We compared Check Point Harmony Email and Collaboration and Trend Micro Email Security across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Features: Check Point Harmony Email and Collaboration offers exceptional integration through APIs, advanced protection against data leaks, and the ability to detect complex social engineering attacks. Trend Micro Email Security is known for its powerful antivirus engine, user-friendly administration, and reliable spam protection.
Room for Improvement: Check Point Harmony Email and Collaboration could improve integration with Exchange and other SaaS clouds while enhancing its threat clouds and AI engines. Trend Micro Email Security customers want better compatibility with third-party email solutions, advanced AI for rule configuration, and improved risk visibility.
Service and Support: Check Point has earned mixed reviews for its customer service. Some customers appreciate the technical support provided, while others are dissatisfied with response times. Trend Micro Email Security's support is generally responsive and helpful, but some reviews suggest room for improvement.
Ease of Deployment: Check Point Harmony Email is considered relatively easy to implement. Setting up Trend Micro Email Security is typically easy, taking around 30 minutes to an hour or two.
Pricing: Check Point Harmony Email and Collaboration is a cost-effective option. It offers competitive prices and is suitable for small to medium-sized organizations. Some users find Trend Micro Email Security to be costly and more suitable for larger enterprises.
ROI: Check Point Harmony Email and Collaboration delivers superior return on investment compared to other options. Trend Micro Email Security users say its return on investment is hard to demonstrate.
Comparison Results: Check Point Harmony Email and Collaboration is an effective solution for blocking malicious attachments and detecting social engineering attacks. However, there is room for improvement in terms of integration and support, reducing false positives, and enhancing response times. Trend Micro excels in security features, ease of administration, and scalability. Trend Micro could benefit from improved dashboard visibility and stronger spam filtering.
"The most valuable feature is protection against malicious links, fishing, and impersonation. You can train people to be aware of these threats, but they're not always careful. When they're using their phones between meetings, they click on a link, and it's game over."
"The product is not resource-intensive."
"At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."
"Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features."
"Since we have started using the solution, there have been fewer compromises."
"Threat Explorer is one of the features that I very much like because it is a real-time report that allows you to identify, analyze, and trace security attacks."
"Defender for 365 is a comprehensive cloud-based solution. The value of the cloud is that you aren't alone. Threat intelligence and analytics are shared in the cloud. We don't have to find the solution alone. If you face an unknown threat with traditional solutions like Trend Micro and Symantec, you need to open a case and send your information to them to analyze forensically and identify the source of the attack."
"The solution is very easy to use. All you have to do is to assign the license to the end-user and it's done. The customer will only have the feature activated, and the solution will monitor the emails to determine if they are a threat or not."
"It is fast and quite effective in terms of preventing any security incidents."
"The ease of management and intuitive administration are excellent."
"I can count the number of endpoints, emails, and collaborations being used in the environment."
"It is the collaboration between users inside the company. It is a big advantage with Check Point to be able to work together on the same document."
"I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats."
"I like the fact that having granular information about the potential threats is received in email."
"We need the phishing detection and email quarantine. Once an email is considered malicious, it stays in the quarantine where we can interrogate it. We can check out why it was quarantined and see if it should be delivered to the individual."
"Based on domain and URL reputation, it will allow traffic to flow."
"The initial setup is not overly complex."
"The most valuable features of this solution are the antivirus, antispam, and integration with cloud services. This is a multifunctional solution."
"The most valuable feature of Trend Micro Email Security is effective phishing prevention."
"The most valuable feature of Trend Micro Email Security is the security level it provides. The solution is efficient."
"The email and the signature based protection is the most valuable feature."
"The tool provides a strong defense against attacks. It is also easy to use. Trend Micro Email Security's integration capabilities are great."
"The integration capability of the solution is good."
"Trend Micro has inter-domain security features that solutions from other vendors like Forcepoint lack."
"Microsoft wants its well-paying customers to finish testing some of its half-baked products, find bugs, and report bugs back to Microsoft's team, which is a little frustrating for those who have to manage it and roll it up to thousands of people across the organization."
"Several simulation options are available within 365, and the phishing simulation could be better."
"The pre-sales cost calculations could be more transparent."
"Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment."
"There is room for improvement with the UI."
"Microsoft security solutions work as expected. They are constantly updating the solutions to make them better. At the same time, the changes can impact a customer's environment, and we need to adjust settings. Sometimes we aren't aware of the changes, and nothing is pushed from the backend automatically."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"Support can be a bit quicker in helping the customer."
"There could be more automation features included for it."
"It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"Some files are not scanned thoroughly due to occasional network failures."
"The solution fails to support hybrid deployments."
"We have used technical support, but their response time is very slow. It needs to be improved."
"The next release should focus more on email categorization and provide options for unlocking blocked safe emails."
"The patch management could improve in Trend Micro Email Security."
"There needs to be more documentation for the product."
"I would like to see more integration of Trend Micro Email Security with different platforms."
"They need to adjust the spam filtering and make it stronger."
"There is room for improvement in threat detection, especially for advanced attacks and business email compromise."
"There is a lot of room for improvement towards the phishing kind of email filtering, with the different hijacking attacks, and with the kind of password attacks which these phisher attackers do."
"In terms of improvement, reducing false positives would improve the system."
"There is a limitation when customers are using their email from a third-party solution that isn't from Trend Micro."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 7th in Email Security with 49 reviews while Trend Micro Email Security is ranked 8th in Email Security with 24 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Trend Micro Email Security is rated 8.0. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Trend Micro Email Security writes "The solution blocks spam emails from reaching the user’s mailbox but should introduce new features, improvements, and updates". Check Point Harmony Email & Collaboration is most compared with Avanan, Microsoft Defender for Cloud, Mimecast Email Security, Cisco Secure Email and Barracuda Email Protection, whereas Trend Micro Email Security is most compared with Cisco Secure Email, Microsoft Exchange Online Protection (EOP), Fortinet FortiMail and Trend Micro InterScan Messaging Security. See our Check Point Harmony Email & Collaboration vs. Trend Micro Email Security report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.