Try our new research platform with insights from 80,000+ expert users

Abnormal Security vs Check Point Harmony Email & Collaboration comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Abnormal Security
Ranking in Email Security
3rd
Average Rating
9.6
Reviews Sentiment
7.9
Number of Reviews
10
Ranking in other categories
Secure Email Gateway (SEG) (2nd)
Check Point Harmony Email &...
Ranking in Email Security
4th
Average Rating
8.8
Reviews Sentiment
7.5
Number of Reviews
67
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (8th)
 

Mindshare comparison

As of July 2025, in the Email Security category, the mindshare of Abnormal Security is 7.5%, up from 4.0% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.9%, up from 3.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

ChrisBrown5 - PeerSpot reviewer
Automated threat detection that protects against corruption with minimal intervention
Abnormal Security is valuable because it features an automated scoring tool that doesn't require much intervention from our team. It enhances threat detection capabilities by making the process automated and is easy to scale to our entire environment. Additionally, it protects us from being business email compromised, which is invaluable for maintaining our security.
Nasseer Qureshi - PeerSpot reviewer
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It protects us from being business email compromised, which is invaluable for maintaining our security."
"I have never encountered any stability issues with Abnormal."
"It does some really cool stuff that other tools aren't doing. We found it to be really effective, and the AI/ML functionality is really what differentiates them."
"The features that appeal to me most are the combination of auto-remediation and Detection 360."
"I would recommend Abnormal Security."
"Initial auto-remediation allows us to auto-remediate before the email lands in the end user's inbox for a split second."
"One of the things that I love about them is that the setup and installation are super easy. All you do is give them access to your Microsoft 365 tenant, and through APIs, they are able to do their work. They are doing all this through APIs, so you do not have to install the software and take a month to get it all set up to even see the value of the solution. You could be up and running in less than an hour."
"I like Abnormal's threat protection with auto-remediation, but I also love its abuse mailbox feature, which automatically responds to the end user. That feature has a super-valuable security component and helps improve the user experience."
"We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
"The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great."
"Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
"The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc."
"It is very intuitive. It is a point and click type of deal."
"It helped us to bring security compliance and ensure system robustness throughout."
"It is the collaboration between users inside the company. It is a big advantage with Check Point to be able to work together on the same document."
"Check Point's technical support is very good."
 

Cons

"I, as such, do not have anything that I do not like or would like to add, but you could argue that because they are doing it API-based, there is a chance that something could slip through temporarily before they are able to pull it out. In theory, it could happen just because of the nature of the system. They are not in line with the delivery of the mail. They are kind of asynchronous, which is a pro as well as a con. If it is synchronous, then I know it would always stop them, but because it is asynchronous, things could get through temporarily or because of some system issues on the Microsoft side or their side. It is the nature of the beast, but it is a little bit of a con."
"When we're working on something as engineers, and we find an idea or a method of doing something that would be greatly improved by doing it another way, there should be an ability for me to click the ideas button, type in an idea that I have, and submit it to a product review team or developers to have them think through the process a little bit more."
"There could be room for improvement in enhancing integration with other cybersecurity tools."
"The biggest pain point for us is the lack of support for on-premise email systems."
"I would like to have the ability to customize the auto-remediation feature."
"One feature I'd love to see is outbound scanning."
"The pricing for academic institutions and student mailboxes is challenging."
"There could be more selectable options and more granular selections available."
"Some files are not scanned thoroughly due to occasional network failures."
"For tech people who want to dive deep into self-servicing capabilities, Check Point could improve in this area."
"We have used technical support, but their response time is very slow. It needs to be improved."
"There is a need for improvement in handling business email compromise."
"Check Point needs to address the pricing segment for SMEs."
"Check Point could improve its marketing strategy."
"There is always room for improvement and growth."
"They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response."
 

Pricing and Cost Advice

"Abnormal Security, on the other hand, provides the same level of functionality for just over $60,000 – that's half the price!"
"The pricing appears fair, and they demonstrate a genuine willingness to work with us on it."
"Overall, we'd certainly prefer lower pricing, but Abnormal Security doesn't seem unreasonable compared to similar offerings in the market."
"The license is based on the user count, so the number of users that have an email address in the organization."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
"The pricing is in the middle. Check Point's pricing is not the highest in the competitive market."
"Cost is the main concern that every customer takes into consideration, and Check Point always negotiates a price that is affordable."
"Do a full feature evaluation (interactive) with a support person. That is what I did."
"Having information stolen by a hacker would be more expensive than purchasing a license."
"I rate the platform’s pricing a seven and a half."
"I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive."
"The pricing and licensing are always negotiable."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
861,524 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
10%
Manufacturing Company
7%
Government
7%
Computer Software Company
19%
Financial Services Firm
8%
Manufacturing Company
8%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Abnormal Security?
The features that appeal to me most are the combination of auto-remediation and Detection 360.
What is your experience regarding pricing and costs for Abnormal Security?
I find the pricing to be favorable, but I did not disclose the exact cost.
What needs improvement with Abnormal Security?
There could be more selectable options and more granular selections available.
What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
My experience with pricing, setup cost, and licensing for Check Point Harmony Email & Collaboration has been all good.
What is your primary use case for Check Point Harmony Email & Office?
My main use case for Check Point Harmony Email & Collaboration is to protect email against all zero-day threats, compromised QR codes, other malicious account attachments, and more. I do not ha...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
 

Also Known As

No data available
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
 

Overview

 

Sample Customers

Foot Lcoker, Xerox, Liberty Mutual, Mattel, Boston Scientific
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Find out what your peers are saying about Abnormal Security vs. Check Point Harmony Email & Collaboration and other solutions. Updated: July 2025.
861,524 professionals have used our research since 2012.