No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Email Security (formerly Harmony Email & Collaboration) vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Apr 24, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Email Security
21st
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Secure Web Gateways (SWG) (15th), Data Loss Prevention (DLP) (20th), Cloud Access Security Brokers (CASB) (11th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (13th), Access Management (13th), Bot Management (3rd), ZTNA as a Service (9th), ZTNA (4th), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Check Point Email Security ...
Ranking in Email Security
3rd
Average Rating
8.8
Reviews Sentiment
7.2
Number of Reviews
96
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (7th)
Trellix Collaboration Security
Ranking in Email Security
11th
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
19
Ranking in other categories
Instant Communications Security and Compliance (2nd), Secure Email Gateway (SEG) (7th), AI Security (38th)
 

Mindshare comparison

As of April 2026, in the Email Security category, the mindshare of Cloudflare One is 1.5%, down from 1.7% compared to the previous year. The mindshare of Check Point Email Security (formerly Harmony Email & Collaboration) is 4.7%, down from 4.8% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.2%, up from 2.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Mindshare Distribution
ProductMindshare (%)
Check Point Harmony Email & Collaboration4.7%
Trellix Collaboration Security2.2%
Cloudflare One1.5%
Other91.6%
Email Security
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
Nasseer Qureshi - PeerSpot reviewer
Pre Sales Consultant at Redington Group
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.
Felipe Antoniazzi - PeerSpot reviewer
Cybersecurity Engineer Lead at Johnson & Johnson
Real-time threat response has boosted detection accuracy and reduces manual investigation work
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating systems, it was necessary to create different plans and different actions to implement the product.One thing I really do not prefer in Trellix Collaboration Security is not related to the console. I am a McAfee fan since the McAfee tool, and I find the console of Trellix Collaboration Security to be very user-friendly and easy to use. However, I do not know if it is related to the architecture of the product. Of course, we have modern threats based on behaviors and zero days. We have today CrowdStrike and SentinelOne, where we have better results based on threats and behavior, where it is possible to create a simulation environment based on the file detected and based on it, confirm if it really is malicious or not. In general, I believe Trellix Collaboration Security improved the console based on the last console of McAfee, but I think it is possible to improve more. It really is a good product, but in my view, it needs to improve detection based on behaviors. Regarding automations, I have implemented Trellix Collaboration Security here at Johnson & Johnson, and I implemented it in the same situation at Santander Bank and BNP Paribas Bank, where I created automations to export data for different metrics, including malicious detections, compliance, baselines, scans, last scans based on the seven days, and checking of patterns. I export everything to CSV files. Based on that, I create Power BI dashboards, and in these Power BI dashboards, I have a more executive view for different metrics to provide to myself, my manager, or director to create an executive view based on it. Another important point we use here at Johnson & Johnson and other companies is a data hub or a SIEM solution, such as Elastic or ArcSight, where we select some logs to be sent and use it to build reports and metrics.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It will take the blow rather than our applications should an attack occur."
"Cloudflare is by far the most effective solution that I have come across."
"Cloudflare Zero Trust Platform removes the risk of exposing the applications to the public."
"Cloudflare Access is part of the Zero Trust philosophy."
"I'm very satisfied with the environment and the dashboard."
"What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection."
"This solution is easy to understand and easy to configure."
"Cloudflare Access is a stable solution."
"Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure."
"The product's initial setup phase is very simple and automated. Everything can be made ready within a few clicks."
"Check Point Harmony Email and Collaboration is the best security software that protects email and collaboration suites in one of the best possible way."
"It is fast and has a very simple, easy integration."
"Check Point Harmony gives us great visibility of the threats we are being exposed to, where they are coming from and what were they targeting, giving visibility of the weak gateways that could lead to an infection or a leakage."
"Because of its features and abilities, it has saved us from a lot of possible breaches."
"Now, we're happy with this solution, as it's doing well."
"Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size."
"A specific example of how I have used Trellix Collaboration Security in my consulting work is in my current work environment, where I manage over 130,000 endpoints, allowing me to protect each endpoint with a firewall, which makes a significant difference because the entire network is not protected by a network firewall alone."
"We can control this solution from the cloud and are able to access it from wherever we are."
"The product protects my email."
"I like FireEye's filtering, spam digests, and its advanced threat review of email flow."
"Trellix Collaboration Security is valued for being a stable and comprehensive solution that fulfills customer needs."
"FireEye Email Security is easy to use."
"FireEye is good for malware depicting and security."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft, and the solution is easy to use."
 

Cons

"Cloudflare Zero Trust Platform needs to improve its documentation. It took time to do the implementation."
"They don't have a person to provide support for customers using the solution under their free plan."
"The response time for support must be reduced."
"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"Our customers no longer use Cloudflare because its service is subpar."
"Cloudflare DDoS has poor technical support."
"The initial onboarding was causing us some confusion."
"The software has automated alerts, but the automated alerts are not available in the mobile app."
"If Check Point finds something to be described as a clean email, it should have the option to automatically release it to the user. At the moment, we don't have that option."
"Its guides are not great."
"After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."
"The reporting could be improved."
"While Check Point Harmony Email and Collaboration offers useful analytics, there is potential for improvement in providing deeper insights."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"There are sometimes leakages of viruses when the system is experiencing network failures."
"From time to time, the system's administrators notice the increase in the false-positive alerts being reported by CloudGuard SaaS."
"The reporting aspect of the solution needs improvement."
"There is a need for improved integration with totally different products, such as a rapid server."
"If they want to be the primary or best solution, they need to have better email management features."
"I would rate them as a 1.5. The new hub created in India is not good."
"The reporting aspect of the solution needs improvement."
"The spam detection feature could be better."
"The solution must provide features to scan QR codes for threats."
"In general, our company should make the tool more robust to protect our systems."
 

Pricing and Cost Advice

"The solution's pricing lacks transparency."
"The prices are slightly expensive."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"Cloudflare Zero Trust Platform's pricing is good."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The solution is not that expensive."
"I rate the platform’s pricing a seven and a half."
"The product is expensive compared to some competitors, especially for the SME segment."
"Do a full feature evaluation (interactive) with a support person. That is what I did."
"Being able to keep the phishing campaigns out of my company has been ROI for me."
"The product is expensive."
"The cost is similar to other competitors. It's not much higher."
"Check Point is more expensive. That's the honest truth. So far, it's a good value for the money."
"As we are a non-profit organization, we got the tool with a good offer. On a yearly basis, we pay 10,000 Euro for 500 users, which also includes the technical support part."
"The solution requires a license to be purchased for every user."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The licensing is on a yearly basis."
"The cost is very high."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
892,287 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
21%
Comms Service Provider
10%
Financial Services Firm
8%
Manufacturing Company
6%
Computer Software Company
12%
Financial Services Firm
9%
Manufacturing Company
7%
Construction Company
7%
Manufacturing Company
13%
Construction Company
12%
Comms Service Provider
11%
Healthcare Company
11%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise11
By reviewers
Company SizeCount
Small Business63
Midsize Enterprise27
Large Enterprise30
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise4
Large Enterprise11
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
I am not the person to say what cost Check Point has for their products. However, for partners like us, if we could g...
What is your primary use case for Check Point Harmony Email & Office?
We are working with Check Point Harmony Email & Collaboration not only for Harmony, but also for their SaaS solut...
What needs improvement with Check Point Harmony Email & Office?
Check Point must develop one mobile app for iPhone users, Android phone users, and Windows phone users or at least fo...
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to...
What is your primary use case for FireEye Email Security?
In my field, I have been in the information security area for 17 years, and I am currently working in my position for...
 

Comparisons

 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
FireEye Email Security
 

Overview

 

Sample Customers

23andMe
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Check Point Email Security (formerly Harmony Email & Collaboration) vs. Trellix Collaboration Security and other solutions. Updated: April 2026.
892,287 professionals have used our research since 2012.