We compared Check Point Harmony Email and Collaboration and Cisco Secure Email across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Features: Check Point Harmony Email and Collaboration offers exceptional integration through APIs, advanced protection against data leaks, and the ability to detect complex social engineering attacks. Cisco Secure Email offers advanced protection against phishing attacks, reputation-based filtering, and robust tracking functionalities.
Room for Improvement: Check Point Harmony Email and Collaboration could improve integration with Exchange and other SaaS clouds while enhancing its threat clouds and AI engines. Cisco Secure Email should improve global malicious email defense, data loss prevention, and integration with third-party solutions.
Service and Support: Check Point has earned mixed reviews for its customer service. Some customers appreciate the technical support provided, while others are dissatisfied with response times. Cisco support is generally considered knowledgeable and helpful, but a few users reported slow response times and difficulty navigating the support process.
Ease of Deployment: Check Point Harmony Email is considered relatively easy to implement. Cisco Secure Email is generally straightforward and seamless to set up. It provides a modular and adaptable environment, but new users may need training.
Pricing: Check Point Harmony Email and Collaboration is a cost-effective option. It offers competitive prices and is suitable for small to medium-sized organizations. Opinions on the pricing of Cisco Secure Email are mixed. Some find it expensive but worth the investment, while others find it reasonably priced and competitive with other vendors.
ROI: Check Point Harmony Email and Collaboration delivers superior return on investment compared to other options. Cisco Secure Email's return on investment is influenced by factors such as use case, organization size, and industry.
Comparison Results: Check Point Harmony Email and Collaboration is an effective solution for blocking malicious attachments and detecting social engineering attacks. However, there is room for improvement in terms of integration and support, reducing false positives, and enhancing response times. Cisco Secure Email is highly regarded for its intelligence threat detection, reputation filtering, and robust tracking abilities. The solution’s areas for improvement include data loss prevention and third-party integration.
"The good part is that you don't have to configure it, which is very convenient."
"The two main features that prove most beneficial for us are URL scanning and attachment scanning."
"There are several features that I consider valuable."
"The product's scalability is good."
"It also gives the vulnerability status according to the versions you have selected. Let's say you have Google Chrome. It mentions the versions it has, and it updates. Within two hours of an update, it is reflected in the dashboard. That's really nice to have."
"Does a thorough job of examining email and URLs for malicious content."
"Since we have started using the solution, there have been fewer compromises."
"It gives us visibility into threats and, for endpoints, it helps us to prioritize threats. We used to have a lack of visibility, but now our time to detect and respond has decreased."
"Check Point's technical support is very good."
"The product is reliable and sturdy."
"The ease of management and intuitive administration are excellent."
"For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"It is very intuitive. It is a point and click type of deal."
"The solution helps to block spam emails."
"As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts."
"I can customize the configuration and policies."
"It has the ability to tell us, after an email has been delivered, where else it went, once it got inside. Maybe it's something we wanted it to stop and it didn't stop it, but it notified us later that it was something that it should have stopped. It can give us a trajectory of all the other places that it went internally and it can tell us what files were transferred as well."
"It integrates with Active Directory and we can limit specific users to using specific applications."
"The advanced phishing protection and the integration with the awareness tool that Cisco has embedded into the solution to bring awareness to the customers about the dangers of phishing attacks and other things that come from email are the most valuable features."
"The tech engineers are very knowledgeable."
"Administration of the email domains and custom filters are easily done via the web interface."
"There are a lot of filters for scam emails and things like that work out of the box. You can also use the antivirus features. I like its features."
"There were detailed logs available. That was a seriously good feature... It turns out these were actually spoof emails that came into our environment. I got to know about them from the log system."
"Configuration requires going to a lot of places rather than just accessing one tab."
"They have moved features from one console to another. Things have been moved around in the interface and it takes me time to find where certain features are."
"We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email."
"Microsoft Defender for Office 365 must improve the overall management style, including the GUI. It also needs to change the filters so that it is easy to whitelist and blacklist data."
"There is room for improvement with the UI."
"The visibility for the weaknesses in the system and unauthorized access can be improved."
"We need a separate license and we don't know how to get the license that is required."
"About eight months ago, we started to measure the quantity of phishing and spam that we have been receiving, and it has been increasing a lot. That means that protection for our email is not as good as we were expecting."
"We understand that false positives are always there, but sometimes the notifications are more than expected."
"We have used technical support, but their response time is very slow. It needs to be improved."
"We still get some false positives. There are times when legitimate stuff gets flagged and it could be that somebody is expecting a very important email but they don't end up getting it. On the flip side, when we alert Check Point about stuff like this, it is corrected, so they are improving. That's a plus."
"Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult."
"The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."
"The left-hand feature can be made more granular for the implementation of the policy."
"There is too much functionality, which makes it difficult to use. More guidance for users would be helpful."
"They could continue to offer more stringent security policy measures for threat point management."
"They can do it better with web links, with the URLs. They have a technology called Outbreak but it doesn't work as well as we would like."
"The solution needs to improve its advanced phishing filters. It is very good at filtering things which have bad reputations. However, when phishing or malicious emails are new or coming from a legitimate source, we don't feel that the solution is working."
"The product's GUI for the dashboard needs improvement."
"The scalability must be improved."
"Many smaller businesses opt for more cost-effective solutions, such as Gmail or Hotmail accounts, instead of investing in Cisco Secure Email, given its higher cost."
"The pricing needs to be reconsidered or enhanced."
"The user interface is a bit complex."
"The area of license renewal should be improved. We normally renew our license every year. There is a feature called smart licensing, and I switched from the legacy mode to the smart licensing mode because of what I thought smart licensing does. I thought it would make licensing renewal seamless and very swift, but ever since I've switched to smart licensing, each time I want to renew my license, it is a whole lot of headache. The process is not smooth, and I had to keep calling Cisco TAC to see how the issue can be resolved. At one point, I wanted to revert back to the legacy mode, but I can't revert. Once you switch from the legacy mode to the smart licensing mode, you can't revert. They should improve on the visibility of the smart licensing mode so that it can indeed be smart and easier to use for the license renewal every year. That is one challenge."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 7th in Email Security with 47 reviews while Cisco Secure Email is ranked 2nd in Email Security with 55 reviews. Check Point Harmony Email & Collaboration is rated 8.8, while Cisco Secure Email is rated 8.4. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Cisco Secure Email writes "Has effortless spam control, improves security posture, and frees up our IT department's time". Check Point Harmony Email & Collaboration is most compared with Avanan, Microsoft Defender for Cloud, Mimecast Email Security, Barracuda Email Protection and Fortinet FortiMail Cloud, whereas Cisco Secure Email is most compared with Trellix Collaboration Security, Fortinet FortiMail, Microsoft Exchange Online Protection (EOP), Proofpoint Email Protection and Symantec Messaging Gateway. See our Check Point Harmony Email & Collaboration vs. Cisco Secure Email report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.