No more typing reviews! Try our Samantha, our new voice AI agent.
reviewer2008407 - PeerSpot reviewer
Java Developer at EROAD
User
Dec 16, 2022
Great for blocking email, offers comprehensive security measures and has helpful support
Pros and Cons
  • "Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure."
  • "After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."

What is our primary use case?

This platform protects collaboration and email infrastructure from ransomware attacks. 

It helps departments to communicate efficiently and exchange files without any fear. 

It blocks phishing attacks before they reach the inbox. 

Email security has accelerated growth and stimulated new innovative ideas that can boost productivity. Bringing all the teams together has improved teamwork and cooperation among the employees. We deployed this software to enhance effective team coordination and promote secure networking infrastructure.

How has it helped my organization?

The organization has greatly benefited from the strong security measures implemented by this software. 

The capability to block malicious emails from reaching inboxes has helped members to exchange secure messages that cannot spread viruses and lead to delays. 

The comprehensive security measures have enabled members to focus on more productive duties without fear of being attacked. 

The entire supply chain is secured with end-to-end encryption that unauthorized third parties cannot compromise.

What is most valuable?

The software detects sensitive data that can leak confidential information and stops it immediately from leaving the organization. 

Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure. 

The high-grade email security protection features have blocked many attempts from ransomware attacks. 

Collaboration in a secure environment has been one of the greatest dreams we have longed for, with support from all the enterprise members.

What needs improvement?

The set collaboration and email security features have been stable since we deployed this software. Check Point Harmony Email & Collaboration cost is high, and the deployment process may take longer in a new environment. 

It blocks secure communication if the settings are not well set and defined for a given time frame. 

The most set objectives have been achieved with this leading anti-phishing platform that helps to keep the entire organization safe. 

It has prevented account takeover and created the best infrastructure for sharing files and data. 

After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities. 

It is not easy to establish the number of computers that have access to this network.

Buyer's Guide
Check Point Email Security (formerly Harmony Email & Collaboration)
April 2026
Learn what your peers think about Check Point Email Security (formerly Harmony Email & Collaboration). Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
890,027 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for eight months.

What do I think about the stability of the solution?

This platform is highly stable and offers an enhanced secure collaboration infrastructure.

What do I think about the scalability of the solution?

The comprehensive email security provision has impressed the teams.

How are customer service and support?

The customer service team has always offered the best support services.

Which solution did I use previously and why did I switch?

I have no experience with other related software.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation was done through the vendor.

What was our ROI?

ROI stands at 45% - currently up from 30%.

What's my experience with pricing, setup cost, and licensing?

The setup cost and set budgets are suitable for most businesses-level enterprises.

Which other solutions did I evaluate?

I evaluated different solutions, however, we decided to settle on Check Point Harmony Email & Collaboration due to its efficiency.

What other advice do I have?

I am impressed by the overall performance of this software.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Nov 21, 2022
Non-invasive, helps educate users, and acts as a good failsafe
Pros and Cons
  • "Its total protection has been the greatest aspect since it completely protects all the mail from the cloud."
  • "Checkpoint Harmony Email and Collaboration is one of the cloud solutions for email that has given us the most added value."
  • "They could help us be integrating features with solutions from third parties."
  • "They could help us be integrating features with solutions from third parties."

What is our primary use case?

We had the need for a solution that would allow us to integrate search and analysis into the different mail clouds. This allowed us to focus on features that were very important, such as avoiding the loss of data and content. Thanks to the search, analysis, and integration functionalities, we could integrate easily with the cloud that we have. The product gave us a greater ability to search and explore issues while minimally invasive to end users.

How has it helped my organization?

Checkpoint Harmony Email and Collaboration is one of the cloud solutions for email that has given us the most added value. It has allowed for the education of users while still keeping them protected in a non-invasive way. When configuring this solution, we have not needed to come and affect management in terms of the day-to-day tasks handled by the users. It is a solution that is directly configured at the service level, not at the user level, so it's quick to install and configure, allowing connectors through APIs that can block malicious emails before they reach the inbox. It is acting as a full replacement for data loss analysis and management issues.

What is most valuable?

Harmony email has many interesting features. Its total protection has been the greatest aspect since it completely protects all the mail from the cloud. It gives 100% protection and is something that is a failsafe. There are no errors. Having an app-based solution that detects everything that is lost helps ensure reliability. It is quite complete, and it integrates with emulation solutions. If an email is ever compromised, you can detect the issue, find out what happened, and protect the company. It is a very complete solution.

What needs improvement?

The solution really has many outstanding features. It is quite easy to install and configure and is very complete. 

We could analyze services such as SharePoint and have more seamless integration. They could help us be integrating features with solutions from third parties. That would be very helpful. Right now, we do not have complete analysis when it comes to analyzing and detecting all the data that is saved. Having a product that could sweep repositories would be great.

For how long have I used the solution?

I've used the solution for about a year and two months.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Email Security (formerly Harmony Email & Collaboration)
April 2026
Learn what your peers think about Check Point Email Security (formerly Harmony Email & Collaboration). Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
890,027 professionals have used our research since 2012.
Suresh Pathipatti - PeerSpot reviewer
Senior Information Technology Administrator at Aighospital
Real User
Sep 17, 2022
Stable solution with excellent features and support
Pros and Cons
  • "Check Point's technical support is very good."
  • "Harmony Email & Collaboration could be improved by making the whitelist available on the website and application level."

What is most valuable?

All of Harmony Email & Collaboration's features are valuable.

What needs improvement?

Harmony Email & Collaboration could be improved by making the whitelist available on the website and application level.

For how long have I used the solution?

I've been using Harmony Email & Collaboration for a year.

What do I think about the stability of the solution?

Harmony Email & Collaboration is stable.

How are customer service and support?

Check Point's technical support is very good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used McAfee Endpoint.

What other advice do I have?

I would recommend Harmony Email & Collaboration to other users and rate it eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mantu Shaw - PeerSpot reviewer
Project Manager at a outsourcing company with 1,001-5,000 employees
MSP
Top 10
Oct 10, 2021
Good API-based integration, can block sophisticated social engineering attacks and has good stability
Pros and Cons
  • "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
  • "After the implementation of the solution, email phishing is stopped and gives complete visibility."
  • "A phishing simulator would be helpful as a user training module."
  • "A phishing simulator would be helpful as a user training module."

What is our primary use case?

Our primary use case is for Office 365 email security along with other Office 365 products like SharePoint, Teams, and OneDrive. As people are working from home over the last year and phishing attacks are increasing day by day, it is important to implement an email security solution into an environment. Microsoft itself provides security, but that is not sufficient and we have still received a number of malicious emails.

We are looking for a solution that supports API-based integration so that there is no need to re-route email traffic via some third-party solutions. 

Protection is also required as people share files, store documents, etc.

How has it helped my organization?

After the implementation of the solution, email phishing is stopped and gives complete visibility.

No manual intervention is required once the policy is defined.

Now, all office documents are protected and we have also started to take backups of our user data into a cloud which will improve the dependency of other backup solutions.

API-based integration does not increase the email latency and it's an important aspect.

The single solution provides protection of other cloud applications such as G-suite, Slack, G-Drive, etc.

It reduces the TCO of email security.

What is most valuable?

API-based integration is the most valuable aspect as it will not degrade the email delivery features.

UBA is one of the features which monitors the user behavior and takes actions accordingly.

The product blocks malicious attachments before reaching out to user mailboxes while not impacting business productivity.

We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP).

We can block sophisticated social engineering attacks such as impersonation, zero-day phishing, and Business Email Compromise (BEC) using AI-trained engines.

What needs improvement?

It is one of the best solutions for cloud-based email security. Almost all features are available, which is required by most organizations. Still, some other features could be added to create more advantages, such as integration with on-premises exchange integration with other SaaS clouds. 

Integration with other threat clouds and AI engines would be helpful.

A phishing simulator would be helpful as a user training module.

Publishing future roadmaps would help us understand what to expect. 

The product should offer integration with other SIEM tools.

Improvement is a key element of any product and Check Point is doing improvements very effectively - therefore there are no major concerns. 

For how long have I used the solution?

We have been using the solution for 8+ months.

What do I think about the stability of the solution?

It's a stable solution and does not impact performance. 

What do I think about the scalability of the solution?

It's a highly scalable and simple product.

How are customer service and support?

Customer support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Check Point is much simpler than other options and offers support with other cloud products - a key advantage.

How was the initial setup?

It's a straightforward setup and the product is easy to implement.

What about the implementation team?

The initial setup was done by OEM and the rest I handled myself.

What was our ROI?

Email security gives good ROI in terms of tools and the support of other cloud features. 

What's my experience with pricing, setup cost, and licensing?

The product has a simple and easy to set up. The initial setup is critical - so plan it accordingly. Email is one of the key components of any organization, so implement it with proper planning.

Which other solutions did I evaluate?

We tested several solutions, including Cisco IronPort and Darktrace.

What other advice do I have?

It is a good solution and easy to implement in any organization.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Rodrigo Nalda - PeerSpot reviewer
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees
Real User
Apr 4, 2021
Prompt and professional support, good threat visibility, and integrates well with Office365
Pros and Cons
  • "The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user."
  • "After analyzing the market, we opted for the CheckPoint SaaS solution to cover all of these needs, which has led to a considerable leap in the company's security."
  • "Check Point has to continue refining the intelligence engine to minimize the number of false positives."
  • "Check Point has to continue refining the intelligence engine to minimize the number of false positives."

What is our primary use case?

We have the entire email infrastructure based on Office 365, as well as the file-sharing environment using OneDrive, and Teams as a communication tool. We did not have a specific technology to protect this environment, except that which was provided by Microsoft.

After analyzing the market, we opted for the CheckPoint SaaS solution to cover all of these needs, which has led to a considerable leap in the company's security.

In this way, we now have a secure environment throughout the Office 365 platform, integrated into our SIEM and monitored by our SOC.

How has it helped my organization?

In the same way, we have detected malicious files in both OneDrive and SharePoint that have been blocked, which means the elimination of risks in the corporate network.

One of the important characteristics is the visibility that it gives us about suspicious access to accounts, such as several almost simultaneous accesses from impossible geographical locations. This allows us to detect non-legitimate access due to password filtering or brute force attacks.

All this makes the data of our users safer and therefore the integrity of the company is greater.

What is most valuable?

The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user. This facilitates its implementation.

Another very noteworthy feature is that the number of false positives tends to zero, which generates great confidence in both administrators and users.

The system can be easily parameterized and as it is integrated into the Infinity ecosystem, it simplifies the administration and centralization of logs.

All this makes the solution simple, reliable, and above all stable.

What needs improvement?

Check Point has to continue refining the intelligence engine to minimize the number of false positives.

For how long have I used the solution?

We have been using Check Point Harmony Email & Office for two years.

What do I think about the stability of the solution?

For two years, we have not had any problems, so we consider the application very stable.

What do I think about the scalability of the solution?

Scalability-wise, it is easy to expand licenses and therefore coverage.

How are customer service and technical support?

Check Point's technical service is one of the great values ​​of this manufacturer, with prompt attention and they are very professional.

Which solution did I use previously and why did I switch?

We did not use another solution prior to this one.

How was the initial setup?

The initial configuration was completely simple, without any problem.

What about the implementation team?

The integration was carried out by Check Point's professional services, and it was a complete success, both in terms of time and results.

What's my experience with pricing, setup cost, and licensing?

Reasonable cost, quick and easy implementation, and transparent.

Which other solutions did I evaluate?

We evaluated Palo Alto before selecting Check Point.

What other advice do I have?

All these types of tools are gradually refining the intelligence engines that minimize the number of false positives. It is a constant and evolving work that Check Point knows very well and keeps very active.

One of the functionalities that are in the process of coming out is the protection of Teams, a tool that in the current telework situation is essential. This will represent a new leap in communications security.

In any case, Check Point is working on its entire new Harmony environment and surely new ones will appear in the coming months.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Engineer at LTTS
Real User
Feb 8, 2021
Good protection against zero-day attacks and offers DLP features
Pros and Cons
  • "This DLP is very useful, as it gives our users additional protection."
  • "We can say that with Check Point Cloud Guard SaaS, we have improved our security to the next level."
  • "We are unable to export the reports from the dashboard, and if it is possible to do then it is not intuitive."
  • "We are unable to export the reports from the dashboard, and if it is possible to do then it is not intuitive."

What is our primary use case?

As users of Office 365, we are using CloudGuard SaaS to protect this cloud application. We knew that to do so, we would need a very good solution. CloudGaurd SaaS prevents malware and zero-day attacks/threats from attacking our SaaS users.

We have 17k+ users and all of them are using Office 365 for email. That's the reason we have implemented the Check Point CloudGuard SaaS solution. We needed protection, and it is working fine as per our requirement.

How has it helped my organization?

When we moved from an on-premises email solution to Office 365, we no longer had protection against malware or zero-day level attacks. With this SaaS, we prevent these problems, and also, we protect our users against phishing attacks, identity theft, have DLP support, and even SaaS shadow IT discovery protection.

We can say that with Check Point Cloud Guard SaaS, we have improved our security to the next level. Our users and business are more secure, and overall, this is a very impressive solution for us.

What is most valuable?

If you have Check Point Cloud Guard SaaS solution in place, 90% to 95% of the work in protecting your system is complete. There are some additional features that also help including Zero Day, Phasing, Identity Protection, and DLP, which provides us additional protection for our users.

This DLP is very useful, as it gives our users additional protection.

What needs improvement?

We are unable to export the reports from the dashboard, and if it is possible to do then it is not intuitive.

For how long have I used the solution?

We are using Check Point CloudGuard SaaS for the last four to five months.

What do I think about the stability of the solution?

Stability-wise, this is a good product.

What do I think about the scalability of the solution?

We have more than 17,000 users and have not faced any issue from a scalability point of view

What's my experience with pricing, setup cost, and licensing?

The cost of this product huge and it should be lowered because all organizations are going to be using cloud services. If it were more affordable then more organizations can rely on it to make them secure.

This is a very good product if you are on the cloud, but the price is a little more expensive.

What other advice do I have?

As per current threats or malware behaviors, most of the attacks or viruses are coming from email only, and if you have no such solution to protect or prevent it then you are in big trouble.

Overall, this is a good product and it has very little we have found that needs to improve.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Network Security Engineer - Presales at a tech services company with 201-500 employees
Real User
Dec 21, 2020
Has efficient, effective security features, but the solution is costly
Pros and Cons
  • "For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good."
  • "Getting reports and finding threats in the console is easy."
  • "In terms of technical features, this is the best solution that I have worked with so far."
  • "Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."
  • "The worst thing that I have faced with Check Point has been their support."

What is our primary use case?

This solution is not for our organization. We are system integrators. We have some projects for our clients, and one of our clients was looking for CloudGuard because they use Check Point Firewall for their on-premise. There are a number of machines and critical servers that they have hosted in AWS; 15 to 20 servers and application servers are hosted in the AWS platform. For those, we have applied Check Point IaaS Firewall for their security and firewall protection.

We are using the stable version that was published in March.

How has it helped my organization?

I am confident with the block rate. We host our solution in AWS cloud. If someone tries to hit our applications, they could be a legitimate user or a hacker. So, we have found a number of blocked attempts from the external end.

What is most valuable?

In terms of technical features, this is the best solution that I have worked with so far. For example:

  • URL Filtering
  • Application control 
  • Threat Prevention
  • Sandboxing

We have found threat prevention using sandboxing from Check Point, after buying the Threat Prevention license, helped with the malware prevention rate and reduced zero-day attacks.

For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good. 

Getting reports and finding threats in the console is easy.

What needs improvement?

The false positive rate is one of the problems that we had faced with Check Point's information. For example, we have a number of false positives in both CloudGuard SaaS and CloudGuard IaaS, which has been quite disappointing when we find them. However, the moment when we whitelist or blacklist false positive things, the solution gives us more efficient security than other solutions. When I teach Check Point IaaS, I feel like it is putting devices into learning mode and feeding more stuff to the solution, which gives me more efficient security.

We download the SmartConsole from AWS, installing it on our computers, then managing it from our end only on local machines. I need to download agents for every machine from the Check Point instance. To connect with the SmartConsole, then I need to give public access to Check Point's machine. At that moment, there is no configuration in my machine so I need to give some public access to our machine. Giving public access without configuring anything is the first defect or drawback. It takes a few times for every engineer to download the agent and configure the policy, and that takes five to 10 minutes. Within those five to 10 minutes, it is insecure.

The integration with the Check Point console needs improvement, e.g., accessing the SmartConsole is difficult. 

For how long have I used the solution?

I have been working with Check Point for six to seven months.

What do I think about the scalability of the solution?

I haven't tested the scalability.

How are customer service and technical support?

The worst thing that I have faced with Check Point has been their support.

I have sat with all the following support teams:

  • Cisco
  • Fortinet
  • SonicWall
  • Sophos
  • Check Point. 

Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues. 

Since this is a cloud-based solution for IaaS and SaaS, I need a different support team for a number of things. So, if they increased or developed their support team, then it would be better for their customers.

How was the initial setup?

Compared to other solutions, like Fortinet, this solution's initial setup is complex. Policy configuration and integrations make Check Point's setup difficult. The setup for on-premise and cloud are the same.

What about the implementation team?

Whenever we need to download the agent from Check Point's console and integrate the SmartConsole with the Check Point solution, the configuration is time consuming and a difficult task for an engineer. Getting the console integrated with the firewall can be difficult, affecting engineers during implementation.

What's my experience with pricing, setup cost, and licensing?

When it comes to Threat Prevention pricing and licensing, it has felt a little costly. For some clients, who are looking at security as their primary concern, then it's better for them. 

I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers.

I would like them to improve the pricing.

Which other solutions did I evaluate?

With respect to Check Point's security features, my clients and I feel every feature given by Check Point has been very helpful for us. We have tried FortiGate, Sophos, and Cisco in some places. Even though Check Point wasn't a market leader, like Cisco and FortiGate, they have the most efficient security. Therefore, we feel it is worth the money for their security features.

The cloud security provided by CloudGuard IaaS is simple compared with the security provided by public cloud providers. If I go for Check Point, then I'm getting the complete features of what a firewall does. When I go for AWS, then by default, I don't get anything other than the ACLs.

What other advice do I have?

The security features have been good. The pricing and licensing strategies have been average, but Check Point's support has been the worst.

I would rate the solution as a seven out of 10.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: System Integrator
PeerSpot user
CISO at IMC Companies
Real User
Nov 3, 2020
Gives a lot of time back to admins and simplifies our overall operations
Pros and Cons
  • "It is very intuitive. It is a point and click type of deal."
  • "It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
  • "Now, we're happy with this solution, as it's doing well."
  • "The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported. If they were to add report exporting capabilities on each of metric objects on the dashboard, that would be awesome."
  • "The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported."

What is our primary use case?

During the PoC, we have Office 365 linked to CloudGuard, which validates and checks all of the emails that come in and out. It is also checking and looking for anomalies during logon, e.g., in possible traveling type of scenarios, as we see business emails get compromised. Those pieces of it are really slick.

It also provides you with a lot of reports and visibility on the environment. Sometimes things are not native on Office 365 or you have to purchase additional licensing, but on CloudGuard you have a single pane of glass with all the metrics you need. It gives you a lot of information. For example, it tells you the successful/unsuccessful attempts to log on. 

How has it helped my organization?

If we can reduce the number of malicious emails delivered to the inbox of our users, that is a big win. Over 90 percent of breaches start with an email, so the more you can protect your users with the mail firewall piece, the better off you will be. Then, you just do exceptions. That is where endpoint protection comes in. For example, typically, if the mail firewall that we have, which is not CloudGuard, misses something malicious, once a user clicks on that email, opens it, or tries to trigger anything on it, then SandBlast Agent will catch and stop it. Now, that is without using the mail firewall on CloudGuard. However, if we were to stay with CloudGuard and apply the mail firewall, then we will just see less items, messages, and malicious messages being delivered. 

Having CloudGuard would allow us to reduce our vendor footprint. If you have less vendors and tools to manage, it gives a lot of time back to admins and simplifies our overall operations.

It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior.

What is most valuable?

The mail firewall and the Office 365 Control are its two most valuable features.

It is very intuitive. It is a point and click type of deal.

The other slick thing is it has a cleanup process. So, we can set it up and tell it to just deliver files that have been cleaned or transformed to a clean type of document.

What needs improvement?

The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported. If they were to add report exporting capabilities on each of metric objects on the dashboard, that would be awesome.

For how long have I used the solution?

We have been testing the solution for a month.

What do I think about the stability of the solution?

There have been no issues with stability so far.

What do I think about the scalability of the solution?

Being SaaS, the scalability is limitless.

Everyone who has an email is using CloudGuard, which is more than 500 users. On top of that, there is also system email addresses. If you count the email addresses or SMTP containers, there are over 1000.

At the moment, on the PoC, we only have two administrators. However, that could easily escalate to around 10. Some of their roles would be troubleshooting with users. Other roles would be email, whitelisting, logging, etc.

How are customer service and technical support?

I have not needed to use their technical support.

Which solution did I use previously and why did I switch?

We do have a current mail firewall. What Check Point is getting or receiving wasn't cleaned up or detected by our current mail firewall (Mimecast). In those terms, CloudGuard is detecting far more items than our current mail firewall. Therefore, it is really encouraging to look at CloudGuard as a solution because it's picking up what the other solution is not.

For the Active Directory on Usher, we were just using the regular Microsoft tools.

It is that time of the year when we have to renew licensing, so evaluating tools makes sense. 

Once we get the CloudGuard licensing and get it configured, we will test it out for a month or so, then drop our other service.

How was the initial setup?

The initial setup was point and click. It was really easy. We just jumped on and did it. It took 10 minutes to get it up and running altogether.

What about the implementation team?

We implemented it directly with Check Point.

What was our ROI?

Hopefully, we will be able to reduce or maintain costs that otherwise would go up. We should definitely be able to reduce the cost on support and management. It should also give us a more robust environment, which doesn't have a price associated with it.

What's my experience with pricing, setup cost, and licensing?

The pricing and licensing are always negotiable.

You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost. That is how we have been looking at it.

We are in a point in time where we are going to have to renew our Endpoint Security licensing. When we do that, we will take advantage of the SaaS management console and just concentrate there. At that point, we will have the SmartConsole, CloudGuard, and Gateway on the SaaS. However, we're not there yet.

Which other solutions did I evaluate?

We didn't evaluate any other solutions because we're not trying to get more vendors. We are trying to consolidate them.

We were already using the Check Point Endpoint Security solution and are very satisfied with it. That is what brought us to this point. Now, we're happy with this solution, as it's doing well. It is easy to manage and support. It has also reduced our need to support users because we have less issues. We used to have Sophos, and our experience with their endpoint solution moved us to use the VPN with Check Point, and now do a PoC CloudGuard.

Most providers don't give you many options unless you pay for additional licensing. In the case of Microsoft (for example), you have an E3 or E5 Office licensed, which would only cover your usage of the Office Suite, the email, and collaboration tools, but none of the security will apply to it. While Microsoft gives a free version of their MFA solution, it is very cumbersome to have. You either need to bite the bullet and buy the additional licenses, have something like CloudGuard, or both. However, most cloud providers don't give you an out-of-the-box security solution. They rely a lot on you to set up the policies that you want them to follow for your tenant space.

What other advice do I have?

Do your homework. Make sure that you have a good understanding of what tools are part of the solution and make a decision whether you're going to go SaaS or on-prem. My recommendation would be just to go SaaS, as it's a lot easier. You don't have to worry about servers or resources, as it's just on the cloud. 

If you use a third-party to help you implement the solution, it's good to use someone you trust and has experience on the product. 

Check Point has a lot of tools for analysis. This solution is just as good.

Some of the the nice features that you can do with it, we're not doing them today. For example, maybe two or three years in the future when we will host our VPN gateways on the SaaS cloud, then we will use it for our users to remote into our environment. If they had that when we implemented it the VPN, we would have used that instead of the physical gateways. 

I haven't seen any false positives.

I would the solution as a 10 out of 10.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Download our free Check Point Email Security (formerly Harmony Email & Collaboration) Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2026
Buyer's Guide
Download our free Check Point Email Security (formerly Harmony Email & Collaboration) Report and get advice and tips from experienced pros sharing their opinions.