Try our new research platform with insights from 80,000+ expert users
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS
Real User
Top 5Leaderboard
Good DLP and threat prevention and helpful centralized management
Pros and Cons
  • "It is fast and quite effective in terms of preventing any security incidents."
  • "Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents."

What is our primary use case?

The company handles confidential information, such as clients' financial data, and it is important to keep that information secure to comply with certain regulations. 

One of the important challenges was to counteract the amount of phishing, ransomware attacks, and accidental leaks of information through email and collaboration applications.

We did not have a tool that would provide this security, so we chose to look for one and apply it to our environment.

How has it helped my organization?

The company handles a large amount of client information, some of which is confidential, including account numbers and sensitive information. This tool provides us with the features to meet the needs we have. 

One of these features is real-time threat prevention. It uses advanced analytics to detect and block malicious emails, phishing, and unwanted content before they reach inboxes. It also has DLP. This helps prevent the leak of information. In this way, we can reduce vulnerabilities.

What is most valuable?

The tool has many important features. Some of them are very valuable.

One of the most valuable is real-time prevention, which constantly analyzes and provides results. The leak control that comes with DLP is excellent. 

It provides us with a more centralized management where we can monitor everything that happens in our environment and in this way, can manage the security policies necessary for our organization in real time. 

It is fast and quite effective in terms of preventing any security incidents.

What needs improvement?

The product is a very effective tool. It provides a lot of security to ensure the confidentiality of the information.

Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents.

They should also improve the quality of technical support since, in the last few years, they have lowered the quality of SLA response and do not provide concise solutions. 

They should also generate a knowledge base where the unified information or the most common errors are found so as not to depend so much on support.

Buyer's Guide
Check Point Harmony Email & Collaboration
June 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.

For how long have I used the solution?

I have experience using the solution for four years.

What do I think about the stability of the solution?

The stability presents as efficient.

What do I think about the scalability of the solution?

The scalability is new; it is multi-cloud.

How are customer service and support?

The experience has not been very good since we have had problems with the SLA.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no previous solution in the organization.

How was the initial setup?

The initial implementation is complicated when you do not have experience with said tool.

What about the implementation team?

It was implemented with the seller and his engineer in charge, which was very fast and friendly.

What was our ROI?

The investment is somewhat high. However, it will provide security for all customer information.

What's my experience with pricing, setup cost, and licensing?

The tool is somewhat competitive with the others on the market. The installation has an average learning curve.

Which other solutions did I evaluate?

Several solutions were evaluated, such as Microsoft Defender for Office 365, Proofpoint Email Protection, and Cisco Secure Email.

What other advice do I have?

It is an excellent tool for information security. Before acquiring it, you must analyze whether it meets company needs.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Suresh Pathipatti - PeerSpot reviewer
Senior Information Technology Administrator at Aighospital
Real User
Top 5
Helps quarantine emails with security issues
Pros and Cons
  • "The product offers good and easy integration capabilities with other products."
  • "I need to go to Check Point's admin portal if I want to see the license list and the details of the users of the tool, making it an area of concern where some ease of process should be provided from an improvement perspective."

What is our primary use case?

I use the solution in my company to secure the users' environment so that there are no phishing attacks. The tool operates as an anti-spam solution for the users in our company. Each and every email passes through the email security scanning process. Emails with issues get quarantined by the solution.

What is most valuable?

The most valuable features of the solution include all of the functionalities offered by the tool, which work fine. I cannot say that a particular feature does not work fine. Each and every feature provided by the product works fine.

What needs improvement?

At the time of the purchase of the product for the users in my company, I am unable to see or get details of the users for whom the product has been purchased. I need to go to Check Point's admin portal if I want to see the license list and the details of the users of the tool, making it an area of concern where some ease of process should be provided from an improvement perspective.

For how long have I used the solution?

I have been using Check Point Harmony Email & Collaboration for two years.

What do I think about the stability of the solution?

There are day-to-day updates in the solution. The product gets updated automatically since it is a SaaS-based tool. My company does not have to invest time to upgrade any applications in the product. In general, it is a hassle-free process to work with the product.

What do I think about the scalability of the solution?

My company has around 50 users of the product.

My company plans to increase the number of uses of the product in the upcoming two or three months.

How are customer service and support?

The need to seek technical support depends upon the severity of the issues that we face in our company with the product. Depending on the severity of the issue, my company connects with the support team in three to four hours. During high-severity cases when our entire organization goes down due to some issue in the product, my company connects directly with the support team.

How was the initial setup?

People already use the product as a SaaS-based tool, but it can be complex if used at an in-house level only. As a SaaS-based tool, the product is easy to use without complexities.

The solution is deployed on the cloud.

The solution can be deployed in twenty minutes to half an hour.

What was our ROI?

I work in a hospital where we purchased the tool for security purposes. Being a hospital, we did not purchase the product with an ROI angle in mind.

What's my experience with pricing, setup cost, and licensing?

I don't even have details of the product's single license purchased by my company.

What other advice do I have?

The product is useful as it works fine to secure our company's email communication. My company has not faced any issues since the time we purchased the solution.

The product has improved our organization's functioning as a secure collaboration tool, considering that different products are made available in the market on a day-to-day basis. As a tool for email security, the solution serves as one of the best products in the market.

The product offers good and easy integration capabilities with other products. When it comes to integration, the product will ask about the credentials of the global applications to the tool's admin, after which it will automatically scan the licenses of the integrated products.

The reports and analytics part of the product is fine for my company since it allows us to check the analytical reports on a weekly basis at a user level. The product provides different kinds of reports like anti-spam reports that we can check in our company.

I recommended the product to those who plan to use it for email security purposes, as it offers a seamless and user-friendly experience to its users. There is no complexity involved in integrations with other products for better email security.

The need for cybersecurity will increase in different ways on a daily basis. The product does not provide alerts. The product fails to provide alerts if some issue occurs at a global level. From an improvement perspective, the product should provide alerts related to email security to its users.

I rate the tool a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
June 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Kalpesh Panchal - PeerSpot reviewer
TOC Architect at Infopercept Consulting Limited
Real User
Top 5
Easy to setup, give me detailed information for malicious storage and stable product
Pros and Cons
  • "The option to set a copy is beneficial."
  • "The reporting could be improved."

What is our primary use case?

We use two solutions: Check Point Gateway and Harmony Email & Collaboration.

We primarily use it for IDS and threat protection, as well as VPN.

What is most valuable?

It's very easy to deploy with Microsoft Office 365.

The option to set a copy is beneficial. Additionally, the solution scans OneDrive, Teams, and SharePoint content and provides a full report. 

If I store any malicious file in my cloud storage, it will give me detailed information in the Check Point console, including which DLL is infected. That's a very useful feature.

I'm satisfied with the product as it is, especially regarding security.

What needs improvement?

The reporting could be improved. Also, the predefined workflows cannot be changed. It would be great to add custom workflows to better suit customer requirements.

For how long have I used the solution?

I've been working with Check Point for the last four years. I perform day-to-day operational tasks with it.

What do I think about the stability of the solution?

It is stable.

What do I think about the scalability of the solution?

It is scalable. There are around 300 end users.

It's a cloud-based SaaS application, so it doesn't need to be deployed in multiple locations. We integrated it with our existing email solution, and all our email traffic is routed through it.

How are customer service and support?

The customer service and support are very good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I've worked with Microsoft Defender, Proofpoint, and Barracuda Email Security.

The pros include quick implementation time and easy policy deployment. Security is also good, as Check Point provides multiple security engines and inline data security. As for cons, having the option for custom workflows would be a great improvement.

How was the initial setup?

I completed the initial setup in about 15 minutes, by myself. It was very easy. There's no need for improvement. 

We share product white papers with our customers, understand customers' needs and current email infrastructure, and design a solution before pitching to them. We also create a project timeline for the POC and implementation.

It's easy to integrate, as it supports both cloud-based platforms, O365 and Google Workspace. If you have basic knowledge of your email platform, you can easily integrate the product.

Check Point takes care of the maintenance. It doesn't require any maintenance. 

What was our ROI?

Check Point Harmony Email & Collaboration is beneficial for customers. It brings in the value.

It provides enhanced email content security to prevent external attacks.

What's my experience with pricing, setup cost, and licensing?

I run the proof of concept and submit a report to management. They handle discussions with customers and coordinate with the Check Point sales team.

What other advice do I have?

I would recommend it. 

Overall, I would rate it a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
PeerSpot user
Ruan Kotze - PeerSpot reviewer
Head: Cloud Platform Security at BCX Namibia
Reseller
Top 5Leaderboard
Along with great technical support, the solution also offers phishing protection
Pros and Cons
  • "The most valuable feature of the solution is the phishing protection it offers."
  • "The solution fails to support hybrid deployments."

What is our primary use case?

My company uses Check Point Harmony Email & Collaboration to provide security for Office 365 email and collaboration apps like Teams, SharePoint, OneDrive, and other related tools.

What is most valuable?

The most valuable feature of the solution is the phishing protection it offers.

What needs improvement?

The solution fails to support hybrid deployments.

Currently, the solution supports cloud email only. It would be great if they could also support hybrid deployments.

For how long have I used the solution?

I have been using Check Point Harmony Email & Collaboration for three years. My company has a partnership with Check Point.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten since there were a few minor issues that were quickly resolved while the uptime of the product has not been 100 percent.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a ten out of ten.

I would say that probably around 50 percent of our customer base uses the solution.

How are customer service and support?

The solution's technical support is very good. I rate the technical support a ten out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

I rate the product's initial setup a nine out of ten since the setup phase is seamless 99 percent of the time. If the end user customized the Office 365 tenant a lot, then a manual setup might be required.

The solution is deployed on the public cloud while supporting cloud services from Google and Microsoft.

The deployment process of the solution takes about five minutes. It would probably take ten minutes if we consider from start to finish of the deployment process.

For deployment, there is a need to create an account in Check Point Infinity Portal, after which you can activate Harmony Email & Collaboration module and then provide the credentials to your Office 365 tenant, following which the integration process starts.

What's my experience with pricing, setup cost, and licensing?

I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive.

It is a reasonably priced product offering good value for money.

What other advice do I have?

I would say that since Check Point Harmony Email & Collaboration provides a two-week evaluation option, it's very easy to integrate into your environment in a read-only mode so that it doesn't interfere with your email. It just scans and then provides you a report afterward of the threats your solution has missed and what Check Point would have caught.

Check Point Harmony Email & Collaboration is a fantastic solution.

I rate the overall tool a ten out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
reviewer2584944 - PeerSpot reviewer
Senior Information Security Engineer at Glidewell Laboratories
User
Top 10
Good for preventing phishing with a nice dashboard and Explore page
Pros and Cons
  • "The dashboard provides information to investigate more about malicious activity and blocked emails."
  • "It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files."

What is our primary use case?

We use the solution to prevent any phishing emails from reaching out to the end users. We also use it for URL protection and DLP, to protect the end users from ransomware attacks, and to avoid any issues that halt business activities.

We used to have another solution for email security and we used to find so many issues while using it. We could not stop some phishing emails from getting into the user's mailbox and were worried about losing data. We had to work on fine-tuning the solution all the time to avoid the issues. We came to know about Check Point and wanted to try for email security.

How has it helped my organization?

We have blocked more phishing emails since we started using Check Point. The solution works brilliantly in filtering and the amount of information provided is unmatched and helped us in various ways. 

The Explore page provides multiple options for searching for emails and other information. Quarantine/removing from Quarantine has become so easy with search options

The dashboard provides information to investigate more about malicious activity and blocked emails. 

Check Point has become our go-to solution for most of our issues.

What is most valuable?

We like the email search options, availability of information on various aspects, algorithms, and AI models that provide pretty useful data - and the list goes on!

The email search/explore option helped us find the required emails and logs easily with multiple filters to use. 

Information provided in each and every email is very useful for investigating any activity. We do not have to use multiple websites for that information since everything is provided in Check Point itself. 

AI-based models and algorithms provide more accurate and useful information.

What needs improvement?

It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files. That will help in creating more filters and analyzing the data.

Providing more Training videos and documentation will be helpful for beginners to understand how checkpoint works. 

For how long have I used the solution?

I've used the solution for the past eight months.

Which solution did I use previously and why did I switch?

We used some other email security tools and we used to have multiple issues with email filtering and available information. We do not see any of those issues after using Check Point.

What's my experience with pricing, setup cost, and licensing?

We are good with the licensing.

Which other solutions did I evaluate?

We directly chose Check Point since we could not find any better alternative.

What other advice do I have?

It is the perfect one-stop solution for securing the organization!

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PRADIPJOSHI - PeerSpot reviewer
Owner at Shree Atharva Sales Corporation
Real User
Top 5Leaderboard
Reliable product with a straightforward setup process
Pros and Cons
  • "The product is reliable and sturdy."
  • "They must provide security to more email service providers."

What is most valuable?

The product is reliable and sturdy. It can be configured within five minutes and has minimal downtime. It provides an in-built API functionality. It supports chat and file sharing from solutions like OneDrive, SharePoint, Google Drive, and Dropbox. Additionally, it offers 100% protection for unified communication or collaboration to prevent hacking incidents like the Zoom hack.

What needs improvement?

They must provide security to Rediffmail and other email service providers. At present, it is limited to only two email services. They should also offer additional protection to Zoom, Cisco Webex, BlueJeans, and StarLeaf.

For how long have I used the solution?

We have been using Check Point Harmony Email & Collaboration for five to six days. However, we have been using Check Point for five to six years.

What do I think about the stability of the solution?

I rate the platform’s stability a ten out of ten.

What do I think about the scalability of the solution?

I rate the platform’s scalability a ten out of ten. It is suitable for small, medium, and large companies. Mostly, it will be helpful for small enterprises that can’t afford firewall solutions like Wireshark.

How are customer service and support?

Check Point has a good support system in our country. They are 100% customer-centric and have many support partners as well.

How was the initial setup?

It is straightforward to set up. We can deploy within five minutes.

What about the implementation team?

Check Point is a very user-friendly product. The customers can deploy it easily with some technical knowledge; they can take help for installation and programming for a nominal cost from the product partners.

What's my experience with pricing, setup cost, and licensing?

I rate the platform’s pricing a seven and a half.

What other advice do I have?

I rate Check Point Harmony Email & Collaboration a ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Integrates with Office365, strengthens security, and provides visibility
Pros and Cons
  • "It is fast and has a very simple, easy integration."
  • "Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult."

What is our primary use case?

Our company uses Office 365 and clearly, we use Outlook. We needed a tool that had the functionality to verify and validate the emails that enter and leave our organization. With this tool, we can solve security problems since many of the collaborators work from home. With this, we have decreased phishing attacks. It offers quite a few types of analysis and reporting that help to clear up security doubts and how to counter these gaps.

Check Point Harmony Email & Collaboration is workload protection in the cloud. This firewall helps us provide controls on our organization's devices and has become our main tool in the analysis and coverage of the infrastructure and also maintains fairly reasonable scalability.

How has it helped my organization?

Check Point Harmony Email & Collaboration has helped our company with perimeter security and securing our employees from wherever they are working. It's strengthening security as it is able to stop phishing attacks on Office 365 accounts and block possible account hijacking. It is also responsible for detecting malicious files in both OneDrive and SharePoint. This makes the product more robust and also gives us visibility into suspicious access, and provides the areas from which they are trying to enter. With this other feature, it provides more integrity to our company.

What is most valuable?

We have found several features that are very valuable. One of them is the integration with Office365. In addition to that, it is fast and has a very simple, easy integration. In addition to that, it integrates with other Office 365 products. The false positives are minimal, almost nil. That is very important since it will not generate an absurd amount of emails. The functionality of the tool is very easy to configure and manage. The platform is friendly and makes its integrations even more, so this tool is very efficient.

What needs improvement?

Check Point Harmony Email & Collaboration presents a problem similar to the other Check Point tools that it was able to manage, and that is the access to its administrative functions. Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult. 

It presents problems in the management of technical support since the SLA is not optimal, causing delays. This means that security problems may arise since it does not provide a quick response or a concrete solution.

For how long have I used the solution?

I have been using it for approximately 4 years

What do I think about the stability of the solution?

The tool stability is very good.

What do I think about the scalability of the solution?

The scalability that the solution presents is very good. It is quite scalable.

How are customer service and support?

The experience has not been very pleasant since we have opened cases and they take too much time to respond or schedule a meeting even to provide a solution.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no other solution implemented.

How was the initial setup?

The initial configuration was very simple and fast.

What about the implementation team?

During the implementation, the provider's team helped us, and it was very efficient; they knew what they were doing

What was our ROI?

The functionality that the tool presents with its characteristics and capabilities helped us a lot in our organization.

What's my experience with pricing, setup cost, and licensing?

Like all security tools, they are expensive tools. However, Check Point competes in the market and its accessibility is good, so paying for a tool that provides security is worth it.

Which other solutions did I evaluate?

The company has already had several Check Point tools. For this reason, this tool was implemented to keep in line with the same brand and hopefully not present us with problems if we implement another one.

What other advice do I have?

The only advice is to improve the technical support for your users since it is not very efficient.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Alejandro Flores. - PeerSpot reviewer
Director de Ingenieria at Smartelecom SA de CV
MSP
Top 5
Granular with good integration capabilities and helpful support
Pros and Cons
  • "I like the fact that having granular information about the potential threats is received in email."
  • "They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."

What is our primary use case?

We use the solution for SaaS protection for 10,000 Gsuite users. How collaborators process data with sensitive information and information leaks was a constant concern. The collaboration solution allows you to have visibility of the entire SaaS environment and create customized security profiles to give optimal treatment to the information. This solution allows you to have very granular visibility at all times; this is of utmost importance as it allows you to make immediate and precise decisions about the security environment.

How has it helped my organization?

This solution has allowed us to have visibility of the security environment for the business and has allowed us to have specific treatment by users, user groups, and departments of the information that is processed. This allows users to be certain that their information is protected. Certain security problems were detected. Without this solution at the SaaS level would have been impossible to detect so there has been an improvement in the treatment of the attack surface and the protection of valuable data.

What is most valuable?

There are several features that were considered valuable. For example, the fact that the installation and integration of the solution with SaaS tools were very fast and highly recognized by SaaS administrators. I like the fact that having granular information about the potential threats is received in email. Being able to protect information repositories was of great interest to decision-makers. It was also possible to implement an entire environment in record time. Having this information allowed us to better model the attacking surface.

What needs improvement?

They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment). 

Reports should be presented in such a way that they are readable by non-technical work groups who are involved in information protection and who may misread the information on the dashboard and make incorrect decisions.

For how long have I used the solution?

I've used the solution for four months.

What do I think about the stability of the solution?

The product is very stable; it is a cloud solution and we have not had any operational incidents.

What do I think about the scalability of the solution?

The solution is very scalable since you only have to add licenses.

How are customer service and support?

They offer good support; you have several support options depending on the SLA you need.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup is very straightforward and very fast; it took about 20 minutes.

What about the implementation team?

The setup involved a mix of personnel and Check Point SE are experts in the area of ​​security.

What's my experience with pricing, setup cost, and licensing?

The setup was very fast; the license scheme was very easy to understand.

Which other solutions did I evaluate?

We also evaluated the PAN solution and Fortinet.

What other advice do I have?

I consider it to be a cost-effective solution that focuses on security and is a highly recommended and easy-to-use option.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.