David AntlitzManager Firewall and Security at W.R. Grace & Co.
Brice ABRIOUXInformation Security Engineer at ENEDIS
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The program has a nice interface and it is easy to use."
"The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour."
"We need the phishing detection and email quarantine. Once an email is considered malicious, it stays in the quarantine where we can interrogate it. We can check out why it was quarantined and see if it should be delivered to the individual."
"As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts."
"It is very intuitive. It is a point and click type of deal."
"It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
"For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good."
"Getting reports and finding threats in the console is easy."
"The most valuable feature of this solution is security."
"The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network."
"The most valuable feature is micro-segmentation, which is the most important with respect to visibility."
"At this time, the two-factor authentication does not work for Active Directory."
"if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."
"We still get some false positives. There are times when legitimate stuff gets flagged and it could be that somebody is expecting a very important email but they don't end up getting it. On the flip side, when we alert Check Point about stuff like this, it is corrected, so they are improving. That's a plus."
"From time to time, the system's administrators notice the increase in the false-positive alerts being reported by CloudGuard SaaS."
"The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported. If they were to add report exporting capabilities on each of metric objects on the dashboard, that would be awesome."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"We are unable to export the reports from the dashboard, and if it is possible to do then it is not intuitive."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"The interface is really helpful for technical people, but it is not user-friendly."
"The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring."
"There is some overlap between Cisco Tetration and AppDynamics and I need to have a single pane of glass, rather than have to jump between different tools."
"The price is very good, based on what they deliver."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"There are absolutely no additional costs to the standard licensing fees. One of the wonderful pieces is that CloudGuard SaaS is all-inclusive in its licensing. There's no a-la-carte functionality. You're getting 100 percent of the product for the licensing that you're paying."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
"The pricing and licensing are always negotiable."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers."
"This is a very good product if you are on the cloud, but the price is a little more expensive."
"The price is based on how many computers you're going to install it on."
Phishing emails become more sophisticated by the day and can be the start of lateral attacks across organizations, leading to huge losses.
Harmony Email & Office detects and blocks the most advanced phishing attacks across inbound and internal communications in real time – before they reach users.
Achieve the security required for today's heterogeneous multicloud environment with Cisco Secure Workload (formerly Tetration). Protect workloads across any cloud, application, and workload--anywhere. Automate and implement a secure zero-trust model for micro-segmentation based on application behavior and telemetry. Proactively detect and remediate indicators of compromise to minimize the impact to your business.
Check Point Harmony Email & Office is ranked 4th in Cloud Workload Security with 9 reviews while Cisco Secure Workload is ranked 7th in Cloud Workload Security with 3 reviews. Check Point Harmony Email & Office is rated 8.8, while Cisco Secure Workload is rated 8.4. The top reviewer of Check Point Harmony Email & Office writes "Daily phishing attacks are no longer negatively impacting us, and we no longer have data exfiltration". On the other hand, the top reviewer of Cisco Secure Workload writes "A secure and stable solution for our on-premises network analytics". Check Point Harmony Email & Office is most compared with Prisma Cloud by Palo Alto Networks, Check Point CloudGuard Posture Management, Azure Security Center, Amazon GuardDuty and Trend Micro Cloud One Workload Security, whereas Cisco Secure Workload is most compared with VMware NSX, Guardicore Centra, Illumio Adaptive Security Platform, Prisma Cloud by Palo Alto Networks and vArmour DSS. See our Check Point Harmony Email & Office vs. Cisco Secure Workload report.
See our list of best Cloud Workload Security vendors.
We monitor all Cloud Workload Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.