Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Orca Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 27, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

SentinelOne Singularity Clo...
Sponsored
Ranking in Cloud Workload Protection Platforms (CWPP)
4th
Average Rating
8.8
Reviews Sentiment
7.9
Number of Reviews
114
Ranking in other categories
Vulnerability Management (5th), Cloud and Data Center Security (2nd), Container Security (3rd), Cloud Security Posture Management (CSPM) (3rd), Cloud-Native Application Protection Platforms (CNAPP) (3rd), Compliance Management (1st)
Check Point Harmony Email &...
Ranking in Cloud Workload Protection Platforms (CWPP)
9th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
69
Ranking in other categories
Email Security (4th), Data Loss Prevention (DLP) (5th)
Orca Security
Ranking in Cloud Workload Protection Platforms (CWPP)
10th
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
21
Ranking in other categories
Vulnerability Management (14th), Container Security (14th), API Security (5th), Cloud Security Posture Management (CSPM) (11th), Cloud-Native Application Protection Platforms (CNAPP) (6th), Data Security Posture Management (DSPM) (9th), Cloud Detection and Response (CDR) (2nd)
 

Mindshare comparison

As of August 2025, in the Cloud Workload Protection Platforms (CWPP) category, the mindshare of SentinelOne Singularity Cloud Security is 3.2%, up from 1.1% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 0.6%, down from 1.3% compared to the previous year. The mindshare of Orca Security is 6.4%, down from 8.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Workload Protection Platforms (CWPP)
 

Featured Reviews

Andrew W - PeerSpot reviewer
Tells us about vulnerabilities as well as their impact and helps to focus on real issues
Looking at all the different pieces, it has got everything we need. Some of the pieces we do not even use. For example, we do not have Kubernetes Security. We are not running any K8 clusters, so it is good for us. Overall, we find the solution to be fantastic. There can be additional education components. This may not be truly fair to them because of what the product is going for, but it would be great to see additional education for compliance. It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background.
Nasseer Qureshi - PeerSpot reviewer
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.
CHINTAN MEHTA - PeerSpot reviewer
Consolidating security tools with comprehensive cloud visibility
The documentation for Orca Security could be improved. The compliance framework also needs enhancements, especially concerning integrations with other tools like ServiceNow's vulnerability modules, which are not as mature as expected. It should also increase its capability to ingest data from other security tools like CloudSight for endpoint detection and provide real-time monitoring.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"SentinelOne's behaviour analytics are valuable because they detect anomalies and malicious behaviour that signature-based solutions might miss."
"When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
"The cloud misconfiguration is the most valuable feature."
"SentinelOne Singularity Cloud Security provides email alerts and ranks issues based on severity, such as high, critical, etc., that help us prioritize issues."
"SentinelOne Singularity Cloud Security stands out for its user-friendly interface and intuitive software, making it easy to navigate and use."
"There's real-time threat detection. It can show threats and find issues based on their severity and helps us with real-time monitoring."
"Cloud Security has provided a single view to observe all workloads, prioritization for handling cloud assets, and reduced noise by distinguishing false positives effectively."
"The most valuable feature of SentinelOne Singularity Cloud Security is its advanced AI and machine learning capabilities, which allow it to identify and respond to threats in real time."
"I can count the number of endpoints, emails, and collaborations being used in the environment."
"The email security solution boasts an exceptional success rate in filtering out junk, spam, and phishing emails while ensuring that legitimate emails reach their intended recipients. The setup process is straightforward and user-friendly"
"It protects cloud email and collaboration suites from cyber-attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365, G-Suite, Teams, and Slack."
"It helped us to bring security compliance and ensure system robustness throughout."
"I recommend Check Point Harmony Email and Collaboration to all types of companies, from small businesses to enterprises."
"We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
"It is fast and has a very simple, easy integration."
"It is fast and quite effective in terms of preventing any security incidents."
"The GUI features are very good. Threat intelligence is also very good."
"Another valuable feature with Orca, something that's not talked about enough, is its ability to rank your gaps and your tasks... You can get visibility with agents and there are a lot of ways to do that. But the ranking and the context across the entire environment, that is what is unique about Orca."
"The initial setup is very easy."
"The vulnerability management does not require network scanning or agent technology, so I don't need to modify any of my products in order to do vulnerability assessments."
"The product itself is really good. It helped us streamline the way we access our servers."
"One of the valuable features of Orca Security is its design and options that allow flexible filtering and user-friendly visualization."
"The best features of Orca Security include its ability to perform a lot of security controls without requiring any installation of agents, making it very easy to set up."
"Orca Security has helped reduce the time it takes to address cloud security alerts."
 

Cons

"I personally use the SentinelOne Singularity Cloud Security daily, and I have noticed that the dashboard occasionally gets stuck, potentially due to internet issues. It could benefit from enhancements to be more robust and smoother."
"The documentation could be better."
"It is not a criticism of the tool per se, but anything to help non-development resources understand some of the complexities of the cloud is always appreciated. Any additional educational resources are always helpful for security teams, especially those without a development background."
"The application module focuses on the different codes and libraries that can be run on the machines. It is very important for Singularity EDR to detect what type of codes and what type of libraries can run in the machine. If they can implement a white list or a black list of codes or libraries that can be used in the machine, it would be very helpful. They can focus more on the application module."
"One area for improvement could be the internal analysis process, specifically the guidance provided for remediation."
"We repeatedly get alerts on the tool dashboard that we've already solved on our end, but they still appear. That is somewhat irritating."
"Implementing single sign-on requires a pre-class account feature, which is currently not available."
"When we request any changes, they must be reflected in the next update."
"A phishing simulator would be helpful as a user training module."
"Maybe Check Point can work on the DLP part."
"Check Point could improve its marketing strategy."
"After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."
"We still get some false positives. There are times when legitimate stuff gets flagged and it could be that somebody is expecting a very important email but they don't end up getting it. On the flip side, when we alert Check Point about stuff like this, it is corrected, so they are improving. That's a plus."
"There is a need for improvement in handling business email compromise."
"The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter."
"if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."
"The interface can be a bit cranky and sometimes takes a lot of time to load."
"In the future, I'd like to see Orca work better with third-party vendors. Specifically, being able to provide sanitized results from third parties."
"The solution could improve by making the dashboards more elaborative and more descriptive."
"Orca Security can be improved as there should be some kind of central pane of glass. Similar to how cloud management works, Orca Security should have something comparable."
"The automatic scan only runs every 24 hours, and if an alert is remediated within an hour, it still remains until the next scheduled scan."
"Orca Security could improve its ticket creation process. Currently, it allows for creating tickets in only one bucket, which requires monitoring to redirect tickets to the appropriate team."
"The main drawback in an agentless approach is that if the solution detects a virus or malware in the environment, we need to manually remove it. But from my experience with other production environments, it's not straightforward to install agents in the hope they will automatically remediate viruses, even from production environments... Ultimately, the ability to auto-remediate is something that I would like to see."
"We are PCI DSS compliant, so we need to scan our environment externally with tools vetted by the PCI DSS organization. Orca doesn't scan the environment externally. It only scans what's currently in the cloud."
 

Pricing and Cost Advice

"PingSafe is cost-effective for the amount of infrastructure we have. It's reasonable for what they offer compared to our previous solution. It's at least 25 percent to 30 percent less."
"PingSafe is less expensive than other options."
"I am not involved in the pricing, but it is cost-effective."
"The cost for PingSafe is average when compared to other CSPM tools."
"SentinelOne Singularity Cloud Security is costly."
"Pricing is based on modules, which was ideal for us."
"PingSafe is priced reasonably for our workload."
"SentinelOne is quite costly compared to other security platforms."
"The pricing is in the middle. Check Point's pricing is not the highest in the competitive market."
"The price is very good, based on what they deliver."
"Do a full feature evaluation (interactive) with a support person. That is what I did."
"The product’s price is very high."
"The product is expensive."
"The pricing is expensive."
"As we are a non-profit organization, we got the tool with a good offer. On a yearly basis, we pay 10,000 Euro for 500 users, which also includes the technical support part."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"While it's competitive with Palo Alto Prisma, I think Orca's list price is very high. I would advise Orca to lower it because, at that price, I might consider alternatives like Wiz, which also offers agentless services."
"The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest."
"Orca is very competitive when compared to the alternatives and is not the most expensive in the market, that's for sure."
"The price is a bit expensive for smaller organizations."
"Orca Security charges are based on cloud workloads. So, it's based on workloads. If we look at one feature, it might be expensive."
"The pricing depends on how many assets you have running in your cloud and how many environments you have. If you have a dev environment, test environment, and a production environment then it's really important that you have coverage for all of them."
"We have a total of 25 licenses for this solution. The solution is on a pay-and-you-use model."
"Its license is a bit expensive."
report
Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
9%
Government
6%
Computer Software Company
18%
Manufacturing Company
8%
Financial Services Firm
8%
Healthcare Company
5%
Computer Software Company
15%
Financial Services Firm
12%
Manufacturing Company
10%
University
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about PingSafe?
The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best featu...
What is your experience regarding pricing and costs for PingSafe?
I don't handle the price part, but it isn't more expensive than Palo Alto Prisma Cloud. It's not cheap, but it is wor...
What needs improvement with PingSafe?
There is scope for more application security posture management features. Additionally, the runtime protection needs ...
What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
My experience with pricing, setup cost, and licensing for Check Point Harmony Email & Collaboration shows it was ...
What is your primary use case for Check Point Harmony Email & Office?
My main use case for Check Point Harmony Email & Collaboration is email protection against spam, phishing, and ma...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about Orca Security?
It's for protection. It's an agentless tool. We don't need to install anything at a customer's premises. We can just ...
What needs improvement with Orca Security?
I really love the way Orca Security worked. A potential improvement could be additional security features for the two...
What is your primary use case for Orca Security?
We used Orca Security ( /products/orca-security-reviews ) for about two to three months until I left the company. The...
 

Also Known As

PingSafe
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
No data available
 

Overview

 

Sample Customers

Information Not Available
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
BeyondTrust, Postman, Digital Turbine, Solarisbank, Lemonade, C6 Bank, Docebo, Vercel, and Vivino
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Orca Security and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.