No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Harmony Email & Collaboration vs Prisma Cloud by Palo Alto Networks comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 11, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Email Security (21st), Secure Web Gateways (SWG) (15th), Data Loss Prevention (DLP) (20th), Cloud Access Security Brokers (CASB) (11th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (13th), Access Management (13th), Bot Management (3rd), ZTNA as a Service (9th), ZTNA (4th), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Check Point Harmony Email &...
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
96
Ranking in other categories
Email Security (3rd), Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (7th)
Prisma Cloud by Palo Alto N...
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
114
Ranking in other categories
Web Application Firewall (WAF) (9th), Container Security (2nd), Cloud Security Posture Management (CSPM) (2nd), Cloud-Native Application Protection Platforms (CNAPP) (2nd), Data Security Posture Management (DSPM) (2nd)
 

Mindshare comparison

Email Security Mindshare Distribution
ProductMindshare (%)
Check Point Harmony Email & Collaboration4.7%
Proofpoint Email Protection7.3%
Microsoft Defender for Office 3657.3%
Other80.7%
Email Security
Cloud-Native Application Protection Platforms (CNAPP) Mindshare Distribution
ProductMindshare (%)
Prisma Cloud by Palo Alto Networks11.4%
Wiz15.4%
Microsoft Defender for Cloud8.5%
Other64.7%
Cloud-Native Application Protection Platforms (CNAPP)
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
Nasseer Qureshi - PeerSpot reviewer
Pre Sales Consultant at Redington Group
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.
reviewer2776578 - PeerSpot reviewer
Cyber Security Architect at a comms service provider with 10,001+ employees
Image scanning has supported consistent security practices during cloud deployment
On a scale of ten, we would say people are happy with Prisma Cloud by Palo Alto Networks for the part we use. People are okay with it. We probably would give an eight. We don't give ten because if we don't use the other parts of Prisma Cloud by Palo Alto Networks, it's because it was difficult to implement from an operational point of view. We could have deployed the runtime monitoring with Prisma Cloud by Palo Alto Networks, but within our organization at our company, it was very difficult to find who would be the owner for the alerts. People have other tools and in the end, we don't use the full capabilities of a product that we pay for. It's partially related to the difficulty to integrate Prisma Cloud by Palo Alto Networks runtime in our company's support process. We don't use the real-time monitoring part of Prisma Cloud by Palo Alto Networks. We don't know about the automated remediation feature of Prisma Cloud by Palo Alto Networks.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"For Cloudflare Access, I am using the free plan...The most valuable feature is their protection."
"The best feature is rate limiting. If I'm expecting 500 visits per hour, Cloudflare will limit the requests if I suddenly get 50,000."
"This solution is easy to understand and easy to configure."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"Using Cloudflare One makes my work quite easy because for DDoS protection, all I need to do is understand the OSI model and click; it makes it easier than trying to write a command line or use a Linux command."
"It will take the blow rather than our applications should an attack occur."
"The solution has different options that can be used to differentiate DDoS attacks."
"I like the fact that having granular information about the potential threats is received in email."
"This DLP is very useful, as it gives our users additional protection."
"The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great."
"The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user."
"Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
"I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats."
"Email security has improved since we deployed this platform."
"I can count the number of endpoints, emails, and collaborations being used in the environment."
"The most valuable feature is that the rule set is managed and that it can be run on a regularly scheduled basis."
"You can also integrate with Amazon Managed Services. You can also get a snapshot in time, whether that's over a 24-hour period, seven days, or a month, to determine what the estate might look like at a certain point in time and generate reports from that for vulnerability management forums."
"One feature we like is the amount of data Prisma gives us. Some infrastructure and platform vulnerabilities that in the cloud are hard to detect, and we were unaware of some of these. It's critical to shed light on these. For example, you create virtual machines and forget about them, but when you revisit them, some vulnerabilities may be detected."
"CSPM is the most valuable feature."
"The most valuable feature is the option to add custom queries using the RQL language that they supply so that we can customize the compliance frameworks to what we need to look for."
"What I like most about Prisma Cloud is its zero-day signatures, maximum security, minimal downtime, cloud visibility, control, and ease of deployment."
"Integration is very easy. And because it supports security that spans multi- and hybrid-cloud environments, it's very easy to use."
"From the CSPM perspective, RQL in Prisma Cloud by Palo Alto Networks is a feature where we can conduct any kind of investigation and create our own custom policies, which is really helpful because in the cloud, there are millions of assets and with RQL, we can drill down to as fine a level as per our requirement."
 

Cons

"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"The initial onboarding was causing us some confusion."
"The onboarding process can be improved a little bit."
"The free plan has limitations. For example, I can only set up three rules, and the application firewall is unavailable."
"They don't have a person to provide support for customers using the solution under their free plan."
"For the topic of improvement, providing some training material is one of my suggestions."
"Operating and tuning the product is difficult."
"Feedback could be enhanced."
"I would like the agents to perform better; sometimes, they are too heavy for endpoints, and they affect performance."
"They could help us be integrating features with solutions from third parties."
"Check Point should integrate with features available in Barracuda."
"It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files."
"Initial Learning Mode takes a while."
"I would like Check Point to extend its coverage to include more cloud applications."
"We have used technical support, but their response time is very slow. It needs to be improved."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"There I saw one feature called dummy payloads, in which we trigger the dummy payload, so it exactly gives the exploitable resources. That might be a feature that would be helpful if Prisma Cloud by Palo Alto Networks also had some kind of that feature."
"They need to make the settings more flexible to fit our internal policies about data."
"We don't give ten because if we don't use the other parts of Prisma Cloud by Palo Alto Networks, it's because it was difficult to implement from an operational point of view."
"Today, I won't recommend Palo Alto Prisma to someone because I'm not confident about their support."
"When there are updates, whether daily, weekly, or monthly, it needs configuration or permission adjustments. There is no automation for that, which is too bad."
"It's not really on par with, or catering to, what other products are looking at in terms of SAST and DAST capabilities. For those, you'd probably go to the market and look at something like Veracode or WhiteHat."
"The challenge that Palo Alto and Prisma have is that, at times, the instructions in an event are a little bit dated and they're not usable."
"The alignment of Twistlock Defender agents with image repositories needs improvement. These deployed agents have no way of differentiating between on-premise and cloud-based image repositories. If I deploy a Defender agent to secure an on-premise Kubernetes cluster, that agent also tries to scan my ECR image repositories on AWS. So, we have limited options for aligning those Defenders with the repositories that we want them to scan. It is scanning everything rather than giving us the ability to be real granular in choosing which agents can scan which repositories."
 

Pricing and Cost Advice

"The solution is not that expensive."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The prices are slightly expensive."
"The solution's pricing lacks transparency."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"Cloudflare Zero Trust Platform's pricing is good."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"Reasonable cost, quick and easy implementation, and transparent."
"The product is expensive."
"Having information stolen by a hacker would be more expensive than purchasing a license."
"The pricing is in the middle. Check Point's pricing is not the highest in the competitive market."
"Usually, we pay for the licensing part on a yearly basis and not on a monthly basis. If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts."
"The pricing and licensing are always negotiable."
"The product is expensive compared to some competitors, especially for the SME segment."
"There are absolutely no additional costs to the standard licensing fees. One of the wonderful pieces is that CloudGuard SaaS is all-inclusive in its licensing. There's no a-la-carte functionality. You're getting 100 percent of the product for the licensing that you're paying."
"The cost depends on the pricing model. Compared to other solutions, the cost isn't that bad."
"Prisma Cloud licensing works on credits."
"One thing we're very pleased about is how the licensing model for Prisma is based on work resources. You buy a certain amount of work resources and then, as they enable new capabilities within Prisma, it just takes those work resource units and applies them to new features. This enables us to test and use the new features without having to go back and ask for and procure a whole new product, which could require going through weeks, and maybe months, of a procurement process."
"Prisma Cloud's licensing system functions as expected with a solid licensing infrastructure."
"Prisma Cloud by Palo Alto Networks has helped the company save some money. Cost-wise, it's okay."
"This solution is good for a company with at least 400 people that must be connected remotely. For smaller companies, it can be too expensive."
"Prisma Cloud is remarkably expensive."
"We are encountering some resistance in the African market regarding the cost of Prisma Cloud."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
886,468 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
22%
Comms Service Provider
10%
Financial Services Firm
8%
Computer Software Company
6%
Computer Software Company
13%
Financial Services Firm
9%
Manufacturing Company
7%
Construction Company
7%
Financial Services Firm
15%
Computer Software Company
9%
Manufacturing Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise11
By reviewers
Company SizeCount
Small Business64
Midsize Enterprise27
Large Enterprise30
By reviewers
Company SizeCount
Small Business37
Midsize Enterprise22
Large Enterprise56
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
My experience with the pricing aspect, including setup cost and licensing cost of Check Point Harmony Email & Col...
What is your primary use case for Check Point Harmony Email & Office?
We use Check Point Harmony Email & Collaboration for our clients, and we have also implemented the solution in ou...
What needs improvement with Check Point Harmony Email & Office?
A more intuitive interface would be an area for improvement. I would like the agents to perform better; sometimes, th...
What is your primary use case for Prisma Cloud by Palo Alto Networks?
Prisma Cloud helps support DevSecOps methodologies, making those responsibilities easier to manage.
What Cloud-Native Application Protection Platform do you recommend?
We like Prisma Cloud by Palo Alto Networks, since it offers us incredible visibility into our entire cloud system. We...
What do you think of Aqua Security vs Prisma Cloud?
Aqua Security is easy to use and very manageable. Its main focus is on Kubernetes and Docker. Security is a very valu...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
Prisma Public Cloud, RedLock Cloud 360, RedLock, Twistlock, Aporeto
 

Overview

 

Sample Customers

23andMe
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Amgen, Genpact, Western Asset, Zipongo, Proofpoint, NerdWallet, Axfood, 21st Century Fox, Veeva Systems, Reinsurance Group of America
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Prisma Cloud by Palo Alto Networks and other solutions. Updated: March 2025.
886,468 professionals have used our research since 2012.