Check Point Harmony Email & Collaboration vs Illumio comparison

Cancel
You must select at least 2 products to compare!
Illumio Logo
3,936 views|3,001 comparisons
85% willing to recommend
Comparison Buyer's Guide
Executive Summary
Updated on Jul 3, 2023

We performed a comparison between Illumio Zero Trust Segmentation and Check Point Harmony Email & Collaboration based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.

  • Features: Illumio Zero Trust Segmentation users liked the platform's automated policy writing and the visibility it offers into application communication and network protocols. Check Point Harmony Email & Collaboration has been praised for its API-based integration and comprehensive coverage of email and collaboration systems. Illumio Zero Trust Segmentation product could enhance its labeling functionality and data security. Users also say it offers limited visibility and flexibility in on-prem environments. Check Point Harmony Email & Collaboration could benefit from better integration with other platforms and streamlined administrative functions. 

  • Service and Support: Some users were pleased with Illumio support's quick response and round-the-clock services, while others reported unhelpful answers and delayed responses. Some Check Point customers said the support was prompt, and they appreciated the close collaboration with staff members. Other users raised concerns about long response times and the lack of Spanish-language support options.

  • Ease of Deployment: Some users said that the setup process for Illumio Zero Trust Segmentation is time-consuming, taking around six months, with three months for testing and three months for deployment. It requires establishing a good baseline before enabling easy blocking and micro-segmenting. Check Point Harmony Email & Collaboration has a straightforward setup. The system handles everything automatically, resulting in a quick and hassle-free deployment. 

  • Pricing: Illumio Zero Trust Segmentation is considered a costly solution. Users of Check Point Harmony Email & Collaboration say the solution is reasonably priced and manageable. Check Point's pricing is competitive, providing necessary components without additional fees.

  • ROI: Check Point Harmony Email & Collaboration has consistently demonstrated a positive ROI. Illumio Zero Trust Segmentation users have not given feedback on the platform's ROI. 

Comparison Results: Illumio Zero Trust Segmentation is preferred by users over Check Point Harmony Email & Collaboration. Illumio offers better visibility into application communication and network protocols, allowing users to block specific protocols and prevent attacks. 

    To learn more, read our detailed Check Point Harmony Email & Collaboration vs. Illumio Report (Updated: March 2024).
    768,415 professionals have used our research since 2012.
    Featured Review
    Quotes From Members
    We asked business professionals to review the solutions they use.
    Here are some excerpts of what they said:
    Pros
    "Getting reports and finding threats in the console is easy.""The program has a nice interface and it is easy to use.""It is very intuitive. It is a point and click type of deal.""Encryption of emails enhances safe communication that ransomware attacks cannot compromise.""The product is a fairly complete and centralized solution accessible through the Infinity Portal.""The setup is very easy. I haven't faced any complexity with the setup of the solution.""Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure.""It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."

    More Check Point Harmony Email & Collaboration Pros →

    "The Explorer allows you to know the traffic between source and destination.""The flexibility of the solution is its most valuable feature.""The most valuable feature of Illumio Adaptive Security Platform is monitoring. When I have no requirement from the other application, I can use the web block traffic to build.""The product provides visibility into how the applications communicate and how the network protocols are being used.""It has helped us to understand internal network visibility and firewall policy implementation. We use the product to simplify firewall policy implementation.""The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging policies, which can be complex to devise. It's a matter that requires careful consideration and stakeholder involvement before implementing such policies.""The solution helps to maintain logs and monitor activities. It also helps us with access management. The tool helps us to secure organizational data that include files.""The solution is easy to use."

    More Illumio Pros →

    Cons
    "We understand that false positives are always there, but sometimes the notifications are more than expected.""They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response.""There is always room for improvement and growth.""We are unable to export the reports from the dashboard, and if it is possible to do then it is not intuitive.""Its guides are not great.""Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues.""A phishing simulator would be helpful as a user training module.""if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."

    More Check Point Harmony Email & Collaboration Cons →

    "It requires a low-level re-architecting of the product.""The product’s agents don't work very well in OT environments.""I would like to see better data security in the product.""The solution is very basic and doesn't do anything other than the orchestration of layer four endpoint firewall rules.""Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial.""The interaction we've had with the support team hasn't been ideal. Technical support should be improved.""The customer service is lagging a bit. It could be better.""Illumio Adaptive Security Platform could improve by supporting more operating systems. For example, Cisco and Apache appliances."

    More Illumio Cons →

    Pricing and Cost Advice
  • "Having information stolen by a hacker would be more expensive than purchasing a license."
  • "Being able to keep the phishing campaigns out of my company has been ROI for me."
  • "Do a full feature evaluation (interactive) with a support person. That is what I did."
  • "The price is very good, based on what they deliver."
  • "One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
  • "There are absolutely no additional costs to the standard licensing fees. One of the wonderful pieces is that CloudGuard SaaS is all-inclusive in its licensing. There's no a-la-carte functionality. You're getting 100 percent of the product for the licensing that you're paying."
  • "The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
  • "The pricing and licensing are always negotiable."
  • More Check Point Harmony Email & Collaboration Pricing and Cost Advice →

  • "There is a subscription needed to use Illumio Adaptive Security Platform and we pay every three years. Overall the solution is expensive."
  • "The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis."
  • More Illumio Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Cloud Workload Protection Platforms (CWPP) solutions are best for your needs.
    768,415 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:I don't even have details of the product's single license purchased by my company.
    Top Answer:I use the solution in my company to secure the users' environment so that there are no phishing attacks. The tool operates as an anti-spam solution for the users in our company. Each and every email… more »
    Top Answer:The product offers good and easy integration capabilities with other products.
    Top Answer:The features that I have found most useful is the ability to centralize all the rules and then distribute them across various locations. However, I've encountered challenges related to tagging… more »
    Top Answer:The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis.
    Top Answer:Some of the features that can be improved is offer additional guidance on creating an effective and risk-free tagging policy would be highly beneficial.
    Ranking
    Views
    1,684
    Comparisons
    927
    Reviews
    26
    Average Words per Review
    507
    Rating
    8.7
    Views
    3,936
    Comparisons
    3,001
    Reviews
    6
    Average Words per Review
    384
    Rating
    8.0
    Comparisons
    Also Known As
    Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
    Illumio Adaptive Security Platform, Illumio ASP
    Learn More
    Overview

    Check Point Harmony Email and Office is a cloud-based software offering complete protection to stop malware attacks through emails. The software is designed to provide protection for organizations using Office 365, G Suite, Google Workspace, and all other collaboration and file-sharing apps. Access permissions can be granted and custom policies can be defined for any user of choice.

    Check Point Harmony Email and Office identifies and blocks advanced malware, phishing, and ransomware attacks in real time before they reach the user’s inbox. In turn, this also helps protect sensitive business data from breaches. Harmony Email and Office was the first solution to implement machine learning, API, and AI for email security, and will ultimately prevent any attempts at account takeover via agentless multi-factor authentication.

    What is Complete Protection?

    Check Point Harmony Email and Office offers a superior catch rate for collaboration apps and cloud email with their API-based solution that detects attacks that other solutions miss, including account takeover, supply chain attacks, ransomware, and BEC. The complete protection offers:

    • Malware Protection - Recognized by NSS Labs as “most effective in breach prevention,” the solution leverages technologies to bring clean files to users within 1.5 seconds. In addition, enterprises can be safer as the solution prevents malicious messages and files from reaching the user’s inbox.
    • Data Leakage Protection - Any confidential or sensitive information will be marked and have a classified suffix added to the end of the message or file to help keep those materials safe. Those files are encrypted, and the user will be alerted to any attempted breach of those messages.
    • Phishing Protection - Before advanced phishing attacks reach the end user, Harmony Email and Office detects and blocks them, including outbound, inbound, and internal communications.
    • Account Takeover Protection - After a user connects their cloud app, the solution captures the user's history and creates a profile and a custom threat profile. In the event of a suspected account takeover, threat intelligence is leveraged through millions of Check Point-secured gateways and endpoints and is blocked.

    Reviews from Real Users

    Check Point Harmony Email and Office offers a revolutionary prevention solution to stop malware attacks through emails. Users particularly like its visibility and the ability to protect sensitive business data.

    David U., a CISO at IMC companies, notes, "It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."

    Mantu S., a senior technology architect at Incedo Inc., writes, "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."

    Illumio Zero Trust Segmentation is a cloud and data center security solution that helps stop breaches from spreading across hybrid and multi cloud IT environments. The solution is designed to stop ransomware, contain cyber attacks, and reduce risk. With Illumio Zero Trust Segmentation, users can understand relationships and communications to map exposure risk of systems and data, identify the right security posture and secure applications through least-privilege policies, and ensure a Zero Trust security posture.

    Illumio Zero Trust Segmentation Features

    Illumio Zero Trust Segmentation has many valuable key features. Some of the most useful ones include:

    • Scalability: Illumio Zero Trust Segmentation scales up to 200,000 managed workloads or over 700,000 unmanaged workloads. These workloads can be in the cloud, on-premises, and in hybrid environments.
    • Single pane of visibility: The solution’s single pane of visibility improves your security posture and ability to prevent and respond rapidly to cyberattacks.
    • Simplicity: With Illumio Zero Trust Segmentation, setting up groups and tags is simple. The solution is easy to integrate with next-generation firewalls and can also integrate with IT service management tools to import workload tags to provide more context to workloads.
    • Ransomware containment: The solution provides enforcement boundaries to contain attackers from moving laterally across your organization, enabling security architects to immediately isolate any workload or endpoint compromised in an attack. Enforcement boundaries can be activated instantly through scripts or by manual control, isolating workloads and endpoints already infected from spreading across the organization.

    Illumio Zero Trust Segmentation Benefits

    There are many benefits to implementing Illumio Zero Trust Segmentation. Some of the biggest advantages the solution offers include:

    • Visibility everywhere: The Illumio Zero Trust Segmentation solution helps ensure that every interaction on your network is accounted for. 
    • Least-privilege access: By implementing Illumio Zero Trust Segmentation, your organization can prevent unexpected breaches from propagating.
    • Adaptability and consistency: The solution guarantees consistent network behavior everywhere. 
    • Proactive posture: Using the solution enables your organization to always be on the lookout for an attack. 
    • Improve breach containment: With the solution, you can prevent unauthorized lateral movement and reduce your blast radius. Creating micro-perimeters around specific assets breaks up your attack surface and gives you the granular control needed to contain breaches.
    • Streamline policy management: The solution enables organizations to decouple segmentation from the underlying network to define policies based on the language that IT uses. Illumio's human-readable labels make policy creation much simpler and faster than traditional network segmentation approaches like VLANs, IP addresses, and port numbers.

    Reviews from Real Users

    Illumio Zero Trust Segmentation is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has a good auto policy writing feature, great mapping, and useful monitoring. 

    Shashi, Technical Consultant at a financial services firm, explains which features she really likes. “The auto policy writing is great. The feature will give you the option of inbound-outbound traffic. The Explorer allows you to know the traffic between source and destination. The illumination definitely stands out. Mapping is great. The application group mapping is useful.”

    The solution has “helpful support, useful monitoring, and high availability,” according to Edwin L., Security Architect at MGM.

    Sample Customers
    Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
    Plantronics, NTT Innovation Institute Inc.
    Top Industries
    REVIEWERS
    Energy/Utilities Company17%
    Computer Software Company15%
    Security Firm10%
    Healthcare Company7%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Manufacturing Company8%
    Financial Services Firm8%
    Real Estate/Law Firm6%
    VISITORS READING REVIEWS
    Financial Services Firm18%
    Computer Software Company16%
    Manufacturing Company9%
    Government6%
    Company Size
    REVIEWERS
    Small Business51%
    Midsize Enterprise17%
    Large Enterprise32%
    VISITORS READING REVIEWS
    Small Business36%
    Midsize Enterprise17%
    Large Enterprise46%
    REVIEWERS
    Small Business25%
    Midsize Enterprise13%
    Large Enterprise63%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise12%
    Large Enterprise69%
    Buyer's Guide
    Check Point Harmony Email & Collaboration vs. Illumio
    March 2024
    Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Illumio and other solutions. Updated: March 2024.
    768,415 professionals have used our research since 2012.

    Check Point Harmony Email & Collaboration is ranked 8th in Cloud Workload Protection Platforms (CWPP) with 47 reviews while Illumio is ranked 14th in Cloud Workload Protection Platforms (CWPP) with 8 reviews. Check Point Harmony Email & Collaboration is rated 8.8, while Illumio is rated 8.0. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Illumio writes "Pprevents attackers or threats from spreading or moving laterally". Check Point Harmony Email & Collaboration is most compared with Microsoft Defender for Office 365, Avanan, Microsoft Defender for Cloud, Mimecast Email Security and Cisco Secure Email, whereas Illumio is most compared with Akamai Guardicore Segmentation, VMware NSX, Cisco Secure Workload, Zscaler Internet Access and Microsoft Defender for Cloud. See our Check Point Harmony Email & Collaboration vs. Illumio report.

    See our list of best Cloud Workload Protection Platforms (CWPP) vendors.

    We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.