We compared Check Point Harmony Email and Collaboration and Trend Micro Email Security across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Features: Check Point Harmony Email and Collaboration offers exceptional integration through APIs, advanced protection against data leaks, and the ability to detect complex social engineering attacks. Trend Micro Email Security is known for its powerful antivirus engine, user-friendly administration, and reliable spam protection.
Room for Improvement: Check Point Harmony Email and Collaboration could improve integration with Exchange and other SaaS clouds while enhancing its threat clouds and AI engines. Trend Micro Email Security customers want better compatibility with third-party email solutions, advanced AI for rule configuration, and improved risk visibility.
Service and Support: Check Point has earned mixed reviews for its customer service. Some customers appreciate the technical support provided, while others are dissatisfied with response times. Trend Micro Email Security's support is generally responsive and helpful, but some reviews suggest room for improvement.
Ease of Deployment: Check Point Harmony Email is considered relatively easy to implement. Setting up Trend Micro Email Security is typically easy, taking around 30 minutes to an hour or two.
Pricing: Check Point Harmony Email and Collaboration is a cost-effective option. It offers competitive prices and is suitable for small to medium-sized organizations. Some users find Trend Micro Email Security to be costly and more suitable for larger enterprises.
ROI: Check Point Harmony Email and Collaboration delivers superior return on investment compared to other options. Trend Micro Email Security users say its return on investment is hard to demonstrate.
Comparison Results: Check Point Harmony Email and Collaboration is an effective solution for blocking malicious attachments and detecting social engineering attacks. However, there is room for improvement in terms of integration and support, reducing false positives, and enhancing response times. Trend Micro excels in security features, ease of administration, and scalability. Trend Micro could benefit from improved dashboard visibility and stronger spam filtering.
"I would say that 90% of the spam and phishing attack emails get blocked right off the bat."
"There are several features that I consider valuable."
"The product is not resource-intensive."
"Microsoft Defender for Office 365 has improved my organization's security. It makes it easier to manage the infrastructure without the help of third-party applications."
"Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various email campaigns, pinpointing where they emanate from, and identifying the individuals within our organization who are affected."
"Defender helps us prioritize threats across our organization."
"It gives us visibility into threats and, for endpoints, it helps us to prioritize threats. We used to have a lack of visibility, but now our time to detect and respond has decreased."
"The initial setup is straightforward. You just add the license, click it, and then you can set up the rules. It is quite simple."
"The most valuable feature of the solution is the phishing protection it offers."
"Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size."
"I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats."
"Check Point's technical support is very good."
"For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good."
"We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
"Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble."
"Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
"The most valuable features include email filtering to block spam and phishing attempts, the use of DMARC for email authentication, and robust malware scanning."
"Trend Micro Email Security’s most valuable feature is spam filtering."
"The integration capability of the solution is good."
"The technical support is good."
"The most valuable feature of Trend Micro Email Security is effective phishing prevention."
"Since implementing it, we've seen a significant improvement in security. We no longer receive spam emails, and we're protected from various cyberattacks, including ransomware and social engineering."
"Trend Micro Email Security has a feature for secure protection of OneDrive, Google Drive, and CloudApp security."
"It does a good job of ensuring users are not compromised via email."
"Microsoft sometimes has downtime, and we'll get several incidents coming in back to back. We have a huge backlog of notifications, many of which may be false positives. However, there might be serious alerts, so we can't risk dismissing all of them at once."
"The only thing they should improve is the licensing model. They should stop changing it. A year ago, the five features I mentioned were included in one product. Now, three of them are bundled into one product, and you have to pay extra for the other two. I don't mind paying extra, but I don't want them to change it every year or every six months. I need to know what I'm looking at and not worry about it next year."
"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."
"About eight months ago, we started to measure the quantity of phishing and spam that we have been receiving, and it has been increasing a lot. That means that protection for our email is not as good as we were expecting."
"Configuration requires going to a lot of places rather than just accessing one tab."
"Microsoft wants its well-paying customers to finish testing some of its half-baked products, find bugs, and report bugs back to Microsoft's team, which is a little frustrating for those who have to manage it and roll it up to thousands of people across the organization."
"The company should focus on adding threats that the solution is currently unable to detect."
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."
"They could help us be integrating features with solutions from third parties."
"We have used technical support, but their response time is very slow. It needs to be improved."
"A phishing simulator would be helpful as a user training module."
"There are sometimes leakages of viruses when the system is experiencing network failures."
"The solution fails to support hybrid deployments."
"Check Point has to continue refining the intelligence engine to minimize the number of false positives."
"The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."
"if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."
"The patch management could improve in Trend Micro Email Security."
"The only negative thing about Trend Micro Email Security is its price. It could be less expensive."
"There is a lot of room for improvement towards the phishing kind of email filtering, with the different hijacking attacks, and with the kind of password attacks which these phisher attackers do."
"The capacity handling and the scalability of the solution need to be improved since I feel Trend Micro lacks in such areas."
"Sometimes malicious email gets past the email gateway."
"Trend Micro Email Security could improve by advancing its artificial intelligence in email security. There are rules that have to be configured. There should be less configuring."
"I would like to see more integration of Trend Micro Email Security with different platforms."
"The initial setup was straightforward. This is a virtual appliance, it takes a short time to deploy the solution. However, it is not difficult if you understand the technology. You must have good knowledge of the email security area to set up the product correctly. There are many features in this solution and a high risk of having mistakes with the configuration."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Check Point Harmony Email & Collaboration Pricing and Cost Advice →
Check Point Harmony Email & Collaboration is ranked 7th in Email Security with 47 reviews while Trend Micro Email Security is ranked 8th in Email Security with 22 reviews. Check Point Harmony Email & Collaboration is rated 8.8, while Trend Micro Email Security is rated 8.0. The top reviewer of Check Point Harmony Email & Collaboration writes "Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing". On the other hand, the top reviewer of Trend Micro Email Security writes "The solution blocks spam emails from reaching the user’s mailbox but should introduce new features, improvements, and updates". Check Point Harmony Email & Collaboration is most compared with Avanan, Microsoft Defender for Cloud, Mimecast Email Security, Cisco Secure Email and Barracuda Email Protection, whereas Trend Micro Email Security is most compared with Cisco Secure Email, Microsoft Exchange Online Protection (EOP), Fortinet FortiMail, Trend Micro InterScan Messaging Security and Barracuda Email Security Gateway. See our Check Point Harmony Email & Collaboration vs. Trend Micro Email Security report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.