Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
52
Ranking in other categories
Email Archiving (1st), Advanced Threat Protection (ATP) (1st), Microsoft Security Suite (11th), Secure Email Gateway (SEG) (1st)
Check Point Harmony Email &...
Ranking in Email Security
7th
Average Rating
8.8
Reviews Sentiment
7.4
Number of Reviews
62
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (11th)
Trellix Collaboration Security
Ranking in Email Security
19th
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Instant Communications Security and Compliance (7th), Secure Email Gateway (SEG) (9th)
 

Mindshare comparison

As of May 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 12.9%, down from 18.3% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.7%, up from 3.3% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.1%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Rahul Kamble. - PeerSpot reviewer
Offers complete detection and simple management and is a user-friendly solution
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session. As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks. For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities. Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors. Moreover, Check Point Harmony Email incorporates AI technology within its security features. Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
Amey Darekar - PeerSpot reviewer
Has an easy implementation phase to deal with for users
I primarily use the product in our daily security operations since it is implemented in all of our company's systems and is used in our environment. Normally, email security tools like FireEye or Trellix help to protect ourselves from spam, malware, and other email-oriented threats. The tool is used extensively in our company's environment. It is more like a collaboration email security that is used in our company. Whether my company plans to increase the number of users of the product or not is something that depends on the growth of the organization. I recommend the product to those who plan to use it. The product is stable and reliable, considering the results my company gets out of it. When it comes to Trellix or FireEye Endpoint Security (HX), the tools offer antivirus as well as the modern real-time security feature, which is used to automate the detection and protection of the endpoints against all the security threats that are currently there in the industry. I don't see any challenges with the integration part of the product, but since a different team manages it, I don't have visibility into it. In terms of the value offered by the product, the solution does help our company protect data and the complete infrastructure. I rate the tool a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."
"I like its investigation capabilities, as that is what is most important to me. It is fairly simple with a user-friendly interface."
"The basic features are okay and I'm satisfied with the Defender."
"The deployment capability is a great feature."
"Defender for 365 is a comprehensive cloud-based solution. The value of the cloud is that you aren't alone. Threat intelligence and analytics are shared in the cloud. We don't have to find the solution alone. If you face an unknown threat with traditional solutions like Trend Micro and Symantec, you need to open a case and send your information to them to analyze forensically and identify the source of the attack."
"Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various email campaigns, pinpointing where they emanate from, and identifying the individuals within our organization who are affected."
"Microsoft Defender for Office 365's most valuable features are safe attachments and safe links."
"Defender is a SaaS platform, so it offers more flexibility. Managing the permissions is easier. The solution's automated detection and response features are scalable."
"The product offers good and easy integration capabilities with other products."
"It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
"The automated rule cleanups and automated policy installs have improved my customers' organizations."
"Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size."
"Its total protection has been the greatest aspect since it completely protects all the mail from the cloud."
"I recommend Check Point Harmony Email and Collaboration to all types of companies, from small businesses to enterprises."
"The email security solution boasts an exceptional success rate in filtering out junk, spam, and phishing emails while ensuring that legitimate emails reach their intended recipients. The setup process is straightforward and user-friendly"
"As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts."
"I like FireEye's filtering, spam digests, and its advanced threat review of email flow. It also has a broad range of riskware rules you can deploy."
"The auto-remediation feature is valuable."
"FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks."
"One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment."
"We can control this solution from the cloud and are able to access it from wherever we are."
"The product helps reduce the number of malicious emails reaching the user's inbox."
"The initial setup is simple."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use."
 

Cons

"They have moved features from one console to another. Things have been moved around in the interface and it takes me time to find where certain features are."
"The product must provide better malware detection."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"One area for improvement is integration. For example, when it comes to external SaaS platforms, we were not able to get a lot of information on integrations with such apps for security and authentication."
"We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"We need a separate license and we don't know how to get the license that is required."
"Configuring the default strategies and policies in Microsoft Defender for Cloud Apps generates a lot of noise and false positives."
"Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."
"The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."
"A signature-based filter could improve the solution's AI model for spam email."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"Initial Learning Mode takes a while."
"Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents."
"Check Point should integrate with features available in Barracuda."
"I would love it if they would do some work on the Postgres definition on the back-end."
"There is a need for improved integration with totally different products, such as a rapid server."
"The solution must provide features to scan QR codes for threats."
"I would rate them as a 1.5. The new hub created in India is not good."
"Sometimes especially zero-day spam emails can be passed to the user's inbox."
"FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"The spam detection feature could be better."
"I would like to see this solution become more flexible."
 

Pricing and Cost Advice

"I know that the product is incredibly expensive."
"I was working in the government and it was too expensive for us to use our Microsoft products."
"Compared to other brands, Microsoft Defender for Office 365's pricing is competitive."
"It is much more expensive than using another solution because we have had to include some options and upgrade our license."
"Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
"For large enterprise organizations, they can definitely afford it, but for small and medium organizations, they might struggle to cover the expenses."
"The pricing is normal. Considering its popularity, it's not overpriced."
"Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
"The pricing is competitive."
"I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers."
"Reasonable cost, quick and easy implementation, and transparent."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"I rate the platform’s pricing a seven and a half."
"I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive."
"Due to its pricing, I would say that Check Point Harmony Email & Collaboration is more suitable for medium to enterprise organizations."
"Do a full feature evaluation (interactive) with a support person. That is what I did."
"The licensing is on a yearly basis."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The cost is very high."
"The solution requires a license to be purchased for every user."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
851,604 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
19%
Financial Services Firm
9%
Manufacturing Company
8%
Government
5%
Manufacturing Company
16%
Computer Software Company
14%
Financial Services Firm
11%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
Microsoft is quite affordable with a lot of features available for any size organization.
What needs improvement with Microsoft Defender for Office 365?
Microsoft could improve by offering recommendations for domain spoofing attacks, especially scenarios where DNS recor...
What is your primary use case for Check Point Harmony Email & Office?
We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For exa...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
I would like to see the addition of email digital protection features, such as anti-spam and antivirus, not just sand...
What is your primary use case for FireEye Email Security?
I have worked on Email Security ( /categories/email-security ) both on-premises and in the cloud, Web Security, and a...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
FireEye Email Security
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Trellix Collaboration Security and other solutions. Updated: April 2025.
851,604 professionals have used our research since 2012.