We were using Google Email earlier and wanted to move from Google to Microsoft. Knowing the vulnerability issues with Microsoft, we wanted a strong email security management system on top of Microsoft 365.
The use cases include anti-spam and anti-phishing. We have Email Collaboration for the anti-spam solution and anti-phishing solution. It’s a very good platform because every day, we block about 1,000 to 5,000 batch emails with malware, spam, etc. So for our business, it’s very important to have this platform, this solution, because it helps us very well with all email.
We mainly use this product for Email Security, and it has an extremely simple setup. We have it installed at one of our client's locations to detect and respond appropriately to common threats such as phishing, scams, and data leakage. This comprehensive coverage allows us to protect the services running within the organization. Check Point Harmony Email Collaboration enables us to efficiently and confidently implement necessary solutions for our various email configurations. The support services available are outstanding. When we sought a product demo for Harmony Email and Collaboration, it was very thorough.
We use Harmony Email & Collaboration to prevent malicious emails from reaching inboxes, guarding against the attacks of threat actors. We have also enabled a data leakage policy based on our client's needs, with hundreds of predefined and custom data types. Below are the security elements of Harmony Email & Office which we use in our client environment. * Anti-phishing for incoming and internal emails. * Complete known malware and zero-day malware prevention (Sandboxing) * Attachment sanitization (CDR, Threat Extraction) * Malicious URL protection (URL Protection)
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
AVP IT & Communication at Proactive Construction Pvt. Ltd at Techtronics Global Innovations Pvt Ltd
Real User
Top 20
2024-05-16T07:13:50Z
May 16, 2024
We use the product to address core, perimeter, and administrative security requirements for firewalls within our environment. Additionally, we cater to email security requirements for clients using both Google Workspace and Microsoft 365 platforms.
I use Check Point Harmony as a security using one solution for both mobile and app development. If we use email security like Office 365, Microsoft Office 365, or G-Suite, we can protect all incoming emails from Microsoft Exchange and stop spam mail with all kinds of security check policies with Check Point Harmony.
Senior Information Technology Administrator at Aighospital
Real User
Top 5
2024-02-27T08:34:54Z
Feb 27, 2024
I use the solution in my company to secure the users' environment so that there are no phishing attacks. The tool operates as an anti-spam solution for the users in our company. Each and every email passes through the email security scanning process. Emails with issues get quarantined by the solution.
The company handles confidential information, such as clients' financial data, and it is important to keep that information secure to comply with certain regulations. One of the important challenges was to counteract the amount of phishing, ransomware attacks, and accidental leaks of information through email and collaboration applications. We did not have a tool that would provide this security, so we chose to look for one and apply it to our environment.
Senior IT Security Manager at a tech services company with 51-200 employees
User
Top 20
2023-11-16T14:19:00Z
Nov 16, 2023
We use the solution for preventing malicious emails that we're getting through Google's built-in spam filters. The amount of spam and phishing had greatly increased at our organization and we needed a solution implemented fast. Check Point was really quick to integrate and implement and instantly started providing value. The reporting we got during our trial helped to quantify the value to the executive team, in particular, the report that shows what Check Point caught items that Google's spam filters would've let through.
Our team primarily uses Google Workspace for email, so we were looking for a solution that could protect us from spam, phishing attacks, and other email threats. Harmony Email fits the bill perfectly because it's an API-based product that doesn't require any MX record or other configuration changes. It's also very easy to use and manage, even for non-technical users.
Senior Information Security Engineer at Glidewell Laboratories
User
Top 10
2023-10-11T20:11:00Z
Oct 11, 2023
We use the solution to prevent any phishing emails from reaching out to the end users. We also use it for URL protection and DLP, to protect the end users from ransomware attacks, and to avoid any issues that halt business activities. We used to have another solution for email security and we used to find so many issues while using it. We could not stop some phishing emails from getting into the user's mailbox and were worried about losing data. We had to work on fine-tuning the solution all the time to avoid the issues. We came to know about Check Point and wanted to try for email security.
We use the solution for SaaS protection for 10,000 Gsuite users. How collaborators process data with sensitive information and information leaks was a constant concern. The collaboration solution allows you to have visibility of the entire SaaS environment and create customized security profiles to give optimal treatment to the information. This solution allows you to have very granular visibility at all times; this is of utmost importance as it allows you to make immediate and precise decisions about the security environment.
We use the solution for the protection of email from phishing attacks, spam, and malicious email-related activities. It detects and blocks the most advanced phishing attacks across inbound, outbound, and internal communications, in real-time, before the attack succeeds. The solution is used for email protection, providing IT administrators with a great amount of information about possible attacks faced by the organization, and logins by users. It also has a high level of detail in its reports, facilitating the management and detection of possible threats to the security of the organization.
The solution helps to block spam emails. With this solution, the users mostly see what the solution posts on its dashboard. This helps users analyze the spam and data.
Usually, the customer is on Office 365, and the main selling point for us is that approximately 95 percent of customers do not have the E5 license from Microsoft, which is the highest tier. As a result, they lack advanced email protection. Therefore, using a third-party solution is more cost-effective than upgrading to an E5 license, and it also offers greater sophistication. This solution can cover not only Office 365 but also other platforms. Furthermore, it carries the reputable brand name Check Point and is well-known in the security industry.
If we talk about use cases, one of our customers is using o365, and one of the customers is using G Suite. On top of that, they require email security along with an anti-APT solution, anti-spam, anti-phishing, and business email compromise with next-generation antivirus included. One of the major use cases is internal communication using an encrypted solution or encrypted mail, especially if internal users send some mail to a particular customer and they require encrypted mail. They also require an encrypted mail solution.
Basically, it protects email services like Office 365 or G-Suite as well as business communication like Slack and Teams, and offers advanced protection against phishing and attachments even before they reach the mailbox. It also includes a DLP (Data Loss Prevention) feature that can be configured to prevent sensitive information from leaving the organization via email. Additionally, it provides advanced security measures to protect against account takeover. The email protection piece utilizes an API rather than an agent, which is more basic. This API-based approach allows for greater flexibility and integration with other systems. You can also configure it to send suspicious items to a sandbox environment for further analysis if you're not comfortable relying solely on the automated solution.
Our corporate environment requires business protection for email and our collaboration tools to avoid threats, spam, and ransomware, among other threats coming in through email. This could have great effects on our systems and equipment. With Check Point, we can protect our data in the cloud with tools such as One Drive, among others. The tool works with different manufacturers, which provides great reliability.
This product has been protecting emails across the company communication system. It helps my colleagues to share files and send emails without fear of phishing attacks. It keeps all the employees safe all the time when sharing confidential information. It protects sensitive company data from leaving the organization in to an insecure environment. Cases of ransomware attacks are no longer reported since we have the best solution for handling networking security. Implementing API email security across the organization enables teams to access the right information at the right time.
The advanced software blocks advanced email phishing that can affect information infrastructure. It keeps my colleagues safe when interacting with our partners through collaboration. Our communication networking system is secure from end to end to enhance information safety and prevent cyber attacks. Sending emails is fast and efficient within the organization's ecosystem. This product provides security alerts when there is a threat that can affect our communication channel. Check Point Harmony Email & Collaboration caters to full cloud email security and other applications in the cloud.
This platform protects collaboration and email infrastructure from ransomware attacks. It helps departments to communicate efficiently and exchange files without any fear. It blocks phishing attacks before they reach the inbox. Email security has accelerated growth and stimulated new innovative ideas that can boost productivity. Bringing all the teams together has improved teamwork and cooperation among the employees. We deployed this software to enhance effective team coordination and promote secure networking infrastructure.
Project Consultant at a consultancy with 10,001+ employees
User
Top 10
2022-11-22T04:36:00Z
Nov 22, 2022
Check Point Harmony Email and Collaboration is the best security software that protects email and collaboration suites in one of the best possible way. It ensures the restriction of threat points and malware in a comprehensive manner. All our Google Workspace applications and Office 365 are thoroughly secured by the software. It's been a great experience so far. Multiple phishing activities and complete zero-day protection are all ensured through Check Point. Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble.
We had the need for a solution that would allow us to integrate search and analysis into the different mail clouds. This allowed us to focus on features that were very important, such as avoiding the loss of data and content. Thanks to the search, analysis, and integration functionalities, we could integrate easily with the cloud that we have. The product gave us a greater ability to search and explore issues while minimally invasive to end users.
The company desires to protect the current email tool, in this case, Microsoft, and its collaboration products such as One Drive and Sharepoint. We wanted to avoid malware, phishing, and spam, among other frequent threats in this infrastructure. We managed to solve it through Harmony Email Collaboration. Other tools provided similar solutions. However, we could not centralize their administration. With the Infinity Check Point Portal, it was possible to meet this requirement.
At the moment, we're heavily using the email and collaboration features. We are also licensed for the mobile part, which we are sort of working into, and CloudGuard as well. We're kind of working through those features.
With the evolution of technologies, attacks also evolve. This is why we need to secure mail. We have chosen to include Harmony Email in our Office 365 mail solution to thus proactively ensure any incident that we may have in the future is dealt with. It gives us complete security support from anywhere. Wherever our users are, the solution will always be protecting them.
Our company uses Office 365 and clearly, we use Outlook. We needed a tool that had the functionality to verify and validate the emails that enter and leave our organization. With this tool, we can solve security problems since many of the collaborators work from home. With this, we have decreased phishing attacks. It offers quite a few types of analysis and reporting that help to clear up security doubts and how to counter these gaps. Check Point Harmony Email & Collaboration is workload protection in the cloud. This firewall helps us provide controls on our organization's devices and has become our main tool in the analysis and coverage of the infrastructure and also maintains fairly reasonable scalability.
Cloud Support at a tech company with 51-200 employees
User
2022-06-20T05:35:00Z
Jun 20, 2022
Currently, our company uses mail with Microsoft 365, both Exchange, Teams, and One Drive, which always showcases phishing problems, or malware, sent by mail. This Check Point technology application has helped us with validation, revision, and improvements. In security, which shields our current resources in a better way, implementation is really easy to carry out and very useful for us, in terms of reviewing events. It provided us with improvements and records that have happened in our environment, which works perfectly. It allows us to be able to take improvement actions.
Our primary use case is for Office 365 email security along with other Office 365 products like SharePoint, Teams, and OneDrive. As people are working from home over the last year and phishing attacks are increasing day by day, it is important to implement an email security solution into an environment. Microsoft itself provides security, but that is not sufficient and we have still received a number of malicious emails. We are looking for a solution that supports API-based integration so that there is no need to re-route email traffic via some third-party solutions. Protection is also required as people share files, store documents, etc.
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees
Real User
2021-03-26T10:30:00Z
Mar 26, 2021
We have the entire email infrastructure based on Office 365, as well as the file-sharing environment using OneDrive, and Teams as a communication tool. We did not have a specific technology to protect this environment, except that which was provided by Microsoft. After analyzing the market, we opted for the CheckPoint SaaS solution to cover all of these needs, which has led to a considerable leap in the company's security. In this way, we now have a secure environment throughout the Office 365 platform, integrated into our SIEM and monitored by our SOC.
This perimeter firewall provides me control over my perimeter servers and devices. Current Cloud applications are getting good protection from CASB solutions, but are limited to data leakage and application control. Beyond that, I require something to monitor my data that flows inside of my cloud application. Sophisticated threats like zero-day attacks can't be control by CASB solutions, Instead, we are required to have something that can work using Artificial Intelligence and Machine learning algorithms. This helps to defend my cloud applications against today's attacks.
As users of Office 365, we are using CloudGuard SaaS to protect this cloud application. We knew that to do so, we would need a very good solution. CloudGaurd SaaS prevents malware and zero-day attacks/threats from attacking our SaaS users. We have 17k+ users and all of them are using Office 365 for email. That's the reason we have implemented the Check Point CloudGuard SaaS solution. We needed protection, and it is working fine as per our requirement.
Network Security Engineer - Presales at a tech services company with 201-500 employees
Real User
2020-12-09T05:46:00Z
Dec 9, 2020
This solution is not for our organization. We are system integrators. We have some projects for our clients, and one of our clients was looking for CloudGuard because they use Check Point Firewall for their on-premise. There are a number of machines and critical servers that they have hosted in AWS; 15 to 20 servers and application servers are hosted in the AWS platform. For those, we have applied Check Point IaaS Firewall for their security and firewall protection. We are using the stable version that was published in March.
During the PoC, we have Office 365 linked to CloudGuard, which validates and checks all of the emails that come in and out. It is also checking and looking for anomalies during logon, e.g., in possible traveling type of scenarios, as we see business emails get compromised. Those pieces of it are really slick. It also provides you with a lot of reports and visibility on the environment. Sometimes things are not native on Office 365 or you have to purchase additional licensing, but on CloudGuard you have a single pane of glass with all the metrics you need. It gives you a lot of information. For example, it tells you the successful/unsuccessful attempts to log on.
About one year ago, we decided to switch from the on-premises located email server, based on Zimbra software, to the cloud-based Office 365 provided by Microsoft. We did this because of the increased load that followed after the company's growth. To provide the security coverage to the new email service, we chose the Check Point CloudGuard SaaS solution. Now it serves as the main protection mechanism, with about 500 users and up to 10,000 emails per day, and there are no problems with the scalability for future growth.
Manager Firewall and Security at a manufacturing company with 1,001-5,000 employees
Real User
2020-05-21T06:20:00Z
May 21, 2020
We have 4,000 users globally, dispersed all over the world including at our manufacturing locations. The CloudGuard SaaS solution is protecting our Office 365 email environment as well as our Office 365 OneDrive environment from malware and other malicious content. Our CloudGuard Connect instance is protecting our remote plants and acting as a cloud-based firewall enforcement point that is 100 percent managed in the cloud as opposed to on-prem.
We use CloudGuard SaaS to protect our cloud-based services from security threats. It is responsible for our Office 365 environment, OneDrive, SharePoint, Dropbox, G-Suite, and more.
Check Point Harmony Email and Office is a cloud-based software offering complete protection to stop malware attacks through emails. The software is designed to provide protection for organizations using Office 365, G Suite, Google Workspace, and all other collaboration and file-sharing apps. Access permissions can be granted and custom policies can be defined for any user of choice.
Check Point Harmony Email and Office identifies and blocks advanced malware, phishing, and ransomware attacks...
We were using Google Email earlier and wanted to move from Google to Microsoft. Knowing the vulnerability issues with Microsoft, we wanted a strong email security management system on top of Microsoft 365.
The use cases include anti-spam and anti-phishing. We have Email Collaboration for the anti-spam solution and anti-phishing solution. It’s a very good platform because every day, we block about 1,000 to 5,000 batch emails with malware, spam, etc. So for our business, it’s very important to have this platform, this solution, because it helps us very well with all email.
We use two solutions: Check Point Gateway and Harmony Email & Collaboration. We primarily use it for IDS and threat protection, as well as VPN.
We mainly use this product for Email Security, and it has an extremely simple setup. We have it installed at one of our client's locations to detect and respond appropriately to common threats such as phishing, scams, and data leakage. This comprehensive coverage allows us to protect the services running within the organization. Check Point Harmony Email Collaboration enables us to efficiently and confidently implement necessary solutions for our various email configurations. The support services available are outstanding. When we sought a product demo for Harmony Email and Collaboration, it was very thorough.
We use the solution for multi-scanning, threat cloud, and DLP.
We use Harmony Email & Collaboration to prevent malicious emails from reaching inboxes, guarding against the attacks of threat actors. We have also enabled a data leakage policy based on our client's needs, with hundreds of predefined and custom data types. Below are the security elements of Harmony Email & Office which we use in our client environment. * Anti-phishing for incoming and internal emails. * Complete known malware and zero-day malware prevention (Sandboxing) * Attachment sanitization (CDR, Threat Extraction) * Malicious URL protection (URL Protection)
We use the product to address core, perimeter, and administrative security requirements for firewalls within our environment. Additionally, we cater to email security requirements for clients using both Google Workspace and Microsoft 365 platforms.
I use Check Point Harmony as a security using one solution for both mobile and app development. If we use email security like Office 365, Microsoft Office 365, or G-Suite, we can protect all incoming emails from Microsoft Exchange and stop spam mail with all kinds of security check policies with Check Point Harmony.
I use the solution in my company to secure the users' environment so that there are no phishing attacks. The tool operates as an anti-spam solution for the users in our company. Each and every email passes through the email security scanning process. Emails with issues get quarantined by the solution.
The company handles confidential information, such as clients' financial data, and it is important to keep that information secure to comply with certain regulations. One of the important challenges was to counteract the amount of phishing, ransomware attacks, and accidental leaks of information through email and collaboration applications. We did not have a tool that would provide this security, so we chose to look for one and apply it to our environment.
We use the solution for preventing malicious emails that we're getting through Google's built-in spam filters. The amount of spam and phishing had greatly increased at our organization and we needed a solution implemented fast. Check Point was really quick to integrate and implement and instantly started providing value. The reporting we got during our trial helped to quantify the value to the executive team, in particular, the report that shows what Check Point caught items that Google's spam filters would've let through.
Our team primarily uses Google Workspace for email, so we were looking for a solution that could protect us from spam, phishing attacks, and other email threats. Harmony Email fits the bill perfectly because it's an API-based product that doesn't require any MX record or other configuration changes. It's also very easy to use and manage, even for non-technical users.
We use the solution to prevent any phishing emails from reaching out to the end users. We also use it for URL protection and DLP, to protect the end users from ransomware attacks, and to avoid any issues that halt business activities. We used to have another solution for email security and we used to find so many issues while using it. We could not stop some phishing emails from getting into the user's mailbox and were worried about losing data. We had to work on fine-tuning the solution all the time to avoid the issues. We came to know about Check Point and wanted to try for email security.
We use the solution for SaaS protection for 10,000 Gsuite users. How collaborators process data with sensitive information and information leaks was a constant concern. The collaboration solution allows you to have visibility of the entire SaaS environment and create customized security profiles to give optimal treatment to the information. This solution allows you to have very granular visibility at all times; this is of utmost importance as it allows you to make immediate and precise decisions about the security environment.
We use the solution for the protection of email from phishing attacks, spam, and malicious email-related activities. It detects and blocks the most advanced phishing attacks across inbound, outbound, and internal communications, in real-time, before the attack succeeds. The solution is used for email protection, providing IT administrators with a great amount of information about possible attacks faced by the organization, and logins by users. It also has a high level of detail in its reports, facilitating the management and detection of possible threats to the security of the organization.
The solution helps to block spam emails. With this solution, the users mostly see what the solution posts on its dashboard. This helps users analyze the spam and data.
Usually, the customer is on Office 365, and the main selling point for us is that approximately 95 percent of customers do not have the E5 license from Microsoft, which is the highest tier. As a result, they lack advanced email protection. Therefore, using a third-party solution is more cost-effective than upgrading to an E5 license, and it also offers greater sophistication. This solution can cover not only Office 365 but also other platforms. Furthermore, it carries the reputable brand name Check Point and is well-known in the security industry.
If we talk about use cases, one of our customers is using o365, and one of the customers is using G Suite. On top of that, they require email security along with an anti-APT solution, anti-spam, anti-phishing, and business email compromise with next-generation antivirus included. One of the major use cases is internal communication using an encrypted solution or encrypted mail, especially if internal users send some mail to a particular customer and they require encrypted mail. They also require an encrypted mail solution.
Basically, it protects email services like Office 365 or G-Suite as well as business communication like Slack and Teams, and offers advanced protection against phishing and attachments even before they reach the mailbox. It also includes a DLP (Data Loss Prevention) feature that can be configured to prevent sensitive information from leaving the organization via email. Additionally, it provides advanced security measures to protect against account takeover. The email protection piece utilizes an API rather than an agent, which is more basic. This API-based approach allows for greater flexibility and integration with other systems. You can also configure it to send suspicious items to a sandbox environment for further analysis if you're not comfortable relying solely on the automated solution.
Our corporate environment requires business protection for email and our collaboration tools to avoid threats, spam, and ransomware, among other threats coming in through email. This could have great effects on our systems and equipment. With Check Point, we can protect our data in the cloud with tools such as One Drive, among others. The tool works with different manufacturers, which provides great reliability.
This product has been protecting emails across the company communication system. It helps my colleagues to share files and send emails without fear of phishing attacks. It keeps all the employees safe all the time when sharing confidential information. It protects sensitive company data from leaving the organization in to an insecure environment. Cases of ransomware attacks are no longer reported since we have the best solution for handling networking security. Implementing API email security across the organization enables teams to access the right information at the right time.
The advanced software blocks advanced email phishing that can affect information infrastructure. It keeps my colleagues safe when interacting with our partners through collaboration. Our communication networking system is secure from end to end to enhance information safety and prevent cyber attacks. Sending emails is fast and efficient within the organization's ecosystem. This product provides security alerts when there is a threat that can affect our communication channel. Check Point Harmony Email & Collaboration caters to full cloud email security and other applications in the cloud.
This platform protects collaboration and email infrastructure from ransomware attacks. It helps departments to communicate efficiently and exchange files without any fear. It blocks phishing attacks before they reach the inbox. Email security has accelerated growth and stimulated new innovative ideas that can boost productivity. Bringing all the teams together has improved teamwork and cooperation among the employees. We deployed this software to enhance effective team coordination and promote secure networking infrastructure.
Check Point Harmony Email and Collaboration is the best security software that protects email and collaboration suites in one of the best possible way. It ensures the restriction of threat points and malware in a comprehensive manner. All our Google Workspace applications and Office 365 are thoroughly secured by the software. It's been a great experience so far. Multiple phishing activities and complete zero-day protection are all ensured through Check Point. Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble.
We had the need for a solution that would allow us to integrate search and analysis into the different mail clouds. This allowed us to focus on features that were very important, such as avoiding the loss of data and content. Thanks to the search, analysis, and integration functionalities, we could integrate easily with the cloud that we have. The product gave us a greater ability to search and explore issues while minimally invasive to end users.
The company desires to protect the current email tool, in this case, Microsoft, and its collaboration products such as One Drive and Sharepoint. We wanted to avoid malware, phishing, and spam, among other frequent threats in this infrastructure. We managed to solve it through Harmony Email Collaboration. Other tools provided similar solutions. However, we could not centralize their administration. With the Infinity Check Point Portal, it was possible to meet this requirement.
At the moment, we're heavily using the email and collaboration features. We are also licensed for the mobile part, which we are sort of working into, and CloudGuard as well. We're kind of working through those features.
With the evolution of technologies, attacks also evolve. This is why we need to secure mail. We have chosen to include Harmony Email in our Office 365 mail solution to thus proactively ensure any incident that we may have in the future is dealt with. It gives us complete security support from anywhere. Wherever our users are, the solution will always be protecting them.
Our company uses Office 365 and clearly, we use Outlook. We needed a tool that had the functionality to verify and validate the emails that enter and leave our organization. With this tool, we can solve security problems since many of the collaborators work from home. With this, we have decreased phishing attacks. It offers quite a few types of analysis and reporting that help to clear up security doubts and how to counter these gaps. Check Point Harmony Email & Collaboration is workload protection in the cloud. This firewall helps us provide controls on our organization's devices and has become our main tool in the analysis and coverage of the infrastructure and also maintains fairly reasonable scalability.
Currently, our company uses mail with Microsoft 365, both Exchange, Teams, and One Drive, which always showcases phishing problems, or malware, sent by mail. This Check Point technology application has helped us with validation, revision, and improvements. In security, which shields our current resources in a better way, implementation is really easy to carry out and very useful for us, in terms of reviewing events. It provided us with improvements and records that have happened in our environment, which works perfectly. It allows us to be able to take improvement actions.
Our primary use case is for Office 365 email security along with other Office 365 products like SharePoint, Teams, and OneDrive. As people are working from home over the last year and phishing attacks are increasing day by day, it is important to implement an email security solution into an environment. Microsoft itself provides security, but that is not sufficient and we have still received a number of malicious emails. We are looking for a solution that supports API-based integration so that there is no need to re-route email traffic via some third-party solutions. Protection is also required as people share files, store documents, etc.
We have the entire email infrastructure based on Office 365, as well as the file-sharing environment using OneDrive, and Teams as a communication tool. We did not have a specific technology to protect this environment, except that which was provided by Microsoft. After analyzing the market, we opted for the CheckPoint SaaS solution to cover all of these needs, which has led to a considerable leap in the company's security. In this way, we now have a secure environment throughout the Office 365 platform, integrated into our SIEM and monitored by our SOC.
This perimeter firewall provides me control over my perimeter servers and devices. Current Cloud applications are getting good protection from CASB solutions, but are limited to data leakage and application control. Beyond that, I require something to monitor my data that flows inside of my cloud application. Sophisticated threats like zero-day attacks can't be control by CASB solutions, Instead, we are required to have something that can work using Artificial Intelligence and Machine learning algorithms. This helps to defend my cloud applications against today's attacks.
As users of Office 365, we are using CloudGuard SaaS to protect this cloud application. We knew that to do so, we would need a very good solution. CloudGaurd SaaS prevents malware and zero-day attacks/threats from attacking our SaaS users. We have 17k+ users and all of them are using Office 365 for email. That's the reason we have implemented the Check Point CloudGuard SaaS solution. We needed protection, and it is working fine as per our requirement.
This solution is not for our organization. We are system integrators. We have some projects for our clients, and one of our clients was looking for CloudGuard because they use Check Point Firewall for their on-premise. There are a number of machines and critical servers that they have hosted in AWS; 15 to 20 servers and application servers are hosted in the AWS platform. For those, we have applied Check Point IaaS Firewall for their security and firewall protection. We are using the stable version that was published in March.
During the PoC, we have Office 365 linked to CloudGuard, which validates and checks all of the emails that come in and out. It is also checking and looking for anomalies during logon, e.g., in possible traveling type of scenarios, as we see business emails get compromised. Those pieces of it are really slick. It also provides you with a lot of reports and visibility on the environment. Sometimes things are not native on Office 365 or you have to purchase additional licensing, but on CloudGuard you have a single pane of glass with all the metrics you need. It gives you a lot of information. For example, it tells you the successful/unsuccessful attempts to log on.
About one year ago, we decided to switch from the on-premises located email server, based on Zimbra software, to the cloud-based Office 365 provided by Microsoft. We did this because of the increased load that followed after the company's growth. To provide the security coverage to the new email service, we chose the Check Point CloudGuard SaaS solution. Now it serves as the main protection mechanism, with about 500 users and up to 10,000 emails per day, and there are no problems with the scalability for future growth.
We use it to secure an email gateway.
We have 4,000 users globally, dispersed all over the world including at our manufacturing locations. The CloudGuard SaaS solution is protecting our Office 365 email environment as well as our Office 365 OneDrive environment from malware and other malicious content. Our CloudGuard Connect instance is protecting our remote plants and acting as a cloud-based firewall enforcement point that is 100 percent managed in the cloud as opposed to on-prem.
We use CloudGuard SaaS to protect our cloud-based services from security threats. It is responsible for our Office 365 environment, OneDrive, SharePoint, Dropbox, G-Suite, and more.
Our primary use is for email protection, though the analytics provided with respect to data leakage and user login activity is invaluable.