Compare Check Point Harmony Email & Collaboration and Mimecast Advanced Email Security

Save your comparisonKeep these tools in one place and come back anytime.
Save to board
At a Glance
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Star Rating
(511)4.6 out of 5
Market Segments
Mid-Market (58.6% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Check Point Harmony Email & Collaboration
Mimecast Advanced Email Security
Mimecast Advanced Email Security
Star Rating
(320)4.4 out of 5
Market Segments
Mid-Market (68.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Mimecast Advanced Email Security
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Check Point Harmony Email & Collaboration excels in ease of use, with users appreciating its intuitive dashboard that simplifies policy management and provides clear visibility into threats. This user-friendly experience is particularly beneficial for IT teams, as it reduces the time spent on spam complaints.
  • Users say that Mimecast Advanced Email Security offers robust protection against phishing and malware, with its AI-powered multi-layer detection being a standout feature. Reviewers highlight its effectiveness in identifying unknown emails and blocking spam, making it a reliable choice for organizations focused on security.
  • According to verified reviews, Check Point Harmony Email & Collaboration integrates seamlessly with platforms like Microsoft 365, enhancing security without disrupting productivity. Users appreciate this integration, which adds an extra layer of protection while maintaining smooth communication.
  • Reviewers mention that Mimecast Advanced Email Security is easy to manage, with an intuitive interface that facilitates daily monitoring and policy updates. This ease of management is a significant advantage for teams looking to streamline their email security processes.
  • G2 reviewers highlight that Check Point Harmony Email & Collaboration provides real-time threat prevention and clear reporting, instilling confidence in users regarding the safety of sensitive information. This proactive approach to security is a key factor for organizations prioritizing data protection.
  • Users report that while Mimecast Advanced Email Security is effective in spam and virus defense, it faces challenges in ease of setup compared to Check Point Harmony Email & Collaboration, which is noted for its quick implementation process. This difference can impact the initial experience for new users.
Pricing
Entry-Level Pricing
Check Point Harmony Email & Collaboration
No pricing available
Mimecast Advanced Email Security
No pricing available
Free Trial
Check Point Harmony Email & Collaboration
No trial information available
Mimecast Advanced Email Security
Free Trial is available
Ratings
Meets Requirements
9.2
342
9.0
252
Ease of Use
9.1
350
8.0
258
Ease of Setup
9.2
285
8.0
206
Ease of Admin
9.3
257
7.9
206
Quality of Support
9.1
334
8.3
245
Has the product been a good partner in doing business?
9.3
251
8.7
205
Product Direction (% positive)
9.7
324
8.9
246
Features by Category
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
9.2
71
Not enough data
Administration
9.1
62
Not enough data
9.2
61
Not enough data
9.4
62
Not enough data
Governance
9.0
51
Not enough data
9.2
55
Not enough data
9.1
55
Not enough data
Security
9.3
53
Not enough data
9.1
53
Not enough data
9.3
58
Not enough data
9.2
54
Not enough data
9.0
196
8.5
139
Administration
9.0
157
8.0
117
9.1
161
8.4
121
9.0
149
8.2
117
8.8
126
8.2
101
Maintenance
9.0
152
8.1
116
9.2
164
8.9
122
9.0
141
8.5
108
8.6
118
8.6
115
Security
9.2
166
9.0
134
8.8
117
8.2
110
9.3
162
9.0
129
9.2
156
8.8
124
9.4
162
8.8
127
9.0
133
7.7
88
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
8.6
52
Not enough data
Analysis
8.9
34
Not enough data
8.7
33
Not enough data
8.8
36
Not enough data
Functionality
8.3
27
Not enough data
8.9
29
Not enough data
8.6
26
Not enough data
Security
8.7
36
Not enough data
8.0
35
Not enough data
8.8
31
Not enough data
8.7
34
Not enough data
8.9
59
Not enough data
Data Protection
9.1
47
Not enough data
9.1
51
Not enough data
9.0
52
Not enough data
9.1
52
Not enough data
9.0
49
Not enough data
Analysis
8.8
47
Not enough data
8.8
47
Not enough data
9.0
50
Not enough data
Administration
8.8
51
Not enough data
9.0
51
Not enough data
8.8
49
Not enough data
9.0
98
Not enough data
Security
9.1
69
Not enough data
9.1
83
Not enough data
9.0
78
Not enough data
9.2
81
Not enough data
Administration
9.1
86
Not enough data
8.7
74
Not enough data
9.0
77
Not enough data
Access Control
9.2
81
Not enough data
9.1
78
Not enough data
9.0
78
Not enough data
9.0
75
Not enough data
Intelligent Email ProtectionHide 12 FeaturesShow 12 Features
9.3
119
8.7
138
Administration
9.3
91
8.5
112
9.1
104
8.6
124
9.4
102
9.1
127
9.2
98
8.9
127
Detection
9.0
93
8.3
115
9.3
101
8.5
119
9.3
103
8.9
126
Protection
9.4
98
9.0
125
9.2
96
9.0
130
9.3
104
9.1
133
Agentic AI - Intelligent Email Protection
Not enough data
7.9
8
Not enough data
8.1
8
Not enough data
8.9
135
Functionality
Not enough data
9.1
133
|
Verified
Not enough data
9.2
133
|
Verified
Not enough data
8.8
133
|
Verified
Not enough data
9.0
131
|
Verified
Not enough data
9.0
131
|
Verified
Not enough data
9.1
126
|
Verified
Not enough data
9.0
129
|
Verified
Not enough data
8.8
123
|
Verified
Not enough data
8.5
130
|
Verified
Not enough data
Feature Not Available
Agentic AI - Secure Email Gateway
Not enough data
Not enough data
8.7
18
Not enough data
Encryption Techniques - Email Encryption
8.8
17
Not enough data
8.6
17
Not enough data
9.0
17
Not enough data
Authentication, Verification, and Access Controls - Email Encryption
8.7
17
Not enough data
8.8
16
Not enough data
8.6
16
Not enough data
8.9
17
Not enough data
Security Enhancements and Auditing - Email Encryption
8.9
17
Not enough data
8.8
16
Not enough data
9.2
16
Not enough data
8.3
16
Not enough data
Integration, Compatibility, and Usability - Email Encryption
8.8
16
Not enough data
8.1
15
Not enough data
8.9
15
Not enough data
8.5
17
Not enough data
7.5
12
Not enough data
Agentic AI - Email Anti-spam Features
7.7
10
Not enough data
7.2
10
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Mimecast Advanced Email Security
Mimecast Advanced Email Security
Check Point Harmony Email & Collaboration and Mimecast Advanced Email Security are categorized as Cloud Email Security and Intelligent Email Protection
Unique Categories
Mimecast Advanced Email Security
Mimecast Advanced Email Security is categorized as Secure Email Gateway and Browser Isolation
Reviews
Reviewers' Company Size
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Small-Business(50 or fewer emp.)
16.7%
Mid-Market(51-1000 emp.)
58.6%
Enterprise(> 1000 emp.)
24.7%
Mimecast Advanced Email Security
Mimecast Advanced Email Security
Small-Business(50 or fewer emp.)
15.7%
Mid-Market(51-1000 emp.)
68.4%
Enterprise(> 1000 emp.)
16.0%
Reviewers' Industry
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Information Technology and Services
17.1%
Computer & Network Security
8.9%
Financial Services
7.6%
Computer Software
3.9%
Higher Education
2.6%
Other
59.9%
Mimecast Advanced Email Security
Mimecast Advanced Email Security
Legal Services
9.3%
Information Technology and Services
8.0%
Financial Services
6.4%
Construction
4.5%
Computer Software
4.2%
Other
67.6%
Alternatives
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration Alternatives
Proofpoint Core Email Protection
Proofpoint Core Email...
Add Proofpoint Core Email Protection
Cisco Duo
Cisco Duo
Add Cisco Duo
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
Paubox
Paubox
Add Paubox
Mimecast Advanced Email Security
Mimecast Advanced Email Security Alternatives
Proofpoint Core Email Protection
Proofpoint Core Email...
Add Proofpoint Core Email Protection
SpamTitan Email Security
SpamTitan Email Security
Add SpamTitan Email Security
Cloudflare One (SASE)
Cloudflare One (SASE)
Add Cloudflare One (SASE)
Cisco Secure Email Threat Defense
Cisco Secure Email Threat...
Add Cisco Secure Email Threat Defense
Discussions
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration Discussions
What are the different types of email security?
2 Comments
Verified User
G2
Several types of email security measures that can be implemented to protect against various threats. Here are some of the most common types of email...Read more
What is Avanan Cloud Email Security used for?
1 Comment
rahul g.
RG
Avanan Cloud Email Security is used for to protecting email accounts from various threats, like- 1. Phishing emails: Detects and blocks fraudulent emails...Read more
What is cloud email security?
1 Comment
Verified User
G2
cloud email security is an essential component of a comprehensive cybersecurity strategy, particularly for businesses that rely on cloud-based email...Read more
Mimecast Advanced Email Security
Mimecast Advanced Email Security Discussions
Has anyone implemented ingesting the Audit logs from Mimecast into Graylog?
3 Comments
CH
I have not, I just use the built in alerts and mxtoolbox for mail flow.Read more
What is Mimecast Email Security with Targeted Threat Protection used for?
2 Comments
Devang G.
DG
Mimecast Email Security with Targeted Threat Protection is used to defend against phishing, malware, ransomware, and impersonation attacks.... It provides...Read more
Monty the Mongoose crying
Mimecast Advanced Email Security has no more discussions with answers