Try our new research platform with insights from 80,000+ expert users
reviewer2008407 - PeerSpot reviewer
Java Developer at EROAD
User
Great for blocking email, offers comprehensive security measures and has helpful support
Pros and Cons
  • "Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure."
  • "After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."

What is our primary use case?

This platform protects collaboration and email infrastructure from ransomware attacks. 

It helps departments to communicate efficiently and exchange files without any fear. 

It blocks phishing attacks before they reach the inbox. 

Email security has accelerated growth and stimulated new innovative ideas that can boost productivity. Bringing all the teams together has improved teamwork and cooperation among the employees. We deployed this software to enhance effective team coordination and promote secure networking infrastructure.

How has it helped my organization?

The organization has greatly benefited from the strong security measures implemented by this software. 

The capability to block malicious emails from reaching inboxes has helped members to exchange secure messages that cannot spread viruses and lead to delays. 

The comprehensive security measures have enabled members to focus on more productive duties without fear of being attacked. 

The entire supply chain is secured with end-to-end encryption that unauthorized third parties cannot compromise.

What is most valuable?

The software detects sensitive data that can leak confidential information and stops it immediately from leaving the organization. 

Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure. 

The high-grade email security protection features have blocked many attempts from ransomware attacks. 

Collaboration in a secure environment has been one of the greatest dreams we have longed for, with support from all the enterprise members.

What needs improvement?

The set collaboration and email security features have been stable since we deployed this software. Check Point Harmony Email & Collaboration cost is high, and the deployment process may take longer in a new environment. 

It blocks secure communication if the settings are not well set and defined for a given time frame. 

The most set objectives have been achieved with this leading anti-phishing platform that helps to keep the entire organization safe. 

It has prevented account takeover and created the best infrastructure for sharing files and data. 

After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities. 

It is not easy to establish the number of computers that have access to this network.

Buyer's Guide
Check Point Harmony Email & Collaboration
March 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
845,040 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for eight months.

What do I think about the stability of the solution?

This platform is highly stable and offers an enhanced secure collaboration infrastructure.

What do I think about the scalability of the solution?

The comprehensive email security provision has impressed the teams.

How are customer service and support?

The customer service team has always offered the best support services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with other related software.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation was done through the vendor.

What was our ROI?

ROI stands at 45% - currently up from 30%.

What's my experience with pricing, setup cost, and licensing?

The setup cost and set budgets are suitable for most businesses-level enterprises.

Which other solutions did I evaluate?

I evaluated different solutions, however, we decided to settle on Check Point Harmony Email & Collaboration due to its efficiency.

What other advice do I have?

I am impressed by the overall performance of this software.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Good sandbox and analysis capabilities with the ability to expand
Pros and Cons
  • "Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
  • "Its guides are not great."

What is our primary use case?

With the evolution of technologies, attacks also evolve. This is why we need to secure mail. We have chosen to include Harmony Email in our Office 365 mail solution to thus proactively ensure any incident that we may have in the future is dealt with. It gives us complete security support from anywhere. Wherever our users are, the solution will always be protecting them. 

How has it helped my organization?

Like any company, we care about security and having exposure to various clients and departments. We can be violated or have identity theft attempts, and this is where Check Point Harmony Email (and its computing power that is integrated from the Check Point cloud) comes in. It gives us the protection and analysis, to help us avoid phishing attacks and malware. By integrating solutions such as DLP, we can protect our identity and data. 

Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure.

What is most valuable?

One of the best features is the analysis and emulation carried out with each file attached to the emails, which makes each of the deliveries we make via email more secure. This function creates a scalable sandboxing where a copy of the file under analysis is made, and it is verified, scanned, and analyzed to each of our files for malicious links. If it finds a link, it emulates its action to determine if it is benign or malignant to deliver clean and safe data.

What needs improvement?

Something worth mentioning is the need for Spanish language support and better representation for teams in the Latin American area. There is a growing demand for these IT services and new technologies.

Its guides are not great. It would be more pleasing if these guides could be updated and improved in their design. 

The support that most requires attention is the phone calls or the cases through the support page. Several times, through the chat function, we found that it gets stuck and does not bring up the live chat.

For how long have I used the solution?

I've used the solution for around two years.

What do I think about the scalability of the solution?

The solution is very easy to scale.

How are customer service and support?

There is a need for more support in Spanish. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not previously use a different solution. 

What's my experience with pricing, setup cost, and licensing?

It is quick to configure. The advantage is that it does not need us to install an agent on the machines. Everything is done from the administrators' consoles. 

Which other solutions did I evaluate?

We did not previously evaluate other options. 

What other advice do I have?

It is a simple tool and centralizes its administration. Being able to request a POC from Check Point is a good opportunity that will give new users an opportunity to assess the quality and security capacity that it can provide. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
March 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
845,040 professionals have used our research since 2012.
reviewer2005803 - PeerSpot reviewer
Digital Coordinator at Modis
Real User
Helpful URL protection, good quarantine capabilities, and a nice user dashboard
Pros and Cons
  • "Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
  • "Some files are not scanned thoroughly due to occasional network failures."

What is our primary use case?

The advanced software blocks advanced email phishing that can affect information infrastructure. 

It keeps my colleagues safe when interacting with our partners through collaboration. 

Our communication networking system is secure from end to end to enhance information safety and prevent cyber attacks. 

Sending emails is fast and efficient within the organization's ecosystem. This product provides security alerts when there is a threat that can affect our communication channel. 

Check Point Harmony Email & Collaboration caters to full cloud email security and other applications in the cloud.

How has it helped my organization?

Encryption of emails enhances safe communication that ransomware attacks cannot compromise. 

A secure collaboration environment has enhanced faster growth due to productive sessions convened by teams. 

It blocks unsafe emails before landing inbox to avoid time wastage. Blocking malicious emails has enabled employees to focus on their roles fully without fear of being attacked. 

Consistent security across the company infrastructure has saved the company costs that could be accrued from an insecure work environment.

What is most valuable?

Securing major file-sharing services across the company has been productive since we deployed this platform. 

The security system has a stable data protection system that has prevented potential data loss. 

This product detects malicious behavior in advance and immediately quarantines files before they can spread viruses to the entire network. 

URL protection features give me the confidence to browse the internet without fear of visiting unsafe sites. 

The user dashboard updates systems automatically to meet the current enterprise demands.

What needs improvement?

The system has programmed categories of threats that are detected automatically. 

This can lead to virus leakage and spread malicious data across the enterprise. 

The cost of deployment and integration with other applications is high. 

Some files are not scanned thoroughly due to occasional network failures.

We have experienced the best services from the performance of this platform despite a few operational challenges that rarely occur. 

Monitoring the system operation for new teams is not easy due to complicated configuration techniques.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

It is highly stable in the provision of email security.

What do I think about the scalability of the solution?

This tool is good in overall performance.

How are customer service and support?

The support staff is kind with fast responses to our requests.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with a different solution.

How was the initial setup?

The setup was complex during integrations though the support staff provided productive guidance.

What about the implementation team?

Implementation took place through the vendor team.

What was our ROI?

There has been increased ROI (from 30% to 55%) since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The licensing terms have favored our organization.

Which other solutions did I evaluate?

We selected this product after a recommendation from our colleagues.

What other advice do I have?

Email security is critical to any enterprise, and with this solution, everything is covered.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC
User
Increases productivity, offers good encryption, and is very secure
Pros and Cons
  • "It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
  • "The next release should focus more on email categorization and provide options for unlocking blocked safe emails."

What is our primary use case?

Check Point Harmony Email & Collaboration block any harmful social communication data that can destroy safe information. 

It enables teams in the organization to collaborate under a safe environment when working on various projects and tasks. 

It monitors the flow of emails from one destination to the other with security protocols that block phishing attacks. 

The product stops threats and fraudulent messages before entering the inbox of the receiver. This software has enabled members of the organization to focus on demanding projects without fear of external cyber-attacks.

How has it helped my organization?

Productivity has increased since there are no external detractors. 

Sending email with bulky attachments is safe and faster with guaranteed security encryption. 

It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments. 

It has been able to block malware attacks that could derail workflows and affect overall production. 

The solution cleans unsafe files quickly and eliminates threats that can adversely affect information. 

Engagement with my colleagues is easy, and I no longer fear any ransomware attacks.

What is most valuable?

Sensitive business data is effectively protected from any third-party attacks that can easily destroy confidential information. 

It prevents data from leakages and exposure to unauthorized hands. 

The high-grade bulletproof security model monitors email transfer and content that is contained in the messages. File-sharing security provides a reliable platform for faster sharing of documents without fear of external data threats. 

The dashboard provides real-time insights that provide awareness to members on the best policies for sharing information and engaging each other.

What needs improvement?

The next release should focus more on email categorization and provide options for unlocking blocked safe emails. 

They should release should increase collaboration apps that can be topped with security layers. 

It has developed reliable security infrastructure for guarding our information, and I am proud of that. Most objectives have been achieved with positive results and increased return on investment. The unified dashboard gives departments an easy time monitoring their work progress and security situation in their networking environment.

For how long have I used the solution?

I've used the solution for nine months. 

What do I think about the stability of the solution?

This product is stable with robust performance.

What do I think about the scalability of the solution?

It is easy to master the concept of operations and monitor performance.

How are customer service and support?

The customer service team works closely with all the staff members.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used another solution.

How was the initial setup?

The setup was not complex.

What about the implementation team?

It was deployed by the vendor.

What was our ROI?

ROI has been positive since we deployed it and has highly improved from 15% to 35%.

What's my experience with pricing, setup cost, and licensing?

The setup and cost have been good from my experience, and I recommend it to other organizations.

Which other solutions did I evaluate?

I did not find any other effective platforms like this one.

What other advice do I have?

This is a great product with high-performance features.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Abnet Tsegaye - PeerSpot reviewer
Cyber Security Engineer at DeliverICT
Real User
Top 5
Phishing attacks are effectively blocked with prompt notifications and email protection

What is our primary use case?

We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For example, our CEO received phishing emails with a subject line 'Fund Relief,' and Check Point Harmony Email & Collaboration helped block it.

What is most valuable?

The features I appreciate about Check Point Harmony Email & Collaboration include notifications about email reputation and phishing protection. As the admin, I am notified immediately when phishing attacks occur, allowing me to block harmful emails quickly. This notification feature ensures that I have control over email activity and helps maintain data security.

What needs improvement?

Check Point Harmony Email & Collaboration could improve by providing configuration recommendations and use case specific solutions.

For how long have I used the solution?

Our company has licensed Check Point Harmony Email & Collaboration for twenty users, and I have just started configuring it.

What do I think about the scalability of the solution?

I think Check Point Harmony Email & Collaboration's scalability is excellent. It allows us to scale protection for more users as needed, potentially up to hundreds or thousands.

How are customer service and support?

I would rate customer support eight out of ten. Though it's my first product from Check Point, I find the service good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use any specific email solution before this, except for Microsoft's built-in Defender with Office 365.

How was the initial setup?

The initial setup of Check Point Harmony Email & Collaboration was easy because it is cloud-based, and there is a helpful guide on the dashboard.

What was our ROI?

Investing in Check Point Harmony Email & Collaboration has protected our company data from theft, providing clear ROI. This solution manages threats, reducing my concern about daily email monitoring.

What other advice do I have?

I advise organizations to use Check Point Harmony Email & Collaboration to protect against phishing attacks and data thefts. I would rate the overall solution eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Support at a security firm with 51-200 employees
User
Good security and integration but needs better documentation
Pros and Cons
  • "We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
  • "They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response."

What is our primary use case?

Our corporate environment requires business protection for email and our collaboration tools to avoid threats, spam, and ransomware, among other threats coming in through email. This could have great effects on our systems and equipment.

With Check Point, we can protect our data in the cloud with tools such as One Drive, among others.

The tool works with different manufacturers, which provides great reliability.

How has it helped my organization?

Check Point has helped us improve our security layer with this complete cloud solution. We no longer depend on a Gateway as it is a complete solution that helps us prevent any type of threat that travels through email.

We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point.

We also really like its centralized environment since the Check Point Infinity Portal really centralizes everything.                 

What is most valuable?

The platform offers advanced security measures to protect emails from cyber threats such as phishing attacks, malware, and ransomware.

The platform is cloud-based, which means users can access their emails and collaboration tools from anywhere and on any device.

The security of collaboration tools is great.

The platform integrates with other productivity and collaboration tools like Microsoft Office, Slack, and Zoom.

What needs improvement?

Maybe they could integrate the solution with Avanan. Doing that would really make it a very robust solution.

They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response.

The solution lacks public documentation and some documentation is not so clear, which means that the client does not understand the implementation that must be carried out.

You can only see the costs through a Check Point partner.                           

For how long have I used the solution?

This is a very productive tool. We used it for a few months. It really helped us protect against threats in email and Microsoft collaborative tools.

Which solution did I use previously and why did I switch?

Previously we did not use more than the security provided by Microsoft itself. We have since changed to Check Point.

What's my experience with pricing, setup cost, and licensing?

As for the cost, it is per protected user. It seems good to me in that aspect however, the issue of implementation sometimes costs a bit. That's okay if it can be done correctly. The licenses are easy to acquire.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IT specialist at Landpower Australia Pty Ltd
Real User
A stable solution that does a fantastic job of catching things Microsoft doesn't, but implementation could be easier
Pros and Cons
  • "The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic."
  • "The implementation could definitely be better."

What is our primary use case?

At the moment, we're heavily using the email and collaboration features. We are also licensed for the mobile part, which we are sort of working into, and CloudGuard as well. We're kind of working through those features. 

What needs improvement?

The implementation could definitely be better. We had great support from Check Point, but there were some "got-you" moments where we got surprises as we were setting it up. When Check Point talks about it, it's all "plug and play," but it's not really one of those platforms where you can just jump in and click a few buttons and everything works. You need to have a bit of knowledge about what you're doing and it's a bit more complicated than they advertise.

In the future I would like to see something similar to what Proofpoint has, where users can actually go in and make the call to release their own emails. We've got a small number of users, so it's okay for the IT team to constantly be bombarded with our emails for releasing, but I would love to have an option where I can allow users to go in and make the call to release an email, and then of course it would only actually be released if it passes certain things.

For how long have I used the solution?

I have been using this solution for about a year and a half now. 

What do I think about the stability of the solution?

The solution is stable and I think it does a fantastic job. The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic. There's a few things that get flagged by Microsoft, most of them false positives, so it's interesting. Harmony passes it through and Microsoft thinks it's spam, but usually it's not.

What do I think about the scalability of the solution?

The solution is very easy to scale. There are between 500-550 active users in our company. We have a team of three people that look after the environment, but that is only part of their responsibilities. I think it would do very well with one full-time person handling the maintenance. 

How are customer service and support?

The technical support was brilliant, but that's the thing when you're buying something, usually the initial support is top notch. It's been a year and a half now, and we haven't had any urgent technical issues that we've had to go back for help with, but at the start, when we were implementing the solution, we had good support. They were on the ball and they really stepped up.

Which solution did I use previously and why did I switch?

What we used in the past was an outfit called MSX.

What's my experience with pricing, setup cost, and licensing?

Check Point is more expensive. That's the honest truth. So far, it's a good value for the money. 

Which other solutions did I evaluate?

We considered the Microsoft inbuilt solution, and the advice that we got from a lot of people was, if you want to use that one, combine it with something else. That is what we ended up doing, because it came as part of our licensing with 365, but we can tell that it was a good idea to combine it with Check Point because it will let a lot of things pass.

Also, I know CrowdStrike is cheaper with their Falcon offering, but I haven't had the opportunity to work with it. The reason why I went with Check Point was because I have worked with it in the past and I like their product, so that was the biggest push. 

What other advice do I have?

I would rate this solution as a seven out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Offers advanced visibility using good monitoring and alerting capabilities
Pros and Cons
  • "As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts."
  • "From time to time, the system's administrators notice the increase in the false-positive alerts being reported by CloudGuard SaaS."

What is our primary use case?

About one year ago, we decided to switch from the on-premises located email server, based on Zimbra software, to the cloud-based Office 365 provided by Microsoft. We did this because of the increased load that followed after the company's growth.

To provide the security coverage to the new email service, we chose the Check Point CloudGuard SaaS solution. Now it serves as the main protection mechanism, with about 500 users and up to 10,000 emails per day, and there are no problems with the scalability for future growth.

How has it helped my organization?

The Check Point CloudGuard SaaS solution is used mostly to prevent malware and zero-day threats. It protects the Microsoft Office 365 cloud email service users of our company against attacks. It is also capable of stopping the sophisticated phishing attacks on the Office 365 accounts and block the possible account hijacks.

It would be really hard to achieve such a level of protection with the on-premises email server without using some email-server specific software, but with CloudGuard SaaS it was easy to integrate the security into the Microsoft email services.

What is most valuable?

As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts. In general, the monitoring and alerting is just great, and the default dashboards provided are used by our support team as part of the SoC solution.

In addition, the CloudGuard SaaS is capable of preventing data leakage, thus may serve as the basic DLP system for the cloud email system. We rely on this functionality and block the emails that contain the card numbers patterns as part of the compliance regulations.

What needs improvement?

From time to time, the system's administrators notice the increase in the false-positive alerts being reported by CloudGuard SaaS. The increase usually lasts for several days, with the longest we observed being about a week. During these periods, some number of the "clean" emails are blocked and not delivered to the end-users. I hope the Check Point team would work on improving the detection algorithm and the amount of the false-positive alerts would be more predictable, stable on the minimal level. 

For how long have I used the solution?

We onboarded the Check Point CloudGuard SaaS about a year ago, after switching from our on-prem email system to the cloud-based Office 365.

What do I think about the stability of the solution?

The solution is mature and stable.

What do I think about the scalability of the solution?

The solution is scalable. We now have about 500 active users and see no issues with the performance. 

How are customer service and technical support?

We haven't had any support cases opened for Check Point CloudGuard SaaS so far.

Which solution did I use previously and why did I switch?

We didn't have previous experience with any SaaS security solution before switching.

How was the initial setup?

The setup was straightforward, but quite long due to the need for API integration configuration. In total, it took us about a month to deploy.

What about the implementation team?

The solution was implemented by the in-house team of security engineers and email system administrators, without the prior experience of the CloudGuard SaaS.

Which other solutions did I evaluate?

We didn't evaluate the other products, since we have a strong expertise among the team with the other Check Point solution, and were satisfied with them.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2025
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.