Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Cloudflare One comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 16, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
48
Ranking in other categories
Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (11th)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
59
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
Cloudflare One
Ranking in Email Security
11th
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
20
Ranking in other categories
Secure Web Gateways (SWG) (7th), Data Loss Prevention (DLP) (7th), Cloud Access Security Brokers (CASB) (7th), Distributed Denial-of-Service (DDoS) Protection (5th), Access Management (5th), Bot Management (3rd), ZTNA as a Service (3rd), ZTNA (2nd), Secure Access Service Edge (SASE) (6th), Remote Browser Isolation (RBI) (2nd)
 

Mindshare comparison

As of April 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 13.1%, down from 19.0% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.8%, up from 3.1% compared to the previous year. The mindshare of Cloudflare One is 1.6%, up from 1.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Carlos Alam Hernandez Baruch - PeerSpot reviewer
The solution enables seamless security management and fosters a learning environment
Feedback could be enhanced. While I work efficiently with Clover as a partner in Mexico City, sometimes the information and requests are easier to manage with more concrete solutions. For the solution stopping us for e-learning, I appreciate the concept yet need more resources or courses in Mexico, preferably in Spanish. Certifications are easy, however, I require more real-world environments and instructors.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The deployment capability is a great feature."
"The initial setup is straightforward. You just add the license, click it, and then you can set up the rules. It is quite simple."
"The email protection is excellent, especially in terms of anti-phishing policies."
"Microsoft Defender for Office 365 is a stable solution."
"It also gives me good visibility because, with Defender, I'm using a Microsoft product to defend Microsoft products. The integration was really seamless and I have wide visibility because it picks up almost everything. Literally, I can see almost every activity that happens, from the e-mail to the workstation itself."
"The most valuable feature of Microsoft Defender for Office 365 is its spam filter."
"The technical support is good and quick to resolve issues."
"The initial setup was easy."
"Email security has improved since we deployed this platform."
"Check Point adds value with east-west protection in the data center."
"Based on domain and URL reputation, it will allow traffic to flow."
"The dashboard provides information to investigate more about malicious activity and blocked emails."
"The sanitization feature of Check Point Harmony Email and Collaboration is valuable."
"The program has a nice interface and it is easy to use."
"The option to set a copy is beneficial."
"I like the fact that having granular information about the potential threats is received in email."
"The solution has different options that can be used to differentiate DDoS attacks."
"Cloudflare, in my opinion, was easy to implement."
"Clover is the best product globally."
"The best feature is rate limiting. If I'm expecting 500 visits per hour, Cloudflare will limit the requests if I suddenly get 50,000."
"Cloudflare is simple to use."
"For Cloudflare Access, I am using the free plan...The most valuable feature is their protection."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"Cloudflare DDoS is better than its competitors for its security, deployment, and scalability."
 

Cons

"This product's effectiveness could be improved, in terms of detecting unwanted spam or even malware between the emails, compared to other products."
"The changes to customer service, specifically the new model for support agreements, are not favorable."
"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."
"One area for improvement is integration. For example, when it comes to external SaaS platforms, we were not able to get a lot of information on integrations with such apps for security and authentication."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"Microsoft Defender for Office 365 should be more proactive."
"There is always room for improvement and growth."
"I would like Check Point to extend its coverage to include more cloud applications."
"The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported. If they were to add report exporting capabilities on each of metric objects on the dashboard, that would be awesome."
"Check Point should integrate with features available in Barracuda - like more advanced threat management."
"After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."
"A signature-based filter could improve the solution's AI model for spam email."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"I have learned enough to make the product stable. However, the stability has some challenges."
"Cloudflare DDoS has poor technical support."
"Feedback could be enhanced. While I work efficiently with Clover as a partner in Mexico City, sometimes the information and requests are easier to manage with more concrete solutions."
"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"Cloudflare Zero Trust Platform needs to improve its documentation. It took time to do the implementation."
"For the topic of improvement, providing some training material is one of my suggestions."
"The free plan has limitations. For example, I can only set up three rules, and the application firewall is unavailable."
"They don't have a person to provide support for customers using the solution under their free plan."
"The onboarding process can be improved a little bit."
 

Pricing and Cost Advice

"From the pricing point of view, like any other product in the market, there is scope for negotiation."
"The solution could be better by simplifying the business model of their licensing. It was hard to figure out how to get the licensing done for the environment, initially."
"The product is very expensive."
"The license is expensive because the cost is based on the number of users."
"The pricing is normal. Considering its popularity, it's not overpriced."
"Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
"While Microsoft Defender for Office 365 necessitates pricier E3 or E5 subscriptions, the extensive functionality offered by these licenses across various Microsoft products justifies the investment."
"It's a user-base subscription."
"The product is expensive."
"I rate the platform’s pricing a seven and a half."
"I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive."
"The price is very good, based on what they deliver."
"The pricing and licensing are always negotiable."
"The difference between [Check Point and its competitors] boiled down to money. Price-wise, Check Point was very good, it was very competitive."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"The pricing is expensive."
"Cloudflare Zero Trust Platform's pricing is good."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The prices are slightly expensive."
"The solution's pricing lacks transparency."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The solution is not that expensive."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
845,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
19%
Financial Services Firm
10%
Manufacturing Company
8%
Healthcare Company
5%
Computer Software Company
16%
Financial Services Firm
10%
Comms Service Provider
9%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
I don't have detailed specifics on pricing, setup cost, or licensing.
What needs improvement with Microsoft Defender for Office 365?
I am generally satisfied with how it currently is. If I could improve anything, I would reduce the cost.
What is your primary use case for Check Point Harmony Email & Office?
We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For exa...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about Cloudflare Access?
The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good.
What is your experience regarding pricing and costs for Cloudflare Access?
The price of Cloudflare Access is the same as compared to Akamai, but I get better performance from Cloudflare. My co...
What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
23andMe
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Cloudflare One and other solutions. Updated: March 2025.
845,406 professionals have used our research since 2012.