Compare Check Point Harmony Email & Collaboration and CloudSOC Cloud Access Security Broker (CASB)

At a Glance
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Star Rating
(513)4.6 out of 5
Market Segments
Mid-Market (59.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Check Point Harmony Email & Collaboration
CloudSOC Cloud Access Security Broker (CASB)
CloudSOC Cloud Access Security Broker (CASB)
Star Rating
(33)4.3 out of 5
Market Segments
Enterprise (50.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about CloudSOC Cloud Access Security Broker (CASB)
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Check Point Harmony Email & Collaboration excels in user satisfaction, boasting a significantly higher overall score compared to CloudSOC Cloud Access Security Broker. Users appreciate its seamless integration with platforms like Microsoft 365, which enhances security without hindering productivity.
  • According to verified reviews, CloudSOC Cloud Access Security Broker offers a robust set of features, including enterprise-grade data loss prevention and a cloud-native architecture. However, some users find the interface initially complex, requiring time to familiarize themselves with its functionalities.
  • Users say that Check Point Harmony provides excellent real-time threat prevention, effectively catching phishing attempts and spam. The clear visibility offered by its dashboard is frequently highlighted, making it easier for IT teams to manage policies and reduce user complaints about unwanted emails.
  • Reviewers mention that while CloudSOC provides strong data connectivity resources, it sometimes struggles with user experience, particularly in setup and ease of use. Users have noted that the learning curve can be steep, which may impact initial productivity.
  • G2 reviewers highlight Check Point Harmony's strong support and documentation, which contribute to a smoother implementation process. Users feel confident in the product's ability to protect sensitive information, thanks to its comprehensive reporting features.
  • According to recent feedback, CloudSOC's strengths lie in its advanced data security features, but it faces challenges in user engagement and support quality. Users have expressed a desire for improved guidance and resources to maximize the platform's potential.
Pricing
Entry-Level Pricing
Check Point Harmony Email & Collaboration
No pricing available
CloudSOC Cloud Access Security Broker (CASB)
No pricing available
Free Trial
Check Point Harmony Email & Collaboration
No trial information available
CloudSOC Cloud Access Security Broker (CASB)
No trial information available
Ratings
Meets Requirements
9.2
344
8.1
26
Ease of Use
9.1
353
8.1
26
Ease of Setup
9.2
288
7.9
17
Ease of Admin
9.3
257
8.1
17
Quality of Support
9.1
336
7.3
25
Has the product been a good partner in doing business?
9.3
251
8.0
17
Product Direction (% positive)
9.7
327
7.1
24
Features by Category
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
9.2
71
Not enough data
Administration
9.1
62
Not enough data
9.2
61
Not enough data
9.4
62
Not enough data
Governance
9.0
51
Not enough data
9.2
55
Not enough data
9.1
55
Not enough data
Security
9.3
53
Not enough data
9.1
53
Not enough data
9.3
58
Not enough data
9.2
54
Not enough data
9.0
196
Not enough data
Administration
9.0
157
Not enough data
9.1
161
Not enough data
9.0
149
Not enough data
8.8
126
Not enough data
Maintenance
9.0
152
Not enough data
9.2
164
Not enough data
9.0
141
Not enough data
8.6
118
Not enough data
Security
9.2
166
Not enough data
8.8
117
Not enough data
9.3
162
Not enough data
9.2
156
Not enough data
9.4
162
Not enough data
9.0
133
Not enough data
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
8.7
52
8.0
14
Analysis
8.9
35
7.8
10
8.7
34
7.4
9
8.8
37
7.8
10
Functionality
8.3
28
8.5
9
8.9
30
8.1
8
8.6
27
7.9
8
Security
8.7
37
8.0
9
8.1
36
8.7
9
8.8
32
8.0
9
8.7
35
8.0
9
8.9
59
7.4
12
Data Protection
9.1
48
7.4
7
9.1
52
8.3
7
9.0
53
8.6
7
9.2
53
7.7
8
9.0
50
7.1
8
Analysis
8.8
48
6.9
8
8.8
48
6.3
8
9.0
51
6.7
8
Administration
8.8
52
7.6
9
9.0
52
6.9
9
8.8
50
8.0
9
9.0
98
7.6
11
Security
9.0
70
Not enough data
9.1
84
7.5
6
9.0
79
7.9
7
9.2
82
7.4
7
Administration
9.1
87
7.4
7
8.7
75
7.5
6
9.0
78
8.3
6
Access Control
9.2
82
7.9
7
9.2
79
7.6
7
9.0
79
6.9
6
9.0
76
7.2
6
Intelligent Email ProtectionHide 12 FeaturesShow 12 Features
9.3
119
Not enough data
Administration
9.3
91
Not enough data
9.1
104
Not enough data
9.4
102
Not enough data
9.2
98
Not enough data
Detection
9.0
93
Not enough data
9.3
101
Not enough data
9.3
103
Not enough data
Protection
9.4
98
Not enough data
9.2
96
Not enough data
9.3
104
Not enough data
Agentic AI - Intelligent Email Protection
Not enough data
Not enough data
Not enough data
Not enough data
8.7
18
Not enough data
Encryption Techniques - Email Encryption
8.8
17
Not enough data
8.6
17
Not enough data
9.0
17
Not enough data
Authentication, Verification, and Access Controls - Email Encryption
8.7
17
Not enough data
8.8
16
Not enough data
8.6
16
Not enough data
8.9
17
Not enough data
Security Enhancements and Auditing - Email Encryption
8.9
17
Not enough data
8.8
16
Not enough data
9.2
16
Not enough data
8.3
16
Not enough data
Integration, Compatibility, and Usability - Email Encryption
8.8
16
Not enough data
8.1
15
Not enough data
8.9
15
Not enough data
8.5
17
Not enough data
7.5
12
Not enough data
Agentic AI - Email Anti-spam Features
7.7
11
Not enough data
7.3
11
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
CloudSOC Cloud Access Security Broker (CASB)
CloudSOC Cloud Access Security Broker (CASB)
Check Point Harmony Email & Collaboration and CloudSOC Cloud Access Security Broker (CASB) are categorized as Cloud File Security, Cloud Access Security Broker (CASB), and Cloud Data Security
Unique Categories
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration is categorized as Cloud Email Security, Data Loss Prevention (DLP), Email Anti-spam, Email Encryption, and Intelligent Email Protection
CloudSOC Cloud Access Security Broker (CASB)
CloudSOC Cloud Access Security Broker (CASB) has no unique categories
Reviews
Reviewers' Company Size
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Small-Business(50 or fewer emp.)
16.4%
Mid-Market(51-1000 emp.)
59.0%
Enterprise(> 1000 emp.)
24.6%
CloudSOC Cloud Access Security Broker (CASB)
CloudSOC Cloud Access Security Broker (CASB)
Small-Business(50 or fewer emp.)
21.4%
Mid-Market(51-1000 emp.)
28.6%
Enterprise(> 1000 emp.)
50.0%
Reviewers' Industry
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Information Technology and Services
17.1%
Computer & Network Security
9.3%
Financial Services
7.6%
Computer Software
3.9%
Higher Education
2.6%
Other
59.6%
CloudSOC Cloud Access Security Broker (CASB)
CloudSOC Cloud Access Security Broker (CASB)
Information Technology and Services
17.9%
Computer & Network Security
14.3%
Management Consulting
7.1%
Financial Services
7.1%
Electrical/Electronic Manufacturing
7.1%
Other
46.4%
Alternatives
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration Alternatives
Proofpoint Core Email Protection
Proofpoint Core Email...
Add Proofpoint Core Email Protection
Cisco Duo
Cisco Duo
Add Cisco Duo
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
Paubox
Paubox
Add Paubox
CloudSOC Cloud Access Security Broker (CASB)
CloudSOC Cloud Access Security Broker (CASB) Alternatives
Cisco Duo
Cisco Duo
Add Cisco Duo
BetterCloud
BetterCloud
Add BetterCloud
Virtru Email Encryption
Virtru Email Encryption
Add Virtru Email Encryption
CyberSentriq
CyberSentriq
Add CyberSentriq
Discussions
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration Discussions
What are the different types of email security?
2 Comments
Verified User
G2
Several types of email security measures that can be implemented to protect against various threats. Here are some of the most common types of email...Read more
What is Avanan Cloud Email Security used for?
1 Comment
rahul g.
RG
Avanan Cloud Email Security is used for to protecting email accounts from various threats, like- 1. Phishing emails: Detects and blocks fraudulent emails...Read more
What is cloud email security?
1 Comment
Verified User
G2
cloud email security is an essential component of a comprehensive cybersecurity strategy, particularly for businesses that rely on cloud-based email...Read more
CloudSOC Cloud Access Security Broker (CASB)
CloudSOC Cloud Access Security Broker (CASB) Discussions
Monty the Mongoose crying
CloudSOC Cloud Access Security Broker (CASB) has no discussions with answers