We compared Check Point Harmony Email and Collaboration and Trend Micro Email Security across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Features: Check Point Harmony Email and Collaboration offers exceptional integration through APIs, advanced protection against data leaks, and the ability to detect complex social engineering attacks. Trend Micro Email Security is known for its powerful antivirus engine, user-friendly administration, and reliable spam protection.
Room for Improvement: Check Point Harmony Email and Collaboration could improve integration with Exchange and other SaaS clouds while enhancing its threat clouds and AI engines. Trend Micro Email Security customers want better compatibility with third-party email solutions, advanced AI for rule configuration, and improved risk visibility.
Service and Support: Check Point has earned mixed reviews for its customer service. Some customers appreciate the technical support provided, while others are dissatisfied with response times. Trend Micro Email Security's support is generally responsive and helpful, but some reviews suggest room for improvement.
Ease of Deployment: Check Point Harmony Email is considered relatively easy to implement. Setting up Trend Micro Email Security is typically easy, taking around 30 minutes to an hour or two.
Pricing: Check Point Harmony Email and Collaboration is a cost-effective option. It offers competitive prices and is suitable for small to medium-sized organizations. Some users find Trend Micro Email Security to be costly and more suitable for larger enterprises.
ROI: Check Point Harmony Email and Collaboration delivers superior return on investment compared to other options. Trend Micro Email Security users say its return on investment is hard to demonstrate.
Comparison Results: Check Point Harmony Email and Collaboration is an effective solution for blocking malicious attachments and detecting social engineering attacks. However, there is room for improvement in terms of integration and support, reducing false positives, and enhancing response times. Trend Micro excels in security features, ease of administration, and scalability. Trend Micro could benefit from improved dashboard visibility and stronger spam filtering.
"The basic features are okay and I'm satisfied with the Defender."
"Does a thorough job of examining email and URLs for malicious content."
"It gives us visibility into threats and, for endpoints, it helps us to prioritize threats. We used to have a lack of visibility, but now our time to detect and respond has decreased."
"Microsoft Defender for Office 365 has improved my organization's security. It makes it easier to manage the infrastructure without the help of third-party applications."
"The initial setup was easy."
"The deployment capability is a great feature."
"Defender for Office 365 has helped eliminate having to look at multiple dashboards and that is the aspect I like most about it. It is simpler, effective, and convenient. The users like the process efficiency."
"Microsoft Defender for Office 365's most valuable feature is its performance."
"Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
"The API is its most valuable feature. On the API side, relative to the rest of the market, Check Point is decades ahead of its competitors."
"I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats."
"As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts."
"It is the collaboration between users inside the company. It is a big advantage with Check Point to be able to work together on the same document."
"The product offers good and easy integration capabilities with other products."
"Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size."
"The solution helps to block spam emails."
"Trend Micro Email Security’s most valuable feature is spam filtering."
"It is mostly stable."
"The most valuable feature of Trend Micro Email Security is the security level it provides. The solution is efficient."
"The most valuable features of the solution are spam protection and email continuity."
"The initial setup is not overly complex."
"The tool provides a strong defense against attacks. It is also easy to use. Trend Micro Email Security's integration capabilities are great."
"It does a good job of ensuring users are not compromised via email."
"The most valuable features include email filtering to block spam and phishing attempts, the use of DMARC for email authentication, and robust malware scanning."
"Microsoft Defender for Office 365 could improve by giving customers information on techniques to prevent threats. For example, information about best practices on how to protect their own devices against hackers and scammers, such as educational information or training. This would help others have a better understanding of cyber security. Additionally, there can be more security features added."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"One area for improvement is integration. For example, when it comes to external SaaS platforms, we were not able to get a lot of information on integrations with such apps for security and authentication."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"About eight months ago, we started to measure the quantity of phishing and spam that we have been receiving, and it has been increasing a lot. That means that protection for our email is not as good as we were expecting."
"The pre-sales cost calculations could be more transparent."
"Microsoft should provide more documentation for users so they can self-educate. I would like to see more documentation for advanced security features."
"The company should focus on adding threats that the solution is currently unable to detect."
"It's not fully integrated with Google Workspace, and the statistics don't update in real-time."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"They could continue to offer more stringent security policy measures for threat point management."
"The next release should focus more on email categorization and provide options for unlocking blocked safe emails."
"It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products."
"The implementation could definitely be better."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"I rate Trend Micro support four out of 10. The support in our region isn't very good. They do not respond quickly when we open up a case."
"There is room for improvement in threat detection, especially for advanced attacks and business email compromise."
"There is a limitation when customers are using their email from a third-party solution that isn't from Trend Micro."
"The patch management could improve in Trend Micro Email Security."
"While they are good, not 100% of email is protected just yet."
"The initial setup was straightforward. This is a virtual appliance, it takes a short time to deploy the solution. However, it is not difficult if you understand the technology. You must have good knowledge of the email security area to set up the product correctly. There are many features in this solution and a high risk of having mistakes with the configuration."
"Sometimes malicious email gets past the email gateway."
"There needs to be more documentation for the product."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 7th in Email Security with 49 reviews while Trend Micro Email Security is ranked 8th in Email Security with 24 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Trend Micro Email Security is rated 8.0. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Trend Micro Email Security writes "The solution blocks spam emails from reaching the user’s mailbox but should introduce new features, improvements, and updates". Check Point Harmony Email & Collaboration is most compared with Avanan, Microsoft Defender for Cloud, Mimecast Email Security, Cisco Secure Email and Barracuda Email Protection, whereas Trend Micro Email Security is most compared with Cisco Secure Email, Microsoft Exchange Online Protection (EOP), Fortinet FortiMail and Trend Micro InterScan Messaging Security. See our Check Point Harmony Email & Collaboration vs. Trend Micro Email Security report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.