Try our new research platform with insights from 80,000+ expert users

Check Point Harmony Email & Collaboration vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Defender for Offi...
Sponsored
Ranking in Email Security
1st
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
52
Ranking in other categories
Email Archiving (1st), Advanced Threat Protection (ATP) (2nd), Microsoft Security Suite (10th), Secure Email Gateway (SEG) (1st)
Check Point Harmony Email &...
Ranking in Email Security
4th
Average Rating
8.8
Reviews Sentiment
7.5
Number of Reviews
67
Ranking in other categories
Data Loss Prevention (DLP) (5th), Cloud Workload Protection Platforms (CWPP) (8th)
Trellix Collaboration Security
Ranking in Email Security
18th
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Instant Communications Security and Compliance (7th), Secure Email Gateway (SEG) (9th)
 

Mindshare comparison

As of July 2025, in the Email Security category, the mindshare of Microsoft Defender for Office 365 is 12.3%, down from 16.9% compared to the previous year. The mindshare of Check Point Harmony Email & Collaboration is 4.9%, up from 3.7% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.0%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

Tolu Omolaja - PeerSpot reviewer
Great URL scanning and attachment scanning, but I would like more proactive threat analysis
The two main features that prove most beneficial for us are URL scanning and attachment scanning. URL scanning involves an automatic scan of links and emails. When a user clicks on a link within an email, the system promptly checks the link's safety. If the link is deemed safe, access is granted automatically. However, if it is flagged as unsafe, we receive feedback and notification to caution us about the potentially harmful link. At this point, we are presented with the option to proceed or return. I have personally witnessed the system identify a few unsafe links, making this the primary advantage of using the solution. The second crucial aspect is the scanning of attachments. When an email containing an attachment arrives, we receive a notification of the new email, along with information that the attachment is being scanned for threats. This additional layer of security provides peace of mind for our organization. While Microsoft Defender for Office 365 offers numerous features, these two stand out as particularly impressive and valuable to us.
Nasseer Qureshi - PeerSpot reviewer
Email security effectively detects a wide range of threats and improves productivity
Since we have been using Check Point Harmony Email & Collaboration for a year, we haven't encountered significant challenges. However, it would be beneficial if it could support other email security services beyond Microsoft and Google. Integration with other platforms would enhance its appeal since the features are commendable. While the analytics are commendable, they don't provide deep dive insights. They show the overall counts of malware, phishing, and business compromise emails, but there isn't a robust ability to dive deeper into those categories to see specifics. Analytics should allow us to explore which users received malware emails the most or trends among departments. Currently, we have to sift through manually, which is not ideal. A more profound analytical capability would elevate the tool to become the complete email security solution for any user.
BernardLugalia - PeerSpot reviewer
Provides strong data protection with virtual patching and vulnerability assessments
I primarily use it to monitor database access, particularly in banking and similar environments. It ensures that IT personnel and others do not create unauthorized accounts or users. Collaboration security assists in tracking database access and alerts in case of suspicious activity One of the…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The deployment capability is a great feature."
"It gives us visibility into threats and, for endpoints, it helps us to prioritize threats. We used to have a lack of visibility, but now our time to detect and respond has decreased."
"The product is not resource-intensive."
"My experience deploying Microsoft Defender for Office 365 was seamless."
"Defender is a SaaS platform, so it offers more flexibility. Managing the permissions is easier. The solution's automated detection and response features are scalable."
"The good part is that you don't have to configure it, which is very convenient."
"Defender enables us to secure all 365-related activity from a single place. It gives us visibility into everything happening in Outlook, protecting us against phishing and other email-based threats. Defender helps us detect any suspicious behaviors."
"The basic features are okay and I'm satisfied with the Defender."
"The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great."
"The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic."
"The threat management database provides consistent updates."
"Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
"The main benefit is that hackers can't steal information."
"It is fast and quite effective in terms of preventing any security incidents."
"Its characteristics are adapted to the most modern threats."
"As a comprehensive solution, Check Point offers a very granular and best-in-class experience."
"The initial setup is simple."
"The auto-remediation feature is valuable."
"We have had very good results from the use of FireEye Email Security. We are very comfortable with this technology, but I don't know if it's necessary to move into the cloud, we will check other technologies and study them. Additionally, the solution has good integration."
"FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks."
"FireEye Email Security is easy to use."
"Trellix Collaboration Security is valued for being a stable and comprehensive solution that fulfills customer needs."
"One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment."
"The solution's most valuable feature is its simplicity. It's very user-friendly."
 

Cons

"The phishing and spam filters could use some improvement."
"Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment."
"I am generally satisfied with how it currently is. If I could improve anything, I would reduce the cost."
"Several simulation options are available within 365, and the phishing simulation could be better."
"There is a different console for different things; I just want one consolidated console."
"The visibility into threats is not up to the mark, as I do not have control. I rate my experience with Microsoft Defender for Office 365 as six out of ten due to troubleshooting and pricing concerns."
"The certification training for Defender for 365 needs to be deeper and incorporate Sentinel. I took all the security courses except one, and Sentinel isn't included."
"Sometimes, phishing emails manage to pass through the filter, so the system needs to enhance its phishing email detection capabilities."
"Support can be a bit quicker in helping the customer."
"There is a need for improvement in handling business email compromise."
"Some files are not scanned thoroughly due to occasional network failures."
"Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."
"There are a few areas for improvement. One is the occasional sluggishness or latency, which is likely due to the cloud-based nature of the solution. So, the performance can be better."
"The sanitization on the file needs improvement."
"The product's pricing needs improvement."
"Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
"Sometimes, integration can be challenging, impacting its stability, which is why I rate it a five out of ten."
"There is a need for improved integration with totally different products, such as a rapid server."
"The solution needs better support."
"I would like to see this solution become more flexible."
"I would rate them as a 1.5. The new hub created in India is not good."
"FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA."
"If they want to be the primary or best solution, they need to have better email management features."
"The reporting aspect of the solution needs improvement."
 

Pricing and Cost Advice

"The pricing has become expensive."
"The license is expensive because the cost is based on the number of users."
"It's a user-base subscription."
"The solution could be better by simplifying the business model of their licensing. It was hard to figure out how to get the licensing done for the environment, initially."
"Microsoft Defender for Office 365 comes with Microsoft Windows. It is free with the operating system."
"For licensing, it's usually a yearly package for customers who are subscribed to Office 365, but they can also pay on a monthly basis."
"Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
"I was working in the government and it was too expensive for us to use our Microsoft products."
"Do a full feature evaluation (interactive) with a support person. That is what I did."
"One of the nice features is that the licensing model is elastic, so if you go over your license count, you can add users during your billing cycle and true-up later."
"Reasonable cost, quick and easy implementation, and transparent."
"Having information stolen by a hacker would be more expensive than purchasing a license."
"The pricing is competitive."
"Usually, we pay for the licensing part on a yearly basis and not on a monthly basis. If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts."
"Due to its pricing, I would say that Check Point Harmony Email & Collaboration is more suitable for medium to enterprise organizations."
"You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost."
"The cost is very high."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The licensing is on a yearly basis."
"The solution requires a license to be purchased for every user."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
860,592 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
9%
Manufacturing Company
8%
Government
6%
Computer Software Company
19%
Financial Services Firm
8%
Manufacturing Company
7%
Healthcare Company
5%
Manufacturing Company
16%
Computer Software Company
14%
Government
9%
Comms Service Provider
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft Defender for Office 365?
Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of variou...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
Microsoft is quite affordable with a lot of features available for any size organization.
What needs improvement with Microsoft Defender for Office 365?
Microsoft could improve by offering recommendations for domain spoofing attacks, especially scenarios where DNS recor...
What is your experience regarding pricing and costs for Check Point Harmony Email & Office?
My experience with pricing, setup cost, and licensing for Check Point Harmony Email & Collaboration has been all ...
What is your primary use case for Check Point Harmony Email & Office?
My main use case for Check Point Harmony Email & Collaboration is to protect email against all zero-day threats, ...
What do you like most about Check Point Harmony Email & Office?
The product offers good and easy integration capabilities with other products.
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
I would like to see the addition of email digital protection features, such as anti-spam and antivirus, not just sand...
What is your primary use case for FireEye Email Security?
I have worked on Email Security ( /categories/email-security ) both on-premises and in the cloud, Web Security, and a...
 

Also Known As

MS Defender for Office 365
Check Point CloudGuard, Check Point CloudGuard SaaS , Check Point Harmony Email & Office
FireEye Email Security
 

Overview

 

Sample Customers

Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Helvetia, Denham Capital, Daymark Solutions, Neopharm Group
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Check Point Harmony Email & Collaboration vs. Trellix Collaboration Security and other solutions. Updated: June 2025.
860,592 professionals have used our research since 2012.