We performed a comparison between Check Point Harmony Email & Collaboration and Trellix Collaboration Security based on real PeerSpot user reviews.
Find out in this report how the two Email Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Our customers are satisfied with Defender for 365 because Microsoft products are easy to use and customize to meet the client's needs. Everything is in one place, so we can adjust policies as needed for phishing, DLP, ATP, or any other security features that our clients want to apply."
"The basic features are okay and I'm satisfied with the Defender."
"Some of the valuable features on the email side are anti-phishing, anti-malware, and Safe Links."
"I would say that 90% of the spam and phishing attack emails get blocked right off the bat."
"The most valuable feature is protection against malicious links, fishing, and impersonation. You can train people to be aware of these threats, but they're not always careful. When they're using their phones between meetings, they click on a link, and it's game over."
"There are several features that I consider valuable."
"The solution is very easy to use. All you have to do is to assign the license to the end-user and it's done. The customer will only have the feature activated, and the solution will monitor the emails to determine if they are a threat or not."
"The good part is that you don't have to configure it, which is very convenient."
"The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great."
"Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure."
"Check Point adds value with east-west protection in the data center."
"Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
"Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size."
"I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats."
"Check Point's technical support is very good."
"The most valuable feature of the solution is the phishing protection it offers."
"FireEye is good for malware depicting and security."
"We can control this solution from the cloud and are able to access it from wherever we are."
"FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks."
"One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use."
"The solution's most valuable feature is its simplicity. It's very user-friendly."
"FireEye Email Security is easy to use."
"The initial setup is simple."
"Microsoft Defender for Office 365 must improve the overall management style, including the GUI. It also needs to change the filters so that it is easy to whitelist and blacklist data."
"There is room for improvement in terms of reporting."
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"I'd like some additional features any product can give me to protect our environment in a better way."
"The visibility for the weaknesses in the system and unauthorized access can be improved."
"The company should focus on adding threats that the solution is currently unable to detect."
"We need to be able to whitelist data at the backend."
"From time to time, the system's administrators notice the increase in the false-positive alerts being reported by CloudGuard SaaS."
"There are sometimes leakages of viruses when the system is experiencing network failures."
"Harmony Email & Collaboration could be improved by making the whitelist available on the website and application level."
"I would love it if they would do some work on the Postgres definition on the back-end."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"Some undefined threats can bypass the security system when there is a networking failure in the organization."
"The solution must provide features to scan QR codes for threats."
"In general, our company should make the tool more robust to protect our systems."
"The reporting aspect of the solution needs improvement."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"I would like to see this solution become more flexible."
"The custom tailoring is limited."
"The solution needs better support."
"The spam detection feature could be better."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
More Trellix Collaboration Security Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 7th in Email Security with 49 reviews while Trellix Collaboration Security is ranked 17th in Email Security with 13 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Trellix Collaboration Security is rated 8.6. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Trellix Collaboration Security writes "Has an easy implementation phase to deal with for users". Check Point Harmony Email & Collaboration is most compared with Avanan, Microsoft Defender for Cloud, Mimecast Email Security, Cisco Secure Email and Barracuda Email Protection, whereas Trellix Collaboration Security is most compared with Cisco Secure Email, Proofpoint Email Protection, Microsoft Exchange Online Protection (EOP), Trend Micro Email Security and Fortinet FortiMail. See our Check Point Harmony Email & Collaboration vs. Trellix Collaboration Security report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.