We performed a comparison between Prisma Cloud by Palo Alto Networks and Check Point Harmony Email & Collaboration based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Comparison Results: Our users prefer Prisma Cloud by Palo Alto Networks over Check Point Harmony Email & Collaboration. Prisma Cloud offers extensive visibility, continuous cloud compliance monitoring, and seamless integration with other tools. It also addresses a gap in the market by providing container and serverless security capabilities. While Check Point Harmony Email & Collaboration is praised for its API-based integration and advanced data leak prevention, users say they want better integration, performance, and support.
"It is fairly simple. Anybody can use it."
"Cloud Native Security helps us discover vulnerabilities in a cloud environment like open ports that allow people to attack our environment. If someone unintentionally opens a port, we are exposed. Cloud Native Security alerts us so we can remediate the problem. We can also automate it so that Cloud Native Security will fix it."
"The management console is the most valuable feature."
"It's positively affected the communication between cloud security, application developers, and AppSec teams."
"PingSafe's graph explorer is a valuable tool that lets us visualize all connected services."
"PingSafe's most valuable feature is its unified console."
"Support has been very helpful and provides regular feedback and help whenever needed. They've been very useful."
"The mean time to detect has been reduced."
"Check Point's technical support is very good."
"We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
"The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic."
"The product's environment is easy to work and comprehensive."
"We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
"The program has a nice interface and it is easy to use."
"Its characteristics are adapted to the most modern threats."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"You can also integrate with Amazon Managed Services. You can also get a snapshot in time, whether that's over a 24-hour period, seven days, or a month, to determine what the estate might look like at a certain point in time and generate reports from that for vulnerability management forums."
"The visibility on alerts helps you investigate more easily and see details faster."
"One of the main reasons we like Prisma Cloud so much is that they also provide an API. You can't expect to give someone an account on Prisma Cloud, or on any tool for that matter, and say, "Go find your things and fix them." It doesn't work like that... We pull down the information from the API that Prisma Cloud provides, which is multi-cloud, multi-account—hundreds and hundreds of different types of alerts graded by severity—and then we can clearly identify that these alerts belong to these people, and they're the people who must remediate them."
"The CVEs are valuable because we used to have a tool to scan CVEs, at the language level, for the dependencies that our developers had. What is good about Prisma Cloud is that the CVEs are not only from the software layer, but from all layers: the language, the base image, and you also have CVEs from the host. It covers the full base of security."
"Visibility is a key feature. Integration with other technologies across the board, whether they are Palo Alto technologies, Windows technologies, or cloud technologies, is probably the biggest thing."
"The dynamic workload identity creation, attestation, and assignment is the best feature. In addition, the application dependency map across heterogeneous environments for compliance is a striking feature."
"Prisma Cloud's most important feature is its auto-remediation."
"The client wasn't using all of the features, but the one that stood out was infrastructure-as-code (IaC). I built IaC use cases and was trying to get them to use it. I also liked cloud workload protection. I worked with the vulnerability management team to develop a process. It's a manual process, so it can be challenging to remediate many image or container issues. It was nice that we could build out a reporting process and download the reports. The reports are solid."
"In terms of ease of use, initially, it is a bit confusing to navigate around, but once you get used to it, it becomes easier."
"I would like PingSafe to add real-time detection of vulnerabilities and cloud misconfigurations."
"Some of the navigation and some aspects of the portal may be a little bit confusing."
"Customized queries should be made easier to improve PingSafe."
"The could improve their mean time to detect."
"One area for improvement could be the internal analysis process, specifically the guidance provided for remediation."
"We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization."
"The recommended actions aren't always specific, so it might suggest recommendations that don't apply to the particular infrastructure code I'm reviewing."
"A phishing simulator would be helpful as a user training module."
"Its guides are not great."
"Some undefined threats can bypass the security system when there is a networking failure in the organization."
"Check Point has to continue refining the intelligence engine to minimize the number of false positives."
"I would love it if they would do some work on the Postgres definition on the back-end."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult."
"A signature-based filter could improve the solution's AI model for spam email."
"In terms of securing cloud-native development at build time, a lot of improvement is needed. Currently, it's more a runtime solution than a build-time solution. For runtime, I would rate it at seven out of 10, but for build-time there is a lot of work to be done."
"I would like Prisma Cloud to improve its mapping feature to increase usability."
"The visibility on the SIEM needs to be streamlined so we can get the data without any issues."
"The challenge that Palo Alto and Prisma have is that, at times, the instructions in an event are a little bit dated and they're not usable. That doesn't apply to all the instructions, but there are times where, for example, the Microsoft or the Amazon side has made some changes and Palo Alto or Prisma was not aware of them. So as we try to remediate an alert in such a case, the instructions absolutely do not work. Then we open up a ticket and they'll reply, "Oh yeah, the API for so-and-so vendor changed and we'll have to work with them on that." That area could be done a little better."
"The UI could use some improvement; we usually find the information we're looking for, but what fields can be clicked on and what workflow to follow to get the required information is not always evident. Sometimes we're all over the place, clicking around to drill in and uncover the alert and investigation details we're looking for."
"The access controls for our bank roles were not granular enough. We needed specific people to do particular actions, and we often had to give some people way too much access for them to be able to do what they needed in Prisma. They couldn't do their jobs if they didn't have that level of access, so other people had to do that part for them. It would help to have more granular role-based access controls."
"The UI could be improved."
"The information presented in the UI sometimes doesn't look intuitive enough."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
More Prisma Cloud by Palo Alto Networks Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 9th in Cloud Workload Protection Platforms (CWPP) with 49 reviews while Prisma Cloud by Palo Alto Networks is ranked 1st in Cloud Workload Protection Platforms (CWPP) with 82 reviews. Check Point Harmony Email & Collaboration is rated 8.6, while Prisma Cloud by Palo Alto Networks is rated 8.4. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Prisma Cloud by Palo Alto Networks writes "The dashboard is very user-friendly and can be used to generate custom RQL based on user requirements". Check Point Harmony Email & Collaboration is most compared with Microsoft Defender for Office 365, Avanan, Microsoft Defender for Cloud, Mimecast Email Security and Cisco Secure Email, whereas Prisma Cloud by Palo Alto Networks is most compared with Wiz, Microsoft Defender for Cloud, Aqua Cloud Security Platform, AWS Security Hub and CrowdStrike Falcon Cloud Security. See our Check Point Harmony Email & Collaboration vs. Prisma Cloud by Palo Alto Networks report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.