We performed a comparison between Check Point Harmony Email & Collaboration and Microsoft Defender for Cloud based on real PeerSpot user reviews.Find out in this report how the two CWPP (Cloud Workload Protection Platforms) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
"It is fast and has a very simple, easy integration."
"The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great."
"The product is a fairly complete and centralized solution accessible through the Infinity Portal."
"It's easy to use and offers practical configuration and administration."
"Email security has improved since we deployed this platform."
"Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
"The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic."
"It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
"We can create alerts that trigger if there is any malicious activity happening in the workflow and these alerts can be retrieved using the query language."
"The first valuable feature was the fact that it gave us a list of everything that users were surfing on the web. Having the list, we could make decisions about those sites."
"When you have commissioned Defender, you have these things visible already on your dashboard. This gives the efficiency to the people to do their actual work rather than bothering about the email, sorting out the email, or looking at it through an ITSM solution, whey they have to look at the description and use cases. Efficiency increases with this optimized, ready-made solution since you don't need to invest in something externally. You can start using the dashboard and auditing capability provided from day one. Thus, you have fewer costs with a more optimized, easier-to-use solution, providing operational efficiency for your team."
"Threat protection is comprehensive and simple."
"One important security feature is the incident alerts. Now, with all these cyberattacks, there are a lot of incident alerts that get triggered. It is very difficult to keep monitoring everything automatically, instead our organization is utilizing the automated use case that we get from Microsoft. That has helped bring down the manual work for a lot of things."
"The main feature is the security posture assessment through the security score. I find that to be very helpful because it gives us guidance on what needs to be secured and recommendations on how to secure the workloads that have been onboarded."
"Most importantly, it's an integrated solution. We not only have Defender for Cloud, but we also have Defender for Endpoint, Defender for Office 365, and Defender for Identity. It's an integrated, holistic solution."
"Everything is built into Azure, and if we go for cross-cloud development with Azure Arc, we can use most of the features. While it's possible to deploy and convert third-party applications, it is difficult to maintain, whereas Azure deployments to the cloud are always easier. Also, Microsoft is a big company, so they always provide enough support, and we trust the Microsoft brand."
"They could continue to offer more stringent security policy measures for threat point management."
"A phishing simulator would be helpful as a user training module."
"The implementation could definitely be better."
"Its guides are not great."
"Some files are not scanned thoroughly due to occasional network failures."
"The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."
"Sometimes, it's very difficult to determine when I need Microsoft Defender for Cloud for a special resource group or certain kinds of products. That's not an issue directly with the product, though."
"After getting a recommendation, it takes time for the solution to refresh properly to show that the problem has been eliminated."
"From my own perspective, they just need a product that is tailored to micro-segmentation so I can configure rules for multiple systems at once and manage it."
"Another thing is that Defender for Cloud uses more resources than CrowdStrike, which my current company uses. Defender for Cloud has two or three processes running simultaneously that consume memory and processor time. I had the chance to compare that with CrowdStrike a few days ago, which was significantly less. It would be nice if Defender were a little lighter. It's a relatively large installation that consumes more resources than competitors do."
"Microsoft can improve the pricing by offering a plan that is more cost-effective for small and medium organizations."
"Most of the time, when we log into the support, we don't get a chance to interact with Microsoft employees directly, except having it go to outsource employees of Microsoft. The initial interaction has not been that great because outsourced companies cannot provide the kind of quality or technical expertise that we look for. We have a technical manager from Microsoft, but they are kind of average unless we make noise and ask them to escalate. We then can get the right people and the right solution, but it definitely takes time."
"The solution's portal is very easy to use, but there's one key component that is missing when it comes to managing policies. For example, if I've onboarded my server and I need to specify antivirus policies, there's no option to do that on the portal. I will have to go to Intune to deploy them. That is one main aspect that is missing and it's worrisome."
"Azure Security Center takes a long time to update, compared to the on-premises version of Microsoft Defender."
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email and Office is a cloud-based software offering complete protection to stop malware attacks through emails. The software is designed to provide protection for organizations using Office 365, G Suite, Google Workspace, and all other collaboration and file-sharing apps. Access permissions can be granted and custom policies can be defined for any user of choice.
Check Point Harmony Email and Office identifies and blocks advanced malware, phishing, and ransomware attacks in real time before they reach the user’s inbox. In turn, this also helps protect sensitive business data from breaches. Harmony Email and Office was the first solution to implement machine learning, API, and AI for email security, and will ultimately prevent any attempts at account takeover via agentless multi-factor authentication.
What is Complete Protection?
Check Point Harmony Email and Office offers a superior catch rate for collaboration apps and cloud email with their API-based solution that detects attacks that other solutions miss, including account takeover, supply chain attacks, ransomware, and BEC. The complete protection offers:
Reviews from Real Users
Check Point Harmony Email and Office offers a revolutionary prevention solution to stop malware attacks through emails. Users particularly like its visibility and the ability to protect sensitive business data.
David U., a CISO at IMC companies, notes, "It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
Mantu S., a senior technology architect at Incedo Inc., writes, "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
Microsoft Defender for Cloud protects your Azure and hybrid resources. Microsoft uses a wide variety of physical, infrastructure, and operational controls to help secure Azure—but there are additional actions you need to take to help safeguard your workloads. Turn on Azure Security Center to strengthen your cloud security posture. Within Azure Security Center, use Azure Defender to protect your hybrid cloud workloads. With Azure Security Center, you can:
- Assess and visualize the security state of your resources in Azure, on-premises, and in other clouds with Azure Secure Score
- Simplify enterprise compliance and view your compliance against regulatory requirements
- Protect all your hybrid cloud workloads with Azure Defender, which is integrated with Security Center
- Use AI and automation to cut through false alarms, quickly identify threats, and streamline threat investigation
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
Check Point Harmony Email & Collaboration is ranked 6th in CWPP (Cloud Workload Protection Platforms) with 19 reviews while Microsoft Defender for Cloud is ranked 2nd in CWPP (Cloud Workload Protection Platforms) with 32 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Microsoft Defender for Cloud is rated 8.2. The top reviewer of Check Point Harmony Email & Collaboration writes "Integrates with Office365, strengthens security, and provides visibility". On the other hand, the top reviewer of Microsoft Defender for Cloud writes "Provides good recommendations and makes policy administration easy". Check Point Harmony Email & Collaboration is most compared with Cisco Secure Workload, Prisma Cloud by Palo Alto Networks, Trend Micro Cloud One Workload Security, Microsoft Defender for Office 365 and Fortinet FortiMail Cloud, whereas Microsoft Defender for Cloud is most compared with Microsoft 365 Defender, Prisma Cloud by Palo Alto Networks, AWS GuardDuty, Trend Micro Cloud One Workload Security and Check Point CloudGuard Posture Management. See our Check Point Harmony Email & Collaboration vs. Microsoft Defender for Cloud report.
See our list of best CWPP (Cloud Workload Protection Platforms) vendors.
We monitor all CWPP (Cloud Workload Protection Platforms) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.