We performed a comparison between Check Point Harmony Email & Collaboration and Cisco Secure Workload based on real PeerSpot user reviews.
Find out in this report how the two Cloud Workload Protection Platforms (CWPP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The ease of use of the platform is very nice."
"PingSafe can integrate all your cloud accounts and resources you create in the AWS account, We have set it up to scan the AWS transfer services, EC2, security groups, and GitHub."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment."
"The most valuable features of PingSafe are the asset inventory and issue indexing."
"PingSafe released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. PingSafe's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue."
"The UI is very good."
"The multi-cloud support is valuable. They are expanding to different clouds. It is not restricted to only AWS. It allows us to have different clouds on one platform."
"I can count the number of endpoints, emails, and collaborations being used in the environment."
"The anti-phishing feature is the solution's best feature."
"It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
"As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts."
"The product is reliable and sturdy."
"It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
"The main benefit is that hackers can't steal information."
"It is fast and quite effective in terms of preventing any security incidents."
"The product offers great visibility into the network so we can enforce security measures."
"Generally speaking, Cisco support is considered one of the best in the networking products and stack."
"The most valuable feature of the solution is that we don't have to do packet captures on the network."
"The most valuable feature of this solution is security."
"Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time."
"It's stable."
"By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself."
"The most valuable feature is micro-segmentation, which is the most important with respect to visibility."
"It does not bring much threat intel from the outside world. All it does is scan. If it can also correlate things, it will be better."
"The Kubernetes scanning on the Oracle Cloud needs to be improved. It's on the roadmap. AWS has this capability, but it's unavailable for Oracle Cloud."
"They can work on policies based on different compliance standards."
"We are experiencing problems with Cloud Native Security reporting."
"We'd like to have better notifications. We'd like them to happen faster."
"One of the issues with the product stems from the fact that it clubs different resources under one ticket."
"We wanted it to provide us with something like Claroty Hub in AWS for lateral movement. For example, if an EC2 instance or a virtual machine is compromised in a public subnet based on a particular vulnerability, such as Log4j, we want it to not be able to reach some of our databases. This kind of feature is not supported in PingSafe."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"Check Point needs to address the pricing segment for SMEs."
"They could continue to offer more stringent security policy measures for threat point management."
"It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products."
"I would love it if they would do some work on the Postgres definition on the back-end."
"We are unable to export the reports from the dashboard, and if it is possible to do then it is not intuitive."
"Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents."
"They could help us be integrating features with solutions from third parties."
"We still get some false positives. There are times when legitimate stuff gets flagged and it could be that somebody is expecting a very important email but they don't end up getting it. On the flip side, when we alert Check Point about stuff like this, it is corrected, so they are improving. That's a plus."
"It is highly scalable, but there is a limitation that it is only available on Cisco devices."
"There is some overlap between Cisco Tetration and AppDynamics and I need to have a single pane of glass, rather than have to jump between different tools."
"It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge."
"The integration could be better, especially with different types of solutions."
"The emailed notifications are either hard to find or they are not available. Search capabilities can be improved."
"The interface is really helpful for technical people, but it is not user-friendly."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes."
"I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 9th in Cloud Workload Protection Platforms (CWPP) with 49 reviews while Cisco Secure Workload is ranked 20th in Cloud Workload Protection Platforms (CWPP) with 13 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Cisco Secure Workload is rated 8.4. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Cisco Secure Workload writes "A solution that provides good technical support but its high cost makes it challenging for users to adopt it". Check Point Harmony Email & Collaboration is most compared with Microsoft Defender for Office 365, Avanan, Microsoft Defender for Cloud, Mimecast Email Security and Cisco Secure Email, whereas Cisco Secure Workload is most compared with Akamai Guardicore Segmentation, Illumio, VMware NSX, Prisma Cloud by Palo Alto Networks and Nutanix Flow Network Security. See our Check Point Harmony Email & Collaboration vs. Cisco Secure Workload report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.