Anonymous UserSenior Architect at a tech services company
David AntlitzManager Firewall and Security at W.R. Grace & Co.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Provides a very good view of the entire security setup of your organization."
"The most valuable feature is that it's intuitive. It's very intuitive."
"The dashboard is very good. It gives our clients a lot of information and allows them to have a complete overview of the system. Everything is visible in one glance."
"The most valuable features of this solution are the remote workforce capabilities and the general experience of the remote workforce."
"It takes very little effort to integrate it. It also gives very good visibility into what exactly is happening."
"The technical support is very good."
"It's quite a good product. It helps to understand the infections and issues you are facing."
"Good compliance policies."
"The program has a nice interface and it is easy to use."
"The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour."
"We need the phishing detection and email quarantine. Once an email is considered malicious, it stays in the quarantine where we can interrogate it. We can check out why it was quarantined and see if it should be delivered to the individual."
"As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts."
"It is very intuitive. It is a point and click type of deal."
"It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
"For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good."
"Getting reports and finding threats in the console is easy."
"No possibility to write or edit any capability."
"When you work with it, the only problem that we're struggling with is that we have 21 different subscriptions we're trying to apply security to. It's impossible to keep everything organized."
"The solution is quite complex. A lot of the different policies that actually get applied don't pertain to every client. If you need to have something open for a client application to work, then you get dinged for having a port open or having an older version of TLS available."
"Pricing could be improved. There are limited options based on pricing for the government."
"From a compliance standpoint, they can include some more metrics and some specific compliances such as GDPR."
"It needs to be simplified and made more user-friendly for a non-technical person."
"The initial setup is not actually so complex but it feels complex because there are many add-ons. There are many options and my team needs to be aware of all of these changes happening on the backend which is a distraction."
"The documentation and implementation guides could be improved."
"At this time, the two-factor authentication does not work for Active Directory."
"if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."
"We still get some false positives. There are times when legitimate stuff gets flagged and it could be that somebody is expecting a very important email but they don't end up getting it. On the flip side, when we alert Check Point about stuff like this, it is corrected, so they are improving. That's a plus."
"From time to time, the system's administrators notice the increase in the false-positive alerts being reported by CloudGuard SaaS."
"The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported. If they were to add report exporting capabilities on each of metric objects on the dashboard, that would be awesome."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"We are unable to export the reports from the dashboard, and if it is possible to do then it is not intuitive."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"I'm not privy to that information, but I know it's probably close to a million dollars a year."
"We are using the free version of the Azure Security Center."
"This is a worldwide service and depending on the country, there will be different prices."
"Security Center charges $15 per resource for any workload that you onboard into it. They charge per VM or per data-base server or per application. It's not like Microsoft 365 licensing, where there are levels like E3 and E5. Security Center is pretty straightforward."
"There is a helpful cost-reducing option that allows you to integrate production subscriptions with non-production subscriptions."
"Its pricing is a little bit high in terms of Azure Security Center, but the good thing is that we don't need to maintain and deploy it. So, while the pricing is high, it is native to Azure which is why we prefer using this tool."
"I am not involved in this area. However, I believe its price is okay because even small customers are using Azure Security Center. I don't think it is very expensive."
"The cost of the license is based on the subscriptions that you have."
"The price is very good, based on what they deliver."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"There are absolutely no additional costs to the standard licensing fees. One of the wonderful pieces is that CloudGuard SaaS is all-inclusive in its licensing. There's no a-la-carte functionality. You're getting 100 percent of the product for the licensing that you're paying."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
"The pricing and licensing are always negotiable."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers."
"This is a very good product if you are on the cloud, but the price is a little more expensive."
Azure Security Center protects your Azure and hybrid resources. Microsoft uses a wide variety of physical, infrastructure, and operational controls to help secure Azure—but there are additional actions you need to take to help safeguard your workloads. Turn on Azure Security Center to strengthen your cloud security posture. Within Azure Security Center, use Azure Defender to protect your hybrid cloud workloads. With Azure Security Center, you can:
- Assess and visualize the security state of your resources in Azure, on-premises, and in other clouds with Azure Secure Score
- Simplify enterprise compliance and view your compliance against regulatory requirements
- Protect all your hybrid cloud workloads with Azure Defender, which is integrated with Security Center
- Use AI and automation to cut through false alarms, quickly identify threats, and streamline threat investigation
To learn more about our solution, ask questions, and share feedback, join our Azure Security Center Community.
Phishing emails become more sophisticated by the day and can be the start of lateral attacks across organizations, leading to huge losses.
Harmony Email & Office detects and blocks the most advanced phishing attacks across inbound and internal communications in real time – before they reach users.
Azure Security Center is ranked 3rd in Cloud Workload Security with 17 reviews while Check Point Harmony Email & Office is ranked 4th in Cloud Workload Security with 9 reviews. Azure Security Center is rated 8.0, while Check Point Harmony Email & Office is rated 8.8. The top reviewer of Azure Security Center writes "Provides us with recommendations for improving security and enables benchmarking of infrastructure for compliance". On the other hand, the top reviewer of Check Point Harmony Email & Office writes "Daily phishing attacks are no longer negatively impacting us, and we no longer have data exfiltration". Azure Security Center is most compared with Prisma Cloud by Palo Alto Networks, Amazon GuardDuty, Check Point CloudGuard Posture Management, Azure Defender and Guardicore Centra, whereas Check Point Harmony Email & Office is most compared with Prisma Cloud by Palo Alto Networks, Check Point CloudGuard Posture Management, Cisco Secure Workload, Amazon GuardDuty and Trend Micro Cloud One Workload Security. See our Azure Security Center vs. Check Point Harmony Email & Office report.
See our list of best Cloud Workload Security vendors.
We monitor all Cloud Workload Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.