Try our new research platform with insights from 80,000+ expert users
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS
Real User
Top 5Leaderboard
Good DLP and threat prevention and helpful centralized management
Pros and Cons
  • "It is fast and quite effective in terms of preventing any security incidents."
  • "Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents."

What is our primary use case?

The company handles confidential information, such as clients' financial data, and it is important to keep that information secure to comply with certain regulations. 

One of the important challenges was to counteract the amount of phishing, ransomware attacks, and accidental leaks of information through email and collaboration applications.

We did not have a tool that would provide this security, so we chose to look for one and apply it to our environment.

How has it helped my organization?

The company handles a large amount of client information, some of which is confidential, including account numbers and sensitive information. This tool provides us with the features to meet the needs we have. 

One of these features is real-time threat prevention. It uses advanced analytics to detect and block malicious emails, phishing, and unwanted content before they reach inboxes. It also has DLP. This helps prevent the leak of information. In this way, we can reduce vulnerabilities.

What is most valuable?

The tool has many important features. Some of them are very valuable.

One of the most valuable is real-time prevention, which constantly analyzes and provides results. The leak control that comes with DLP is excellent. 

It provides us with a more centralized management where we can monitor everything that happens in our environment and in this way, can manage the security policies necessary for our organization in real time. 

It is fast and quite effective in terms of preventing any security incidents.

What needs improvement?

The product is a very effective tool. It provides a lot of security to ensure the confidentiality of the information.

Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents.

They should also improve the quality of technical support since, in the last few years, they have lowered the quality of SLA response and do not provide concise solutions. 

They should also generate a knowledge base where the unified information or the most common errors are found so as not to depend so much on support.

Buyer's Guide
Check Point Harmony Email & Collaboration
March 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.

For how long have I used the solution?

I have experience using the solution for four years.

What do I think about the stability of the solution?

The stability presents as efficient.

What do I think about the scalability of the solution?

The scalability is new; it is multi-cloud.

How are customer service and support?

The experience has not been very good since we have had problems with the SLA.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no previous solution in the organization.

How was the initial setup?

The initial implementation is complicated when you do not have experience with said tool.

What about the implementation team?

It was implemented with the seller and his engineer in charge, which was very fast and friendly.

What was our ROI?

The investment is somewhat high. However, it will provide security for all customer information.

What's my experience with pricing, setup cost, and licensing?

The tool is somewhat competitive with the others on the market. The installation has an average learning curve.

Which other solutions did I evaluate?

Several solutions were evaluated, such as Microsoft Defender for Office 365, Proofpoint Email Protection, and Cisco Secure Email.

What other advice do I have?

It is an excellent tool for information security. Before acquiring it, you must analyze whether it meets company needs.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ruan Kotze - PeerSpot reviewer
Head: Cloud Platform Security at BCX Namibia
Reseller
Top 5Leaderboard
Along with great technical support, the solution also offers phishing protection
Pros and Cons
  • "The most valuable feature of the solution is the phishing protection it offers."
  • "The solution fails to support hybrid deployments."

What is our primary use case?

My company uses Check Point Harmony Email & Collaboration to provide security for Office 365 email and collaboration apps like Teams, SharePoint, OneDrive, and other related tools.

What is most valuable?

The most valuable feature of the solution is the phishing protection it offers.

What needs improvement?

The solution fails to support hybrid deployments.

Currently, the solution supports cloud email only. It would be great if they could also support hybrid deployments.

For how long have I used the solution?

I have been using Check Point Harmony Email & Collaboration for three years. My company has a partnership with Check Point.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten since there were a few minor issues that were quickly resolved while the uptime of the product has not been 100 percent.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a ten out of ten.

I would say that probably around 50 percent of our customer base uses the solution.

How are customer service and support?

The solution's technical support is very good. I rate the technical support a ten out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

I rate the product's initial setup a nine out of ten since the setup phase is seamless 99 percent of the time. If the end user customized the Office 365 tenant a lot, then a manual setup might be required.

The solution is deployed on the public cloud while supporting cloud services from Google and Microsoft.

The deployment process of the solution takes about five minutes. It would probably take ten minutes if we consider from start to finish of the deployment process.

For deployment, there is a need to create an account in Check Point Infinity Portal, after which you can activate Harmony Email & Collaboration module and then provide the credentials to your Office 365 tenant, following which the integration process starts.

What's my experience with pricing, setup cost, and licensing?

I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive.

It is a reasonably priced product offering good value for money.

What other advice do I have?

I would say that since Check Point Harmony Email & Collaboration provides a two-week evaluation option, it's very easy to integrate into your environment in a read-only mode so that it doesn't interfere with your email. It just scans and then provides you a report afterward of the threats your solution has missed and what Check Point would have caught.

Check Point Harmony Email & Collaboration is a fantastic solution.

I rate the overall tool a ten out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
March 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
PRADIPJOSHI - PeerSpot reviewer
Owner at Shree Atharva Sales Corporation
Real User
Top 5Leaderboard
Reliable product with a straightforward setup process
Pros and Cons
  • "The product is reliable and sturdy."
  • "They must provide security to more email service providers."

What is most valuable?

The product is reliable and sturdy. It can be configured within five minutes and has minimal downtime. It provides an in-built API functionality. It supports chat and file sharing from solutions like OneDrive, SharePoint, Google Drive, and Dropbox. Additionally, it offers 100% protection for unified communication or collaboration to prevent hacking incidents like the Zoom hack.

What needs improvement?

They must provide security to Rediffmail and other email service providers. At present, it is limited to only two email services. They should also offer additional protection to Zoom, Cisco Webex, BlueJeans, and StarLeaf.

For how long have I used the solution?

We have been using Check Point Harmony Email & Collaboration for five to six days. However, we have been using Check Point for five to six years.

What do I think about the stability of the solution?

I rate the platform’s stability a ten out of ten.

What do I think about the scalability of the solution?

I rate the platform’s scalability a ten out of ten. It is suitable for small, medium, and large companies. Mostly, it will be helpful for small enterprises that can’t afford firewall solutions like Wireshark.

How are customer service and support?

Check Point has a good support system in our country. They are 100% customer-centric and have many support partners as well.

How was the initial setup?

It is straightforward to set up. We can deploy within five minutes.

What about the implementation team?

Check Point is a very user-friendly product. The customers can deploy it easily with some technical knowledge; they can take help for installation and programming for a nominal cost from the product partners.

What's my experience with pricing, setup cost, and licensing?

I rate the platform’s pricing a seven and a half.

What other advice do I have?

I rate Check Point Harmony Email & Collaboration a ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Shrinkhala Jain - PeerSpot reviewer
Project Consultant at a consultancy with 10,001+ employees
User
Great zero-day protection and very useful against data leaks and loss
Pros and Cons
  • "Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble."
  • "They could continue to offer more stringent security policy measures for threat point management."

What is our primary use case?

Check Point Harmony Email and Collaboration is the best security software that protects email and collaboration suites in one of the best possible way. It ensures the restriction of threat points and malware in a comprehensive manner. 

All our Google Workspace applications and Office 365 are thoroughly secured by the software. It's been a great experience so far. 

Multiple phishing activities and complete zero-day protection are all ensured through Check Point. 

Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble.

How has it helped my organization?

Check Point Harmony Email and Collaboration comes with end-to-end capabilities of system protection in a holistic manner. It is restricting the entry of phishing attacks, malware attacks, and ransomware threats. 

It ensures anti-phishing management effectively and prevents any data loss through encrypted database management. Bulletproof security is one of the best features which enables protection from the most sophisticated and evasive threat attacks. It claims to reduce phishing attempts by almost 100%

What is most valuable?

Zero-day protection of the cloud and email systems is possible with Check Point Harmony Email and Collaboration. It ensures anti-phishing management end to end, and with this product, there can not be any evasive attack of sophisticated malware and threats on the system. 

Data loss and leakage prevention are one of the best features as it ensures no data loss and that all confidential documents and information is secured forever.

Protection of all confidential and sensitive data base (DLP) is secured in the system forever with complete dashboard and data tracking management.

What needs improvement?

They could continue to offer more stringent security policy measures for threat point management. Their zero-day threat protection can be further strengthened to have better compliance control, as 1% data loss and data breaches are still possible through existing systems. Even this 1% carries the potential to harm the system for a long time. 

We should have more and more pilots of security systems across different business environments to have 100% security checks and compliance.

For how long have I used the solution?

It's been using the solution for about a year now.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

Technical support is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution. We started using this solution recently and have been happy with the experience so far.

How was the initial setup?

The setup was easy and straightforward.

What about the implementation team?

We implemented the solution through the vendor team.

What was our ROI?

We've seen an ROI of over 80%.

What's my experience with pricing, setup cost, and licensing?

The setup cost is significantly low and quite affordable currently as per other competitive software. Also, the renewal and licensing process is streamlined and not complicated at all.

Which other solutions did I evaluate?

We evaluated a lot of alternatives simultaneously. Some of them included ESET Protect, Forcepoint DLP, Sentinel, and Kaspersky Endpoint Security, among others.

What other advice do I have?

I'd advise new users to go for a trial of Check Point Harmony Email and Collaboration software and use it to its fullest to understand the capabilities at its best practices.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Integrates with Office365, strengthens security, and provides visibility
Pros and Cons
  • "It is fast and has a very simple, easy integration."
  • "Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult."

What is our primary use case?

Our company uses Office 365 and clearly, we use Outlook. We needed a tool that had the functionality to verify and validate the emails that enter and leave our organization. With this tool, we can solve security problems since many of the collaborators work from home. With this, we have decreased phishing attacks. It offers quite a few types of analysis and reporting that help to clear up security doubts and how to counter these gaps.

Check Point Harmony Email & Collaboration is workload protection in the cloud. This firewall helps us provide controls on our organization's devices and has become our main tool in the analysis and coverage of the infrastructure and also maintains fairly reasonable scalability.

How has it helped my organization?

Check Point Harmony Email & Collaboration has helped our company with perimeter security and securing our employees from wherever they are working. It's strengthening security as it is able to stop phishing attacks on Office 365 accounts and block possible account hijacking. It is also responsible for detecting malicious files in both OneDrive and SharePoint. This makes the product more robust and also gives us visibility into suspicious access, and provides the areas from which they are trying to enter. With this other feature, it provides more integrity to our company.

What is most valuable?

We have found several features that are very valuable. One of them is the integration with Office365. In addition to that, it is fast and has a very simple, easy integration. In addition to that, it integrates with other Office 365 products. The false positives are minimal, almost nil. That is very important since it will not generate an absurd amount of emails. The functionality of the tool is very easy to configure and manage. The platform is friendly and makes its integrations even more, so this tool is very efficient.

What needs improvement?

Check Point Harmony Email & Collaboration presents a problem similar to the other Check Point tools that it was able to manage, and that is the access to its administrative functions. Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult. 

It presents problems in the management of technical support since the SLA is not optimal, causing delays. This means that security problems may arise since it does not provide a quick response or a concrete solution.

For how long have I used the solution?

I have been using it for approximately 4 years

What do I think about the stability of the solution?

The tool stability is very good.

What do I think about the scalability of the solution?

The scalability that the solution presents is very good. It is quite scalable.

How are customer service and support?

The experience has not been very pleasant since we have opened cases and they take too much time to respond or schedule a meeting even to provide a solution.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no other solution implemented.

How was the initial setup?

The initial configuration was very simple and fast.

What about the implementation team?

During the implementation, the provider's team helped us, and it was very efficient; they knew what they were doing

What was our ROI?

The functionality that the tool presents with its characteristics and capabilities helped us a lot in our organization.

What's my experience with pricing, setup cost, and licensing?

Like all security tools, they are expensive tools. However, Check Point competes in the market and its accessibility is good, so paying for a tool that provides security is worth it.

Which other solutions did I evaluate?

The company has already had several Check Point tools. For this reason, this tool was implemented to keep in line with the same brand and hopefully not present us with problems if we implement another one.

What other advice do I have?

The only advice is to improve the technical support for your users since it is not very efficient.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2584944 - PeerSpot reviewer
Senior Information Security Engineer at Glidewell Laboratories
User
Top 10
Good for preventing phishing with a nice dashboard and Explore page
Pros and Cons
  • "The dashboard provides information to investigate more about malicious activity and blocked emails."
  • "It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files."

What is our primary use case?

We use the solution to prevent any phishing emails from reaching out to the end users. We also use it for URL protection and DLP, to protect the end users from ransomware attacks, and to avoid any issues that halt business activities.

We used to have another solution for email security and we used to find so many issues while using it. We could not stop some phishing emails from getting into the user's mailbox and were worried about losing data. We had to work on fine-tuning the solution all the time to avoid the issues. We came to know about Check Point and wanted to try for email security.

How has it helped my organization?

We have blocked more phishing emails since we started using Check Point. The solution works brilliantly in filtering and the amount of information provided is unmatched and helped us in various ways. 

The Explore page provides multiple options for searching for emails and other information. Quarantine/removing from Quarantine has become so easy with search options

The dashboard provides information to investigate more about malicious activity and blocked emails. 

Check Point has become our go-to solution for most of our issues.

What is most valuable?

We like the email search options, availability of information on various aspects, algorithms, and AI models that provide pretty useful data - and the list goes on!

The email search/explore option helped us find the required emails and logs easily with multiple filters to use. 

Information provided in each and every email is very useful for investigating any activity. We do not have to use multiple websites for that information since everything is provided in Check Point itself. 

AI-based models and algorithms provide more accurate and useful information.

What needs improvement?

It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files. That will help in creating more filters and analyzing the data.

Providing more Training videos and documentation will be helpful for beginners to understand how checkpoint works. 

For how long have I used the solution?

I've used the solution for the past eight months.

Which solution did I use previously and why did I switch?

We used some other email security tools and we used to have multiple issues with email filtering and available information. We do not see any of those issues after using Check Point.

What's my experience with pricing, setup cost, and licensing?

We are good with the licensing.

Which other solutions did I evaluate?

We directly chose Check Point since we could not find any better alternative.

What other advice do I have?

It is the perfect one-stop solution for securing the organization!

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at IRMA Anand
User
Good support, impressive performance, and helps prevent data loss
Pros and Cons
  • "It helped us to bring security compliance and ensure system robustness throughout."
  • "The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."

What is our primary use case?

Check Point Harmony Email and Collaboration is a one-stop solution for providing the best enterprise security and protecting systems and mail servers from malware and threat attacks. 

Also, It helps in URL protection and DLP quite efficiently without any issues. 

It provides real-time protection to users and their devices from any incoming potential threats and malware sources. 

It helps in bringing security compliance to the system end to end. 

It permanently blocks phishing websites and any ransomware attacks. 

We find that it protects all confidential information from any sort of data leak and ensures data robustness and keeps everything intact in the system.

How has it helped my organization?

It helped us to bring security compliance and ensure system robustness throughout. 

It suspends and proactively blocks the malicious ransomware and threats before reaching the inbox. 

The product prevents data loss or data theft and ensures that the system is secured end to end without any trouble. 

Its API integration with other portals and applications goes smoothly without any hiccups. 

They provide bulletproof security to systems and email servers and ensure round-the-clock security for cloud email servers and other collaborating applications. 

It's an all-in-one security solution for businesses in this current era.

What is most valuable?

All the features offer great utility, and their performance is quite impressive. 

They have more secure applications than cloud-native security and have a higher security compliance rate. Also, the prevention of systems and servers from phishing attacks and system threats is proactively traceable and immediately diffused with a catchment rate of almost 99.99%, which is great in today's era of cyber threats and attacks. 

Their sound features of security for account protection and data leak protection works great for us, and we never face any compatibility or lag issue while working on the software. 

What needs improvement?

I would love to have their ticket resolution process as fast as possible. Fast and accurate ticket resolution can be a game changer for any industry, and the performance and confidence of clients go hand in hand with improved performance efficacy. This will definitely attract more loyal clients, and it helps with retention for longer periods.

The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally.

For how long have I used the solution?

I've been using the solution for precisely two years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The product is scalable and gives users a great opportunity to replicate as well.

How are customer service and support?

Customer service and support are good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first time we are using a solution of this kind formally.

How was the initial setup?

The setup was straightforward and easy.

What about the implementation team?

We implemented the product through our in-house team.

What was our ROI?

The ROI is always better than other alternatives.

What's my experience with pricing, setup cost, and licensing?

Check Point solutions are cost-effective and can be used effortlessly without any hassle. The renewal process for agreement is quite easy and can be done online easily. Licensing is smooth and price affordability is just great and can be recommended to all small and marginal start-up organizations for trial.

Which other solutions did I evaluate?

A lot of security solutions were evaluated. We evaluated Cyber Protect Cloud, Duo Security, Splunk, etc.

What other advice do I have?

This is a must-have solution for all enterprises. People should try it now.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
CTO & Co-Founder at Cyber Strategic
Reseller
Top 10
Offers an API that adds significant value to the email session
Pros and Cons
  • "In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication."
  • "It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products."

What is our primary use case?

Basically, it protects email services like Office 365 or G-Suite as well as business communication like Slack and Teams, and offers advanced protection against phishing and attachments even before they reach the mailbox. It also includes a DLP (Data Loss Prevention) feature that can be configured to prevent sensitive information from leaving the organization via email. Additionally, it provides advanced security measures to protect against account takeover. 

The email protection piece utilizes an API rather than an agent, which is more basic. This API-based approach allows for greater flexibility and integration with other systems. You can also configure it to send suspicious items to a sandbox environment for further analysis if you're not comfortable relying solely on the automated solution.

What is most valuable?

The API is super valuable because it's not really embedded in the email session. It's more like it comes in, and before it hits your mailbox, Check Point inspects it.

Many products require running it through a specific Web Gateway or some kind of intermediate box like Barracuda, or an agent installed on Outlook among many ways. Check Point is more advanced, so it's up there with the best. In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication. It also covers collaboration tools like OneDrive, Dropbox, and Box. That's the collaboration part.

What needs improvement?

It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products. For example, there are other collaboration tools besides Box and Slack that they could explore.

For how long have I used the solution?


What do I think about the stability of the solution?

The stability is excellent. Check Point is a company that has acquired matured technology from other companies and integrated it pretty well. I've seen integrations from other companies that were lacking, but Check Point has done a great job. 

Check Point has also developed its own solutions based on its security knowledge and experience. Being an Israeli company, they have access to some of the best resources in the field. 

What do I think about the scalability of the solution?

Scalability is a significant component of Check Point, as it is built for companies of any size.

How are customer service and support?

The customer service and support team is great. I never had a problem with them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used to work as an IT manager in a biotech company that utilized Check Point, which is why I've always liked their product. It's designed for complex environments and connecting multiple branches. It can be challenging for many companies, but it's intended to handle such complexities. Overall, Check Point Harmony Email & Collaboration is a great product.

How was the initial setup?

The initial setup is very straightforward. It's actually quite easy to set up and configure because the system handles everything. You don't have to install anything separately. You install the agent for the whole solution, and you can choose to enable or disable the email component. Then you simply configure a few settings, and you're done. The real action happens in how it handles incoming emails.

What's my experience with pricing, setup cost, and licensing?

The security solutions of which Email and Collaboration are a part is competitive because Check Point competes on both technology and price.

Check Point often competes with companies like Microsoft, Sophos, and CrowdStrike. Check Point offers competitive prices. Some companies may advertise lower prices, but they exclude essential components like email security or browser security, which you need to pay extra for and in the end they cost the same or even more. 

So the pricing is highly competitive. It's comparable to other companies of the same caliber, such as Microsoft and CrowdStrike. However, with all of them, if you opt for managed services, the pricing can vary, becoming more of a black box. It's usually not publicly published and is often negotiated based on specific needs. Similar to storage pricing, you need to be aware of the details and negotiate. But overall, the pricing is excellent and on par with other leading solutions. 

When comparing Check Point with lesser-known products like Kaspersky and others, it's important to consider the target market. If you're dealing with multinational corporations, or hospital systems, their requirements differ, from smaller companies, and they may be considering solutions from SentinelOne, CrowdStrike, Sophos, or Cylance, however, you have to make sure the product offers all the specific components like email or browser security that Check Point provides. Check Point is known for its comprehensive range of solutions, including firewalls, which can be deployed to endpoints.

What other advice do I have?

I would give it a nine out of ten. It's a great product overall. I hesitate to give any company a perfect ten because there's always a chance of unexpected issues arising in the future. But so far, I haven't encountered any problems with Check Point. It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products. For example, there are other collaboration tools besides Box and Slack that they could explore.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2025
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.