Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Trellix Email Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 6, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Harmony Email &...
Ranking in Email Security
4th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
68
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (9th)
Trellix Email Security
Ranking in Email Security
28th
Average Rating
9.0
Reviews Sentiment
7.7
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Featured Reviews

Nasseer Qureshi - PeerSpot reviewer
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.
KB
Ease of deployment and cost-effectiveness boost operational efficiency
I have recommendations for increasing dashboard customization. Currently, we are using custom dashboards, but they are not effectively customizable. If they provide better customization options, it would be easier to understand everything in a single dashboard instead of navigating through dropdown menus to see reports. Additionally, log retention is currently 30 days, but some customers request to extend it to 60 days. Having 60 days of log retention would be helpful for maintaining logs.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble."
"The product is reliable and sturdy."
"The most valuable feature of the solution is the phishing protection it offers."
"We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
"The initial setup is easy."
"Check Point Harmony Email and Collaboration offers online support and has tight integration with Microsoft."
"The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user."
"The anti-phishing feature is the solution's best feature."
"Compared to other email solutions such as Cisco, price-wise, we get this solution within 50 to 60% of the average."
 

Cons

"At this time, the two-factor authentication does not work for Active Directory."
"Support can be a bit quicker in helping the customer."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"I would like Check Point to extend its coverage to include more cloud applications."
"The left-hand feature can be made more granular for the implementation of the policy."
"We have used technical support, but their response time is very slow. It needs to be improved."
"Currently, Check Point HEC supports only Microsoft Office 365 and Google Sheets. In today's world, some clients are using old email service provider solutions, so it would be better if HEC also provides support for third-party email service solutions, such as IBM HCL Notes, creating more opportunities."
"We still get some false positives. There are times when legitimate stuff gets flagged and it could be that somebody is expecting a very important email but they don't end up getting it. On the flip side, when we alert Check Point about stuff like this, it is corrected, so they are improving. That's a plus."
"Threat intelligence is adequate because they are using Microsoft GTI threat intelligence, but we need to increase protection against phishing and spam mails."
 

Pricing and Cost Advice

"The pricing is in the middle. Check Point's pricing is not the highest in the competitive market."
"The pricing is competitive."
"I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers."
"Having information stolen by a hacker would be more expensive than purchasing a license."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"The product’s price is very high."
"The cost is similar to other competitors. It's not much higher."
"Usually, we pay for the licensing part on a yearly basis and not on a monthly basis. If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts."
Information not available
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
865,164 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Manufacturing Company
8%
Financial Services Firm
7%
Healthcare Company
5%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
My experience with pricing, setup cost, and licensing for Check Point Harmony Email & Collaboration shows it was less expensive than our Mimecast licensing by quite a bit, so I found it pretty ...
What is your primary use case for Check Point Harmony Email & Office?
My main use case for Check Point Harmony Email & Collaboration is email protection against spam, phishing, and malware, and I can give a quick, specific example of how I'm using it day-to-day. ...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What is your experience regarding pricing and costs for Trellix Email Security?
I am satisfied with the secure licensing cost because compared to other solutions, Trellix Email Security is cheaper and provides most features. I only know about the pricing from one year ago.
What needs improvement with Trellix Email Security?
I have recommendations for increasing dashboard customization. Currently, we are using custom dashboards, but they are not effectively customizable. If they provide better customization options, it...
What is your primary use case for Trellix Email Security?
We block DMARC for incoming mails and have threat detection enabled to block or identify any spam mail received in end-user mailboxes. We prevent spam mails and unknowns such as DKIM and DMARC unav...
 

Also Known As

Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
No data available
 

Overview

 

Sample Customers

Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Information Not Available
Find out what your peers are saying about Microsoft, Proofpoint, Abnormal Security and others in Email Security. Updated: July 2025.
865,164 professionals have used our research since 2012.