What is our primary use case?
We have the entire email infrastructure based on Office 365, as well as the file-sharing environment using OneDrive, and Teams as a communication tool. We did not have a specific technology to protect this environment, except that which was provided by Microsoft.
After analyzing the market, we opted for the CheckPoint SaaS solution to cover all of these needs, which has led to a considerable leap in the company's security.
In this way, we now have a secure environment throughout the Office 365 platform, integrated into our SIEM and monitored by our SOC.
How has it helped my organization?
In the same way, we have detected malicious files in both OneDrive and SharePoint that have been blocked, which means the elimination of risks in the corporate network.
One of the important characteristics is the visibility that it gives us about suspicious access to accounts, such as several almost simultaneous accesses from impossible geographical locations. This allows us to detect non-legitimate access due to password filtering or brute force attacks.
All this makes the data of our users safer and therefore the integrity of the company is greater.
What is most valuable?
The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user. This facilitates its implementation.
Another very noteworthy feature is that the number of false positives tends to zero, which generates great confidence in both administrators and users.
The system can be easily parameterized and as it is integrated into the Infinity ecosystem, it simplifies the administration and centralization of logs.
All this makes the solution simple, reliable, and above all stable.
What needs improvement?
Check Point has to continue refining the intelligence engine to minimize the number of false positives.
For how long have I used the solution?
We have been using Check Point Harmony Email & Office for two years.
What do I think about the stability of the solution?
For two years, we have not had any problems, so we consider the application very stable.
What do I think about the scalability of the solution?
Scalability-wise, it is easy to expand licenses and therefore coverage.
How are customer service and technical support?
Check Point's technical service is one of the great values of this manufacturer, with prompt attention and they are very professional.
Which solution did I use previously and why did I switch?
We did not use another solution prior to this one.
How was the initial setup?
The initial configuration was completely simple, without any problem.
What about the implementation team?
The integration was carried out by Check Point's professional services, and it was a complete success, both in terms of time and results.
What's my experience with pricing, setup cost, and licensing?
Reasonable cost, quick and easy implementation, and transparent.
Which other solutions did I evaluate?
We evaluated Palo Alto before selecting Check Point.
What other advice do I have?
All these types of tools are gradually refining the intelligence engines that minimize the number of false positives. It is a constant and evolving work that Check Point knows very well and keeps very active.
One of the functionalities that are in the process of coming out is the protection of Teams, a tool that in the current telework situation is essential. This will represent a new leap in communications security.
In any case, Check Point is working on its entire new Harmony environment and surely new ones will appear in the coming months.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.