We compared Check Point Harmony Email and Collaboration and Proofpoint Email Protection across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Features: Check Point Harmony Email and Collaboration offers exceptional integration through APIs, advanced protection against data leaks, and the ability to detect complex social engineering attacks. Users describe Proofpoint Email Protection as a convenient all-in-one solution that offers effective defense against phishing attempts.
Room for Improvement: Check Point Harmony Email and Collaboration could improve integration with Exchange and other SaaS clouds while enhancing its threat clouds and AI engines. Proofpoint Email Protection could make its interface clearer and simplify admin management.
Service and Support: Check Point has earned mixed reviews for its customer service. Some customers appreciate the technical support provided, while others are dissatisfied with response times. Proofpoint Email Protection’s customer service is described as responsive, professional, and knowledgeable. However, there are some concerns about availability.
Ease of Deployment: Check Point Harmony Email is considered relatively easy to implement. Proofpoint Email Protection can be set up in a relatively short amount of time. Some users found it simple, while others mentioned that it requires technical skills.
Pricing: Check Point Harmony Email and Collaboration is a cost-effective option. It offers competitive prices and is suitable for small to medium-sized organizations. The opinions on the cost of Proofpoint Email Protection vary, with some users finding it costly while others find it reasonable.
ROI: Check Point Harmony Email and Collaboration delivers superior return on investment compared to other options. Proofpoint Email Protection stands out with its robust phishing signature file, surpassing competitors in threat detection.
Comparison Results: Check Point Harmony Email and Collaboration is an effective solution for blocking malicious attachments and detecting social engineering attacks. However, there is room for improvement in terms of integration and support, reducing false positives, and enhancing response times. Proofpoint Email Protection provides effective email protection and strong threat-detection features. However, it needs to simplify its user interface and administration.
"Some of the valuable features on the email side are anti-phishing, anti-malware, and Safe Links."
"I would say that 90% of the spam and phishing attack emails get blocked right off the bat."
"Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various email campaigns, pinpointing where they emanate from, and identifying the individuals within our organization who are affected."
"Does a thorough job of examining email and URLs for malicious content."
"At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."
"Microsoft Defender for Office 365 has improved my organization's security. It makes it easier to manage the infrastructure without the help of third-party applications."
"The good part is that you don't have to configure it, which is very convenient."
"The benefit that stands out to me is the ability for multiple individuals to collaborate simultaneously within the same document. Additionally, there is the option to save the document directly in the integrated OneDrive or SharePoint."
"It is fast and quite effective in terms of preventing any security incidents."
"We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
"The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour."
"The product offers good and easy integration capabilities with other products."
"The ease of management and intuitive administration are excellent."
"Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
"It is fast and has a very simple, easy integration."
"The anti-phishing feature is the solution's best feature."
"The most valuable feature is the option to edit the inbound security."
"I like all the features with Proofpoint, such as how it filters the spam and marketing mail, lost reality mail, blocks phishing attacks, blocks malicious attachments, and stops phishing links. Also it can defend against the business email compromise impersonation technique. It is a complete solution for all email attacks. It filters for the bad, malicious attachments. If there is any executable file, it can be deleted. It is a good, complete solution."
"Its anti-phishing functionality is the most valuable. Certainly, the biggest problem I have is phishing."
"The solution blocks malicious emails containing viruses and malware and reduces them out of spam."
"The most valuable feature of Proofpoint Email Protection is the TAP Dashboard. It provides more detailed information that can be used for forensic analysis. This is an advantage that other email security providers, such as Cisco, IronPort, or Microsoft do not offer in their dashboards."
"It was easy to set up."
"There is no downtime."
"Proofpoint Email Protection is the best solution from the perspective of email security."
"Configuration requires going to a lot of places rather than just accessing one tab."
"One area for improvement is integration. For example, when it comes to external SaaS platforms, we were not able to get a lot of information on integrations with such apps for security and authentication."
"They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not."
"We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment."
"The certification training for Defender for 365 needs to be deeper and incorporate Sentinel. I took all the security courses except one, and Sentinel isn't included."
"Microsoft sometimes has downtime, and we'll get several incidents coming in back to back. We have a huge backlog of notifications, many of which may be false positives. However, there might be serious alerts, so we can't risk dismissing all of them at once."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult."
"After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."
"They must provide security to more email service providers."
"They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."
"It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products."
"Check Point needs to address the pricing segment for SMEs."
"Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix."
"Proofpoint Email Protection is an expensive solution."
"Pricing for the platform could still be cheaper."
"Sometimes it detects false positives."
"The initial setup is complex."
"Proofpoint should have better integration with complex environments that need more than one instance of Proofpoint, as there are issues with nested instances."
"The solution could lower its price."
"Proofpoint Email Protection could improve on the training. Every organization is different and to fine-tune it to block everything properly there needs to be better training. Sometimes it can block some of the information it shouldn't."
"The largest complaint that we hear from our customers is that there is no local support."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 7th in Email Security with 49 reviews while Proofpoint Email Protection is ranked 1st in Secure Email Gateway (SEG) with 46 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Proofpoint Email Protection is rated 8.4. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Proofpoint Email Protection writes "A reasonably priced product that offers protection to emails, along with spam filters". Check Point Harmony Email & Collaboration is most compared with Avanan, Microsoft Defender for Cloud, Mimecast Email Security, Cisco Secure Email and Barracuda Email Security Gateway, whereas Proofpoint Email Protection is most compared with Microsoft Exchange Online Protection (EOP), Palo Alto Networks WildFire, Cisco Secure Email, Fortinet FortiMail and Fortra's Agari. See our Check Point Harmony Email & Collaboration vs. Proofpoint Email Protection report.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.