Try our new research platform with insights from 80,000+ expert users

Abnormal Security vs Check Point Harmony Email & Collaboration comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
52
Ranking in other categories
Email Archiving (1st), Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (11th), Secure Email Gateway (SEG) (1st)
Abnormal Security
Ranking in Email Security
4th
Average Rating
9.6
Reviews Sentiment
7.9
Number of Reviews
10
Ranking in other categories
Secure Email Gateway (SEG) (3rd)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
63
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
 

Mindshare comparison

As of May 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 12.9%, down from 18.3% compared to the previous year. The mindshare of Abnormal Security is 7.5%, up from 3.2% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.7%, up from 3.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
William Schellhaas - PeerSpot reviewer
Provides comprehensive email security management, effective in detecting a wide range of email threats
The ideal scenario would be for Abnormal Security to work in tandem with Microsoft to analyze incoming emails. This means Abnormal Security would assess emails before they reach my inbox, even if it happens slightly after Microsoft's initial scan. Currently, the process isn't seamless. Microsoft analyzes emails and delivers legitimate ones to my inbox. Abnormal Security then scans these delivered emails, and if flagged as malicious, they disappear. This creates a problem for our ticketing system mailbox, which is a third-party service. Emails sent to the ticketing system address are automatically forwarded by Microsoft. However, if these emails are malicious, Abnormal Security only cleans them from my Outlook mailbox after they've been forwarded. Since we primarily rely on the ticketing system and not the Outlook mailbox, these malicious emails still reach the ticketing system.
Sethu B - PeerSpot reviewer
Enhanced email security with effective threat management and spam detection
We were using Google Email earlier and wanted to move from Google to Microsoft. Knowing the vulnerability issues with Microsoft, we wanted a strong email security management system on top of Microsoft 365 We aimed to enhance the server security perimeter due to previous vulnerabilities with…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is protection against malicious links, fishing, and impersonation. You can train people to be aware of these threats, but they're not always careful. When they're using their phones between meetings, they click on a link, and it's game over."
"I would say that 90% of the spam and phishing attack emails get blocked right off the bat."
"Defender helps us prioritize threats across our organization."
"One of the best features of the tool is its capability to aggregate insights from different workloads, basically from the Office 365 and endpoints part."
"The benefit that stands out to me is the ability for multiple individuals to collaborate simultaneously within the same document. Additionally, there is the option to save the document directly in the integrated OneDrive or SharePoint."
"The deployment capability is a great feature."
"The most valuable feature of Microsoft Defender for Office 365 is its spam filter."
"It has significantly decreased my time to detection and response."
"It does some really cool stuff that other tools aren't doing. We found it to be really effective, and the AI/ML functionality is really what differentiates them."
"The features that appeal to me most are the combination of auto-remediation and Detection 360."
"I have never encountered any stability issues with Abnormal."
"Ease of use is undoubtedly one of the most valuable features of Abnormal Security."
"What I like about Abnormal Security is that it notifies me if any of my partners or suppliers are experiencing a security breach by analyzing their database and identifying potential cyber threats."
"Initial auto-remediation allows us to auto-remediate before the email lands in the end user's inbox for a split second."
"I like Abnormal's threat protection with auto-remediation, but I also love its abuse mailbox feature, which automatically responds to the end user. That feature has a super-valuable security component and helps improve the user experience."
"One of the things that I love about them is that the setup and installation are super easy. All you do is give them access to your Microsoft 365 tenant, and through APIs, they are able to do their work. They are doing all this through APIs, so you do not have to install the software and take a month to get it all set up to even see the value of the solution. You could be up and running in less than an hour."
"We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
"The solution helps to block spam emails."
"Overall, I would rate it ten out of ten."
"It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
"It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
"Email security has improved since we deployed this platform."
"The product's initial setup phase is very simple and automated. Everything can be made ready within a few clicks."
"Check Point Harmony Email and Collaboration offers online support and has tight integration with Microsoft."
 

Cons

"The custom alerts have to improve a lot."
"You should be able to deploy Defender for every subscription without the need to add servers."
"The visibility into threats is not up to the mark, as I do not have control. I rate my experience with Microsoft Defender for Office 365 as six out of ten due to troubleshooting and pricing concerns."
"Specifically, within Microsoft Defender for Office 365, I want it to improve the DLP capabilities."
"Microsoft could improve by offering recommendations for domain spoofing attacks, especially scenarios where DNS records like SPF, DKIM, and DMARC are not properly published."
"Microsoft Defender for Office 365's Mac functionality requires improvement to deliver the same level of protection found on Windows devices."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."
"When we're working on something as engineers, and we find an idea or a method of doing something that would be greatly improved by doing it another way, there should be an ability for me to click the ideas button, type in an idea that I have, and submit it to a product review team or developers to have them think through the process a little bit more."
"There could be more selectable options and more granular selections available."
"I, as such, do not have anything that I do not like or would like to add, but you could argue that because they are doing it API-based, there is a chance that something could slip through temporarily before they are able to pull it out. In theory, it could happen just because of the nature of the system. They are not in line with the delivery of the mail. They are kind of asynchronous, which is a pro as well as a con. If it is synchronous, then I know it would always stop them, but because it is asynchronous, things could get through temporarily or because of some system issues on the Microsoft side or their side. It is the nature of the beast, but it is a little bit of a con."
"The biggest pain point for us is the lack of support for on-premise email systems."
"One feature I'd love to see is outbound scanning."
"There could be more selectable options and more granular selections available."
"The ideal scenario would be for Abnormal Security to work in tandem with Microsoft to analyze incoming emails."
"I would like to have the ability to customize the auto-remediation feature."
"The left-hand feature can be made more granular for the implementation of the policy."
"The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported. If they were to add report exporting capabilities on each of metric objects on the dashboard, that would be awesome."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"There is always room for improvement and growth."
"There is a need for improvement in handling business email compromise."
"Integration is currently limited to Microsoft Office 365 and Google G Suite."
"It's not fully integrated with Google Workspace, and the statistics don't update in real-time."
"I have learned enough to make the product stable. However, the stability has some challenges."
 

Pricing and Cost Advice

"Compared to other brands, Microsoft Defender for Office 365's pricing is competitive."
"The pricing has become expensive."
"The product is expensive."
"The product is very expensive."
"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"The pricing is normal. Considering its popularity, it's not overpriced."
"Defender is a little bit more expensive as compared to others. We are in the manufacturing environment. So, we don't have a high budget for all of our endpoint devices. Its cost is a major concern for us."
"For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
"Overall, we'd certainly prefer lower pricing, but Abnormal Security doesn't seem unreasonable compared to similar offerings in the market."
"The license is based on the user count, so the number of users that have an email address in the organization."
"The pricing appears fair, and they demonstrate a genuine willingness to work with us on it."
"Abnormal Security, on the other hand, provides the same level of functionality for just over $60,000 – that's half the price!"
"Reasonable cost, quick and easy implementation, and transparent."
"The product is expensive compared to some competitors, especially for the SME segment."
"I rate the platform’s pricing a seven and a half."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"Due to its pricing, I would say that Check Point Harmony Email & Collaboration is more suitable for medium to enterprise organizations."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"The pricing and licensing are always negotiable."
"Do a full feature evaluation (interactive) with a support person. That is what I did."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
852,780 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
7%
Government
7%
Computer Software Company
19%
Financial Services Firm
9%
Manufacturing Company
8%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
Microsoft is quite affordable with a lot of features available for any size organization.
What needs improvement with Microsoft Defender for Office 365?
Microsoft could improve by offering recommendations for domain spoofing attacks, especially scenarios where DNS recor...
What do you like most about Abnormal Security?
The features that appeal to me most are the combination of auto-remediation and Detection 360.
What is your experience regarding pricing and costs for Abnormal Security?
I find the pricing to be favorable, but I did not disclose the exact cost.
What needs improvement with Abnormal Security?
There could be more selectable options and more granular selections available.
What is your primary use case for Check Point Harmony Email & Office?
We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For exa...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
 

Also Known As

MS Defender for Office 365
No data available
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Foot Lcoker, Xerox, Liberty Mutual, Mattel, Boston Scientific
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Find out what your peers are saying about Abnormal Security vs. Check Point Harmony Email & Collaboration and other solutions. Updated: April 2025.
852,780 professionals have used our research since 2012.