Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
52
Ranking in other categories
Email Archiving (1st), Advanced Threat Protection (ATP) (2nd), Microsoft Security Suite (10th), Secure Email Gateway (SEG) (1st)
Check Point Harmony Email &...
Ranking in Email Security
5th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
65
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (9th)
Trellix Collaboration Security
Ranking in Email Security
18th
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Instant Communications Security and Compliance (7th), Secure Email Gateway (SEG) (9th)
 

Mindshare comparison

As of June 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 12.6%, down from 17.6% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.8%, up from 3.5% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.0%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Nasseer Qureshi - PeerSpot reviewer
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.
BernardLugalia - PeerSpot reviewer
Provides strong data protection with virtual patching and vulnerability assessments
I primarily use it to monitor database access, particularly in banking and similar environments. It ensures that IT personnel and others do not create unauthorized accounts or users. Collaboration security assists in tracking database access and alerts in case of suspicious activity One of the…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It’s easy to handle integrations, and we don't need a lot of people in our IT team."
"It also gives the vulnerability status according to the versions you have selected. Let's say you have Google Chrome. It mentions the versions it has, and it updates. Within two hours of an update, it is reflected in the dashboard. That's really nice to have."
"Since we have started using the solution, there have been fewer compromises."
"The two main features that prove most beneficial for us are URL scanning and attachment scanning."
"Microsoft Defender for Office 365 helps people to work remotely. It is a secure solution. We don't need to use our company's computers or get VPN connections to the networks. I can control how they share screens and what they send to the devices. It keeps our organizations confidential and sensitive information safe."
"The benefit that stands out to me is the ability for multiple individuals to collaborate simultaneously within the same document. Additionally, there is the option to save the document directly in the integrated OneDrive or SharePoint."
"Our customers are satisfied with Defender for 365 because Microsoft products are easy to use and customize to meet the client's needs. Everything is in one place, so we can adjust policies as needed for phishing, DLP, ATP, or any other security features that our clients want to apply."
"At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."
"This DLP is very useful, as it gives our users additional protection."
"As a comprehensive solution, Check Point offers a very granular and best-in-class experience."
"The most valuable feature is spam detection and phishing site prevention, which Microsoft couldn't catch, yet Check Point does."
"As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts."
"The ease of management and intuitive administration are excellent."
"The email security solution boasts an exceptional success rate in filtering out junk, spam, and phishing emails while ensuring that legitimate emails reach their intended recipients. The setup process is straightforward and user-friendly"
"The anti-phishing feature is the solution's best feature."
"I recommend Check Point Harmony Email and Collaboration to all types of companies, from small businesses to enterprises."
"FireEye is good for malware depicting and security."
"The product helps reduce the number of malicious emails reaching the user's inbox."
"The product protects my email."
"I like FireEye's filtering, spam digests, and its advanced threat review of email flow. It also has a broad range of riskware rules you can deploy."
"We can control this solution from the cloud and are able to access it from wherever we are."
"FireEye Email Security is easy to use."
"Before installing, consider potential challenges with system performance, especially when integrating multiple tools, which could slow down performance."
"One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment."
 

Cons

"There is a different console for different things; I just want one consolidated console."
"Sometimes, phishing emails manage to pass through the filter, so the system needs to enhance its phishing email detection capabilities."
"The XDR dashboard has room for improvement."
"The visibility for the weaknesses in the system and unauthorized access can be improved."
"They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"The certification training for Defender for 365 needs to be deeper and incorporate Sentinel. I took all the security courses except one, and Sentinel isn't included."
"Microsoft could improve by offering recommendations for domain spoofing attacks, especially scenarios where DNS records like SPF, DKIM, and DMARC are not properly published."
"There is always room for improvement and growth."
"The sanitization on the file needs improvement."
"The cost is a little bit expensive."
"Its guides are not great."
"I have learned enough to make the product stable. However, the stability has some challenges."
"Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult."
"The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter."
"The product's pricing needs improvement."
"In general, our company should make the tool more robust to protect our systems."
"The spam detection feature could be better."
"I would rate them as a 1.5. The new hub created in India is not good."
"If they want to be the primary or best solution, they need to have better email management features."
"I would like to see this solution become more flexible."
"The reporting aspect of the solution needs improvement."
"There is a need for improved integration with totally different products, such as a rapid server."
"The custom tailoring is limited."
 

Pricing and Cost Advice

"Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"Microsoft Defender is expensive. I typically recommend it only if clients have the budget. Otherwise, I would suggest an alternative."
"The license is expensive because the cost is based on the number of users."
"I know that the product is incredibly expensive."
"The product is expensive."
"Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
"Defender for 365 comes in various plans and licenses, along with other Microsoft security solutions. Purchasing this kind of package or security bundle gives good value for money, and that's what I recommend."
"The price is very good, based on what they deliver."
"The pricing and licensing are always negotiable."
"Having information stolen by a hacker would be more expensive than purchasing a license."
"The pricing is in the middle. Check Point's pricing is not the highest in the competitive market."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
"I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive."
"Reasonable cost, quick and easy implementation, and transparent."
"The pricing is competitive."
"The cost is very high."
"The solution requires a license to be purchased for every user."
"The licensing is on a yearly basis."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
857,028 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
20%
Financial Services Firm
9%
Manufacturing Company
7%
Healthcare Company
5%
Manufacturing Company
16%
Computer Software Company
14%
Financial Services Firm
9%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
Microsoft is quite affordable with a lot of features available for any size organization.
What needs improvement with Microsoft Defender for Office 365?
Microsoft could improve by offering recommendations for domain spoofing attacks, especially scenarios where DNS recor...
What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
Pricing is a bit expensive, but it is worth it considering the features that Check Point provides.
What is your primary use case for Check Point Harmony Email & Office?
The main use case for Check Point Harmony ( /products/avaya-workforce-engagement-reviews ) Email & Collaboration ...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
I would like to see the addition of email digital protection features, such as anti-spam and antivirus, not just sand...
What is your primary use case for FireEye Email Security?
I have worked on Email Security ( /categories/email-security ) both on-premises and in the cloud, Web Security, and a...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
FireEye Email Security
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Trellix Collaboration Security and other solutions. Updated: June 2025.
857,028 professionals have used our research since 2012.