

![Threat Stack Cloud Security Platform [EOL] Logo](https://images.peerspot.com/image/upload/c_scale,dpr_3.0,f_auto,q_100,w_64/o0no0it6ybl6satjcxomcblsgmd6.png?_a=BACAGSGT)
Threat Stack Cloud Security Platform and Check Point Harmony Email & Collaboration compete in cloud security. Check Point seems to have the upper hand with more robust features despite higher costs.
Features: Threat Stack offers infrastructure monitoring, compliance management, and real-time cloud security intelligence. Check Point focuses on email and collaboration platform security, anti-phishing, malware prevention, and data protection.
Room for Improvement: Threat Stack could enhance scalability, improve integration with external tools, and expand security analytics. Check Point might improve user interface intuitiveness, reduce false positives, and enhance integration with non-Microsoft platforms.
Ease of Deployment and Customer Service: Threat Stack's deployment is straightforward with good support, whereas Check Point benefits from comprehensive support solutions and seamless integration.
Pricing and ROI: Threat Stack is known for competitive pricing and lower setup costs, offering substantial ROI. Check Point offers higher ROI potential through advanced security features, justifying its higher initial cost.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
The time saved during investigations is significant due to the neat dashboard that organizes everything related to alerts.
We have gone from three to four successful phishing attacks every year to a maximum of one.
There has been a 70% decrease in phishing emails and data breaches since implementing Check Point Harmony Email Security.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
Their technical support is proficient at resolving issues within their scope, providing excellent problem-solving assistance and guidance.
We opted for the 24/7 premium support, which is very responsive and quick whenever we have configuration challenges or other inquiries.
We understand that with respect to SLA, but we expect they can go beyond SLA and provide quick support for the client.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
I would rate the scalability of PingSafe 10 out of 10.
I would rate the scalability of Check Point Harmony Email and Collaboration as nine out of ten, indicating high scalability.
Scalability is limited, being only integrated with Microsoft Office 365 and G Suite at present.
SentinelOne Singularity Cloud is incredibly reliable.
The only downtime we had was when switching from V1 to V2 but it was smooth.
Cloud Native Security is a SaaS product and I've never experienced an outage.
The platform is very stable; we have not encountered any downtime or stability-related issues.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
I would also like to see Cloud Native Security offer APIs that allow us to directly build dashboards within the platform.
Updates based on AI and reduced administrative overhead by adding or bulk adding new users, along with graphical enhancements to the GUI, would also be beneficial.
Enhancing reporting capabilities with customizable and advanced analytics features would greatly improve our ability to detect trends and proactively address emerging threats.
The current system, being tied directly to the mailbox instead of requiring MX record verification, allows new mailboxes to function immediately after Microsoft activation.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
There are some tools that are double the cost of Cloud Native Security.
I recall Cloud Native Security charging a slightly higher premium previously.
Pricing is a bit expensive, but it is worth it considering the features that Check Point provides.
I consider the pricing to be a bit expensive, similar to other solutions.
The pricing is lower compared to what I used before.
This tool has been helpful for us. It allows us to search for vulnerabilities and provides evidence directly on the screen.
Cloud Native Security's cloud SIEM feature has been essential in preventing our most critical security incidents.
The cloud misconfiguration feature gave us almost zero false positives.
I haven't had any users accidentally click on something problematic since implementing the product, which speaks to its efficacy.
The most valuable feature is spam detection and phishing site prevention, which Microsoft couldn't catch, yet Check Point does.
Check Point Harmony Email and Collaboration offers online support and has tight integration with Microsoft.

| Company Size | Count |
|---|---|
| Small Business | 49 |
| Midsize Enterprise | 22 |
| Large Enterprise | 55 |
| Company Size | Count |
|---|---|
| Small Business | 62 |
| Midsize Enterprise | 27 |
| Large Enterprise | 29 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 5 |
| Large Enterprise | 2 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?
What benefits should users expect from SentinelOne Singularity Cloud Security?
SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
Check Point Harmony Email and Office is a cloud-based software offering complete protection to stop malware attacks through emails. The software is designed to provide protection for organizations using Office 365, G Suite, Google Workspace, and all other collaboration and file-sharing apps. Access permissions can be granted and custom policies can be defined for any user of choice.
Check Point Harmony Email and Office identifies and blocks advanced malware, phishing, and ransomware attacks in real time before they reach the user’s inbox. In turn, this also helps protect sensitive business data from breaches. Harmony Email and Office was the first solution to implement machine learning, API, and AI for email security, and will ultimately prevent any attempts at account takeover via agentless multi-factor authentication.
What is Complete Protection?
Check Point Harmony Email and Office offers a superior catch rate for collaboration apps and cloud email with their API-based solution that detects attacks that other solutions miss, including account takeover, supply chain attacks, ransomware, and BEC. The complete protection offers:
Reviews from Real Users
Check Point Harmony Email and Office offers a revolutionary prevention solution to stop malware attacks through emails. Users particularly like its visibility and the ability to protect sensitive business data.
David U., a CISO at IMC companies, notes, "It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
Mantu S., a senior technology architect at Incedo Inc., writes, "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
Threat Stack Cloud Security Platform [EOL] offers robust security features including endpoint monitoring, rule customization, and integration capabilities, with easy connectivity to cloud services like Docker and AWS.
Threat Stack Cloud Security Platform [EOL] provides tools for enhancing security visibility across cloud infrastructure. It supports AWS and Docker integration, facilitating efficient threat detection and management. Users appreciate its capability to configure customizable alerts and monitor endpoints, sessions, API interactions, and cloud services. However, there are areas needing improvement, such as better serverless environment support and reduced alert frequency. The platform services smaller organizations by compensating for limited security resources with its comprehensive monitoring and auditing tools.
What are the key features?In specific industries, Threat Stack Cloud Security Platform [EOL] is utilized for its strength in monitoring cloud infrastructure and preventing unauthorized access. Organizations in fields where cloud operations are critical use it for regular audits and monitoring. Its capabilities in threat management are leveraged to maintain secure operations and compliance, especially where there is no dedicated security team.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.