We performed a comparison between Illumio Zero Trust Segmentation and Check Point Harmony Email & Collaboration based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Illumio Zero Trust Segmentation users liked the platform's automated policy writing and the visibility it offers into application communication and network protocols. Check Point Harmony Email & Collaboration has been praised for its API-based integration and comprehensive coverage of email and collaboration systems. Illumio Zero Trust Segmentation product could enhance its labeling functionality and data security. Users also say it offers limited visibility and flexibility in on-prem environments. Check Point Harmony Email & Collaboration could benefit from better integration with other platforms and streamlined administrative functions.
Service and Support: Some users were pleased with Illumio support's quick response and round-the-clock services, while others reported unhelpful answers and delayed responses. Some Check Point customers said the support was prompt, and they appreciated the close collaboration with staff members. Other users raised concerns about long response times and the lack of Spanish-language support options.
Ease of Deployment: Some users said that the setup process for Illumio Zero Trust Segmentation is time-consuming, taking around six months, with three months for testing and three months for deployment. It requires establishing a good baseline before enabling easy blocking and micro-segmenting. Check Point Harmony Email & Collaboration has a straightforward setup. The system handles everything automatically, resulting in a quick and hassle-free deployment.
Pricing: Illumio Zero Trust Segmentation is considered a costly solution. Users of Check Point Harmony Email & Collaboration say the solution is reasonably priced and manageable. Check Point's pricing is competitive, providing necessary components without additional fees.
ROI: Check Point Harmony Email & Collaboration has consistently demonstrated a positive ROI. Illumio Zero Trust Segmentation users have not given feedback on the platform's ROI.
Comparison Results: Illumio Zero Trust Segmentation is preferred by users over Check Point Harmony Email & Collaboration. Illumio offers better visibility into application communication and network protocols, allowing users to block specific protocols and prevent attacks.
"Getting reports and finding threats in the console is easy."
"The program has a nice interface and it is easy to use."
"It is very intuitive. It is a point and click type of deal."
"Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
"The product is a fairly complete and centralized solution accessible through the Infinity Portal."
"The setup is very easy. I haven't faced any complexity with the setup of the solution."
"Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
"It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
"The Explorer allows you to know the traffic between source and destination."
"The flexibility of the solution is its most valuable feature."
"The most valuable feature of Illumio Adaptive Security Platform is monitoring. When I have no requirement from the other application, I can use the web block traffic to build."
"The product provides visibility into how the applications communicate and how the network protocols are being used."
"It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation."
"The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies."
"The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files."
"The solution is easy to use."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response."
"There is always room for improvement and growth."
"We are unable to export the reports from the dashboard, and if it is possible to do then it is not intuitive."
"Its guides are not great."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"A phishing simulator would be helpful as a user training module."
"if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."
"It requires a low-level re-architecting of the product."
"The product’s agents don't work very well in OT environments."
"I would like to see better data security in the product."
"The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules."
"Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial."
"The interaction we've had with the support team hasn't been ideal. Technical support should be improved."
"The customer service is lagging a bit. It could be better."
"Illumio Adaptive Security Platform could improve by supporting more operating systems. For example, Cisco and Apache appliances."
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 8th in Cloud Workload Protection Platforms (CWPP) with 47 reviews while Illumio is ranked 14th in Cloud Workload Protection Platforms (CWPP) with 8 reviews. Check Point Harmony Email & Collaboration is rated 8.8, while Illumio is rated 8.0. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Illumio writes "Pprevents attackers or threats from spreading or moving laterally". Check Point Harmony Email & Collaboration is most compared with Microsoft Defender for Office 365, Avanan, Microsoft Defender for Cloud, Mimecast Email Security and Cisco Secure Email, whereas Illumio is most compared with Akamai Guardicore Segmentation, VMware NSX, Cisco Secure Workload, Zscaler Internet Access and Microsoft Defender for Cloud. See our Check Point Harmony Email & Collaboration vs. Illumio report.
See our list of best Cloud Workload Protection Platforms (CWPP) vendors.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.