Try our new research platform with insights from 80,000+ expert users

Share your experience using Comodo Dome Data Loss Prevention

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 98,000+ reviews on PeerSpot:

GANESAN K - PeerSpot reviewer
Senior Technical Engineer at Safezone Secure Solutions Private Limited
Reseller
Top 5Leaderboard
Distributors highly benefit from advanced data monitoring and seamless integration features
Pros and Cons
  • "The solution is stable and does not have glitching issues."
  • "When cases are raised, partners perform initial L1 or L2 troubleshooting. However, ticket resolution times are often too long, with new engineers sometimes requesting the same logs repeatedly."

What is our primary use case?

We have been distributing Trellix DLP solutions for around 5 to 6 years because we have our DLP customers. When going for fresh leads, we insist on Trellix DLP solutions if they have a Windows environment. We definitely recommend Trellix DLP because it has many features, and when it comes to on-premises solutions, it has the best incident monitoring and evidence storing capacity. Data evidence is essential. If somebody shares something, we will be able to look at what files they had and what those contents are. This particular feature we highlight to every customer, making it a key selling point for Trellix DLP.

The main use cases would be incident monitoring and incident storing to look through the contents. Registering the documents enables fingerprinting so you can monitor wherever they go, whether they are sent via mail or through a browser. That is one of the benefits. With application monitoring, many solutions have control over data in applications. For example, remote access applications or instant messaging applications have access, but in most solutions, they are predefined, and to add a custom-based application, it takes some time. You need to have a call with tech support to add that application. However, with Trellix DLP, we can directly create a user-based classifier and application channel in the definitions and block the data leakage of sensitive data through that application.

Another part involves custom classifications; we can also integrate third-party classifiers, such as Titus and Mimecast.

What is most valuable?

We handle data security parts including DLP Encryption, EDR, and external endpoint security, including Trellix Endpoint Security.

The document registration feature enables fingerprinting of documents for monitoring their movement through email or browser. Application monitoring provides control over data in applications, with the ability to directly create user-based classifiers and application channels without requiring technical support intervention.

The solution includes custom classifications and integration capabilities with third-party classifiers. The Machine Learning capability assists with classification capabilities, though there is room for improvement in data discovery accuracy.

What needs improvement?

The Machine Learning capability could be improved, particularly in data discovery. When given sensitive data expressions, the system retrieves files that are not always related. The system should adhere strictly to the given expression rather than just focusing on keywords within the expression.

In endpoint features, while the detection rate is good, there could be improvements in remediation and rollback solutions during attacks. Other solutions now include such options since providing 100% security is impossible.

The flexibility varies across environments. Enterprise customers find the product performs well without affecting their data, with scans running as scheduled. However, SMB customers experience some performance issues during scanning.

Since EDR is integrated, users must access the EDR console to check endpoint detections. It would be beneficial if this functionality were incorporated within the EPO console, as the current threat graphs link doesn't display endpoint threat graphs.

For how long have I used the solution?

We have been distributing Trellix DLP solutions for around 5 to 6 years and continue to maintain our DLP customer base.

What do I think about the stability of the solution?

The solution is stable and does not have glitching issues.

What do I think about the scalability of the solution?

There are no limitations regarding scalability; the solution is sufficiently scalable.

How are customer service and support?

The technical support from Trellix was excellent previously, but since the rebranding, it needs improvement.

When cases are raised, partners perform initial L1 or L2 troubleshooting. However, ticket resolution times are often too long, with new engineers sometimes requesting the same logs repeatedly. This creates challenges, especially for enterprise customers with strict SLAs.

Which solution did I use previously and why did I switch?

We previously used McAfee but have transitioned everything to Trellix DLP now.

How was the initial setup?

The installation process is quite easy, especially with AD connectors for group policy installations for bulk setups.

What was our ROI?

Trellix DLP provides return on investment for enterprise customers, with approximately 20% ROI for enterprises.

What's my experience with pricing, setup cost, and licensing?

The solution is currently affordable and not considered expensive.

What other advice do I have?

The solution features both a dashboard and workspace, which is beneficial. The workspace provides updates on endpoints facing escalated attacks, allowing users to monitor endpoint updates and threat attacks. With EDR integration, users can check policy configurations and identify potential loopholes.

The flexibility varies between SMB and enterprise environments. Enterprise customers report minimal impact during scans, while SMB customers may experience some performance issues during scanning.

Previously held certifications have expired, and there have been challenges accessing the partner portal after the transition to Trellix. Access to the partner portal is important as enterprise customers often request certified professionals.

On a scale of 1-10, this solution rates at 8.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Flag as inappropriate
Derek Schneider - PeerSpot reviewer
Manager, Information Technology at a hospitality company with 201-500 employees
Real User
Top 5
Threat detection has improved and users no longer click on harmful emails
Pros and Cons
  • "Check Point has made my threat prevention better; it has helped me avoid having to redo machines and has helped protect our data by not letting unauthorized items through."
  • "During the East Coast server outage with Amazon service this week, mail was delivered and then pulled back because Harmony wasn't working properly and needed to scan it."

What is our primary use case?

I have been using Check Point Harmony Email & Collaboration for about a year and a half and I don't have plans to switch it out for something else. I'm not as enthused about Check Point as Unitrends. There are a couple of things that haven't gone exactly the way I expected them to, but overall the product is pretty good. I don't expect to move away from them.

How has it helped my organization?

Check Point has made my threat prevention better. It has helped me avoid having to redo machines and has helped protect our data by not letting unauthorized items through. The items it does let through that people are worried about are usually real things that appear unusual. It blocks and notifies me about other concerning items, then I can investigate and determine if it's legitimate mail from someone we want. It has significantly fewer false positives than my old solution did. I remember constantly releasing mails with my old solution, being in there four or five times a week releasing emails that got blocked even after I had whitelisted some portion of them. Once I whitelist something with Check Point Harmony Email & Collaboration, I haven't had to think about it again.

What is most valuable?

I appreciate having one login to deal with multiple different security products. My favorite feature is the ease of finding a piece of mail that got lost somewhere or was blocked for any reason. Their Mail Explorer is simple to use while also offering complex capabilities. I've always been able to find the problematic email and resolve whatever issue exists, whether it requires quarantine or appropriate release.

The AI-powered threat intelligence is built into this system. I haven't had any users accidentally click on something problematic since implementing the product, which speaks to its efficacy.

Check Point Harmony Email & Collaboration has enhanced our threat prevention. It has prevented machine redos and protected our data by blocking unauthorized items. When items are flagged as concerning, they're typically legitimate but appear unusual. The system blocks and notifies about suspicious items, allowing me to verify if they're legitimate communications we want to receive. It produces significantly fewer false positives than my previous solution.

What needs improvement?

One aspect of Check Point Harmony Email & Collaboration that differs from my old solution, Proofpoint, involves mail delivery. With Proofpoint at the MX level, mail would be processed first before being sent to our Microsoft tenant, preventing users from seeing problematic emails. The current setup with Check Point routes mail into the mailbox and then removes it if an issue is detected. During the East Coast server outage with Amazon service this week, mail was delivered and then pulled back because Harmony wasn't working properly and needed to scan it. I prefer the approach where mail gets blocked before reaching the mailbox. However, there haven't been any issues with the current method.

One advantage of the current system is the user creation process. With Proofpoint, I had to wait up to 45 minutes for new email accounts to start working due to sync requirements. The current system, being tied directly to the mailbox instead of requiring MX record verification, allows new mailboxes to function immediately after Microsoft activation.

For how long have I used the solution?

I have been using Check Point Harmony Email & Collaboration for about a year and a half.

What do I think about the stability of the solution?

I haven't had any users encounter issues with accidentally clicked emails since implementing the product.

How are customer service and support?

My experience with Check Point's customer service and tech support has been positive. I maintain a relationship with them despite my sales representative changing once. I have access to a dedicated sales engineer for technical guidance and best practice recommendations. Their technical support is proficient at resolving issues within their scope, providing excellent problem-solving assistance and guidance.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup with Check Point Harmony Email & Collaboration is super simple. Check Point provides comprehensive technical documentation for all their products if you're willing to read it. Though I had a sales engineer on the phone during setup, their assistance wasn't necessary. The Harmony implementation was straightforward - requiring only a few clicks to add the tenant and activate the system. After the initial configuration, no additional setup was required.

Which other solutions did I evaluate?

Check Point Harmony Email & Collaboration handles mail delivery differently than my previous solution, Proofpoint. At the MX level, Proofpoint would process all mail before sending it to our Microsoft tenant.

What other advice do I have?

Before using Check Point, some issues would get through and people would inquire about them, demonstrating appropriate caution. However, we had instances where users clicked on suspicious items, requiring computer removal from the network and complete system wipes for security purposes.

Check Point Harmony Email & Collaboration has been very competitive with their pricing. Compared to previous security products, I was able to add a physical firewall and software licensing for the same price as the endpoint and email security. While my overall bill increased after adding more products, they offered significantly better pricing than competitors.

I would rate Check Point Harmony Email & Collaboration a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate