We performed a comparison between Check Point Harmony Email & Collaboration and Cisco Secure Workload based on real PeerSpot user reviews.
Find out in this report how the two Cloud Workload Protection Platforms (CWPP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is advantageous in terms of time-saving and cost reduction."
"It used to guide me about an alert. There is something called an alert guide. I used to click on the alert guide, and I could read everything. I could read about the alert and how to resolve it. I used to love that feature."
"The user interface is well-designed and easy to navigate."
"The most valuable feature is the ability to gain deep visibility into the workloads inside containers."
"We use the infrastructure as code scanning, which is good."
"With PingSafe, it's easy to onboard new accounts."
"The most valuable feature of the solution is its storyline, which helps trace an event back to its source, like an email or someone clicking on a link."
"The offensive security where they do a fix is valuable. They go to a misconfiguration and provide detailed alerts on what could be there. They also provide a remediation feature where if we give the permission, they can also go and fix the issue."
"It seems quite scalable. We don't anticipate any scaling issues. We have it deployed in the cloud."
"The API is its most valuable feature. On the API side, relative to the rest of the market, Check Point is decades ahead of its competitors."
"The main benefit is that hackers can't steal information."
"It is fast and quite effective in terms of preventing any security incidents."
"We need the phishing detection and email quarantine. Once an email is considered malicious, it stays in the quarantine where we can interrogate it. We can check out why it was quarantined and see if it should be delivered to the individual."
"Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
"I like the fact that having granular information about the potential threats is received in email."
"It helped us to bring security compliance and ensure system robustness throughout."
"The most valuable feature of this solution is security."
"The most valuable feature is micro-segmentation, which is the most important with respect to visibility."
"Generally speaking, Cisco support is considered one of the best in the networking products and stack."
"A complete and powerful micro-segmentation solution."
"It's stable."
"The product provides multiple-device integration."
"Scalability is its most valuable feature."
"The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network."
"I'd like to see better onboarding documentation."
"I used to work on AWS. At times, I would generate a normal bug in my system, and then I would check PingSafe. The alert used to come after about three and a half hours. It used to take that long to generate the alert about the vulnerability in my system. If a hacker attacks a system and PingSafe takes three to four hours to generate an alert, it will not be beneficial for the company. It would be helpful if we get the alert in five to ten minutes."
"Implementing single sign-on requires a pre-class account feature, which is currently not available."
"There is a bit of a learning curve for new users."
"If I had to pick a complaint, it would be the way the hosts are listed in the tool. You have different columns separated by endpoint name, Cloud Account, and Cloud Instances ID. I wish there was something where we could change the endpoint name and not use just the IP address. We would like to have custom names or our own names for the instances. If I had a complaint, that would be it, but so far, it meets all the needs that we have."
"Maybe container runtime security could be improved."
"The resolution suggestions could be better, and the compliance features could be more customizable for Indian regulations. Overall, the compliance aspects are good. It gives us a comprehensive list, and its feedback is enough to bring us into compliance with regulations, but it doesn't give us the specific objects."
"It would be really helpful if the solution improves its agent deployment process."
"I would like Check Point to extend its coverage to include more cloud applications."
"I would love it if they would do some work on the Postgres definition on the back-end."
"They must provide security to more email service providers."
"Stability has been a pain point. I was going back and forth with my product engineer and project manager for a couple of months. I had the product in a demonstration mode and wasn't satisfied with the results initially. After a few alterations and a few revisions later, it is fine."
"Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents."
"There is always room for improvement and growth."
"The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."
"Support can be a bit quicker in helping the customer."
"Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it."
"There is some overlap between Cisco Tetration and AppDynamics and I need to have a single pane of glass, rather than have to jump between different tools."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes."
"The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring."
"It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge."
"It has an uninviting interface."
"The integration could be better, especially with different types of solutions."
"The interface is really helpful for technical people, but it is not user-friendly."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 9th in Cloud Workload Protection Platforms (CWPP) with 49 reviews while Cisco Secure Workload is ranked 19th in Cloud Workload Protection Platforms (CWPP) with 13 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Cisco Secure Workload is rated 8.4. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Cisco Secure Workload writes "A solution that provides good technical support but its high cost makes it challenging for users to adopt it". Check Point Harmony Email & Collaboration is most compared with Microsoft Defender for Office 365, Avanan, Microsoft Defender for Cloud, Mimecast Email Security and Cisco Secure Email, whereas Cisco Secure Workload is most compared with Akamai Guardicore Segmentation, Illumio, VMware NSX, Prisma Cloud by Palo Alto Networks and Nutanix Flow Network Security. See our Check Point Harmony Email & Collaboration vs. Cisco Secure Workload report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.