Try our new research platform with insights from 80,000+ expert users
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Easy to deploy with simple integration and straightforward management
Pros and Cons
  • "The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great."
  • "We understand that false positives are always there, but sometimes the notifications are more than expected."

What is our primary use case?

We acquired Check Point Harmony to protect our email environment in Office 365. In general terms, the false positives rate has stayed low, and detection rates and successful threat preventions have increased. It filters malicious emails, cleans documents, and effectively prevents phishing attacks. These processes happening in the cloud give peace of mind that the protective actions are taking place before they reach the endpoint, making it safer and adding layers of protection key to keeping the network safe.

How has it helped my organization?

A lot of these attacks and malware now come hidden in ways we expect the least, and since we never think we'll be targets of a cyber attack, this makes us vulnerable to them. Check Point Harmony gives us great visibility of the threats we are being exposed to, where they are coming from and what were they targeting, giving visibility of the weak gateways that could lead to an infection or a leakage. Management is easy, and integration is too, support is good, and the steps followed to set it up were very simple.

What is most valuable?

The previous solution we had for email protection required a lot of investment from us, both money and time-wise. 

The software is easy to deploy and maintain, and the administration and operation of it require very few interventions from the IT team. 

The solution also integrates amazingly with our network's server environment for collaboration and email apps. The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great.

What needs improvement?

We understand that false positives are always there, but sometimes the notifications are more than expected. We've seen clean emails being blocked, thanks to this. 

There are some delays when applying new administrative functions. Sometimes going through the documentation is complex and can be a bit confusing; reporting from the dashboard could get some improvements, too. However, in general, we feel satisfied with Email and Collaboration as it delivers the expected results regarding threat prevention. 

Buyer's Guide
Check Point Harmony Email & Collaboration
March 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for more than three years.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Kalpesh Panchal - PeerSpot reviewer
TOC Architect at Infopercept Consulting Limited
Real User
Top 5
Easy to setup, give me detailed information for malicious storage and stable product
Pros and Cons
  • "The option to set a copy is beneficial."
  • "The reporting could be improved."

What is our primary use case?

We use two solutions: Check Point Gateway and Harmony Email & Collaboration.

We primarily use it for IDS and threat protection, as well as VPN.

What is most valuable?

It's very easy to deploy with Microsoft Office 365.

The option to set a copy is beneficial. Additionally, the solution scans OneDrive, Teams, and SharePoint content and provides a full report. 

If I store any malicious file in my cloud storage, it will give me detailed information in the Check Point console, including which DLL is infected. That's a very useful feature.

I'm satisfied with the product as it is, especially regarding security.

What needs improvement?

The reporting could be improved. Also, the predefined workflows cannot be changed. It would be great to add custom workflows to better suit customer requirements.

For how long have I used the solution?

I've been working with Check Point for the last four years. I perform day-to-day operational tasks with it.

What do I think about the stability of the solution?

It is stable.

What do I think about the scalability of the solution?

It is scalable. There are around 300 end users.

It's a cloud-based SaaS application, so it doesn't need to be deployed in multiple locations. We integrated it with our existing email solution, and all our email traffic is routed through it.

How are customer service and support?

The customer service and support are very good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I've worked with Microsoft Defender, Proofpoint, and Barracuda Email Security.

The pros include quick implementation time and easy policy deployment. Security is also good, as Check Point provides multiple security engines and inline data security. As for cons, having the option for custom workflows would be a great improvement.

How was the initial setup?

I completed the initial setup in about 15 minutes, by myself. It was very easy. There's no need for improvement. 

We share product white papers with our customers, understand customers' needs and current email infrastructure, and design a solution before pitching to them. We also create a project timeline for the POC and implementation.

It's easy to integrate, as it supports both cloud-based platforms, O365 and Google Workspace. If you have basic knowledge of your email platform, you can easily integrate the product.

Check Point takes care of the maintenance. It doesn't require any maintenance. 

What was our ROI?

Check Point Harmony Email & Collaboration is beneficial for customers. It brings in the value.

It provides enhanced email content security to prevent external attacks.

What's my experience with pricing, setup cost, and licensing?

I run the proof of concept and submit a report to management. They handle discussions with customers and coordinate with the Check Point sales team.

What other advice do I have?

I would recommend it. 

Overall, I would rate it a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
March 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Good security and integration but needs better documentation
Pros and Cons
  • "We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
  • "They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response."

What is our primary use case?

Our corporate environment requires business protection for email and our collaboration tools to avoid threats, spam, and ransomware, among other threats coming in through email. This could have great effects on our systems and equipment.

With Check Point, we can protect our data in the cloud with tools such as One Drive, among others.

The tool works with different manufacturers, which provides great reliability.

How has it helped my organization?

Check Point has helped us improve our security layer with this complete cloud solution. We no longer depend on a Gateway as it is a complete solution that helps us prevent any type of threat that travels through email.

We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point.

We also really like its centralized environment since the Check Point Infinity Portal really centralizes everything.                 

What is most valuable?

The platform offers advanced security measures to protect emails from cyber threats such as phishing attacks, malware, and ransomware.

The platform is cloud-based, which means users can access their emails and collaboration tools from anywhere and on any device.

The security of collaboration tools is great.

The platform integrates with other productivity and collaboration tools like Microsoft Office, Slack, and Zoom.

What needs improvement?

Maybe they could integrate the solution with Avanan. Doing that would really make it a very robust solution.

They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response.

The solution lacks public documentation and some documentation is not so clear, which means that the client does not understand the implementation that must be carried out.

You can only see the costs through a Check Point partner.                           

For how long have I used the solution?

This is a very productive tool. We used it for a few months. It really helped us protect against threats in email and Microsoft collaborative tools.

Which solution did I use previously and why did I switch?

Previously we did not use more than the security provided by Microsoft itself. We have since changed to Check Point.

What's my experience with pricing, setup cost, and licensing?

As for the cost, it is per protected user. It seems good to me in that aspect however, the issue of implementation sometimes costs a bit. That's okay if it can be done correctly. The licenses are easy to acquire.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2107347 - PeerSpot reviewer
Project Manager at UFINET
Real User
reduced phishing attacks, blocks malicious mail, and removes likelihood of data loss
Pros and Cons
  • "Email security has improved since we deployed this platform."
  • "Some undefined threats can bypass the security system when there is a networking failure in the organization."

What is our primary use case?

Check Point Harmony Email and Collaboration has enabled my team to implement projects and tasks effectively. 

It provides a reliable communication pathway that cannot be compromised by cyber attacks. 

It protects confidential data from leaving an organization without a proper channel. It keeps our emails in a unified environment that is secure and highly safeguarded by strong security tools. 

There are advanced collaboration techniques enhanced by this platform in the enterprise. It prevents account takeover and always keeps my colleagues under safe network infrastructure.

How has it helped my organization?

Email security has improved since we deployed this platform. 

This platform has enhanced faster file sharing and improved the collaboration network systems. 

Securing business lines has reduced cases of fraud that used to affect workflows. API connection has enabled us to integrate this platform with applications for the efficient implementation of business programs. 

Sending and receiving emails has been reliable and always productive, with zero phishing attacks. 

Full email protection of both cloud and on-premise emails has reduced the chances of losing data to zero.

What is most valuable?

Bulletproof Security catches up with all types of cyber attacks that can lead to account takeover and data compromisation. The entire networking system is secured with end-to-end encryption that enhances the secure flow of data. 

The superior data catch rate has reduced phishing attacks by a high rate of almost 100%, which has boosted productivity. 

It blocks malicious emails that wreak havoc and destroy valuable data in the systems. 

Employees can focus on more productive roles without fear of being attacked by external factors.

What needs improvement?

Some undefined threats can bypass the security system when there is a networking failure in the organization. 

The next release should have a fixed system that can categorize the various levels of viruses. 

The detection of threats before they reach inboxes has enhanced reliable communication among teams. 

The malware protection system has to be upgraded to catch up with various current threats that can easily affect our systems without precautions. 

Email and collaboration safety has been a great step that we have achieved from the performance of this platform, and I totally recommend it to others.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

This tool is highly powerful in blocking phishing attacks and ransomware attacks.

What do I think about the scalability of the solution?

I love the great performance of this platform.

How are customer service and support?

The customer support staff provides reliable services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the main email and collaboration platform that I have worked with.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

The implementation was done by the vendor.

What was our ROI?

The rate of ROI has increased from 40% to 60%.

What's my experience with pricing, setup cost, and licensing?

The setup cost is good and highly efficient.

Which other solutions did I evaluate?

I have not come across another powerful platform like this one.

What other advice do I have?

I am satisfied with the security measures that have been enhanced by this tool.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Mantu Shaw - PeerSpot reviewer
Project Manager at Incedo Inc.
MSP
Top 20
Good API-based integration, can block sophisticated social engineering attacks and has good stability
Pros and Cons
  • "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
  • "A phishing simulator would be helpful as a user training module."

What is our primary use case?

Our primary use case is for Office 365 email security along with other Office 365 products like SharePoint, Teams, and OneDrive. As people are working from home over the last year and phishing attacks are increasing day by day, it is important to implement an email security solution into an environment. Microsoft itself provides security, but that is not sufficient and we have still received a number of malicious emails.

We are looking for a solution that supports API-based integration so that there is no need to re-route email traffic via some third-party solutions. 

Protection is also required as people share files, store documents, etc.

How has it helped my organization?

After the implementation of the solution, email phishing is stopped and gives complete visibility.

No manual intervention is required once the policy is defined.

Now, all office documents are protected and we have also started to take backups of our user data into a cloud which will improve the dependency of other backup solutions.

API-based integration does not increase the email latency and it's an important aspect.

The single solution provides protection of other cloud applications such as G-suite, Slack, G-Drive, etc.

It reduces the TCO of email security.

What is most valuable?

API-based integration is the most valuable aspect as it will not degrade the email delivery features.

UBA is one of the features which monitors the user behavior and takes actions accordingly.

The product blocks malicious attachments before reaching out to user mailboxes while not impacting business productivity.

We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP).

We can block sophisticated social engineering attacks such as impersonation, zero-day phishing, and Business Email Compromise (BEC) using AI-trained engines.

What needs improvement?

It is one of the best solutions for cloud-based email security. Almost all features are available, which is required by most organizations. Still, some other features could be added to create more advantages, such as integration with on-premises exchange integration with other SaaS clouds. 

Integration with other threat clouds and AI engines would be helpful.

A phishing simulator would be helpful as a user training module.

Publishing future roadmaps would help us understand what to expect. 

The product should offer integration with other SIEM tools.

Improvement is a key element of any product and Check Point is doing improvements very effectively - therefore there are no major concerns. 

For how long have I used the solution?

We have been using the solution for 8+ months.

What do I think about the stability of the solution?

It's a stable solution and does not impact performance. 

What do I think about the scalability of the solution?

It's a highly scalable and simple product.

How are customer service and support?

Customer support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Check Point is much simpler than other options and offers support with other cloud products - a key advantage.

How was the initial setup?

It's a straightforward setup and the product is easy to implement.

What about the implementation team?

The initial setup was done by OEM and the rest I handled myself.

What was our ROI?

Email security gives good ROI in terms of tools and the support of other cloud features. 

What's my experience with pricing, setup cost, and licensing?

The product has a simple and easy to set up. The initial setup is critical - so plan it accordingly. Email is one of the key components of any organization, so implement it with proper planning.

Which other solutions did I evaluate?

We tested several solutions, including Cisco IronPort and Darktrace.

What other advice do I have?

It is a good solution and easy to implement in any organization.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Alejandro Flores. - PeerSpot reviewer
Director de Ingenieria at Smartelecom SA de CV
MSP
Top 5
Granular with good integration capabilities and helpful support
Pros and Cons
  • "I like the fact that having granular information about the potential threats is received in email."
  • "They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."

What is our primary use case?

We use the solution for SaaS protection for 10,000 Gsuite users. How collaborators process data with sensitive information and information leaks was a constant concern. The collaboration solution allows you to have visibility of the entire SaaS environment and create customized security profiles to give optimal treatment to the information. This solution allows you to have very granular visibility at all times; this is of utmost importance as it allows you to make immediate and precise decisions about the security environment.

How has it helped my organization?

This solution has allowed us to have visibility of the security environment for the business and has allowed us to have specific treatment by users, user groups, and departments of the information that is processed. This allows users to be certain that their information is protected. Certain security problems were detected. Without this solution at the SaaS level would have been impossible to detect so there has been an improvement in the treatment of the attack surface and the protection of valuable data.

What is most valuable?

There are several features that were considered valuable. For example, the fact that the installation and integration of the solution with SaaS tools were very fast and highly recognized by SaaS administrators. I like the fact that having granular information about the potential threats is received in email. Being able to protect information repositories was of great interest to decision-makers. It was also possible to implement an entire environment in record time. Having this information allowed us to better model the attacking surface.

What needs improvement?

They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment). 

Reports should be presented in such a way that they are readable by non-technical work groups who are involved in information protection and who may misread the information on the dashboard and make incorrect decisions.

For how long have I used the solution?

I've used the solution for four months.

What do I think about the stability of the solution?

The product is very stable; it is a cloud solution and we have not had any operational incidents.

What do I think about the scalability of the solution?

The solution is very scalable since you only have to add licenses.

How are customer service and support?

They offer good support; you have several support options depending on the SLA you need.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup is very straightforward and very fast; it took about 20 minutes.

What about the implementation team?

The setup involved a mix of personnel and Check Point SE are experts in the area of ​​security.

What's my experience with pricing, setup cost, and licensing?

The setup was very fast; the license scheme was very easy to understand.

Which other solutions did I evaluate?

We also evaluated the PAN solution and Fortinet.

What other advice do I have?

I consider it to be a cost-effective solution that focuses on security and is a highly recommended and easy-to-use option.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1093134 - PeerSpot reviewer
Pentester at Cybertech Projects
User
Top 10
Reduces spam, offers excellent reporting, and has good management capabilities
Pros and Cons
  • "The ease of management and intuitive administration are excellent."
  • "The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter."

What is our primary use case?

We use the solution for the protection of email from phishing attacks, spam, and malicious email-related activities. 

It detects and blocks the most advanced phishing attacks across inbound, outbound, and internal communications, in real-time, before the attack succeeds.  

The solution is used for email protection, providing IT administrators with a great amount of information about possible attacks faced by the organization, and logins by users. 

It also has a high level of detail in its reports, facilitating the management and detection of possible threats to the security of the organization.

How has it helped my organization?

The number of phishing and spam emails has decreased and email security has improved by 80%. The IT team has noticed a great improvement in the number of emails received and a decrease in attacks. The helpful alerts generated by HEC facilitate the management and response. 

Thanks to its dashboard, it displays detailed information about detected activities, suspicious logins, span deletions, or phishing detected and blocked with a high level of detail. The level of reporting detail facilitates threat management; now the organization has an additional layer of protection for end users.

What is most valuable?

The ease of management and intuitive administration are excellent. Thanks to its dashboard, the most valuable thing is the detection capability provided by this solution. The level of detail offered by Harmony is unique, to the point of showing the differences between what is detected by Office 365 and what is detected by HEC. The organization relies on this email security solution and facilitates the protection of all end users, decreasing security breaches by malicious actors.

What needs improvement?

The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter. It could be improved to obtain a greater level of detail, unlike Office 365, which offers an extreme level of detail and facilitates the management and comparison of what is happening with respect to the mail. Its integration with Gsuite is simpler and has that point against it, however high levels of detail can be obtained in the reports of the solution. On the other hand, the ease of administration and threat detection capabilities are its strong points, and it stands out from other solutions that I have had the opportunity to test before.

For how long have I used the solution?

Currently, this solution has been used for the last two years.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Real User
Top 5Leaderboard
An easy-to-deploy and scalable tool useful for mail encryption
Pros and Cons
  • "The setup is very easy. I haven't faced any complexity with the setup of the solution."
  • "Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."

What is our primary use case?

If we talk about use cases, one of our customers is using o365, and one of the customers is using G Suite. On top of that, they require email security along with an anti-APT solution, anti-spam, anti-phishing, and business email compromise with next-generation antivirus included. One of the major use cases is internal communication using an encrypted solution or encrypted mail, especially if internal users send some mail to a particular customer and they require encrypted mail. They also require an encrypted mail solution.

What needs improvement?

With the kind of features we are looking for, be it with Barracuda or Check Point, we are looking at how we can showcase them to the customer and claim that this one is the best solution for your infrastructure and use cases.

I would like Check Point's technical support to be improved.

For how long have I used the solution?

I have been using the solution for five to six years. My company is a distributor of multiple OEM solutions.

What do I think about the stability of the solution?

Most of the customers are using another vendor's solution, so most are looking for a particular email security solution. Whoever has used the solution was facing some challenges till some time ago, but gradually Check Point is improving the solution. So now they are still happy with the solution.

What do I think about the scalability of the solution?

There are multiple customers using the solution. Sometimes they have 100 or 200 users, and they are expanding their team and they are purchasing licenses because if they are increasing users, automatically, mailboxes are increased. We are providing the per-mailbox solution. They are ready to purchase the new licenses for those new mailboxes.

I rate the solution's scalability an eight out of ten.

How are customer service and support?

Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs. Check Point tries to ensure that they are providing good technical support with respect to the solutions and services it provides.

How was the initial setup?

The setup is very easy. I haven't faced any complexity with the setup of the solution.

The deployment took almost four to five years.

I am from the presale side, the solution architecture side. The implementation and deployment teams are different. We have a different team for the deployments and implementations of any particular solution.

What's my experience with pricing, setup cost, and licensing?

Usually, we pay for the licensing part on a yearly basis and not on a monthly basis.

If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts.

What other advice do I have?

It is easy to deploy. With every customer, we just share our thoughts and the experience. It's a very easy-to-implement solution. Check Point is a good cloud-based solution with respect to email security, and Check Point is a very powerful tool with respect to other OEMs.

I rate the overall solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2025
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.