations and makes policy administration easy". Check Point Harmony Email & Collaboration is most compared with Cisco Secure Workload, Prisma Cloud by Palo Alto Networks, Trend Micro Cloud One Workload Security, Microsoft Defender for Office 365 and Fortinet FortiMail Cloud, whereas Microsoft Defender for Cloud is most compared with Microsoft 365 Defender, Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Trend Micro Cloud One Workload Security and Check Point CloudGuard Posture Management. See our Check Point Harmony Email & Collaboration vs. Microsoft Defender for Cloud report.

    See our list of best CWPP (Cloud Workload Protection Platforms) vendors.

    We monitor all CWPP (Cloud Workload Protection Platforms) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.