Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Seclore Email Encryption comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
52
Ranking in other categories
Email Archiving (1st), Advanced Threat Protection (ATP) (2nd), Microsoft Security Suite (10th), Secure Email Gateway (SEG) (1st)
Check Point Harmony Email &...
Ranking in Email Security
5th
Average Rating
8.8
Reviews Sentiment
7.5
Number of Reviews
67
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (9th)
Seclore Email Encryption
Ranking in Email Security
76th
Average Rating
0.0
Reviews Sentiment
8.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 12.3%, down from 16.9% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.9%, up from 3.7% compared to the previous year. The mindshare of Seclore Email Encryption is 0.1%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Nasseer Qureshi - PeerSpot reviewer
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.
Shruti Shetty - PeerSpot reviewer
Automatically protects any files placed within a designated folder, simplifying data protection and ensure continuous data control
The hot folder feature is the most valuable feature of Seclore for safeguarding communications. For example, if an unauthorized user gets access to a file, you can remove their access even if they've forwarded it to someone else. The hot folder feature creates a parent folder that automatically protects any files placed within it. Additionally, when policies are created for third-party applications, files downloaded from them are automatically protected. For instance, pharmaceutical companies generate many files from third-party applications, and Seclore can automatically protect them.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is very easy to use. All you have to do is to assign the license to the end-user and it's done. The customer will only have the feature activated, and the solution will monitor the emails to determine if they are a threat or not."
"It gives us visibility into threats and, for endpoints, it helps us to prioritize threats. We used to have a lack of visibility, but now our time to detect and respond has decreased."
"Defender helps us prioritize threats across our organization."
"Defender for Office 365 has helped eliminate having to look at multiple dashboards and that is the aspect I like most about it. It is simpler, effective, and convenient. The users like the process efficiency."
"At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."
"My experience deploying Microsoft Defender for Office 365 was seamless."
"The initial setup is straightforward. You just add the license, click it, and then you can set up the rules. It is quite simple."
"Does a thorough job of examining email and URLs for malicious content."
"I can count the number of endpoints, emails, and collaborations being used in the environment."
"Overall, I would rate it ten out of ten."
"This product enhances faster and more secure sharing of information among colleagues from different departments."
"The threat management database provides consistent updates."
"I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats."
"Check Point adds value with east-west protection in the data center."
"The program has a nice interface and it is easy to use."
"The ease of management and intuitive administration are excellent."
"The hot folder feature is the most valuable feature of Seclore for safeguarding communications. For example, if an unauthorized user gets access to a file, you can remove their access even if they've forwarded it to someone else."
 

Cons

"Microsoft security solutions work as expected. They are constantly updating the solutions to make them better. At the same time, the changes can impact a customer's environment, and we need to adjust settings. Sometimes we aren't aware of the changes, and nothing is pushed from the backend automatically."
"There is room for improvement in terms of reporting."
"Configuring the default strategies and policies in Microsoft Defender for Cloud Apps generates a lot of noise and false positives."
"Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment."
"One area for improvement is integration. For example, when it comes to external SaaS platforms, we were not able to get a lot of information on integrations with such apps for security and authentication."
"The pre-sales cost calculations could be more transparent."
"The only thing they should improve is the licensing model. They should stop changing it. A year ago, the five features I mentioned were included in one product. Now, three of them are bundled into one product, and you have to pay extra for the other two. I don't mind paying extra, but I don't want them to change it every year or every six months. I need to know what I'm looking at and not worry about it next year."
"We need to be able to whitelist data at the backend."
"Some undefined threats can bypass the security system when there is a networking failure in the organization."
"There is a need for improvement in handling business email compromise."
"A signature-based filter could improve the solution's AI model for spam email."
"The sanitization on the file needs improvement."
"It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files."
"Some files are not scanned thoroughly due to occasional network failures."
"Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents."
"The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported. If they were to add report exporting capabilities on each of metric objects on the dashboard, that would be awesome."
"In future releases, I would like to see new features or more connectors for specific applications."
 

Pricing and Cost Advice

"Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
"It's a user-base subscription."
"It is much more expensive than using another solution because we have had to include some options and upgrade our license."
"The product is expensive."
"The pricing is normal. Considering its popularity, it's not overpriced."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
"Defender for 365 comes in various plans and licenses, along with other Microsoft security solutions. Purchasing this kind of package or security bundle gives good value for money, and that's what I recommend."
"The pricing is competitive."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"The pricing is in the middle. Check Point's pricing is not the highest in the competitive market."
"Check Point is more expensive. That's the honest truth. So far, it's a good value for the money."
"The product is expensive."
"Cost is the main concern that every customer takes into consideration, and Check Point always negotiates a price that is affordable."
"As we are a non-profit organization, we got the tool with a good offer. On a yearly basis, we pay 10,000 Euro for 500 users, which also includes the technical support part."
"The product’s price is very high."
Information not available
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
859,579 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
8%
Manufacturing Company
8%
Government
6%
Computer Software Company
19%
Financial Services Firm
8%
Manufacturing Company
7%
Healthcare Company
5%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
Microsoft is quite affordable with a lot of features available for any size organization.
What needs improvement with Microsoft Defender for Office 365?
Microsoft could improve by offering recommendations for domain spoofing attacks, especially scenarios where DNS recor...
What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
My experience with pricing, setup cost, and licensing for Check Point Harmony Email & Collaboration has been all ...
What is your primary use case for Check Point Harmony Email & Office?
My main use case for Check Point Harmony Email & Collaboration is to protect email against all zero-day threats, ...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What is your experience regarding pricing and costs for Seclore Email Encryption?
It's a flexible scheme that can be adjusted based on the client's budget.
What needs improvement with Seclore Email Encryption?
In future releases, I would like to see new features or more connectors for specific applications.
What is your primary use case for Seclore Email Encryption?
It's used to protect files that leave the company, providing redaction and full control. The main purpose is data pro...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
No data available
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Information Not Available
Find out what your peers are saying about Microsoft, Proofpoint, Abnormal Security and others in Email Security. Updated: June 2025.
859,579 professionals have used our research since 2012.