Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
49
Ranking in other categories
Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (11th)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
59
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
Trellix Collaboration Security
Ranking in Email Security
19th
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Secure Email Gateway (SEG) (8th)
 

Mindshare comparison

As of May 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 12.9%, down from 18.3% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.7%, up from 3.3% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.1%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Amey Darekar - PeerSpot reviewer
Has an easy implementation phase to deal with for users
I primarily use the product in our daily security operations since it is implemented in all of our company's systems and is used in our environment. Normally, email security tools like FireEye or Trellix help to protect ourselves from spam, malware, and other email-oriented threats. The tool is used extensively in our company's environment. It is more like a collaboration email security that is used in our company. Whether my company plans to increase the number of users of the product or not is something that depends on the growth of the organization. I recommend the product to those who plan to use it. The product is stable and reliable, considering the results my company gets out of it. When it comes to Trellix or FireEye Endpoint Security (HX), the tools offer antivirus as well as the modern real-time security feature, which is used to automate the detection and protection of the endpoints against all the security threats that are currently there in the industry. I don't see any challenges with the integration part of the product, but since a different team manages it, I don't have visibility into it. In terms of the value offered by the product, the solution does help our company protect data and the complete infrastructure. I rate the tool a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It gives us visibility into threats and, for endpoints, it helps us to prioritize threats. We used to have a lack of visibility, but now our time to detect and respond has decreased."
"Defender is a SaaS platform, so it offers more flexibility. Managing the permissions is easier. The solution's automated detection and response features are scalable."
"Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features."
"Overall, I would rate Microsoft Defender for Office 365 at a ten."
"At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."
"Defender enables us to secure all 365-related activity from a single place. It gives us visibility into everything happening in Outlook, protecting us against phishing and other email-based threats. Defender helps us detect any suspicious behaviors."
"It also gives me good visibility because, with Defender, I'm using a Microsoft product to defend Microsoft products. The integration was really seamless and I have wide visibility because it picks up almost everything. Literally, I can see almost every activity that happens, from the e-mail to the workstation itself."
"Defender for Office 365 has helped eliminate having to look at multiple dashboards and that is the aspect I like most about it. It is simpler, effective, and convenient. The users like the process efficiency."
"The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user."
"It is very intuitive. It is a point and click type of deal."
"The product's initial setup phase is very simple and automated. Everything can be made ready within a few clicks."
"The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour."
"The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc."
"The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"The initial setup is easy."
"We have had very good results from the use of FireEye Email Security. We are very comfortable with this technology, but I don't know if it's necessary to move into the cloud, we will check other technologies and study them. Additionally, the solution has good integration."
"The solution's most valuable feature is its simplicity. It's very user-friendly."
"Trellix Collaboration Security is valued for being a stable and comprehensive solution that fulfills customer needs."
"One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment."
"Before installing, consider potential challenges with system performance, especially when integrating multiple tools, which could slow down performance."
"The auto-remediation feature is valuable."
"FireEye is good for malware depicting and security."
"The product protects my email."
 

Cons

"We noticed that from time to time, Microsoft's stability does have problems. Sometimes the service goes up and down. Sometimes they change without prior notice."
"Microsoft needs to broaden its global support presence by establishing teams of subject-matter experts in all regions."
"The certification training for Defender for 365 needs to be deeper and incorporate Sentinel. I took all the security courses except one, and Sentinel isn't included."
"I'd like some additional features any product can give me to protect our environment in a better way."
"Configuration requires going to a lot of places rather than just accessing one tab."
"One area for improvement is integration. For example, when it comes to external SaaS platforms, we were not able to get a lot of information on integrations with such apps for security and authentication."
"Microsoft Defender for Office 365's Mac functionality requires improvement to deliver the same level of protection found on Windows devices."
"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."
"The product's pricing needs improvement."
"If Check Point finds something to be described as a clean email, it should have the option to automatically release it to the user. At the moment, we don't have that option."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."
"I have learned enough to make the product stable. However, the stability has some challenges."
"It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files."
"A signature-based filter could improve the solution's AI model for spam email."
"Check Point needs to address the pricing segment for SMEs."
"In general, our company should make the tool more robust to protect our systems."
"The custom tailoring is limited."
"The reporting aspect of the solution needs improvement."
"The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier."
"I would rate them as a 1.5. The new hub created in India is not good."
"I would like to see this solution become more flexible."
"The solution needs better support."
"If they want to be the primary or best solution, they need to have better email management features."
 

Pricing and Cost Advice

"For large enterprise organizations, they can definitely afford it, but for small and medium organizations, they might struggle to cover the expenses."
"Defender for 365 comes in various plans and licenses, along with other Microsoft security solutions. Purchasing this kind of package or security bundle gives good value for money, and that's what I recommend."
"Microsoft Defender is expensive. I typically recommend it only if clients have the budget. Otherwise, I would suggest an alternative."
"Compared to other brands, Microsoft Defender for Office 365's pricing is competitive."
"The license is expensive because the cost is based on the number of users."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"It's a user-base subscription."
"The product is expensive."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"Usually, we pay for the licensing part on a yearly basis and not on a monthly basis. If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts."
"I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers."
"Having information stolen by a hacker would be more expensive than purchasing a license."
"I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive."
"The cost is similar to other competitors. It's not much higher."
"Check Point is more expensive. That's the honest truth. So far, it's a good value for the money."
"The pricing is in the middle. Check Point's pricing is not the highest in the competitive market."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The cost is very high."
"The licensing is on a yearly basis."
"The solution requires a license to be purchased for every user."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
849,686 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
8%
Manufacturing Company
8%
Government
6%
Computer Software Company
18%
Financial Services Firm
9%
Manufacturing Company
8%
Government
5%
Manufacturing Company
16%
Computer Software Company
13%
Financial Services Firm
10%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
Money-wise, it is a part of the Office 365 ( /products/office-365-reviews ) suite, making it slightly more expensive ...
What needs improvement with Microsoft Defender for Office 365?
The main area for improvement is simplifying the implementation and rollout process. There are many conditions to be ...
What is your primary use case for Check Point Harmony Email & Office?
We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For exa...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
I would like to see the addition of email digital protection features, such as anti-spam and antivirus, not just sand...
What is your primary use case for FireEye Email Security?
I have worked on Email Security ( /categories/email-security ) both on-premises and in the cloud, Web Security, and a...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
FireEye Email Security
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Trellix Collaboration Security and other solutions. Updated: April 2025.
849,686 professionals have used our research since 2012.