Try our new research platform with insights from 80,000+ expert users

Abnormal Security vs Check Point Harmony Email & Collaboration comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Email Security
20th
Average Rating
8.8
Reviews Sentiment
6.7
Number of Reviews
22
Ranking in other categories
Secure Web Gateways (SWG) (15th), Data Loss Prevention (DLP) (21st), Cloud Access Security Brokers (CASB) (11th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (13th), Access Management (12th), Bot Management (3rd), ZTNA as a Service (8th), ZTNA (3rd), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Abnormal Security
Ranking in Email Security
6th
Average Rating
9.4
Reviews Sentiment
7.5
Number of Reviews
11
Ranking in other categories
Secure Email Gateway (SEG) (4th)
Check Point Harmony Email &...
Ranking in Email Security
3rd
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
94
Ranking in other categories
Data Loss Prevention (DLP) (4th), Cloud Workload Protection Platforms (CWPP) (7th)
 

Mindshare comparison

As of March 2026, in the Email Security category, the mindshare of Cloudflare One is 1.5%, down from 1.8% compared to the previous year. The mindshare of Abnormal Security is 5.6%, down from 7.0% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 5.5%, up from 4.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Mindshare Distribution
ProductMindshare (%)
Check Point Harmony Email & Collaboration5.5%
Abnormal Security5.6%
Cloudflare One1.5%
Other87.4%
Email Security
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
reviewer2251509 - PeerSpot reviewer
Senior Director, Information Technology at a insurance company with 51-200 employees
AI has helped classify threat types more accurately but product ownership can improve
Ease of use is important, and Abnormal Security's responsiveness and ability to deliver solutions when issues arise are crucial. However, there is always room for improvement, as achieving a perfect 10 means there is no more room for enhancement. For Abnormal Security, it's about leveraging AI even more, which they are already working on in their roadmap.
Nasseer Qureshi - PeerSpot reviewer
Pre Sales Consultant at Redington Group
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The best feature is rate limiting. If I'm expecting 500 visits per hour, Cloudflare will limit the requests if I suddenly get 50,000."
"The capabilities of the software are strong enough for me to do what it's supposed to do. For me, we don't need to do a lot of configuration on our site. We just enable it and monitor it."
"Cloudflare Zero Trust Platform removes the risk of exposing the applications to the public."
"The solution has different options that can be used to differentiate DDoS attacks."
"It will take the blow rather than our applications should an attack occur."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"This solution is easy to understand and easy to configure."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"I like Abnormal's threat protection with auto-remediation, but I also love its abuse mailbox feature, which automatically responds to the end user. That feature has a super-valuable security component and helps improve the user experience."
"It protects us from being business email compromised, which is invaluable for maintaining our security."
"Their ability to take things out of the mailbox and catch things much faster than users is excellent."
"Abnormal Security's AI capabilities are what we like most, as they can categorize and classify the emails, and based on the context of the email, understand if it's a graymail, a bulk mail, or a phish."
"I have never encountered any stability issues with Abnormal."
"What I like about Abnormal Security is that it notifies me if any of my partners or suppliers are experiencing a security breach by analyzing their database and identifying potential cyber threats."
"One of the things that I love about them is that the setup and installation are super easy. All you do is give them access to your Microsoft 365 tenant, and through APIs, they are able to do their work. They are doing all this through APIs, so you do not have to install the software and take a month to get it all set up to even see the value of the solution. You could be up and running in less than an hour."
"I would recommend Abnormal Security."
"Email security has improved since we deployed this platform."
"Based on domain and URL reputation, it will allow traffic to flow."
"We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
"The most valuable feature is the sandboxing feature. It provides a sandboxing environment where you can open links and see where they lead. You can see what is presented in the link after opening it."
"The advanced phishing protection is proactive in catching threats before users even see them; it does not just block obvious spam, it can spot subtle impersonation attempts and suspicious links that appear legitimate at first glance."
"The solution helps to block spam emails."
"We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
"Check Point has made my threat prevention better; it has helped me avoid having to redo machines and has helped protect our data by not letting unauthorized items through."
 

Cons

"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"Cloudflare Zero Trust Platform needs to improve its documentation. It took time to do the implementation."
"Feedback could be enhanced."
"The software has automated alerts, but the automated alerts are not available in the mobile app."
"Our subscription plan for the solution has a limitation of bot signatures."
"The initial onboarding was causing us some confusion."
"The onboarding process can be improved a little bit."
"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"The pricing for academic institutions and student mailboxes is challenging."
"There could be more selectable options and more granular selections available."
"I, as such, do not have anything that I do not like or would like to add, but you could argue that because they are doing it API-based, there is a chance that something could slip through temporarily before they are able to pull it out. In theory, it could happen just because of the nature of the system. They are not in line with the delivery of the mail. They are kind of asynchronous, which is a pro as well as a con. If it is synchronous, then I know it would always stop them, but because it is asynchronous, things could get through temporarily or because of some system issues on the Microsoft side or their side. It is the nature of the beast, but it is a little bit of a con."
"The ideal scenario would be for Abnormal Security to work in tandem with Microsoft to analyze incoming emails."
"When we're working on something as engineers, and we find an idea or a method of doing something that would be greatly improved by doing it another way, there should be an ability for me to click the ideas button, type in an idea that I have, and submit it to a product review team or developers to have them think through the process a little bit more."
"Abnormal should add more automatic reports. I have an open request to our account team for more notification and report types that can be sent automatically. For example, they have an awesome report that gets sent weekly, and I also want them monthly, so I don't need to do so much adding up when my director wants numbers over time."
"One feature I'd love to see is outbound scanning."
"There could be room for improvement in enhancing integration with other cybersecurity tools."
"The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."
"if a phishing email were to get through and bypass the product — which very few do — it would be nice if, when a user clicked on that phishing email, they got a second-chance opportunity, a chance to double-check that they really wanted to proceed to that website."
"The cost is a little bit expensive."
"They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."
"The solution currently integrates with only a few email domains, such as Google, Gmail, Outlook, and Zimbra."
"The reporting could be improved."
"If Check Point finds something to be described as a clean email, it should have the option to automatically release it to the user. At the moment, we don't have that option."
"The documentation is a little unintuitive, and I make an additional effort for the first deployment."
 

Pricing and Cost Advice

"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The solution is not that expensive."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The solution's pricing lacks transparency."
"The prices are slightly expensive."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"Cloudflare Zero Trust Platform's pricing is good."
"The license is based on the user count, so the number of users that have an email address in the organization."
"Abnormal Security, on the other hand, provides the same level of functionality for just over $60,000 – that's half the price!"
"The pricing appears fair, and they demonstrate a genuine willingness to work with us on it."
"Overall, we'd certainly prefer lower pricing, but Abnormal Security doesn't seem unreasonable compared to similar offerings in the market."
"The product is expensive compared to some competitors, especially for the SME segment."
"The product’s price is very high."
"As we are a non-profit organization, we got the tool with a good offer. On a yearly basis, we pay 10,000 Euro for 500 users, which also includes the technical support part."
"Reasonable cost, quick and easy implementation, and transparent."
"Usually, we pay for the licensing part on a yearly basis and not on a monthly basis. If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts."
"I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers."
"The pricing is competitive."
"Having information stolen by a hacker would be more expensive than purchasing a license."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
10%
Computer Software Company
9%
Financial Services Firm
8%
Manufacturing Company
8%
Computer Software Company
11%
Financial Services Firm
10%
Manufacturing Company
8%
Government
6%
Computer Software Company
14%
Manufacturing Company
8%
Financial Services Firm
7%
Healthcare Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise10
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise2
Large Enterprise8
By reviewers
Company SizeCount
Small Business62
Midsize Enterprise27
Large Enterprise29
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What is your experience regarding pricing and costs for Abnormal Security?
I find the pricing to be favorable, but I did not disclose the exact cost.
What needs improvement with Abnormal Security?
Ease of use is important, and Abnormal Security's responsiveness and ability to deliver solutions when issues arise a...
What is your primary use case for Abnormal Security?
The main use case for Abnormal Security is as a spam filter and for mail hygiene. This use case is for the finance in...
What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
My experience with the pricing aspect, including setup cost and licensing cost of Check Point Harmony Email & Col...
What is your primary use case for Check Point Harmony Email & Office?
We use Check Point Harmony Email & Collaboration for our clients, and we have also implemented the solution in ou...
What needs improvement with Check Point Harmony Email & Office?
A more intuitive interface would be an area for improvement. I would like the agents to perform better; sometimes, th...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
No data available
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
 

Overview

 

Sample Customers

23andMe
Foot Lcoker, Xerox, Liberty Mutual, Mattel, Boston Scientific
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Find out what your peers are saying about Abnormal Security vs. Check Point Harmony Email & Collaboration and other solutions. Updated: March 2026.
884,873 professionals have used our research since 2012.