We performed a comparison between Check Point Harmony Email & Collaboration and Microsoft Defender for Cloud based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Comparison Results: Check Point Harmony Email & Collaboration outperforms Microsoft Defender for Cloud among our reviewers. Check Point Harmony seamlessly integrates with different platforms and services, offers advanced data leak prevention features, and provides comprehensive monitoring. Microsoft Defender for Cloud received mixed reviews for its customer service, support, setup process, and licensing experience.
"We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment."
"PingSafe released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. PingSafe's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take."
"When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks."
"It's positively affected the communication between cloud security, application developers, and AppSec teams."
"We use the infrastructure as code scanning, which is good."
"Cloud Native Security is a tool that has good monitoring features."
"The product is a fairly complete and centralized solution accessible through the Infinity Portal."
"As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts."
"The anti-phishing feature is the solution's best feature."
"Its total protection has been the greatest aspect since it completely protects all the mail from the cloud."
"It is very intuitive. It is a point and click type of deal."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc."
"The API is its most valuable feature. On the API side, relative to the rest of the market, Check Point is decades ahead of its competitors."
"It's quite a good product. It helps to understand the infections and issues you are facing."
"The most valuable features of this solution are the remote workforce capabilities and the general experience of the remote workforce."
"It takes very little effort to integrate it. It also gives very good visibility into what exactly is happening."
"The first valuable feature was the fact that it gave us a list of everything that users were surfing on the web. Having the list, we could make decisions about those sites."
"Provides a very good view of the entire security setup of your organization."
"Most importantly, it's an integrated solution. We not only have Defender for Cloud, but we also have Defender for Endpoint, Defender for Office 365, and Defender for Identity. It's an integrated, holistic solution."
"It helps you to identify the gaps in your solution and remediate them. It produces a compliance checklist against known standards such as ISO 27001, HIPAA, iTrust, etc."
"DSPM is the most valuable feature."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"The integration with Oracle has room for improvement."
"here is a bit of a learning curve. However, you only need two to three days to identify options and get accustomed."
"There should be more documentation about the product."
"There's room for improvement in the graphic explorer."
"One of the issues with the product stems from the fact that it clubs different resources under one ticket."
"The alerting system of the product is an area that I look at and sometimes get confused about. I feel the alerting feature needs improvement."
"The cost has the potential for improvement."
"Some undefined threats can bypass the security system when there is a networking failure in the organization."
"Check Point needs to address the pricing segment for SMEs."
"Support can be a bit quicker in helping the customer."
"It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products."
"A signature-based filter could improve the solution's AI model for spam email."
"They could help us be integrating features with solutions from third parties."
"There are a few areas for improvement. One is the occasional sluggishness or latency, which is likely due to the cloud-based nature of the solution. So, the performance can be better."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"The solution is quite complex. A lot of the different policies that actually get applied don't pertain to every client. If you need to have something open for a client application to work, then you get dinged for having a port open or having an older version of TLS available."
"I would suggest building a single product that addresses endpoint server protection, attack surface, and everything else in one solution. That is the main disadvantage with the product. If we are incorporating some features, we end up in a situation where this solution is for the server, and that one is for the client, or this is for identity, and that is for our application. They're not bundling it. Commercially, we can charge for different licenses, but on the implementation side, it's tough to help our end-customer understand which product they're getting."
"The solution could improve by being more intuitive and easier to use requiring less technical knowledge."
"The overview provides you with good information, but if you want more details, there is a lot more customization to do, which requires knowledge of the other supporting solutions."
"The solution could extend its capabilities to other cloud providers. Right now, if you want to monitor a virtual machine on another cloud, you can do that. However, this cannot be done with other cloud platform services. I hope once that is available then Defender for Cloud will be a unified solution for all cloud platform services."
"Another thing is that Defender for Cloud uses more resources than CrowdStrike, which my current company uses. Defender for Cloud has two or three processes running simultaneously that consume memory and processor time. I had the chance to compare that with CrowdStrike a few days ago, which was significantly less. It would be nice if Defender were a little lighter. It's a relatively large installation that consumes more resources than competitors do."
"Consistency is the area where the most improvement is needed. For example, there are some areas where the UI is not uniform across the board."
"Agent features need to be improved. They support agents through Azure Arc or Workbench. Sometimes, we are not able to get correct signals from the machines on which we have installed these agents. We are not able to see how many are currently reporting to Azure Security Center, and how many are currently not reporting. For example, we have 1,000 machines, and we have enrolled 1,000 OMS agents on these machines to collect the log. When I look at the status, even though at some places, it shows that it is connected, but when I actually go and check, I'm not getting any alerts from those. There are some discrepancies on the agent, and the agent features are not up to the mark."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 9th in Cloud Workload Protection Platforms (CWPP) with 49 reviews while Microsoft Defender for Cloud is ranked 3rd in Cloud Workload Protection Platforms (CWPP) with 46 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Microsoft Defender for Cloud is rated 8.0. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Microsoft Defender for Cloud writes "Provides multi-cloud capability, is plug-and-play, and improves our security posture". Check Point Harmony Email & Collaboration is most compared with Microsoft Defender for Office 365, Avanan, Mimecast Email Security, Cisco Secure Email and Barracuda Email Protection, whereas Microsoft Defender for Cloud is most compared with AWS GuardDuty, Prisma Cloud by Palo Alto Networks, Microsoft Defender XDR, Wiz and Cortex XDR by Palo Alto Networks. See our Check Point Harmony Email & Collaboration vs. Microsoft Defender for Cloud report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.