Check Point Harmony Email & Collaboration vs Microsoft Defender for Cloud comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary
Updated on Jul 1, 2023

We performed a comparison between Check Point Harmony Email & Collaboration and Microsoft Defender for Cloud based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.

  • Features: Check Point Harmony Email & Collaboration offers strong integration through its API, advanced data leak prevention, and a robust monitoring system. Microsoft Defender for Cloud impressed users with automation, threat analysis, scalability, and seamless integration with other Microsoft offerings. Check Point Harmony could improve its integration capabilities with on-premises Exchange and third-party solutions. Microsoft Defender for Cloud users want to see more automation and enhanced risk identification. 
  • Service and Support: Positive reviews of Check Point customer service emphasized quick responses and dependable services. Others reported slow response times and asked for support in more languages. Some users praised Microsoft support as responsive and knowledgeable support, but a few users were dissatisfied with support outsourcing and long resolution times. The quality of customer service for both products varies depending on factors like support plans and location.
  • Ease of Deployment: The setup process for Check Point Harmony Email & Collaboration is simple. Users could configure it quickly, and they received vendor assistance during complex integrations. Microsoft Defender for Cloud also offers a straightforward and user-friendly setup. The deployment time may vary, but the solution is automatically installed on the Azure Portal, with minimal configuration needed.
  • Pricing: Check Point Harmony Email & Collaboration is generally considered cost-effective. Some users found the licensing for Microsoft Defender for Cloud to be reasonable, but others described it as costly.
  • ROI: Check Point Harmony Email & Collaboration provides useful functionalities and cloud support, leading to notable improvements in ROI ranging from 15% to 80%. Some users reported that Microsoft Defender for Cloud cut time spent on security tasks in half and said that its core security features could potentially yield a high ROI.

Comparison Results: Check Point Harmony Email & Collaboration outperforms Microsoft Defender for Cloud among our reviewers. Check Point Harmony seamlessly integrates with different platforms and services, offers advanced data leak prevention features, and provides comprehensive monitoring. Microsoft Defender for Cloud received mixed reviews for its customer service, support, setup process, and licensing experience. 

To learn more, read our detailed Check Point Harmony Email & Collaboration vs. Microsoft Defender for Cloud Report (Updated: May 2024).
772,679 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"We've seen a reduction in resources devoted to vulnerability monitoring. Before PingSafe we spent a lot of time monitoring and fixing these issues. PingSafe enabled us to divert more resources to the production environment.""PingSafe released a new security graph tool that helps us identify the root issue. Other tools give you a pass/fail type of profile on all misconfigurations, and those will run into the thousands. PingSafe's graphing algorithm connects various components together and tries to identify what is severe and what is not. It can correlate various vulnerabilities and datasets to test them on the back end to pinpoint the real issue.""It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature.""Atlas security graph is pretty cool. It maps out relationships between components on AWS, like load balancers and servers. This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.""When creating cloud infrastructure, Cloud Native Security evaluates the cloud security parameters and how they will impact the organization's risk. It lets us know whether our security parameter conforms to international industry standards. It alerts us about anything that increases our risk, so we can address those vulnerabilities and prevent attacks.""It's positively affected the communication between cloud security, application developers, and AppSec teams.""We use the infrastructure as code scanning, which is good.""Cloud Native Security is a tool that has good monitoring features."

More SentinelOne Singularity Cloud Security Pros →

"The product is a fairly complete and centralized solution accessible through the Infinity Portal.""As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts.""The anti-phishing feature is the solution's best feature.""Its total protection has been the greatest aspect since it completely protects all the mail from the cloud.""It is very intuitive. It is a point and click type of deal.""The automated rule cleanups and automated policy installs have improved my customers' organizations.""The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc.""The API is its most valuable feature. On the API side, relative to the rest of the market, Check Point is decades ahead of its competitors."

More Check Point Harmony Email & Collaboration Pros →

"It's quite a good product. It helps to understand the infections and issues you are facing.""The most valuable features of this solution are the remote workforce capabilities and the general experience of the remote workforce.""It takes very little effort to integrate it. It also gives very good visibility into what exactly is happening.""The first valuable feature was the fact that it gave us a list of everything that users were surfing on the web. Having the list, we could make decisions about those sites.""Provides a very good view of the entire security setup of your organization.""Most importantly, it's an integrated solution. We not only have Defender for Cloud, but we also have Defender for Endpoint, Defender for Office 365, and Defender for Identity. It's an integrated, holistic solution.""It helps you to identify the gaps in your solution and remediate them. It produces a compliance checklist against known standards such as ISO 27001, HIPAA, iTrust, etc.""DSPM is the most valuable feature."

More Microsoft Defender for Cloud Pros →

Cons
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier.""The integration with Oracle has room for improvement.""here is a bit of a learning curve. However, you only need two to three days to identify options and get accustomed.""There should be more documentation about the product.""There's room for improvement in the graphic explorer.""One of the issues with the product stems from the fact that it clubs different resources under one ticket.""The alerting system of the product is an area that I look at and sometimes get confused about. I feel the alerting feature needs improvement.""The cost has the potential for improvement."

More SentinelOne Singularity Cloud Security Cons →

"Some undefined threats can bypass the security system when there is a networking failure in the organization.""Check Point needs to address the pricing segment for SMEs.""Support can be a bit quicker in helping the customer.""It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products.""A signature-based filter could improve the solution's AI model for spam email.""They could help us be integrating features with solutions from third parties.""There are a few areas for improvement. One is the occasional sluggishness or latency, which is likely due to the cloud-based nature of the solution. So, the performance can be better.""We understand that false positives are always there, but sometimes the notifications are more than expected."

More Check Point Harmony Email & Collaboration Cons →

"The solution is quite complex. A lot of the different policies that actually get applied don't pertain to every client. If you need to have something open for a client application to work, then you get dinged for having a port open or having an older version of TLS available.""I would suggest building a single product that addresses endpoint server protection, attack surface, and everything else in one solution. That is the main disadvantage with the product. If we are incorporating some features, we end up in a situation where this solution is for the server, and that one is for the client, or this is for identity, and that is for our application. They're not bundling it. Commercially, we can charge for different licenses, but on the implementation side, it's tough to help our end-customer understand which product they're getting.""The solution could improve by being more intuitive and easier to use requiring less technical knowledge.""The overview provides you with good information, but if you want more details, there is a lot more customization to do, which requires knowledge of the other supporting solutions.""The solution could extend its capabilities to other cloud providers. Right now, if you want to monitor a virtual machine on another cloud, you can do that. However, this cannot be done with other cloud platform services. I hope once that is available then Defender for Cloud will be a unified solution for all cloud platform services.""Another thing is that Defender for Cloud uses more resources than CrowdStrike, which my current company uses. Defender for Cloud has two or three processes running simultaneously that consume memory and processor time. I had the chance to compare that with CrowdStrike a few days ago, which was significantly less. It would be nice if Defender were a little lighter. It's a relatively large installation that consumes more resources than competitors do.""Consistency is the area where the most improvement is needed. For example, there are some areas where the UI is not uniform across the board.""Agent features need to be improved. They support agents through Azure Arc or Workbench. Sometimes, we are not able to get correct signals from the machines on which we have installed these agents. We are not able to see how many are currently reporting to Azure Security Center, and how many are currently not reporting. For example, we have 1,000 machines, and we have enrolled 1,000 OMS agents on these machines to collect the log. When I look at the status, even though at some places, it shows that it is connected, but when I actually go and check, I'm not getting any alerts from those. There are some discrepancies on the agent, and the agent features are not up to the mark."

More Microsoft Defender for Cloud Cons →

Pricing and Cost Advice
  • "As a partner, we receive a discount on the licenses."
  • "It's a fair price for what you get. We are happy with the price as it stands."
  • "I wasn't sure what to expect from the pricing, but I was pleasantly surprised to find that it was a little less than I thought."
  • "Singularity Cloud Workload Security's pricing is good."
  • "Singularity Cloud Workload Security's licensing and price were cheaper than the other solutions we looked at."
  • "I understand that SentinelOne is a market leader, but the bill we received was astronomical."
  • "It's not expensive. The product is in its initial growth stages and appears more competitive compared to others. It comes in different variants, and I believe the enterprise version costs around $55 per user per year. I would rate it a five, somewhere fairly moderate."
  • "The pricing is fair. It is not inexpensive, and it is also not expensive. When managing a large organization, it is going to be costly, but it meets the business needs. In terms of what is out there on the market, it is fair and comparable to what I have seen, so I do not have any complaints about the cost"
  • More SentinelOne Singularity Cloud Security Pricing and Cost Advice →

  • "Having information stolen by a hacker would be more expensive than purchasing a license."
  • "Being able to keep the phishing campaigns out of my company has been ROI for me."
  • "Do a full feature evaluation (interactive) with a support person. That is what I did."
  • "The price is very good, based on what they deliver."
  • "One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
  • "There are absolutely no additional costs to the standard licensing fees. One of the wonderful pieces is that CloudGuard SaaS is all-inclusive in its licensing. There's no a-la-carte functionality. You're getting 100 percent of the product for the licensing that you're paying."
  • "The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
  • "The pricing and licensing are always negotiable."
  • More Check Point Harmony Email & Collaboration Pricing and Cost Advice →

  • "I'm not privy to that information, but I know it's probably close to a million dollars a year."
  • "We are using the free version of the Azure Security Center."
  • "Azure Defender is a bit pricey. The price could be lower."
  • "This is a worldwide service and depending on the country, there will be different prices."
  • "Security Center charges $15 per resource for any workload that you onboard into it. They charge per VM or per data-base server or per application. It's not like Microsoft 365 licensing, where there are levels like E3 and E5. Security Center is pretty straightforward."
  • "There is a helpful cost-reducing option that allows you to integrate production subscriptions with non-production subscriptions."
  • "Its pricing is a little bit high in terms of Azure Security Center, but the good thing is that we don't need to maintain and deploy it. So, while the pricing is high, it is native to Azure which is why we prefer using this tool."
  • "I am not involved in this area. However, I believe its price is okay because even small customers are using Azure Security Center. I don't think it is very expensive."
  • More Microsoft Defender for Cloud Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
    772,679 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best… more »
    Top Answer:When I joined my organization, I saw that PingSafe was already implemented. I started to use the tool's alerting… more »
    Top Answer:I don't even have details of the product's single license purchased by my company.
    Top Answer:I use the solution in my company to secure the users' environment so that there are no phishing attacks. The tool… more »
    Top Answer:The product offers good and easy integration capabilities with other products.
    Top Answer:Azure Security Center is very easy to use, integrates well, and gives very good visibility on what is happening across… more »
    Top Answer:The entire Defender Suite is tightly coupled, integrated, and collaborative.
    Top Answer:Our clients complain about the cost of Microsoft Defender for Cloud. Microsoft needs to bring the cost down. What we're… more »
    Comparisons
    Also Known As
    PingSafe
    Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
    Microsoft Azure Security Center, Azure Security Center, Microsoft ASC, Azure Defender
    Learn More
    Interactive Demo
    Overview

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure and protect your multi-cloud infrastructure, services, and containers from build time to runtime. SentinelOne’s CNAPP applies an attacker’s mindset to help security practitioners better prioritize their  remediation tasks with evidence-backed Verified Exploit Paths™. The efficient and scalable runtime protection, proven over 5 years and trusted by many of the world’s leading cloud enterprises, harnesses local, autonomous AI engines to detect and thwart runtime threats in real-time. CNAPP data and workload telemetry is recorded to SentinelOne’s unified security lake, for easy access and investigation.

    Singularity Cloud Security includes both agentless and AI-powered cloud security controls, which represent two halves of our strategy to keep public cloud and container environments safe. Radically reduce your cloud attack surface with Singularity Cloud Native Security, formerly PingSafe, with agentless insights and evidence-based prioritization; protect runtime compute and container with Singularity Cloud Workload Security, SentinelOne’s real-time CWPP, with AI-powered machine-speed blocking of threats.

    Check Point Harmony Email and Office is a cloud-based software offering complete protection to stop malware attacks through emails. The software is designed to provide protection for organizations using Office 365, G Suite, Google Workspace, and all other collaboration and file-sharing apps. Access permissions can be granted and custom policies can be defined for any user of choice.

    Check Point Harmony Email and Office identifies and blocks advanced malware, phishing, and ransomware attacks in real time before they reach the user’s inbox. In turn, this also helps protect sensitive business data from breaches. Harmony Email and Office was the first solution to implement machine learning, API, and AI for email security, and will ultimately prevent any attempts at account takeover via agentless multi-factor authentication.

    What is Complete Protection?

    Check Point Harmony Email and Office offers a superior catch rate for collaboration apps and cloud email with their API-based solution that detects attacks that other solutions miss, including account takeover, supply chain attacks, ransomware, and BEC. The complete protection offers:

    • Malware Protection - Recognized by NSS Labs as “most effective in breach prevention,” the solution leverages technologies to bring clean files to users within 1.5 seconds. In addition, enterprises can be safer as the solution prevents malicious messages and files from reaching the user’s inbox.
    • Data Leakage Protection - Any confidential or sensitive information will be marked and have a classified suffix added to the end of the message or file to help keep those materials safe. Those files are encrypted, and the user will be alerted to any attempted breach of those messages.
    • Phishing Protection - Before advanced phishing attacks reach the end user, Harmony Email and Office detects and blocks them, including outbound, inbound, and internal communications.
    • Account Takeover Protection - After a user connects their cloud app, the solution captures the user's history and creates a profile and a custom threat profile. In the event of a suspected account takeover, threat intelligence is leveraged through millions of Check Point-secured gateways and endpoints and is blocked.

    Reviews from Real Users

    Check Point Harmony Email and Office offers a revolutionary prevention solution to stop malware attacks through emails. Users particularly like its visibility and the ability to protect sensitive business data.

    David U., a CISO at IMC companies, notes, "It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."

    Mantu S., a senior technology architect at Incedo Inc., writes, "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."

    Microsoft Defender for Cloud is a comprehensive security solution that provides advanced threat protection for cloud workloads. It offers real-time visibility into the security posture of cloud environments, enabling organizations to quickly identify and respond to potential threats. With its advanced machine learning capabilities, Microsoft Defender for Cloud can detect and block sophisticated attacks, including zero-day exploits and fileless malware.

    The solution also provides automated remediation capabilities, allowing security teams to quickly and easily respond to security incidents. With Microsoft Defender for Cloud, organizations can ensure the security and compliance of their cloud workloads, while reducing the burden on their security teams.

    Sample Customers
    Information Not Available
    Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
    Microsoft Defender for Cloud is trusted by companies such as ASOS, Vatenfall, SWC Technology Partners, and more.
    Top Industries
    REVIEWERS
    Computer Software Company27%
    Construction Company13%
    Financial Services Firm10%
    Media Company8%
    VISITORS READING REVIEWS
    Computer Software Company21%
    Financial Services Firm15%
    Manufacturing Company10%
    Insurance Company4%
    REVIEWERS
    Energy/Utilities Company16%
    Computer Software Company14%
    Financial Services Firm9%
    Security Firm9%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm9%
    Manufacturing Company8%
    Real Estate/Law Firm5%
    REVIEWERS
    Computer Software Company24%
    Agriculture10%
    Consumer Goods Company10%
    Recruiting/Hr Firm10%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm13%
    Manufacturing Company8%
    Government7%
    Company Size
    REVIEWERS
    Small Business39%
    Midsize Enterprise20%
    Large Enterprise41%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise13%
    Large Enterprise61%
    REVIEWERS
    Small Business50%
    Midsize Enterprise19%
    Large Enterprise31%
    VISITORS READING REVIEWS
    Small Business36%
    Midsize Enterprise18%
    Large Enterprise46%
    REVIEWERS
    Small Business27%
    Midsize Enterprise11%
    Large Enterprise62%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise15%
    Large Enterprise65%
    Buyer's Guide
    Check Point Harmony Email & Collaboration vs. Microsoft Defender for Cloud
    May 2024
    Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Microsoft Defender for Cloud and other solutions. Updated: May 2024.
    772,679 professionals have used our research since 2012.

    Check Point Harmony Email & Collaboration is ranked 9th in Cloud Workload Protection Platforms (CWPP) with 49 reviews while Microsoft Defender for Cloud is ranked 3rd in Cloud Workload Protection Platforms (CWPP) with 46 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Microsoft Defender for Cloud is rated 8.0. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Microsoft Defender for Cloud writes "Provides multi-cloud capability, is plug-and-play, and improves our security posture". Check Point Harmony Email & Collaboration is most compared with Microsoft Defender for Office 365, Avanan, Mimecast Email Security, Cisco Secure Email and Barracuda Email Protection, whereas Microsoft Defender for Cloud is most compared with AWS GuardDuty, Prisma Cloud by Palo Alto Networks, Microsoft Defender XDR, Wiz and Cortex XDR by Palo Alto Networks. See our Check Point Harmony Email & Collaboration vs. Microsoft Defender for Cloud report.

    See our list of best Cloud Workload Protection Platforms (CWPP) vendors.

    We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.