Try our new research platform with insights from 80,000+ expert users
reviewer2024712 - PeerSpot reviewer
Planning Analyst at Ovato
User
Top 5
Offers good email security, blocks malicious emails, and protects sensitive data effectively
Pros and Cons
  • "This product enhances faster and more secure sharing of information among colleagues from different departments."
  • "There are sometimes leakages of viruses when the system is experiencing network failures."

What is our primary use case?

This product has been protecting emails across the company communication system. 

It helps my colleagues to share files and send emails without fear of phishing attacks. 

It keeps all the employees safe all the time when sharing confidential information. 

It protects sensitive company data from leaving the organization in to an insecure environment. 

Cases of ransomware attacks are no longer reported since we have the best solution for handling networking security. 

Implementing API email security across the organization enables teams to access the right information at the right time.

How has it helped my organization?

There is improved security across the emailing system and the entire communication networking infrastructure. 

This product enhances faster and more secure sharing of information among colleagues from different departments. 

Blocking malicious emails before landing inbox has enabled each member to access files with viruses and spam. 

The entire communication channels have been fully secured with end-to-end encryption. 

Email security and prevention of data from cyber attacks have been the main goals and have been achieved positively with Check Point Harmony Email & Collaboration.

What is most valuable?

Full suite protection of cloud email and collaboration applications has been a great achievement of this tool's performance. 

The security features provide a comprehensive report based on current performance and security situation. 

The platform API closely monitors the behavior of information traffic and prevents account takeover. 

It has reduced phishing attacks at a high rate and blocked many attempted attacks. 

The customer support team is online 24/7 and always offers solutions to any request when reached.

What needs improvement?

I am happy with the powerful performance of the set features. 

We have achieved the most set goals, and we are grateful for this robust solution. 

There are sometimes leakages of viruses when the system is experiencing network failures. The information may land in unsafe hands and lead to unpredictable attacks. 

Timely updates and system maintenance are encouraged to enhance continuous business operations. 

Efficient categorization of viruses will help filter out advanced phishing attacks before they affect the conversation infrastructure.

Buyer's Guide
Check Point Harmony Email & Collaboration
November 2024
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,636 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

I am impressed by the overall performance.

What do I think about the scalability of the solution?

The solution is highly scalable and powerful.

How are customer service and support?

This is the best support team I have come across. They always offer timely responses.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with a similar tool before.

How was the initial setup?

The setup was relatively complex.

What about the implementation team?

The implementation took place through the vendor team.

What was our ROI?

Our ROI has increased from 30% to 60% this year.

What's my experience with pricing, setup cost, and licensing?

The pricing and setup are suitable for any level of user.

Which other solutions did I evaluate?

I evaluated other tools, however, this was the best solution based on our demands.

What other advice do I have?

This is an excellent product for email security.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Rodrigo Nalda - PeerSpot reviewer
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees
Real User
Prompt and professional support, good threat visibility, and integrates well with Office365
Pros and Cons
  • "The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user."
  • "Check Point has to continue refining the intelligence engine to minimize the number of false positives."

What is our primary use case?

We have the entire email infrastructure based on Office 365, as well as the file-sharing environment using OneDrive, and Teams as a communication tool. We did not have a specific technology to protect this environment, except that which was provided by Microsoft.

After analyzing the market, we opted for the CheckPoint SaaS solution to cover all of these needs, which has led to a considerable leap in the company's security.

In this way, we now have a secure environment throughout the Office 365 platform, integrated into our SIEM and monitored by our SOC.

How has it helped my organization?

In the same way, we have detected malicious files in both OneDrive and SharePoint that have been blocked, which means the elimination of risks in the corporate network.

One of the important characteristics is the visibility that it gives us about suspicious access to accounts, such as several almost simultaneous accesses from impossible geographical locations. This allows us to detect non-legitimate access due to password filtering or brute force attacks.

All this makes the data of our users safer and therefore the integrity of the company is greater.

What is most valuable?

The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user. This facilitates its implementation.

Another very noteworthy feature is that the number of false positives tends to zero, which generates great confidence in both administrators and users.

The system can be easily parameterized and as it is integrated into the Infinity ecosystem, it simplifies the administration and centralization of logs.

All this makes the solution simple, reliable, and above all stable.

What needs improvement?

Check Point has to continue refining the intelligence engine to minimize the number of false positives.

For how long have I used the solution?

We have been using Check Point Harmony Email & Office for two years.

What do I think about the stability of the solution?

For two years, we have not had any problems, so we consider the application very stable.

What do I think about the scalability of the solution?

Scalability-wise, it is easy to expand licenses and therefore coverage.

How are customer service and technical support?

Check Point's technical service is one of the great values ​​of this manufacturer, with prompt attention and they are very professional.

Which solution did I use previously and why did I switch?

We did not use another solution prior to this one.

How was the initial setup?

The initial configuration was completely simple, without any problem.

What about the implementation team?

The integration was carried out by Check Point's professional services, and it was a complete success, both in terms of time and results.

What's my experience with pricing, setup cost, and licensing?

Reasonable cost, quick and easy implementation, and transparent.

Which other solutions did I evaluate?

We evaluated Palo Alto before selecting Check Point.

What other advice do I have?

All these types of tools are gradually refining the intelligence engines that minimize the number of false positives. It is a constant and evolving work that Check Point knows very well and keeps very active.

One of the functionalities that are in the process of coming out is the protection of Teams, a tool that in the current telework situation is essential. This will represent a new leap in communications security.

In any case, Check Point is working on its entire new Harmony environment and surely new ones will appear in the coming months.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
November 2024
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,636 professionals have used our research since 2012.
Kalpesh Panchal - PeerSpot reviewer
TOC Architect at Infopercept Consulting Limited
Real User
Top 5
Easy to setup, give me detailed information for malicious storage and stable product
Pros and Cons
  • "The option to set a copy is beneficial."
  • "The reporting could be improved."

What is our primary use case?

We use two solutions: Check Point Gateway and Harmony Email & Collaboration.

We primarily use it for IDS and threat protection, as well as VPN.

What is most valuable?

It's very easy to deploy with Microsoft Office 365.

The option to set a copy is beneficial. Additionally, the solution scans OneDrive, Teams, and SharePoint content and provides a full report. 

If I store any malicious file in my cloud storage, it will give me detailed information in the Check Point console, including which DLL is infected. That's a very useful feature.

I'm satisfied with the product as it is, especially regarding security.

What needs improvement?

The reporting could be improved. Also, the predefined workflows cannot be changed. It would be great to add custom workflows to better suit customer requirements.

For how long have I used the solution?

I've been working with Check Point for the last four years. I perform day-to-day operational tasks with it.

What do I think about the stability of the solution?

It is stable.

What do I think about the scalability of the solution?

It is scalable. There are around 300 end users.

It's a cloud-based SaaS application, so it doesn't need to be deployed in multiple locations. We integrated it with our existing email solution, and all our email traffic is routed through it.

How are customer service and support?

The customer service and support are very good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I've worked with Microsoft Defender, Proofpoint, and Barracuda Email Security.

The pros include quick implementation time and easy policy deployment. Security is also good, as Check Point provides multiple security engines and inline data security. As for cons, having the option for custom workflows would be a great improvement.

How was the initial setup?

I completed the initial setup in about 15 minutes, by myself. It was very easy. There's no need for improvement. 

We share product white papers with our customers, understand customers' needs and current email infrastructure, and design a solution before pitching to them. We also create a project timeline for the POC and implementation.

It's easy to integrate, as it supports both cloud-based platforms, O365 and Google Workspace. If you have basic knowledge of your email platform, you can easily integrate the product.

Check Point takes care of the maintenance. It doesn't require any maintenance. 

What was our ROI?

Check Point Harmony Email & Collaboration is beneficial for customers. It brings in the value.

It provides enhanced email content security to prevent external attacks.

What's my experience with pricing, setup cost, and licensing?

I run the proof of concept and submit a report to management. They handle discussions with customers and coordinate with the Check Point sales team.

What other advice do I have?

I would recommend it. 

Overall, I would rate it a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
Flag as inappropriate
PeerSpot user
Vikas Gawali - PeerSpot reviewer
Security Engineer at TD SYNNEX
Real User
Top 5Leaderboard
Used for multi-scanning, threat prevention, and DLP
Pros and Cons
  • "The solution's most valuable features are threat prevention, DLP, and some search engines."
  • "The solution should include DMARC or DKIM-related features."

What is our primary use case?

We use the solution for multi-scanning, threat cloud, and DLP.

What is most valuable?

The solution's most valuable features are threat prevention, DLP, and some search engines.

What needs improvement?

The solution should include DMARC or DKIM-related features.

For how long have I used the solution?

I have been using Check Point Harmony Email & Collaboration for two years.

What do I think about the stability of the solution?

Check Point Harmony Email & Collaboration is a stable solution.

I rate the solution ten out of ten for stability.

What do I think about the scalability of the solution?

I rate the solution’s scalability ten out of ten.

How was the initial setup?

There's no need to add DMARC. You just need the API with the data, and the agent will be deployed in five minutes.

What was our ROI?

We have seen a return on investment with the solution in terms of time-saving and cost-saving.

What other advice do I have?

The solution does not need any maintenance. Many customers use this product because it is very simple to use and manage. Check Point Harmony Email & Collaboration is AI and ML enabled. The solution provides AI features like software decrypted password use, multi scanning, DLP, and threat engines.

Overall, I rate the solution ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Real User
Top 5Leaderboard
An easy-to-deploy and scalable tool useful for mail encryption
Pros and Cons
  • "The setup is very easy. I haven't faced any complexity with the setup of the solution."
  • "Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."

What is our primary use case?

If we talk about use cases, one of our customers is using o365, and one of the customers is using G Suite. On top of that, they require email security along with an anti-APT solution, anti-spam, anti-phishing, and business email compromise with next-generation antivirus included. One of the major use cases is internal communication using an encrypted solution or encrypted mail, especially if internal users send some mail to a particular customer and they require encrypted mail. They also require an encrypted mail solution.

What needs improvement?

With the kind of features we are looking for, be it with Barracuda or Check Point, we are looking at how we can showcase them to the customer and claim that this one is the best solution for your infrastructure and use cases.

I would like Check Point's technical support to be improved.

For how long have I used the solution?

I have been using the solution for five to six years. My company is a distributor of multiple OEM solutions.

What do I think about the stability of the solution?

Most of the customers are using another vendor's solution, so most are looking for a particular email security solution. Whoever has used the solution was facing some challenges till some time ago, but gradually Check Point is improving the solution. So now they are still happy with the solution.

What do I think about the scalability of the solution?

There are multiple customers using the solution. Sometimes they have 100 or 200 users, and they are expanding their team and they are purchasing licenses because if they are increasing users, automatically, mailboxes are increased. We are providing the per-mailbox solution. They are ready to purchase the new licenses for those new mailboxes.

I rate the solution's scalability an eight out of ten.

How are customer service and support?

Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs. Check Point tries to ensure that they are providing good technical support with respect to the solutions and services it provides.

How was the initial setup?

The setup is very easy. I haven't faced any complexity with the setup of the solution.

The deployment took almost four to five years.

I am from the presale side, the solution architecture side. The implementation and deployment teams are different. We have a different team for the deployments and implementations of any particular solution.

What's my experience with pricing, setup cost, and licensing?

Usually, we pay for the licensing part on a yearly basis and not on a monthly basis.

If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts.

What other advice do I have?

It is easy to deploy. With every customer, we just share our thoughts and the experience. It's a very easy-to-implement solution. Check Point is a good cloud-based solution with respect to email security, and Check Point is a very powerful tool with respect to other OEMs.

I rate the overall solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Excellent alternative mail solution, Modern Harmony E&C
Pros and Cons
  • "Its characteristics are adapted to the most modern threats."
  • "Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix."

What is our primary use case?

Our goal has always been to strengthen our infrastructure. We currently have Microsoft 365. In order to provide a centralized security solution, we use Checkpoint Harmony Email, which provides us with security against phishing attacks, malware, and advanced data protection, among others. Some other features that successfully help provide a robust security infrastructure for all collaborative applications.

It is also important to mention that it is managed under the Check Point Infinity Portal, which is the most modern of the Check Point approaches.

How has it helped my organization?

We have managed to implement this as a totally cloud tool, from the Check Point Infinity Portal. It's super easy. In addition, we have managed to generate DLP policies for the protection of data that is shared to avoid sensitive losses and compliance with regulations.

Also, through the monitoring panel we have been able to see the behavior of our environment and how it is attacked by new threats. We can make decisions to improve our infrastructure thanks to Harmony Email.

What is most valuable?

This Check Point Harmony Email tool is very modern. Its characteristics are adapted to the most modern threats. One of its main virtues is its monitoring system, which is very important for decision-making, however, it is also very intuitive, easy to understand, and simple to use.

Its DLP policies are quite easy to implement, which help a lot with compliance with the regulations required by our company in addition to shielding sensitive data.

This tool integrates and protects all collaborative tools, in our case, Microsoft 365.

What needs improvement?

The key improvement for this tool is the inclusion of more collaborative applications. We know that Microsoft has many tools, however, not all of them are covered.

It is also important to validate the documentation. Not all of it is precise. It is very difficult to find the correct ones. In this area, Check Point could generate a more up-to-date library to be able to help customers or companies use their products more.

Finally, the Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix.

For how long have I used the solution?

A very modern tool, centralized through Check Point Infinity, this is used by our company on a trial basis during the last semester.

Which solution did I use previously and why did I switch?

Previously, we used Microsoft security tools. However, we needed to centralize the security environments, and it was perfect with Infinity.

What's my experience with pricing, setup cost, and licensing?

It is important to evaluate the tools before going into production to verify that everything works correctly.

Which other solutions did I evaluate?

We carried out a previous validation of the functions and current tools of the market. It convinced us to move towards Check Point.

What other advice do I have?

Security applications are validated and I would recommend the solution.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Offers advanced visibility using good monitoring and alerting capabilities
Pros and Cons
  • "As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts."
  • "From time to time, the system's administrators notice the increase in the false-positive alerts being reported by CloudGuard SaaS."

What is our primary use case?

About one year ago, we decided to switch from the on-premises located email server, based on Zimbra software, to the cloud-based Office 365 provided by Microsoft. We did this because of the increased load that followed after the company's growth.

To provide the security coverage to the new email service, we chose the Check Point CloudGuard SaaS solution. Now it serves as the main protection mechanism, with about 500 users and up to 10,000 emails per day, and there are no problems with the scalability for future growth.

How has it helped my organization?

The Check Point CloudGuard SaaS solution is used mostly to prevent malware and zero-day threats. It protects the Microsoft Office 365 cloud email service users of our company against attacks. It is also capable of stopping the sophisticated phishing attacks on the Office 365 accounts and block the possible account hijacks.

It would be really hard to achieve such a level of protection with the on-premises email server without using some email-server specific software, but with CloudGuard SaaS it was easy to integrate the security into the Microsoft email services.

What is most valuable?

As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts. In general, the monitoring and alerting is just great, and the default dashboards provided are used by our support team as part of the SoC solution.

In addition, the CloudGuard SaaS is capable of preventing data leakage, thus may serve as the basic DLP system for the cloud email system. We rely on this functionality and block the emails that contain the card numbers patterns as part of the compliance regulations.

What needs improvement?

From time to time, the system's administrators notice the increase in the false-positive alerts being reported by CloudGuard SaaS. The increase usually lasts for several days, with the longest we observed being about a week. During these periods, some number of the "clean" emails are blocked and not delivered to the end-users. I hope the Check Point team would work on improving the detection algorithm and the amount of the false-positive alerts would be more predictable, stable on the minimal level. 

For how long have I used the solution?

We onboarded the Check Point CloudGuard SaaS about a year ago, after switching from our on-prem email system to the cloud-based Office 365.

What do I think about the stability of the solution?

The solution is mature and stable.

What do I think about the scalability of the solution?

The solution is scalable. We now have about 500 active users and see no issues with the performance. 

How are customer service and technical support?

We haven't had any support cases opened for Check Point CloudGuard SaaS so far.

Which solution did I use previously and why did I switch?

We didn't have previous experience with any SaaS security solution before switching.

How was the initial setup?

The setup was straightforward, but quite long due to the need for API integration configuration. In total, it took us about a month to deploy.

What about the implementation team?

The solution was implemented by the in-house team of security engineers and email system administrators, without the prior experience of the CloudGuard SaaS.

Which other solutions did I evaluate?

We didn't evaluate the other products, since we have a strong expertise among the team with the other Check Point solution, and were satisfied with them.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1093134 - PeerSpot reviewer
Pentester at Cybertech Projects
User
Top 20
Reduces spam, offers excellent reporting, and has good management capabilities
Pros and Cons
  • "The ease of management and intuitive administration are excellent."
  • "The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter."

What is our primary use case?

We use the solution for the protection of email from phishing attacks, spam, and malicious email-related activities. 

It detects and blocks the most advanced phishing attacks across inbound, outbound, and internal communications, in real-time, before the attack succeeds.  

The solution is used for email protection, providing IT administrators with a great amount of information about possible attacks faced by the organization, and logins by users. 

It also has a high level of detail in its reports, facilitating the management and detection of possible threats to the security of the organization.

How has it helped my organization?

The number of phishing and spam emails has decreased and email security has improved by 80%. The IT team has noticed a great improvement in the number of emails received and a decrease in attacks. The helpful alerts generated by HEC facilitate the management and response. 

Thanks to its dashboard, it displays detailed information about detected activities, suspicious logins, span deletions, or phishing detected and blocked with a high level of detail. The level of reporting detail facilitates threat management; now the organization has an additional layer of protection for end users.

What is most valuable?

The ease of management and intuitive administration are excellent. Thanks to its dashboard, the most valuable thing is the detection capability provided by this solution. The level of detail offered by Harmony is unique, to the point of showing the differences between what is detected by Office 365 and what is detected by HEC. The organization relies on this email security solution and facilitates the protection of all end users, decreasing security breaches by malicious actors.

What needs improvement?

The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter. It could be improved to obtain a greater level of detail, unlike Office 365, which offers an extreme level of detail and facilitates the management and comparison of what is happening with respect to the mail. Its integration with Gsuite is simpler and has that point against it, however high levels of detail can be obtained in the reports of the solution. On the other hand, the ease of administration and threat detection capabilities are its strong points, and it stands out from other solutions that I have had the opportunity to test before.

For how long have I used the solution?

Currently, this solution has been used for the last two years.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.