We performed a comparison between Check Point Harmony Email & Collaboration, CloudPassage, and Threat Stack Cloud Security Platform based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Microsoft, Wiz and others in Cloud Workload Protection Platforms (CWPP)."Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
"The API is its most valuable feature. On the API side, relative to the rest of the market, Check Point is decades ahead of its competitors."
"The dashboard provides information to investigate more about malicious activity and blocked emails."
"It is fast and has a very simple, easy integration."
"Its total protection has been the greatest aspect since it completely protects all the mail from the cloud."
"It is very intuitive. It is a point and click type of deal."
"The anti-phishing feature is the solution's best feature."
"Email security has improved since we deployed this platform."
"Key features are the Software Vulnerability Assessment and the CSM, which is the configuration check."
"Policies are very easy to manage on a day-to-day basis."
"An important feature of this solution is monitoring. Specifically, container monitoring."
"Every other security tool we've looked is good at containers, or at Kubernetes, is good at AWS, or at instance monitoring. But nobody is good at tying all of those things together, and that's really where Threat Stack shines."
"The rules are really great. They give us more visibility and control over what's being triggered. There's a large set of rules that come out-of-the-box. We can customize them and we can create our own rules based on the traffic patterns that we see."
"The most valuable feature is the SecOps because they have our back and they help us with the reports... It's like having an extension of your team. And then, it grows with you."
"With Threat Stack, we quickly identified some AWS accounts which had services that would potentially be exposed and were able to remediate them prior to release of products."
"There has been a measurable decrease in the meantime to remediation... because we have so many different tech verticals already collated in one place, our ability to respond is drastically different than it used to be."
"We're using it on container to see when activity involving executables happens, and that's great."
"We like the ability of the host security module to monitor the processes running on our servers to help us monitor activity."
"The next release should focus more on email categorization and provide options for unlocking blocked safe emails."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"They could help us be integrating features with solutions from third parties."
"It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products."
"The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."
"They could continue to offer more stringent security policy measures for threat point management."
"I have learned enough to make the product stable. However, the stability has some challenges."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"In the CSM module the policies are really hard to work with it. It is not very flexible at all. I would suggest that they change that. Right now, the scan is based on the group that the server is in. What happens if the server is in multiple groups?"
"The reports and graphs are unintuitive."
"Anything outside of the software vulnerability management and the CSM, things like the GhostPort, need some improvement. The dashboard is in beta. It looks really good, I wish it would come out of beta."
"Of all the advertised functions, I only find two things that really work in my environment, even though I wanted to use all of them. They're not flexible enough to be used."
"The solution’s ability to consume alerts and data in third-party tools (via APIs and export into S3 buckets) is moderate. They have some work to do in that area... The API does not mimic the features of the UI as far as reporting and pulling data out go. There's a big discrepancy there."
"It shoots back a lot of alerts."
"They could give a few more insights into security groups and recommendations on how to be more effective. That's getting more into the AWS environment, specifically. I'm not sure if that's Threat Stack's plan or not, but I would like them to help us be efficient about how we're setting up security groups. They could recommend separation of VPCs and the like - really dig into our architecture. I haven't seen a whole lot of that and I think that's something that, right off the bat, could have made us smarter."
"Some features do not work as expected."
"The API - which has grown quite a bit, so we're still learning it and I can't say whether it still needs improvement - was an area that had been needing it."
"The user interface can be a little bit clunky at times... There's a lot of information that needs to be waded through, and the UI just isn't great."
"The compliance and governance need improvement."
"The one thing that we know they're working on, but we don't have through the tool, is the application layer. As we move to a serverless environment, with AWS Fargate or direct Lambda, that's where Threat Stack does not have the capacity to provide feed. Those are areas that it's blind to now..."
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
More Threat Stack Cloud Security Platform Pricing and Cost Advice →
Earn 20 points