Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
52
Ranking in other categories
Email Archiving (1st), Advanced Threat Protection (ATP) (2nd), Microsoft Security Suite (10th), Secure Email Gateway (SEG) (1st)
Check Point Harmony Email &...
Ranking in Email Security
5th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
65
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (9th)
Trellix Collaboration Security
Ranking in Email Security
18th
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Instant Communications Security and Compliance (7th), Secure Email Gateway (SEG) (9th)
 

Mindshare comparison

As of June 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 12.6%, down from 17.6% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.8%, up from 3.5% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.0%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Nasseer Qureshi - PeerSpot reviewer
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.
BernardLugalia - PeerSpot reviewer
Provides strong data protection with virtual patching and vulnerability assessments
I primarily use it to monitor database access, particularly in banking and similar environments. It ensures that IT personnel and others do not create unauthorized accounts or users. Collaboration security assists in tracking database access and alerts in case of suspicious activity One of the…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The product's scalability is good."
"My experience deploying Microsoft Defender for Office 365 was seamless."
"The most valuable feature of Microsoft Defender for Office 365 is its spam filter."
"Since we have started using the solution, there have been fewer compromises."
"Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features."
"I would say that 90% of the spam and phishing attack emails get blocked right off the bat."
"The good part is that you don't have to configure it, which is very convenient."
"Defender is a SaaS platform, so it offers more flexibility. Managing the permissions is easier. The solution's automated detection and response features are scalable."
"I can count the number of endpoints, emails, and collaborations being used in the environment."
"The most valuable feature is the sandboxing feature. It provides a sandboxing environment where you can open links and see where they lead. You can see what is presented in the link after opening it."
"The solution has a very effective anti-phishing algorithm that detects a significantly higher number of phishing emails compared to the default Microsoft solution."
"Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
"The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour."
"The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic."
"The ease of management and intuitive administration are excellent."
"Check Point adds value with east-west protection in the data center."
"The solution's most valuable feature is its simplicity. It's very user-friendly."
"The product protects my email."
"The product helps reduce the number of malicious emails reaching the user's inbox."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use."
"FireEye Email Security is easy to use."
"Before installing, consider potential challenges with system performance, especially when integrating multiple tools, which could slow down performance."
"One of the most valuable features is the protection against vulnerabilities, particularly through virtual patching."
"FireEye is good for malware depicting and security."
 

Cons

"The product must provide better malware detection."
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."
"They have moved features from one console to another. Things have been moved around in the interface and it takes me time to find where certain features are."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"The UI needs to be more user-friendly."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"Microsoft security solutions work as expected. They are constantly updating the solutions to make them better. At the same time, the changes can impact a customer's environment, and we need to adjust settings. Sometimes we aren't aware of the changes, and nothing is pushed from the backend automatically."
"The visibility for the weaknesses in the system and unauthorized access can be improved."
"Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents."
"Maybe Check Point can work on the DLP part."
"I need to go to Check Point's admin portal if I want to see the license list and the details of the users of the tool, making it an area of concern where some ease of process should be provided from an improvement perspective."
"They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response."
"After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."
"Check Point needs to address the pricing segment for SMEs."
"It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"In general, our company should make the tool more robust to protect our systems."
"FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA."
"I would like to see this solution become more flexible."
"The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier."
"The solution must provide features to scan QR codes for threats."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"The solution needs better support."
"Sometimes, integration can be challenging, impacting its stability, which is why I rate it a five out of ten."
 

Pricing and Cost Advice

"The pricing has become expensive."
"Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
"Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"For large enterprise organizations, they can definitely afford it, but for small and medium organizations, they might struggle to cover the expenses."
"The license is expensive because the cost is based on the number of users."
"For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
"It's a user-base subscription."
"The price is very good, based on what they deliver."
"Check Point is more expensive. That's the honest truth. So far, it's a good value for the money."
"The product is expensive."
"The pricing is in the middle. Check Point's pricing is not the highest in the competitive market."
"I rate the platform’s pricing a seven and a half."
"The product is expensive compared to some competitors, especially for the SME segment."
"The product’s price is very high."
"Reasonable cost, quick and easy implementation, and transparent."
"The licensing is on a yearly basis."
"The solution requires a license to be purchased for every user."
"The cost is very high."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
856,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
20%
Financial Services Firm
9%
Manufacturing Company
7%
Healthcare Company
5%
Manufacturing Company
16%
Computer Software Company
14%
Financial Services Firm
9%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
Microsoft is quite affordable with a lot of features available for any size organization.
What needs improvement with Microsoft Defender for Office 365?
Microsoft could improve by offering recommendations for domain spoofing attacks, especially scenarios where DNS recor...
What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
Pricing is a bit expensive, but it is worth it considering the features that Check Point provides.
What is your primary use case for Check Point Harmony Email & Office?
The main use case for Check Point Harmony ( /products/avaya-workforce-engagement-reviews ) Email & Collaboration ...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
I would like to see the addition of email digital protection features, such as anti-spam and antivirus, not just sand...
What is your primary use case for FireEye Email Security?
I have worked on Email Security ( /categories/email-security ) both on-premises and in the cloud, Web Security, and a...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
FireEye Email Security
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Trellix Collaboration Security and other solutions. Updated: June 2025.
856,873 professionals have used our research since 2012.