Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Good security and integration but needs better documentation
Pros and Cons
  • "We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
  • "They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response."

What is our primary use case?

Our corporate environment requires business protection for email and our collaboration tools to avoid threats, spam, and ransomware, among other threats coming in through email. This could have great effects on our systems and equipment.

With Check Point, we can protect our data in the cloud with tools such as One Drive, among others.

The tool works with different manufacturers, which provides great reliability.

How has it helped my organization?

Check Point has helped us improve our security layer with this complete cloud solution. We no longer depend on a Gateway as it is a complete solution that helps us prevent any type of threat that travels through email.

We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point.

We also really like its centralized environment since the Check Point Infinity Portal really centralizes everything.                 

What is most valuable?

The platform offers advanced security measures to protect emails from cyber threats such as phishing attacks, malware, and ransomware.

The platform is cloud-based, which means users can access their emails and collaboration tools from anywhere and on any device.

The security of collaboration tools is great.

The platform integrates with other productivity and collaboration tools like Microsoft Office, Slack, and Zoom.

What needs improvement?

Maybe they could integrate the solution with Avanan. Doing that would really make it a very robust solution.

They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response.

The solution lacks public documentation and some documentation is not so clear, which means that the client does not understand the implementation that must be carried out.

You can only see the costs through a Check Point partner.                           

Buyer's Guide
Check Point Harmony Email & Collaboration
March 2024
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.

For how long have I used the solution?

This is a very productive tool. We used it for a few months. It really helped us protect against threats in email and Microsoft collaborative tools.

Which solution did I use previously and why did I switch?

Previously we did not use more than the security provided by Microsoft itself. We have since changed to Check Point.

What's my experience with pricing, setup cost, and licensing?

As for the cost, it is per protected user. It seems good to me in that aspect however, the issue of implementation sometimes costs a bit. That's okay if it can be done correctly. The licenses are easy to acquire.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Project Manager at UFINET
User
reduced phishing attacks, blocks malicious mail, and removes likelihood of data loss
Pros and Cons
  • "Email security has improved since we deployed this platform."
  • "Some undefined threats can bypass the security system when there is a networking failure in the organization."

What is our primary use case?

Check Point Harmony Email and Collaboration has enabled my team to implement projects and tasks effectively. 

It provides a reliable communication pathway that cannot be compromised by cyber attacks. 

It protects confidential data from leaving an organization without a proper channel. It keeps our emails in a unified environment that is secure and highly safeguarded by strong security tools. 

There are advanced collaboration techniques enhanced by this platform in the enterprise. It prevents account takeover and always keeps my colleagues under safe network infrastructure.

How has it helped my organization?

Email security has improved since we deployed this platform. 

This platform has enhanced faster file sharing and improved the collaboration network systems. 

Securing business lines has reduced cases of fraud that used to affect workflows. API connection has enabled us to integrate this platform with applications for the efficient implementation of business programs. 

Sending and receiving emails has been reliable and always productive, with zero phishing attacks. 

Full email protection of both cloud and on-premise emails has reduced the chances of losing data to zero.

What is most valuable?

Bulletproof Security catches up with all types of cyber attacks that can lead to account takeover and data compromisation. The entire networking system is secured with end-to-end encryption that enhances the secure flow of data. 

The superior data catch rate has reduced phishing attacks by a high rate of almost 100%, which has boosted productivity. 

It blocks malicious emails that wreak havoc and destroy valuable data in the systems. 

Employees can focus on more productive roles without fear of being attacked by external factors.

What needs improvement?

Some undefined threats can bypass the security system when there is a networking failure in the organization. 

The next release should have a fixed system that can categorize the various levels of viruses. 

The detection of threats before they reach inboxes has enhanced reliable communication among teams. 

The malware protection system has to be upgraded to catch up with various current threats that can easily affect our systems without precautions. 

Email and collaboration safety has been a great step that we have achieved from the performance of this platform, and I totally recommend it to others.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

This tool is highly powerful in blocking phishing attacks and ransomware attacks.

What do I think about the scalability of the solution?

I love the great performance of this platform.

How are customer service and support?

The customer support staff provides reliable services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the main email and collaboration platform that I have worked with.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

The implementation was done by the vendor.

What was our ROI?

The rate of ROI has increased from 40% to 60%.

What's my experience with pricing, setup cost, and licensing?

The setup cost is good and highly efficient.

Which other solutions did I evaluate?

I have not come across another powerful platform like this one.

What other advice do I have?

I am satisfied with the security measures that have been enhanced by this tool.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
March 2024
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
Digital Coordinator at Modis
Real User
Top 5
Helpful URL protection, good quarantine capabilities, and a nice user dashboard
Pros and Cons
  • "Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
  • "Some files are not scanned thoroughly due to occasional network failures."

What is our primary use case?

The advanced software blocks advanced email phishing that can affect information infrastructure. 

It keeps my colleagues safe when interacting with our partners through collaboration. 

Our communication networking system is secure from end to end to enhance information safety and prevent cyber attacks. 

Sending emails is fast and efficient within the organization's ecosystem. This product provides security alerts when there is a threat that can affect our communication channel. 

Check Point Harmony Email & Collaboration caters to full cloud email security and other applications in the cloud.

How has it helped my organization?

Encryption of emails enhances safe communication that ransomware attacks cannot compromise. 

A secure collaboration environment has enhanced faster growth due to productive sessions convened by teams. 

It blocks unsafe emails before landing inbox to avoid time wastage. Blocking malicious emails has enabled employees to focus on their roles fully without fear of being attacked. 

Consistent security across the company infrastructure has saved the company costs that could be accrued from an insecure work environment.

What is most valuable?

Securing major file-sharing services across the company has been productive since we deployed this platform. 

The security system has a stable data protection system that has prevented potential data loss. 

This product detects malicious behavior in advance and immediately quarantines files before they can spread viruses to the entire network. 

URL protection features give me the confidence to browse the internet without fear of visiting unsafe sites. 

The user dashboard updates systems automatically to meet the current enterprise demands.

What needs improvement?

The system has programmed categories of threats that are detected automatically. 

This can lead to virus leakage and spread malicious data across the enterprise. 

The cost of deployment and integration with other applications is high. 

Some files are not scanned thoroughly due to occasional network failures.

We have experienced the best services from the performance of this platform despite a few operational challenges that rarely occur. 

Monitoring the system operation for new teams is not easy due to complicated configuration techniques.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

It is highly stable in the provision of email security.

What do I think about the scalability of the solution?

This tool is good in overall performance.

How are customer service and support?

The support staff is kind with fast responses to our requests.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with a different solution.

How was the initial setup?

The setup was complex during integrations though the support staff provided productive guidance.

What about the implementation team?

Implementation took place through the vendor team.

What was our ROI?

There has been increased ROI (from 30% to 55%) since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The licensing terms have favored our organization.

Which other solutions did I evaluate?

We selected this product after a recommendation from our colleagues.

What other advice do I have?

Email security is critical to any enterprise, and with this solution, everything is covered.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Alejandro Flores. - PeerSpot reviewer
Director de Ingenieria at Smartelecom SA de CV
MSP
Top 5
Granular with good integration capabilities and helpful support
Pros and Cons
  • "I like the fact that having granular information about the potential threats is received in email."
  • "They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."

What is our primary use case?

We use the solution for SaaS protection for 10,000 Gsuite users. How collaborators process data with sensitive information and information leaks was a constant concern. The collaboration solution allows you to have visibility of the entire SaaS environment and create customized security profiles to give optimal treatment to the information. This solution allows you to have very granular visibility at all times; this is of utmost importance as it allows you to make immediate and precise decisions about the security environment.

How has it helped my organization?

This solution has allowed us to have visibility of the security environment for the business and has allowed us to have specific treatment by users, user groups, and departments of the information that is processed. This allows users to be certain that their information is protected. Certain security problems were detected. Without this solution at the SaaS level would have been impossible to detect so there has been an improvement in the treatment of the attack surface and the protection of valuable data.

What is most valuable?

There are several features that were considered valuable. For example, the fact that the installation and integration of the solution with SaaS tools were very fast and highly recognized by SaaS administrators. I like the fact that having granular information about the potential threats is received in email. Being able to protect information repositories was of great interest to decision-makers. It was also possible to implement an entire environment in record time. Having this information allowed us to better model the attacking surface.

What needs improvement?

They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment). 

Reports should be presented in such a way that they are readable by non-technical work groups who are involved in information protection and who may misread the information on the dashboard and make incorrect decisions.

For how long have I used the solution?

I've used the solution for four months.

What do I think about the stability of the solution?

The product is very stable; it is a cloud solution and we have not had any operational incidents.

What do I think about the scalability of the solution?

The solution is very scalable since you only have to add licenses.

How are customer service and support?

They offer good support; you have several support options depending on the SLA you need.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup is very straightforward and very fast; it took about 20 minutes.

What about the implementation team?

The setup involved a mix of personnel and Check Point SE are experts in the area of ​​security.

What's my experience with pricing, setup cost, and licensing?

The setup was very fast; the license scheme was very easy to understand.

Which other solutions did I evaluate?

We also evaluated the PAN solution and Fortinet.

What other advice do I have?

I consider it to be a cost-effective solution that focuses on security and is a highly recommended and easy-to-use option.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
CTO & Co-Founder at Cyber Strategic
Reseller
Top 5
Offers an API that adds significant value to the email session
Pros and Cons
  • "In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication."
  • "It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products."

What is our primary use case?

Basically, it protects email services like Office 365 or G-Suite as well as business communication like Slack and Teams, and offers advanced protection against phishing and attachments even before they reach the mailbox. It also includes a DLP (Data Loss Prevention) feature that can be configured to prevent sensitive information from leaving the organization via email. Additionally, it provides advanced security measures to protect against account takeover. 

The email protection piece utilizes an API rather than an agent, which is more basic. This API-based approach allows for greater flexibility and integration with other systems. You can also configure it to send suspicious items to a sandbox environment for further analysis if you're not comfortable relying solely on the automated solution.

What is most valuable?

The API is super valuable because it's not really embedded in the email session. It's more like it comes in, and before it hits your mailbox, Check Point inspects it.

Many products require running it through a specific Web Gateway or some kind of intermediate box like Barracuda, or an agent installed on Outlook among many ways. Check Point is more advanced, so it's up there with the best. In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication. It also covers collaboration tools like OneDrive, Dropbox, and Box. That's the collaboration part.

What needs improvement?

It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products. For example, there are other collaboration tools besides Box and Slack that they could explore.

For how long have I used the solution?


What do I think about the stability of the solution?

The stability is excellent. Check Point is a company that has acquired matured technology from other companies and integrated it pretty well. I've seen integrations from other companies that were lacking, but Check Point has done a great job. 

Check Point has also developed its own solutions based on its security knowledge and experience. Being an Israeli company, they have access to some of the best resources in the field. 

What do I think about the scalability of the solution?

Scalability is a significant component of Check Point, as it is built for companies of any size.

How are customer service and support?

The customer service and support team is great. I never had a problem with them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used to work as an IT manager in a biotech company that utilized Check Point, which is why I've always liked their product. It's designed for complex environments and connecting multiple branches. It can be challenging for many companies, but it's intended to handle such complexities. Overall, Check Point Harmony Email & Collaboration is a great product.

How was the initial setup?

The initial setup is very straightforward. It's actually quite easy to set up and configure because the system handles everything. You don't have to install anything separately. You install the agent for the whole solution, and you can choose to enable or disable the email component. Then you simply configure a few settings, and you're done. The real action happens in how it handles incoming emails.

What's my experience with pricing, setup cost, and licensing?

The security solutions of which Email and Collaboration are a part is competitive because Check Point competes on both technology and price.

Check Point often competes with companies like Microsoft, Sophos, and CrowdStrike. Check Point offers competitive prices. Some companies may advertise lower prices, but they exclude essential components like email security or browser security, which you need to pay extra for and in the end they cost the same or even more. 

So the pricing is highly competitive. It's comparable to other companies of the same caliber, such as Microsoft and CrowdStrike. However, with all of them, if you opt for managed services, the pricing can vary, becoming more of a black box. It's usually not publicly published and is often negotiated based on specific needs. Similar to storage pricing, you need to be aware of the details and negotiate. But overall, the pricing is excellent and on par with other leading solutions. 

When comparing Check Point with lesser-known products like Kaspersky and others, it's important to consider the target market. If you're dealing with multinational corporations, or hospital systems, their requirements differ, from smaller companies, and they may be considering solutions from SentinelOne, CrowdStrike, Sophos, or Cylance, however, you have to make sure the product offers all the specific components like email or browser security that Check Point provides. Check Point is known for its comprehensive range of solutions, including firewalls, which can be deployed to endpoints.

What other advice do I have?

I would give it a nine out of ten. It's a great product overall. I hesitate to give any company a perfect ten because there's always a chance of unexpected issues arising in the future. But so far, I haven't encountered any problems with Check Point. It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products. For example, there are other collaboration tools besides Box and Slack that they could explore.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Ruan Kotze - PeerSpot reviewer
Head: Cloud Platform Security at BCX Namibia
Reseller
Top 5
Along with great technical support, the solution also offers phishing protection
Pros and Cons
  • "The most valuable feature of the solution is the phishing protection it offers."
  • "The solution fails to support hybrid deployments."

What is our primary use case?

My company uses Check Point Harmony Email & Collaboration to provide security for Office 365 email and collaboration apps like Teams, SharePoint, OneDrive, and other related tools.

What is most valuable?

The most valuable feature of the solution is the phishing protection it offers.

What needs improvement?

The solution fails to support hybrid deployments.

Currently, the solution supports cloud email only. It would be great if they could also support hybrid deployments.

For how long have I used the solution?

I have been using Check Point Harmony Email & Collaboration for three years. My company has a partnership with Check Point.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten since there were a few minor issues that were quickly resolved while the uptime of the product has not been 100 percent.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a ten out of ten.

I would say that probably around 50 percent of our customer base uses the solution.

How are customer service and support?

The solution's technical support is very good. I rate the technical support a ten out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

I rate the product's initial setup a nine out of ten since the setup phase is seamless 99 percent of the time. If the end user customized the Office 365 tenant a lot, then a manual setup might be required.

The solution is deployed on the public cloud while supporting cloud services from Google and Microsoft.

The deployment process of the solution takes about five minutes. It would probably take ten minutes if we consider from start to finish of the deployment process.

For deployment, there is a need to create an account in Check Point Infinity Portal, after which you can activate Harmony Email & Collaboration module and then provide the credentials to your Office 365 tenant, following which the integration process starts.

What's my experience with pricing, setup cost, and licensing?

I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive.

It is a reasonably priced product offering good value for money.

What other advice do I have?

I would say that since Check Point Harmony Email & Collaboration provides a two-week evaluation option, it's very easy to integrate into your environment in a read-only mode so that it doesn't interfere with your email. It just scans and then provides you a report afterward of the threats your solution has missed and what Check Point would have caught.

Check Point Harmony Email & Collaboration is a fantastic solution.

I rate the overall tool a ten out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate
PeerSpot user
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at IRMA Anand
User
Top 5
Good support, impressive performance, and helps prevent data loss
Pros and Cons
  • "It helped us to bring security compliance and ensure system robustness throughout."
  • "The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."

What is our primary use case?

Check Point Harmony Email and Collaboration is a one-stop solution for providing the best enterprise security and protecting systems and mail servers from malware and threat attacks. 

Also, It helps in URL protection and DLP quite efficiently without any issues. 

It provides real-time protection to users and their devices from any incoming potential threats and malware sources. 

It helps in bringing security compliance to the system end to end. 

It permanently blocks phishing websites and any ransomware attacks. 

We find that it protects all confidential information from any sort of data leak and ensures data robustness and keeps everything intact in the system.

How has it helped my organization?

It helped us to bring security compliance and ensure system robustness throughout. 

It suspends and proactively blocks the malicious ransomware and threats before reaching the inbox. 

The product prevents data loss or data theft and ensures that the system is secured end to end without any trouble. 

Its API integration with other portals and applications goes smoothly without any hiccups. 

They provide bulletproof security to systems and email servers and ensure round-the-clock security for cloud email servers and other collaborating applications. 

It's an all-in-one security solution for businesses in this current era.

What is most valuable?

All the features offer great utility, and their performance is quite impressive. 

They have more secure applications than cloud-native security and have a higher security compliance rate. Also, the prevention of systems and servers from phishing attacks and system threats is proactively traceable and immediately diffused with a catchment rate of almost 99.99%, which is great in today's era of cyber threats and attacks. 

Their sound features of security for account protection and data leak protection works great for us, and we never face any compatibility or lag issue while working on the software. 

What needs improvement?

I would love to have their ticket resolution process as fast as possible. Fast and accurate ticket resolution can be a game changer for any industry, and the performance and confidence of clients go hand in hand with improved performance efficacy. This will definitely attract more loyal clients, and it helps with retention for longer periods.

The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally.

For how long have I used the solution?

I've been using the solution for precisely two years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The product is scalable and gives users a great opportunity to replicate as well.

How are customer service and support?

Customer service and support are good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first time we are using a solution of this kind formally.

How was the initial setup?

The setup was straightforward and easy.

What about the implementation team?

We implemented the product through our in-house team.

What was our ROI?

The ROI is always better than other alternatives.

What's my experience with pricing, setup cost, and licensing?

Check Point solutions are cost-effective and can be used effortlessly without any hassle. The renewal process for agreement is quite easy and can be done online easily. Licensing is smooth and price affordability is just great and can be recommended to all small and marginal start-up organizations for trial.

Which other solutions did I evaluate?

A lot of security solutions were evaluated. We evaluated Cyber Protect Cloud, Duo Security, Splunk, etc.

What other advice do I have?

This is a must-have solution for all enterprises. People should try it now.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
CISO at IMC Companies
Real User
Gives a lot of time back to admins and simplifies our overall operations
Pros and Cons
  • "It is very intuitive. It is a point and click type of deal."
  • "It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior."
  • "The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported. If they were to add report exporting capabilities on each of metric objects on the dashboard, that would be awesome."

What is our primary use case?

During the PoC, we have Office 365 linked to CloudGuard, which validates and checks all of the emails that come in and out. It is also checking and looking for anomalies during logon, e.g., in possible traveling type of scenarios, as we see business emails get compromised. Those pieces of it are really slick.

It also provides you with a lot of reports and visibility on the environment. Sometimes things are not native on Office 365 or you have to purchase additional licensing, but on CloudGuard you have a single pane of glass with all the metrics you need. It gives you a lot of information. For example, it tells you the successful/unsuccessful attempts to log on. 

How has it helped my organization?

If we can reduce the number of malicious emails delivered to the inbox of our users, that is a big win. Over 90 percent of breaches start with an email, so the more you can protect your users with the mail firewall piece, the better off you will be. Then, you just do exceptions. That is where endpoint protection comes in. For example, typically, if the mail firewall that we have, which is not CloudGuard, misses something malicious, once a user clicks on that email, opens it, or tries to trigger anything on it, then SandBlast Agent will catch and stop it. Now, that is without using the mail firewall on CloudGuard. However, if we were to stay with CloudGuard and apply the mail firewall, then we will just see less items, messages, and malicious messages being delivered. 

Having CloudGuard would allow us to reduce our vendor footprint. If you have less vendors and tools to manage, it gives a lot of time back to admins and simplifies our overall operations.

It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior.

What is most valuable?

The mail firewall and the Office 365 Control are its two most valuable features.

It is very intuitive. It is a point and click type of deal.

The other slick thing is it has a cleanup process. So, we can set it up and tell it to just deliver files that have been cleaned or transformed to a clean type of document.

What needs improvement?

The NAVEX metrics that I have been using on the CloudGuard dashboard cannot be exported. If they were to add report exporting capabilities on each of metric objects on the dashboard, that would be awesome.

For how long have I used the solution?

We have been testing the solution for a month.

What do I think about the stability of the solution?

There have been no issues with stability so far.

What do I think about the scalability of the solution?

Being SaaS, the scalability is limitless.

Everyone who has an email is using CloudGuard, which is more than 500 users. On top of that, there is also system email addresses. If you count the email addresses or SMTP containers, there are over 1000.

At the moment, on the PoC, we only have two administrators. However, that could easily escalate to around 10. Some of their roles would be troubleshooting with users. Other roles would be email, whitelisting, logging, etc.

How are customer service and technical support?

I have not needed to use their technical support.

Which solution did I use previously and why did I switch?

We do have a current mail firewall. What Check Point is getting or receiving wasn't cleaned up or detected by our current mail firewall (Mimecast). In those terms, CloudGuard is detecting far more items than our current mail firewall. Therefore, it is really encouraging to look at CloudGuard as a solution because it's picking up what the other solution is not.

For the Active Directory on Usher, we were just using the regular Microsoft tools.

It is that time of the year when we have to renew licensing, so evaluating tools makes sense. 

Once we get the CloudGuard licensing and get it configured, we will test it out for a month or so, then drop our other service.

How was the initial setup?

The initial setup was point and click. It was really easy. We just jumped on and did it. It took 10 minutes to get it up and running altogether.

What about the implementation team?

We implemented it directly with Check Point.

What was our ROI?

Hopefully, we will be able to reduce or maintain costs that otherwise would go up. We should definitely be able to reduce the cost on support and management. It should also give us a more robust environment, which doesn't have a price associated with it.

What's my experience with pricing, setup cost, and licensing?

The pricing and licensing are always negotiable.

You can get CloudGuard as part of Infinity. When you do the solution through Infinity, it's a per user type of license cost. That is how we have been looking at it.

We are in a point in time where we are going to have to renew our Endpoint Security licensing. When we do that, we will take advantage of the SaaS management console and just concentrate there. At that point, we will have the SmartConsole, CloudGuard, and Gateway on the SaaS. However, we're not there yet.

Which other solutions did I evaluate?

We didn't evaluate any other solutions because we're not trying to get more vendors. We are trying to consolidate them.

We were already using the Check Point Endpoint Security solution and are very satisfied with it. That is what brought us to this point. Now, we're happy with this solution, as it's doing well. It is easy to manage and support. It has also reduced our need to support users because we have less issues. We used to have Sophos, and our experience with their endpoint solution moved us to use the VPN with Check Point, and now do a PoC CloudGuard.

Most providers don't give you many options unless you pay for additional licensing. In the case of Microsoft (for example), you have an E3 or E5 Office licensed, which would only cover your usage of the Office Suite, the email, and collaboration tools, but none of the security will apply to it. While Microsoft gives a free version of their MFA solution, it is very cumbersome to have. You either need to bite the bullet and buy the additional licenses, have something like CloudGuard, or both. However, most cloud providers don't give you an out-of-the-box security solution. They rely a lot on you to set up the policies that you want them to follow for your tenant space.

What other advice do I have?

Do your homework. Make sure that you have a good understanding of what tools are part of the solution and make a decision whether you're going to go SaaS or on-prem. My recommendation would be just to go SaaS, as it's a lot easier. You don't have to worry about servers or resources, as it's just on the cloud. 

If you use a third-party to help you implement the solution, it's good to use someone you trust and has experience on the product. 

Check Point has a lot of tools for analysis. This solution is just as good.

Some of the the nice features that you can do with it, we're not doing them today. For example, maybe two or three years in the future when we will host our VPN gateways on the SaaS cloud, then we will use it for our users to remote into our environment. If they had that when we implemented it the VPN, we would have used that instead of the physical gateways. 

I haven't seen any false positives.

I would the solution as a 10 out of 10.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2024
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.