We compared Check Point Harmony Email and Collaboration and Cisco Secure Email across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Features: Check Point Harmony Email and Collaboration offers exceptional integration through APIs, advanced protection against data leaks, and the ability to detect complex social engineering attacks. Cisco Secure Email offers advanced protection against phishing attacks, reputation-based filtering, and robust tracking functionalities.
Room for Improvement: Check Point Harmony Email and Collaboration could improve integration with Exchange and other SaaS clouds while enhancing its threat clouds and AI engines. Cisco Secure Email should improve global malicious email defense, data loss prevention, and integration with third-party solutions.
Service and Support: Check Point has earned mixed reviews for its customer service. Some customers appreciate the technical support provided, while others are dissatisfied with response times. Cisco support is generally considered knowledgeable and helpful, but a few users reported slow response times and difficulty navigating the support process.
Ease of Deployment: Check Point Harmony Email is considered relatively easy to implement. Cisco Secure Email is generally straightforward and seamless to set up. It provides a modular and adaptable environment, but new users may need training.
Pricing: Check Point Harmony Email and Collaboration is a cost-effective option. It offers competitive prices and is suitable for small to medium-sized organizations. Opinions on the pricing of Cisco Secure Email are mixed. Some find it expensive but worth the investment, while others find it reasonably priced and competitive with other vendors.
ROI: Check Point Harmony Email and Collaboration delivers superior return on investment compared to other options. Cisco Secure Email's return on investment is influenced by factors such as use case, organization size, and industry.
Comparison Results: Check Point Harmony Email and Collaboration is an effective solution for blocking malicious attachments and detecting social engineering attacks. However, there is room for improvement in terms of integration and support, reducing false positives, and enhancing response times. Cisco Secure Email is highly regarded for its intelligence threat detection, reputation filtering, and robust tracking abilities. The solution’s areas for improvement include data loss prevention and third-party integration.
"The email protection is excellent, especially in terms of anti-phishing policies."
"Defender is a SaaS platform, so it offers more flexibility. Managing the permissions is easier. The solution's automated detection and response features are scalable."
"Defender helps us prioritize threats across our organization."
"Microsoft Defender for Office 365's most valuable feature is its performance."
"Defender for Office 365 has helped eliminate having to look at multiple dashboards and that is the aspect I like most about it. It is simpler, effective, and convenient. The users like the process efficiency."
"The initial setup is straightforward. You just add the license, click it, and then you can set up the rules. It is quite simple."
"There are several features that I consider valuable."
"Some of the valuable features on the email side are anti-phishing, anti-malware, and Safe Links."
"Check Point's technical support is very good."
"Getting reports and finding threats in the console is easy."
"The ease of management and intuitive administration are excellent."
"The dashboard provides information to investigate more about malicious activity and blocked emails."
"It is fast and quite effective in terms of preventing any security incidents."
"We need the phishing detection and email quarantine. Once an email is considered malicious, it stays in the quarantine where we can interrogate it. We can check out why it was quarantined and see if it should be delivered to the individual."
"Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble."
"The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic."
"Because we scan products, and there is a lot of critical data, security is very important in these cases."
"The tool comes with AI features. It is good for clients who already use Cisco products due to integration."
"Cisco Secure Email's most valuable is email certification."
"Cisco Secure Email is part of Cisco's extensive efforts and investments in technology, especially in the realm of cyber security. The product is one among many security solutions offered by Cisco."
"The advanced phishing protection and the integration with the awareness tool that Cisco has embedded into the solution to bring awareness to the customers about the dangers of phishing attacks and other things that come from email are the most valuable features."
"It blocks bulk marketing messages, graymail, spam, and provides advanced malware protection."
"Cisco Secure Email Cloud Gateway has allowed our users to be able to concentrate on the emails that they do receive. Previously, our users had to deal with nine million additional emails across the organization, which is nearly 1,000 emails per user to have to deal with a month. That's a massive amount for our staff to deal with and probably several hours of their time. We have a lot of clinical staff, being a hospital. We want to make our staff as productive as possible. By removing a lot of that spam and phishing type emails, this allows them to do their job."
"The most valuable features are Advanced Malware Protection, URL filtering, and of course Reputation Filtering."
"Several simulation options are available within 365, and the phishing simulation could be better."
"I'd like some additional features any product can give me to protect our environment in a better way."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"We need a separate license and we don't know how to get the license that is required."
"You should be able to deploy Defender for every subscription without the need to add servers."
"We need to be able to whitelist data at the backend."
"This product's effectiveness could be improved, in terms of detecting unwanted spam or even malware between the emails, compared to other products."
"The GUI is sometimes slow to fetch the device report and could be improved."
"I have learned enough to make the product stable. However, the stability has some challenges."
"They could help us be integrating features with solutions from third parties."
"We still get some false positives. There are times when legitimate stuff gets flagged and it could be that somebody is expecting a very important email but they don't end up getting it. On the flip side, when we alert Check Point about stuff like this, it is corrected, so they are improving. That's a plus."
"There is too much functionality, which makes it difficult to use. More guidance for users would be helpful."
"They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported. If they were to add report exporting capabilities on each of metric objects on the dashboard, that would be awesome."
"Typically, in a phishing email, they try to use a name everybody's going to recognize, like the CEO's name or the CFO's name... With this appliance, the way it's designed at the moment, for us to really stop that with any level of confidence, we have to build a dictionary of all the names of the people we want it to check, and all the ways they could be spelled. My name would be in there as Phillip Collins, Phillip D. Collins, Phillip Dean Collins, Phil Collins, Phil D. Collins. There could be eight or 10 variations of my name that we'd have to put in the dictionary. There's no artificial intelligence to say "Phil Collins" could be all these other things, and to stop phishing from coming through in that way."
"The user interface needs some improvement to become more user-friendly. The graphics could be better. It's designed more for a technical user rather than a business user."
"In future releases, I would like to see two main improvements come to mind. First, the current solution requires maintaining two separate operating systems for FTD, which can be cumbersome. I'd love to see a single operating system for the FTD box."
"The configuration UI should be made more intuitive. Currently, it takes a while to understand how to do the basic configurations."
"They can do it better with web links, with the URLs. They have a technology called Outbreak but it doesn't work as well as we would like."
"The management features of the product are not up to date."
"Scalability has certain shortcomings and needs to be improved because there are service providers who provide better scalability.v"
"The user interface could be updated."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 7th in Email Security with 49 reviews while Cisco Secure Email is ranked 2nd in Email Security with 56 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Cisco Secure Email is rated 8.4. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Cisco Secure Email writes "Has effortless spam control, improves security posture, and frees up our IT department's time". Check Point Harmony Email & Collaboration is most compared with Avanan, Microsoft Defender for Cloud, Mimecast Email Security, Barracuda Email Protection and Fortinet FortiMail Cloud, whereas Cisco Secure Email is most compared with Trellix Collaboration Security, Microsoft Exchange Online Protection (EOP), Fortinet FortiMail, Proofpoint Email Protection and Symantec Messaging Gateway. See our Check Point Harmony Email & Collaboration vs. Cisco Secure Email report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.