


Check Point Harmony Email & Collaboration and Netwrix Endpoint Protector compete in the cybersecurity market, focusing on email and collaboration security and data loss prevention, respectively. Harmony Email appears to have an advantage in cloud integration and ease of use, while Endpoint Protector excels in endpoint data protection.
Features: Check Point Harmony Email & Collaboration offers strong email threat protection, API integration, and collaboration tools, making it ideal for organizations focused on email and collaboration security. Harmony also leads in cloud integration and user-friendliness. Netwrix Endpoint Protector provides robust data loss prevention features, including device control, content-aware protection, and support for multiple operating systems, which are critical for preventing data leaks.
Room for Improvement: Check Point Harmony Email & Collaboration can improve in project management flexibility, reducing false positives, and third-party application integration. Users also report issues with customer support response times. Netwrix Endpoint Protector could enhance its network-level DLP, Linux support, and policy granularity. Customization and uninstall processes have been reported as challenges by some users.
Ease of Deployment and Customer Service: Check Point Harmony Email & Collaboration is typically deployed on public and hybrid clouds, with a straightforward setup but mixed feedback on support, particularly about slower response times. Netwrix Endpoint Protector is usually an on-premises solution, known for responsive technical support, though initial setup and licensing changes can be challenging. Check Point's customer service varies by region, whereas Endpoint Protector is more favored by smaller organizations for its support.
Pricing and ROI: Check Point Harmony Email & Collaboration is often seen as costly, aimed at medium to large enterprises, but offers elastic licensing and high ROI through improved security and reduced attack risks. Netwrix Endpoint Protector's pricing is considered reasonable with competitive licensing options, making it budget-friendly for smaller organizations, delivering satisfactory ROI through effective data protection and cost-efficient licensing.
For the small project I was working on, using the basic tier provided a huge improvement at zero cost.
In terms of return on investment with Cloudflare, it costs my time to set them up, but basically once they're set up, it's done.
The time saved during investigations is significant due to the neat dashboard that organizes everything related to alerts.
We have gone from three to four successful phishing attacks every year to a maximum of one.
There has been a 70% decrease in phishing emails and data breaches since implementing Check Point Harmony Email Security.
Cloudflare does not offer hands-on technical support to fix customer problems but rather a self-service model.
I would rate the technical support with Cloudflare as excellent every time I've had to call them.
I have primarily worked not with the tool's customer support but with the product's sales engineers and technical sales engineers, who seem to know their stuff.
Their technical support is proficient at resolving issues within their scope, providing excellent problem-solving assistance and guidance.
We opted for the 24/7 premium support, which is very responsive and quick whenever we have configuration challenges or other inquiries.
We understand that with respect to SLA, but we expect they can go beyond SLA and provide quick support for the client.
I would rate the technical support for Netwrix Endpoint Protector as a nine because we have trained engineers, and I am also trained.
I never needed to contact the vendor for technical support because we faced very few issues.
It is a SaaS tool, but the fact that they have workloads deployed across the world proves that it is a highly scalable tool.
The tool offers very good performance, even during high-traffic periods.
I rate the solution’s scalability an eight out of ten.
I would rate the scalability of Check Point Harmony Email and Collaboration as nine out of ten, indicating high scalability.
Scalability is limited, being only integrated with Microsoft Office 365 and G Suite at present.
Everything starts from the endpoint, and we maintain the Endpoint DLP in many cases while working alongside existing DLP systems.
This solution is scalable because prior to onboarding it, we took references from the vendor, the implementation vendor, and the CoSoSys team.
I rate the solution’s stability an eight out of ten.
The service is very stable with no impacts during high-traffic periods.
The platform is very stable; we have not encountered any downtime or stability-related issues.
The product has been around for over 15 years now and is very stable because I started using them from version three.
Stability-wise, the solution is stable; we experienced no downtimes during our two years of usage.
Despite these challenges, overall, Cloudflare remains the preferred solution compared to Azure, AWS CloudFront, and Google Cloud Armor.
Areas like how assessment, discovery, and payload are dealt with and how it all comes into your organization can be considered when trying to make suggestions to Cloudflare for improvements.
There are some performance considerations when it comes to dynamic content that involves fetching data from databases or using APIs.
Updates based on AI and reduced administrative overhead by adding or bulk adding new users, along with graphical enhancements to the GUI, would also be beneficial.
Enhancing reporting capabilities with customizable and advanced analytics features would greatly improve our ability to detect trends and proactively address emerging threats.
The current system, being tied directly to the mailbox instead of requiring MX record verification, allows new mailboxes to function immediately after Microsoft activation.
Netwrix is known as the best DLP for Apple Macintosh computers, which is noteworthy.
Not all the policies applied to the Linux clients were as effective as those for Mac and Windows.
I find it to be cheap.
I rate the product’s pricing a five out of ten, where one is cheap, and ten is expensive.
The tool is a premium product, so it is very expensive.
Pricing is a bit expensive, but it is worth it considering the features that Check Point provides.
I consider the pricing to be a bit expensive, similar to other solutions.
The pricing is lower compared to what I used before.
The most valuable features of the solution are performance and security.
Techniques like minification and image compression reduce the size of assets, leading to better performance and faster user load times.
The solution has been able to compare it to the market, and I think the product has taken great strides in automating quite a bit of things, and they use a lot of AI.
I haven't had any users accidentally click on something problematic since implementing the product, which speaks to its efficacy.
The most valuable feature is spam detection and phishing site prevention, which Microsoft couldn't catch, yet Check Point does.
Check Point Harmony Email and Collaboration offers online support and has tight integration with Microsoft.
Assuming if there's a breach, we will be able to know exactly where the breach has occurred and what has occurred, and they are quite granular in how they report their information, including their logs.
Netwrix Endpoint Protector works on Linux and macOS to block USB ports, control internet access, and manage other peripheral ports.
License utilization was a concern as when we were changing the hostname from asset category to asset tag and from personal hostnames to asset tags, it started taking multiple licenses.


| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 8 |
| Large Enterprise | 25 |
| Company Size | Count |
|---|---|
| Small Business | 58 |
| Midsize Enterprise | 26 |
| Large Enterprise | 29 |
| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 9 |
| Large Enterprise | 6 |
Cloudflare enhances web performance and security with features like CDN caching and DDoS mitigation while providing easy DNS management and intuitive setup through its user-friendly dashboard.
Cloudflare is recognized for its comprehensive web security and performance solutions. Speed improvements are achieved through caching mechanisms and DDoS protection, combining ease of DNS management with flexible page rules. The robust analytics and threat insight tools provide valuable data, assisted by a user-friendly dashboard allowing quick setup and configuration. An API offers dynamic DNS settings ensuring low latency and high performance across the globe.
What are Cloudflare's key features?Cloudflare finds utility across industries for DNS management and defense mechanisms. Its content delivery network assures fast content distribution and fortified security. Businesses integrate features like web application firewalls, load balancing, end-to-end SSL, and zero trust to protect websites from cyber threats while ensuring resilience and reliable performance.
Check Point Harmony Email and Office is a cloud-based software offering complete protection to stop malware attacks through emails. The software is designed to provide protection for organizations using Office 365, G Suite, Google Workspace, and all other collaboration and file-sharing apps. Access permissions can be granted and custom policies can be defined for any user of choice.
Check Point Harmony Email and Office identifies and blocks advanced malware, phishing, and ransomware attacks in real time before they reach the user’s inbox. In turn, this also helps protect sensitive business data from breaches. Harmony Email and Office was the first solution to implement machine learning, API, and AI for email security, and will ultimately prevent any attempts at account takeover via agentless multi-factor authentication.
What is Complete Protection?
Check Point Harmony Email and Office offers a superior catch rate for collaboration apps and cloud email with their API-based solution that detects attacks that other solutions miss, including account takeover, supply chain attacks, ransomware, and BEC. The complete protection offers:
Reviews from Real Users
Check Point Harmony Email and Office offers a revolutionary prevention solution to stop malware attacks through emails. Users particularly like its visibility and the ability to protect sensitive business data.
David U., a CISO at IMC companies, notes, "It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
Mantu S., a senior technology architect at Incedo Inc., writes, "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
Content Aware Protection
Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.
Device Control
USB & peripheral port control
Lockdown, monitor and manage devices. Granular control based on Vendor ID, Product ID, Serial Number and more.
Enforced Encryption
Automatic USB encryption
Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.
eDiscovery
Scanning data at rest
Discover, encrypt and delete sensitive data. Detailed content and context inspection through manual or automatic scans
We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.