Check Point Anti-Spam and Email Security Software Blade vs Trellix Collaboration Security comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Anti-Spam and Email Security Software Blade and Trellix Collaboration Security based on real PeerSpot user reviews.

Find out in this report how the two Email Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
768,740 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"I like its investigation capabilities, as that is what is most important to me. It is fairly simple with a user-friendly interface.""The product is not resource-intensive.""Microsoft Defender for Office 365 has improved my organization's security. It makes it easier to manage the infrastructure without the help of third-party applications.""Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various email campaigns, pinpointing where they emanate from, and identifying the individuals within our organization who are affected.""The most valuable feature is protection against malicious links, fishing, and impersonation. You can train people to be aware of these threats, but they're not always careful. When they're using their phones between meetings, they click on a link, and it's game over.""It also gives the vulnerability status according to the versions you have selected. Let's say you have Google Chrome. It mentions the versions it has, and it updates. Within two hours of an update, it is reflected in the dashboard. That's really nice to have.""The initial setup was easy.""Microsoft Defender for Office 365's most valuable feature is its performance."

More Microsoft Defender for Office 365 Pros →

"It has several very good features that form an excellent tool.""I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like.""Advanced Spam Filtering to identify and block unwanted email messages.""Check Point Anti-Spam and Email Security Software Blade provides an extra level of security against threats and malware along with 2FA support for multiple platform collaboration and integrations in a single click.""It helped us to achieve process compliance with over 90% effectiveness.""Due to its technology, monitoring, and manufacturer features, we have been able to reduce the intrusion of spam and other threats that can be uploaded via email.""It is easy to install, and the deployment is super easy as well.""Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network."

More Check Point Anti-Spam and Email Security Software Blade Pros →

"We can control this solution from the cloud and are able to access it from wherever we are.""What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use.""The auto-remediation feature is valuable.""I like FireEye's filtering, spam digests, and its advanced threat review of email flow. It also has a broad range of riskware rules you can deploy.""FireEye Email Security is easy to use.""The solution's most valuable feature is its simplicity. It's very user-friendly.""The product protects my email.""The product helps reduce the number of malicious emails reaching the user's inbox."

More Trellix Collaboration Security Pros →

Cons
"There's room for improvement regarding the time frame for retrieving emails.""Microsoft should provide more documentation for users so they can self-educate. I would like to see more documentation for advanced security features.""Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment.""In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement.""There is room for improvement with the UI.""About eight months ago, we started to measure the quantity of phishing and spam that we have been receiving, and it has been increasing a lot. That means that protection for our email is not as good as we were expecting.""Microsoft Defender for Office 365 should be more proactive.""It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."

More Microsoft Defender for Office 365 Cons →

"The solution's technical support is an area with shortcomings that need to be improved for the better.""I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal.""The technical team could improve services by ensuring when there are changes they inform enterprise users of effective upgrades.""One thing which annoys me with the Check Point Anti-Spam and Email Security Software Blade is its customer support portal which still lags in service even after so many developments.""Many would love to have this solution and be able to manage it from any device, including native applications or applications that can be installed on devices such as Android or iOS.""The user should be able to perform a real-time search of the objects and see the messages.""The pattern used to filter emails could be improved""If you face any configuration problems, Check Point is the only solution."

More Check Point Anti-Spam and Email Security Software Blade Cons →

"I would like to see this solution become more flexible.""FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA.""The custom tailoring is limited.""The reporting aspect of the solution needs improvement.""If they want to be the primary or best solution, they need to have better email management features.""The solution must provide features to scan QR codes for threats.""Sometimes especially zero-day spam emails can be passed to the user's inbox.""The spam detection feature could be better."

More Trellix Collaboration Security Cons →

Pricing and Cost Advice
  • "It's a user-base subscription."
  • "From the pricing point of view, like any other product in the market, there is scope for negotiation."
  • "Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
  • "For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
  • "Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
  • "Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
  • "The solution saves money so we have seen a return on investment."
  • "Defender for 365 comes in various plans and licenses, along with other Microsoft security solutions. Purchasing this kind of package or security bundle gives good value for money, and that's what I recommend."
  • More Microsoft Defender for Office 365 Pricing and Cost Advice →

  • "Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
  • "The cost is competitive with other security products on the market."
  • "This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
  • "Reasonably priced solution."
  • "For licensing, my company makes yearly payments, which is expensive."
  • "I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
  • More Check Point Anti-Spam and Email Security Software Blade Pricing and Cost Advice →

  • "The solution requires a license to be purchased for every user."
  • "The licensing is on a yearly basis."
  • "The cost is very high."
  • More Trellix Collaboration Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Email Security solutions are best for your needs.
    768,740 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various… more »
    Top Answer:The product must provide better malware detection. The detection algorithms don't perform the way I hope they would.
    Top Answer:Installation time could be improved as it takes too long to install. With the software footprint, it should be taking… more »
    Top Answer:The solution must provide features to scan QR codes for threats. Nowadays, threats are embedded inside QR codes.
    Top Answer:The solution is used for email security. It streamlines our team’s collaboration and file-sharing efforts.
    Comparisons
    Also Known As
    MS Defender for Office 365
    FireEye Email Security
    Learn More
    Overview

    Microsoft Defender for Office 365 is a comprehensive security solution designed to protect organizations against advanced threats in their email, collaboration, and productivity environments. It combines the power of Microsoft's threat intelligence, machine learning, and behavioral analytics to provide real-time protection against phishing, malware, ransomware, and other malicious attacks.

    With Microsoft Defender for Office 365, organizations can safeguard their email communication by detecting and blocking malicious links, attachments, and unsafe email content. It employs advanced anti-phishing capabilities to identify and prevent sophisticated phishing attacks that attempt to steal sensitive information or compromise user credentials.

    This solution also offers robust protection against malware and ransomware. It leverages machine learning algorithms to analyze email attachments and URLs in real-time, identifying and blocking malicious content before it reaches users' inboxes. Additionally, it provides advanced threat-hunting capabilities, allowing security teams to proactively investigate and respond to potential threats.

    Microsoft Defender for Office 365 goes beyond email protection and extends its security features to other collaboration tools like SharePoint, OneDrive, and Teams. It scans files and documents stored in these platforms, ensuring that they are free from malware and other malicious content. It also provides visibility into user activities, helping organizations detect and mitigate insider threats.

    Furthermore, this solution offers rich reporting and analytics capabilities, providing organizations with insights into their security posture and threat landscape. It enables security administrators to monitor and manage security incidents, track trends, and take proactive measures to enhance their overall security posture.

    Check Point Anti-Spam and Email Security Software Blade is a comprehensive solution designed to protect organizations from the growing threat of spam and email-based attacks. With advanced threat prevention capabilities, it ensures that businesses can effectively manage their email security and prevent the infiltration of malicious content.

    This software blade offers a multi-layered approach to email security, combining anti-spam, anti-virus, and anti-phishing technologies to provide robust protection against a wide range of threats. It employs advanced machine learning algorithms to continuously analyze and identify new spam and phishing techniques, ensuring that organizations stay one step ahead of cybercriminals.

    The Anti-Spam and Email Security Software Blade also includes advanced content filtering capabilities, allowing organizations to define and enforce email policies based on specific criteria. This ensures that sensitive information is protected and that employees are not exposed to potentially harmful content.

    Furthermore, this software blade integrates seamlessly with existing email infrastructure, making deployment and management simple and efficient. It supports all major email platforms, including Microsoft Exchange and Office 365, ensuring compatibility with a wide range of environments.

    With real-time monitoring and reporting capabilities, organizations can gain valuable insights into their email security posture. This enables them to identify potential vulnerabilities and take proactive measures to mitigate risks.

    Trellix Collaboration Security is a comprehensive solution designed to protect sensitive data and ensure secure collaboration within organizations. With the increasing reliance on digital platforms for communication and collaboration, it is crucial to have robust security measures in place. Trellix Collaboration Security offers a range of features to safeguard data and prevent unauthorized access.

    One of the key features of Trellix Collaboration Security is its advanced encryption capabilities. All data transmitted and stored within the platform is encrypted using industry-standard encryption algorithms, ensuring that it remains secure and protected from potential threats. This encryption extends to all communication channels, including emails, file transfers, and instant messaging, providing end-to-end security.

    To further enhance security, Trellix Collaboration Security incorporates multi-factor authentication. This means that users are required to provide multiple forms of identification, such as passwords, biometrics, or security tokens, to access the platform. This significantly reduces the risk of unauthorized access, as even if one factor is compromised, the others provide an additional layer of protection.

    In addition to encryption and multi-factor authentication, Trellix Collaboration Security offers robust access controls. Administrators can define and enforce granular access permissions, ensuring that only authorized individuals can view, edit, or share specific documents or folders. This helps prevent data leakage and ensures that sensitive information is only accessible to those who need it.

    Trellix Collaboration Security also includes comprehensive auditing and monitoring capabilities. Administrators can track user activities, monitor file transfers, and generate detailed reports to identify any suspicious or unauthorized behavior. This proactive approach allows organizations to quickly detect and respond to potential security breaches, minimizing the impact on data integrity and confidentiality.

    Sample Customers
    Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
    SF Police Credit Union (SFPCU)
    Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
    Top Industries
    REVIEWERS
    Manufacturing Company16%
    Computer Software Company16%
    Comms Service Provider13%
    Logistics Company6%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm9%
    Manufacturing Company7%
    Government7%
    REVIEWERS
    Security Firm27%
    Financial Services Firm19%
    Cloud Provider19%
    Healthcare Company8%
    VISITORS READING REVIEWS
    Security Firm33%
    Financial Services Firm15%
    Computer Software Company9%
    Comms Service Provider7%
    VISITORS READING REVIEWS
    Computer Software Company15%
    Financial Services Firm15%
    Government8%
    Manufacturing Company8%
    Company Size
    REVIEWERS
    Small Business42%
    Midsize Enterprise16%
    Large Enterprise42%
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise19%
    Large Enterprise51%
    REVIEWERS
    Small Business45%
    Midsize Enterprise14%
    Large Enterprise40%
    VISITORS READING REVIEWS
    Small Business52%
    Midsize Enterprise9%
    Large Enterprise39%
    REVIEWERS
    Small Business42%
    Midsize Enterprise25%
    Large Enterprise33%
    VISITORS READING REVIEWS
    Small Business14%
    Midsize Enterprise13%
    Large Enterprise73%
    Buyer's Guide
    Check Point Anti-Spam and Email Security Software Blade vs. Trellix Collaboration Security
    March 2024
    Find out what your peers are saying about Check Point Anti-Spam and Email Security Software Blade vs. Trellix Collaboration Security and other solutions. Updated: March 2024.
    768,740 professionals have used our research since 2012.

    Check Point Anti-Spam and Email Security Software Blade is ranked 11th in Email Security with 32 reviews while Trellix Collaboration Security is ranked 17th in Email Security with 12 reviews. Check Point Anti-Spam and Email Security Software Blade is rated 8.2, while Trellix Collaboration Security is rated 8.6. The top reviewer of Check Point Anti-Spam and Email Security Software Blade writes "Effectively secures data centers against various threats, including spam emails and provides policy-based control". On the other hand, the top reviewer of Trellix Collaboration Security writes "Protects from advanced malware and phishing attacks; useful dashboard". Check Point Anti-Spam and Email Security Software Blade is most compared with Barracuda Email Security Gateway, Abnormal Security, Cisco Secure Email, Fortinet FortiMail and Sophos Email, whereas Trellix Collaboration Security is most compared with Cisco Secure Email, Proofpoint Email Protection, Microsoft Exchange Online Protection (EOP), Trend Micro Email Security and Fortinet FortiMail. See our Check Point Anti-Spam and Email Security Software Blade vs. Trellix Collaboration Security report.

    See our list of best Email Security vendors.

    We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.