Try our new research platform with insights from 80,000+ expert users
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Top 5
Easy to deploy with simple integration and straightforward management
Pros and Cons
  • "The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great."
  • "We understand that false positives are always there, but sometimes the notifications are more than expected."

What is our primary use case?

We acquired Check Point Harmony to protect our email environment in Office 365. In general terms, the false positives rate has stayed low, and detection rates and successful threat preventions have increased. It filters malicious emails, cleans documents, and effectively prevents phishing attacks. These processes happening in the cloud give peace of mind that the protective actions are taking place before they reach the endpoint, making it safer and adding layers of protection key to keeping the network safe.

How has it helped my organization?

A lot of these attacks and malware now come hidden in ways we expect the least, and since we never think we'll be targets of a cyber attack, this makes us vulnerable to them. Check Point Harmony gives us great visibility of the threats we are being exposed to, where they are coming from and what were they targeting, giving visibility of the weak gateways that could lead to an infection or a leakage. Management is easy, and integration is too, support is good, and the steps followed to set it up were very simple.

What is most valuable?

The previous solution we had for email protection required a lot of investment from us, both money and time-wise. 

The software is easy to deploy and maintain, and the administration and operation of it require very few interventions from the IT team. 

The solution also integrates amazingly with our network's server environment for collaboration and email apps. The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great.

What needs improvement?

We understand that false positives are always there, but sometimes the notifications are more than expected. We've seen clean emails being blocked, thanks to this. 

There are some delays when applying new administrative functions. Sometimes going through the documentation is complex and can be a bit confusing; reporting from the dashboard could get some improvements, too. However, in general, we feel satisfied with Email and Collaboration as it delivers the expected results regarding threat prevention. 

Buyer's Guide
Check Point Harmony Email & Collaboration
November 2024
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,636 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for more than three years.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Network Engineer at LTTS
Real User
Good protection against zero-day attacks and offers DLP features
Pros and Cons
  • "This DLP is very useful, as it gives our users additional protection."
  • "We are unable to export the reports from the dashboard, and if it is possible to do then it is not intuitive."

What is our primary use case?

As users of Office 365, we are using CloudGuard SaaS to protect this cloud application. We knew that to do so, we would need a very good solution. CloudGaurd SaaS prevents malware and zero-day attacks/threats from attacking our SaaS users.

We have 17k+ users and all of them are using Office 365 for email. That's the reason we have implemented the Check Point CloudGuard SaaS solution. We needed protection, and it is working fine as per our requirement.

How has it helped my organization?

When we moved from an on-premises email solution to Office 365, we no longer had protection against malware or zero-day level attacks. With this SaaS, we prevent these problems, and also, we protect our users against phishing attacks, identity theft, have DLP support, and even SaaS shadow IT discovery protection.

We can say that with Check Point Cloud Guard SaaS, we have improved our security to the next level. Our users and business are more secure, and overall, this is a very impressive solution for us.

What is most valuable?

If you have Check Point Cloud Guard SaaS solution in place, 90% to 95% of the work in protecting your system is complete. There are some additional features that also help including Zero Day, Phasing, Identity Protection, and DLP, which provides us additional protection for our users.

This DLP is very useful, as it gives our users additional protection.

What needs improvement?

We are unable to export the reports from the dashboard, and if it is possible to do then it is not intuitive.

For how long have I used the solution?

We are using Check Point CloudGuard SaaS for the last four to five months.

What do I think about the stability of the solution?

Stability-wise, this is a good product.

What do I think about the scalability of the solution?

We have more than 17,000 users and have not faced any issue from a scalability point of view

What's my experience with pricing, setup cost, and licensing?

The cost of this product huge and it should be lowered because all organizations are going to be using cloud services. If it were more affordable then more organizations can rely on it to make them secure.

This is a very good product if you are on the cloud, but the price is a little more expensive.

What other advice do I have?

As per current threats or malware behaviors, most of the attacks or viruses are coming from email only, and if you have no such solution to protect or prevent it then you are in big trouble.

Overall, this is a good product and it has very little we have found that needs to improve.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
November 2024
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,636 professionals have used our research since 2012.
PRADIPJOSHI - PeerSpot reviewer
Owner at Shree Atharva Sales Corporation
Real User
Top 5
Reliable product with a straightforward setup process
Pros and Cons
  • "The product is reliable and sturdy."
  • "They must provide security to more email service providers."

What is most valuable?

The product is reliable and sturdy. It can be configured within five minutes and has minimal downtime. It provides an in-built API functionality. It supports chat and file sharing from solutions like OneDrive, SharePoint, Google Drive, and Dropbox. Additionally, it offers 100% protection for unified communication or collaboration to prevent hacking incidents like the Zoom hack.

What needs improvement?

They must provide security to Rediffmail and other email service providers. At present, it is limited to only two email services. They should also offer additional protection to Zoom, Cisco Webex, BlueJeans, and StarLeaf.

For how long have I used the solution?

We have been using Check Point Harmony Email & Collaboration for five to six days. However, we have been using Check Point for five to six years.

What do I think about the stability of the solution?

I rate the platform’s stability a ten out of ten.

What do I think about the scalability of the solution?

I rate the platform’s scalability a ten out of ten. It is suitable for small, medium, and large companies. Mostly, it will be helpful for small enterprises that can’t afford firewall solutions like Wireshark.

How are customer service and support?

Check Point has a good support system in our country. They are 100% customer-centric and have many support partners as well.

How was the initial setup?

It is straightforward to set up. We can deploy within five minutes.

What about the implementation team?

Check Point is a very user-friendly product. The customers can deploy it easily with some technical knowledge; they can take help for installation and programming for a nominal cost from the product partners.

What's my experience with pricing, setup cost, and licensing?

I rate the platform’s pricing a seven and a half.

What other advice do I have?

I rate Check Point Harmony Email & Collaboration a ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Good security and integration but needs better documentation
Pros and Cons
  • "We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
  • "They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response."

What is our primary use case?

Our corporate environment requires business protection for email and our collaboration tools to avoid threats, spam, and ransomware, among other threats coming in through email. This could have great effects on our systems and equipment.

With Check Point, we can protect our data in the cloud with tools such as One Drive, among others.

The tool works with different manufacturers, which provides great reliability.

How has it helped my organization?

Check Point has helped us improve our security layer with this complete cloud solution. We no longer depend on a Gateway as it is a complete solution that helps us prevent any type of threat that travels through email.

We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point.

We also really like its centralized environment since the Check Point Infinity Portal really centralizes everything.                 

What is most valuable?

The platform offers advanced security measures to protect emails from cyber threats such as phishing attacks, malware, and ransomware.

The platform is cloud-based, which means users can access their emails and collaboration tools from anywhere and on any device.

The security of collaboration tools is great.

The platform integrates with other productivity and collaboration tools like Microsoft Office, Slack, and Zoom.

What needs improvement?

Maybe they could integrate the solution with Avanan. Doing that would really make it a very robust solution.

They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response.

The solution lacks public documentation and some documentation is not so clear, which means that the client does not understand the implementation that must be carried out.

You can only see the costs through a Check Point partner.                           

For how long have I used the solution?

This is a very productive tool. We used it for a few months. It really helped us protect against threats in email and Microsoft collaborative tools.

Which solution did I use previously and why did I switch?

Previously we did not use more than the security provided by Microsoft itself. We have since changed to Check Point.

What's my experience with pricing, setup cost, and licensing?

As for the cost, it is per protected user. It seems good to me in that aspect however, the issue of implementation sometimes costs a bit. That's okay if it can be done correctly. The licenses are easy to acquire.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2107347 - PeerSpot reviewer
Project Manager at UFINET
User
reduced phishing attacks, blocks malicious mail, and removes likelihood of data loss
Pros and Cons
  • "Email security has improved since we deployed this platform."
  • "Some undefined threats can bypass the security system when there is a networking failure in the organization."

What is our primary use case?

Check Point Harmony Email and Collaboration has enabled my team to implement projects and tasks effectively. 

It provides a reliable communication pathway that cannot be compromised by cyber attacks. 

It protects confidential data from leaving an organization without a proper channel. It keeps our emails in a unified environment that is secure and highly safeguarded by strong security tools. 

There are advanced collaboration techniques enhanced by this platform in the enterprise. It prevents account takeover and always keeps my colleagues under safe network infrastructure.

How has it helped my organization?

Email security has improved since we deployed this platform. 

This platform has enhanced faster file sharing and improved the collaboration network systems. 

Securing business lines has reduced cases of fraud that used to affect workflows. API connection has enabled us to integrate this platform with applications for the efficient implementation of business programs. 

Sending and receiving emails has been reliable and always productive, with zero phishing attacks. 

Full email protection of both cloud and on-premise emails has reduced the chances of losing data to zero.

What is most valuable?

Bulletproof Security catches up with all types of cyber attacks that can lead to account takeover and data compromisation. The entire networking system is secured with end-to-end encryption that enhances the secure flow of data. 

The superior data catch rate has reduced phishing attacks by a high rate of almost 100%, which has boosted productivity. 

It blocks malicious emails that wreak havoc and destroy valuable data in the systems. 

Employees can focus on more productive roles without fear of being attacked by external factors.

What needs improvement?

Some undefined threats can bypass the security system when there is a networking failure in the organization. 

The next release should have a fixed system that can categorize the various levels of viruses. 

The detection of threats before they reach inboxes has enhanced reliable communication among teams. 

The malware protection system has to be upgraded to catch up with various current threats that can easily affect our systems without precautions. 

Email and collaboration safety has been a great step that we have achieved from the performance of this platform, and I totally recommend it to others.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

This tool is highly powerful in blocking phishing attacks and ransomware attacks.

What do I think about the scalability of the solution?

I love the great performance of this platform.

How are customer service and support?

The customer support staff provides reliable services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the main email and collaboration platform that I have worked with.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

The implementation was done by the vendor.

What was our ROI?

The rate of ROI has increased from 40% to 60%.

What's my experience with pricing, setup cost, and licensing?

The setup cost is good and highly efficient.

Which other solutions did I evaluate?

I have not come across another powerful platform like this one.

What other advice do I have?

I am satisfied with the security measures that have been enhanced by this tool.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Alejandro Flores. - PeerSpot reviewer
Director de Ingenieria at Smartelecom SA de CV
MSP
Top 5
Granular with good integration capabilities and helpful support
Pros and Cons
  • "I like the fact that having granular information about the potential threats is received in email."
  • "They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."

What is our primary use case?

We use the solution for SaaS protection for 10,000 Gsuite users. How collaborators process data with sensitive information and information leaks was a constant concern. The collaboration solution allows you to have visibility of the entire SaaS environment and create customized security profiles to give optimal treatment to the information. This solution allows you to have very granular visibility at all times; this is of utmost importance as it allows you to make immediate and precise decisions about the security environment.

How has it helped my organization?

This solution has allowed us to have visibility of the security environment for the business and has allowed us to have specific treatment by users, user groups, and departments of the information that is processed. This allows users to be certain that their information is protected. Certain security problems were detected. Without this solution at the SaaS level would have been impossible to detect so there has been an improvement in the treatment of the attack surface and the protection of valuable data.

What is most valuable?

There are several features that were considered valuable. For example, the fact that the installation and integration of the solution with SaaS tools were very fast and highly recognized by SaaS administrators. I like the fact that having granular information about the potential threats is received in email. Being able to protect information repositories was of great interest to decision-makers. It was also possible to implement an entire environment in record time. Having this information allowed us to better model the attacking surface.

What needs improvement?

They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment). 

Reports should be presented in such a way that they are readable by non-technical work groups who are involved in information protection and who may misread the information on the dashboard and make incorrect decisions.

For how long have I used the solution?

I've used the solution for four months.

What do I think about the stability of the solution?

The product is very stable; it is a cloud solution and we have not had any operational incidents.

What do I think about the scalability of the solution?

The solution is very scalable since you only have to add licenses.

How are customer service and support?

They offer good support; you have several support options depending on the SLA you need.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup is very straightforward and very fast; it took about 20 minutes.

What about the implementation team?

The setup involved a mix of personnel and Check Point SE are experts in the area of ​​security.

What's my experience with pricing, setup cost, and licensing?

The setup was very fast; the license scheme was very easy to understand.

Which other solutions did I evaluate?

We also evaluated the PAN solution and Fortinet.

What other advice do I have?

I consider it to be a cost-effective solution that focuses on security and is a highly recommended and easy-to-use option.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
CTO & Co-Founder at Cyber Strategic
Reseller
Top 10
Offers an API that adds significant value to the email session
Pros and Cons
  • "In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication."
  • "It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products."

What is our primary use case?

Basically, it protects email services like Office 365 or G-Suite as well as business communication like Slack and Teams, and offers advanced protection against phishing and attachments even before they reach the mailbox. It also includes a DLP (Data Loss Prevention) feature that can be configured to prevent sensitive information from leaving the organization via email. Additionally, it provides advanced security measures to protect against account takeover. 

The email protection piece utilizes an API rather than an agent, which is more basic. This API-based approach allows for greater flexibility and integration with other systems. You can also configure it to send suspicious items to a sandbox environment for further analysis if you're not comfortable relying solely on the automated solution.

What is most valuable?

The API is super valuable because it's not really embedded in the email session. It's more like it comes in, and before it hits your mailbox, Check Point inspects it.

Many products require running it through a specific Web Gateway or some kind of intermediate box like Barracuda, or an agent installed on Outlook among many ways. Check Point is more advanced, so it's up there with the best. In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication. It also covers collaboration tools like OneDrive, Dropbox, and Box. That's the collaboration part.

What needs improvement?

It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products. For example, there are other collaboration tools besides Box and Slack that they could explore.

For how long have I used the solution?


What do I think about the stability of the solution?

The stability is excellent. Check Point is a company that has acquired matured technology from other companies and integrated it pretty well. I've seen integrations from other companies that were lacking, but Check Point has done a great job. 

Check Point has also developed its own solutions based on its security knowledge and experience. Being an Israeli company, they have access to some of the best resources in the field. 

What do I think about the scalability of the solution?

Scalability is a significant component of Check Point, as it is built for companies of any size.

How are customer service and support?

The customer service and support team is great. I never had a problem with them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used to work as an IT manager in a biotech company that utilized Check Point, which is why I've always liked their product. It's designed for complex environments and connecting multiple branches. It can be challenging for many companies, but it's intended to handle such complexities. Overall, Check Point Harmony Email & Collaboration is a great product.

How was the initial setup?

The initial setup is very straightforward. It's actually quite easy to set up and configure because the system handles everything. You don't have to install anything separately. You install the agent for the whole solution, and you can choose to enable or disable the email component. Then you simply configure a few settings, and you're done. The real action happens in how it handles incoming emails.

What's my experience with pricing, setup cost, and licensing?

The security solutions of which Email and Collaboration are a part is competitive because Check Point competes on both technology and price.

Check Point often competes with companies like Microsoft, Sophos, and CrowdStrike. Check Point offers competitive prices. Some companies may advertise lower prices, but they exclude essential components like email security or browser security, which you need to pay extra for and in the end they cost the same or even more. 

So the pricing is highly competitive. It's comparable to other companies of the same caliber, such as Microsoft and CrowdStrike. However, with all of them, if you opt for managed services, the pricing can vary, becoming more of a black box. It's usually not publicly published and is often negotiated based on specific needs. Similar to storage pricing, you need to be aware of the details and negotiate. But overall, the pricing is excellent and on par with other leading solutions. 

When comparing Check Point with lesser-known products like Kaspersky and others, it's important to consider the target market. If you're dealing with multinational corporations, or hospital systems, their requirements differ, from smaller companies, and they may be considering solutions from SentinelOne, CrowdStrike, Sophos, or Cylance, however, you have to make sure the product offers all the specific components like email or browser security that Check Point provides. Check Point is known for its comprehensive range of solutions, including firewalls, which can be deployed to endpoints.

What other advice do I have?

I would give it a nine out of ten. It's a great product overall. I hesitate to give any company a perfect ten because there's always a chance of unexpected issues arising in the future. But so far, I haven't encountered any problems with Check Point. It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products. For example, there are other collaboration tools besides Box and Slack that they could explore.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Mantu Shaw - PeerSpot reviewer
Project Manager at Incedo Inc.
MSP
Top 20
Good API-based integration, can block sophisticated social engineering attacks and has good stability
Pros and Cons
  • "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
  • "A phishing simulator would be helpful as a user training module."

What is our primary use case?

Our primary use case is for Office 365 email security along with other Office 365 products like SharePoint, Teams, and OneDrive. As people are working from home over the last year and phishing attacks are increasing day by day, it is important to implement an email security solution into an environment. Microsoft itself provides security, but that is not sufficient and we have still received a number of malicious emails.

We are looking for a solution that supports API-based integration so that there is no need to re-route email traffic via some third-party solutions. 

Protection is also required as people share files, store documents, etc.

How has it helped my organization?

After the implementation of the solution, email phishing is stopped and gives complete visibility.

No manual intervention is required once the policy is defined.

Now, all office documents are protected and we have also started to take backups of our user data into a cloud which will improve the dependency of other backup solutions.

API-based integration does not increase the email latency and it's an important aspect.

The single solution provides protection of other cloud applications such as G-suite, Slack, G-Drive, etc.

It reduces the TCO of email security.

What is most valuable?

API-based integration is the most valuable aspect as it will not degrade the email delivery features.

UBA is one of the features which monitors the user behavior and takes actions accordingly.

The product blocks malicious attachments before reaching out to user mailboxes while not impacting business productivity.

We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP).

We can block sophisticated social engineering attacks such as impersonation, zero-day phishing, and Business Email Compromise (BEC) using AI-trained engines.

What needs improvement?

It is one of the best solutions for cloud-based email security. Almost all features are available, which is required by most organizations. Still, some other features could be added to create more advantages, such as integration with on-premises exchange integration with other SaaS clouds. 

Integration with other threat clouds and AI engines would be helpful.

A phishing simulator would be helpful as a user training module.

Publishing future roadmaps would help us understand what to expect. 

The product should offer integration with other SIEM tools.

Improvement is a key element of any product and Check Point is doing improvements very effectively - therefore there are no major concerns. 

For how long have I used the solution?

We have been using the solution for 8+ months.

What do I think about the stability of the solution?

It's a stable solution and does not impact performance. 

What do I think about the scalability of the solution?

It's a highly scalable and simple product.

How are customer service and support?

Customer support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Check Point is much simpler than other options and offers support with other cloud products - a key advantage.

How was the initial setup?

It's a straightforward setup and the product is easy to implement.

What about the implementation team?

The initial setup was done by OEM and the rest I handled myself.

What was our ROI?

Email security gives good ROI in terms of tools and the support of other cloud features. 

What's my experience with pricing, setup cost, and licensing?

The product has a simple and easy to set up. The initial setup is critical - so plan it accordingly. Email is one of the key components of any organization, so implement it with proper planning.

Which other solutions did I evaluate?

We tested several solutions, including Cisco IronPort and Darktrace.

What other advice do I have?

It is a good solution and easy to implement in any organization.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.