We performed a comparison between Check Point CloudGuard Posture Management and Check Point Harmony Email & Collaboration based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Check Point CloudGuard Posture Management is notable for its extensive data protection, incident identification, and adaptable rule sets. It provides control over IAM roles, training options, and robust reporting. Check Point Harmony Email & Collaboration excels at API-driven integration and advanced prevention of data leaks. Check Point CloudGuard Posture Management could enhance its reporting, vulnerability assessments, integration, and customizability. Check Point Harmony Email & Collaboration requires improvements in integration, performance, and collaboration capabilities.
Service and Support: Check Point CloudGuard Posture Management has been praised for its helpful support. Some Check Point Harmony Email & Collaboration customers were dissatisfied with response times and requested support in more languages, but others said the support was excellent.
Ease of Deployment: The setup process for Check Point CloudGuard Posture Management is quick and painless, and the overall deployment varies. Check Point Harmony Email & Collaboration has an automated setup that requires minimal user intervention.
Pricing: Some users found Check Point CloudGuard Posture Management to be reasonably priced and compatible, while others perceive it as costly. Reviewers had mostly good things to say about the cost of Check Point Harmony Email & Collaboration. Users describe the licensing as uncomplicated and budget-friendly.
ROI: Check Point CloudGuard Posture Management offers benefits in terms of compliance management and decreased administrative workload. One user reported a 35% return on investment (ROI) and a notable growth rate. Reviewers also said that Check Point Harmony Email & Collaboration consistently delivers a solid return. Users reported estimated ROIs ranging from 15% to 80%.
Comparison Results: Check Point CloudGuard Posture Management is preferred over Check Point Harmony Email & Collaboration. Users appreciate CloudGuard's comprehensive data security and protection for the entire cloud infrastructure. It offers strong incident detection, granular reporting, and the ability to customize rulesets based on compliance requirements. CloudGuard provides IAM role control and embedded machine learning for real-time attack prevention. Users find the dashboard intuitive, reporting powerful, and the product's ability to enhance security and resolve incidents impressive.
"With PingSafe, it's easy to onboard new accounts."
"I did a lot of research before signing up and doing the demo. They have a good reputation as far as catching threats early on."
"It is pretty easy to integrate with this platform. When properly integrated, it monitors end-to-end."
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"The management console is the most valuable feature."
"The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue."
"The management console is highly intuitive to comprehend and operate."
"The visibility is the best part of the solution."
"The way they offer container security is a big highlight that I have noticed. The solution is also agentless, so the scanning, runtime, really everything is offered directly by CloudGuard."
"This solution provides threat prevention and detection of anomalies automatically and investigates the activity of each one of them."
"Overall, it provides good security."
"Checkpoint posture management gives you visibility across your entire cloud infrastructure, so it helps you with management, maintenance, and compliance. With visibility across all these cloud platforms, you can protect against compromised credentials or identity theft."
"We like the GSL Builder feature. When you're running a security operations center, you spend a lot of time monitoring endpoint activity to ensure there is no malicious traffic or anonymous access in the environment. The GSL Builder is helpful for deep investigations of a particular reason for an incident. You can use it to get more information."
"The two most valuable features for us are the central firewall administrator and the real-time cloud compliance monitoring."
"It provides complete visibility of workload hosted on different cloud platforms including AWS and Azure, along with multiple tenants."
"The most valuable feature is the ability to apply common tools across all accounts."
"In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication."
"We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
"Email security has improved since we deployed this platform."
"It is fast and quite effective in terms of preventing any security incidents."
"Its characteristics are adapted to the most modern threats."
"For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good."
"The setup is very easy. I haven't faced any complexity with the setup of the solution."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"The Kubernetes scanning on the Oracle Cloud needs to be improved. It's on the roadmap. AWS has this capability, but it's unavailable for Oracle Cloud."
"The could improve their mean time to detect."
"Customized queries should be made easier to improve PingSafe."
"With Cloud Native Security, we can't selectively enable or disable alerts based on our specific use case."
"I would like additional integrations."
"I would like PingSafe to add real-time detection of vulnerabilities and cloud misconfigurations."
"Their search feature could be better."
"We are getting reports only in a predefined form. I would like to have customized reports so that I can see how many issues are open or closed today or in two weeks."
"Down the road, we would like to see automation. That is probably a feature that most people want. If they can automate patching a vulnerability, it will be much easier."
"I would like to see some AI on the back-end, just to assist with doing analysis and making recommendations."
"When rules change, it messes up the remediation. They haven't found a fix for that yet. The remediation rule goes into limbo. It's an architectural design flaw within their end compliance engine—a serious bug."
"I would like an interface more adapted to cell phones or tablets."
"Making basic rules is easy, but it's complex if you want to do something a little more nuanced. I've been unable to make some rules that I wanted. I couldn't evaluate some values or parameters of the components I look for. I haven't always been able to assess them."
"The support it provides is not very good. They should improve it since we have had several setbacks due to support issues."
"The integration process could be enhanced by enabling integration at the organizational level rather than requiring the manual setup of individual accounts."
"The performance can be better. Sometimes, the performance is not up to the mark. There is also integration complexity with third-party software and tools."
"Some undefined threats can bypass the security system when there is a networking failure in the organization."
"I would like Check Point to extend its coverage to include more cloud applications."
"The left-hand feature can be made more granular for the implementation of the policy."
"There are a few areas for improvement. One is the occasional sluggishness or latency, which is likely due to the cloud-based nature of the solution. So, the performance can be better."
"if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."
"After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."
"They could help us be integrating features with solutions from third parties."
"They must provide security to more email service providers."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point CloudGuard CNAPP is ranked 5th in Cloud Workload Protection Platforms (CWPP) with 64 reviews while Check Point Harmony Email & Collaboration is ranked 9th in Cloud Workload Protection Platforms (CWPP) with 49 reviews. Check Point CloudGuard CNAPP is rated 8.6, while Check Point Harmony Email & Collaboration is rated 8.6. The top reviewer of Check Point CloudGuard CNAPP writes "Threat intel integration provides us visibility in case any workload is communicating with suspicious or blacklisted IPs". On the other hand, the top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". Check Point CloudGuard CNAPP is most compared with Prisma Cloud by Palo Alto Networks, Wiz, AWS GuardDuty, Microsoft Defender for Cloud and Qualys VMDR, whereas Check Point Harmony Email & Collaboration is most compared with Microsoft Defender for Office 365, Avanan, Microsoft Defender for Cloud, Mimecast Email Security and Cisco Secure Email. See our Check Point CloudGuard CNAPP vs. Check Point Harmony Email & Collaboration report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.