Project Manager at Digitas APAC
User
Top 5
Increases productivity, offers good encryption, and is very secure
Pros and Cons
  • "It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
  • "The next release should focus more on email categorization and provide options for unlocking blocked safe emails."

What is our primary use case?

Check Point Harmony Email & Collaboration block any harmful social communication data that can destroy safe information. 

It enables teams in the organization to collaborate under a safe environment when working on various projects and tasks. 

It monitors the flow of emails from one destination to the other with security protocols that block phishing attacks. 

The product stops threats and fraudulent messages before entering the inbox of the receiver. This software has enabled members of the organization to focus on demanding projects without fear of external cyber-attacks.

How has it helped my organization?

Productivity has increased since there are no external detractors. 

Sending email with bulky attachments is safe and faster with guaranteed security encryption. 

It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments. 

It has been able to block malware attacks that could derail workflows and affect overall production. 

The solution cleans unsafe files quickly and eliminates threats that can adversely affect information. 

Engagement with my colleagues is easy, and I no longer fear any ransomware attacks.

What is most valuable?

Sensitive business data is effectively protected from any third-party attacks that can easily destroy confidential information. 

It prevents data from leakages and exposure to unauthorized hands. 

The high-grade bulletproof security model monitors email transfer and content that is contained in the messages. File-sharing security provides a reliable platform for faster sharing of documents without fear of external data threats. 

The dashboard provides real-time insights that provide awareness to members on the best policies for sharing information and engaging each other.

What needs improvement?

The next release should focus more on email categorization and provide options for unlocking blocked safe emails. 

They should release should increase collaboration apps that can be topped with security layers. 

It has developed reliable security infrastructure for guarding our information, and I am proud of that. Most objectives have been achieved with positive results and increased return on investment. The unified dashboard gives departments an easy time monitoring their work progress and security situation in their networking environment.

Buyer's Guide
Check Point Harmony Email & Collaboration
April 2024
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,924 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for nine months. 

What do I think about the stability of the solution?

This product is stable with robust performance.

What do I think about the scalability of the solution?

It is easy to master the concept of operations and monitor performance.

How are customer service and support?

The customer service team works closely with all the staff members.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used another solution.

How was the initial setup?

The setup was not complex.

What about the implementation team?

It was deployed by the vendor.

What was our ROI?

ROI has been positive since we deployed it and has highly improved from 15% to 35%.

What's my experience with pricing, setup cost, and licensing?

The setup and cost have been good from my experience, and I recommend it to other organizations.

Which other solutions did I evaluate?

I did not find any other effective platforms like this one.

What other advice do I have?

This is a great product with high-performance features.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Senior IT Security Manager at a tech services company with 51-200 employees
User
Helps quarantine and remove threats and detect malicious emails
Pros and Cons
  • "Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size."
  • "It's not fully integrated with Google Workspace, and the statistics don't update in real-time."

What is our primary use case?

We use the solution for preventing malicious emails that we're getting through Google's built-in spam filters. The amount of spam and phishing had greatly increased at our organization and we needed a solution implemented fast. 

Check Point was really quick to integrate and implement and instantly started providing value. The reporting we got during our trial helped to quantify the value to the executive team, in particular, the report that shows what Check Point caught items that Google's spam filters would've let through.

How has it helped my organization?

The amount of spam and phishing getting through to end users has reduced drastically. 

We are also now able to advertise how many malicious emails we get and how it is constantly increasing as we grow. This shows our users how valuable a solution like this is and they appreciate that sometimes it may get a false positive. 

We're abe to show to users why emails are quarantined - which has helped to train them on what to look out for if they do receive a suspicious email. We have also improved our reporting process and notifications to admins.

What is most valuable?

First and foremost, Check Point's ability to detect malicious emails and the filters they put in place are a big improvement on the built-in Google Workspace solution. 

Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size. Admins can be notified as soon as a suspicious email arrives in bulk mailboxes and can act extremely quickly. This has even helped us to notify partners that they had been breached before they knew themselves.

What needs improvement?

There are a few features that are more geared towards Microsoft users rather than Google, for example, user-reported phishing. It's not fully integrated with Google Workspace, and the statistics don't update in real-time. 

We appreciate that Microsoft has the larger market share, and Check Point has been improving its Google integration. However, more advancements would be appreciated. That being said, the "What Google wouldn't have caught" report was extremely valuable to us in showing value. 

For how long have I used the solution?

I've used the solution for nine months.

Which other solutions did I evaluate?

We evaluated other solutions, such as Mimecast, Proofpoint, and Abnormal.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
April 2024
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,924 professionals have used our research since 2012.
reviewer1093134 - PeerSpot reviewer
Pentester at Cybertech Projects
User
Top 20
Reduces spam, offers excellent reporting, and has good management capabilities
Pros and Cons
  • "The ease of management and intuitive administration are excellent."
  • "The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter."

What is our primary use case?

We use the solution for the protection of email from phishing attacks, spam, and malicious email-related activities. 

It detects and blocks the most advanced phishing attacks across inbound, outbound, and internal communications, in real-time, before the attack succeeds.  

The solution is used for email protection, providing IT administrators with a great amount of information about possible attacks faced by the organization, and logins by users. 

It also has a high level of detail in its reports, facilitating the management and detection of possible threats to the security of the organization.

How has it helped my organization?

The number of phishing and spam emails has decreased and email security has improved by 80%. The IT team has noticed a great improvement in the number of emails received and a decrease in attacks. The helpful alerts generated by HEC facilitate the management and response. 

Thanks to its dashboard, it displays detailed information about detected activities, suspicious logins, span deletions, or phishing detected and blocked with a high level of detail. The level of reporting detail facilitates threat management; now the organization has an additional layer of protection for end users.

What is most valuable?

The ease of management and intuitive administration are excellent. Thanks to its dashboard, the most valuable thing is the detection capability provided by this solution. The level of detail offered by Harmony is unique, to the point of showing the differences between what is detected by Office 365 and what is detected by HEC. The organization relies on this email security solution and facilitates the protection of all end users, decreasing security breaches by malicious actors.

What needs improvement?

The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter. It could be improved to obtain a greater level of detail, unlike Office 365, which offers an extreme level of detail and facilitates the management and comparison of what is happening with respect to the mail. Its integration with Gsuite is simpler and has that point against it, however high levels of detail can be obtained in the reports of the solution. On the other hand, the ease of administration and threat detection capabilities are its strong points, and it stands out from other solutions that I have had the opportunity to test before.

For how long have I used the solution?

Currently, this solution has been used for the last two years.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Planning Analyst at Ovato
User
Top 5
Offers good email security, blocks malicious emails, and protects sensitive data effectively
Pros and Cons
  • "This product enhances faster and more secure sharing of information among colleagues from different departments."
  • "There are sometimes leakages of viruses when the system is experiencing network failures."

What is our primary use case?

This product has been protecting emails across the company communication system. 

It helps my colleagues to share files and send emails without fear of phishing attacks. 

It keeps all the employees safe all the time when sharing confidential information. 

It protects sensitive company data from leaving the organization in to an insecure environment. 

Cases of ransomware attacks are no longer reported since we have the best solution for handling networking security. 

Implementing API email security across the organization enables teams to access the right information at the right time.

How has it helped my organization?

There is improved security across the emailing system and the entire communication networking infrastructure. 

This product enhances faster and more secure sharing of information among colleagues from different departments. 

Blocking malicious emails before landing inbox has enabled each member to access files with viruses and spam. 

The entire communication channels have been fully secured with end-to-end encryption. 

Email security and prevention of data from cyber attacks have been the main goals and have been achieved positively with Check Point Harmony Email & Collaboration.

What is most valuable?

Full suite protection of cloud email and collaboration applications has been a great achievement of this tool's performance. 

The security features provide a comprehensive report based on current performance and security situation. 

The platform API closely monitors the behavior of information traffic and prevents account takeover. 

It has reduced phishing attacks at a high rate and blocked many attempted attacks. 

The customer support team is online 24/7 and always offers solutions to any request when reached.

What needs improvement?

I am happy with the powerful performance of the set features. 

We have achieved the most set goals, and we are grateful for this robust solution. 

There are sometimes leakages of viruses when the system is experiencing network failures. The information may land in unsafe hands and lead to unpredictable attacks. 

Timely updates and system maintenance are encouraged to enhance continuous business operations. 

Efficient categorization of viruses will help filter out advanced phishing attacks before they affect the conversation infrastructure.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

I am impressed by the overall performance.

What do I think about the scalability of the solution?

The solution is highly scalable and powerful.

How are customer service and support?

This is the best support team I have come across. They always offer timely responses.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with a similar tool before.

How was the initial setup?

The setup was relatively complex.

What about the implementation team?

The implementation took place through the vendor team.

What was our ROI?

Our ROI has increased from 30% to 60% this year.

What's my experience with pricing, setup cost, and licensing?

The pricing and setup are suitable for any level of user.

Which other solutions did I evaluate?

I evaluated other tools, however, this was the best solution based on our demands.

What other advice do I have?

This is an excellent product for email security.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Rodrigo Nalda - PeerSpot reviewer
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees
Real User
Prompt and professional support, good threat visibility, and integrates well with Office365
Pros and Cons
  • "The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user."
  • "Check Point has to continue refining the intelligence engine to minimize the number of false positives."

What is our primary use case?

We have the entire email infrastructure based on Office 365, as well as the file-sharing environment using OneDrive, and Teams as a communication tool. We did not have a specific technology to protect this environment, except that which was provided by Microsoft.

After analyzing the market, we opted for the CheckPoint SaaS solution to cover all of these needs, which has led to a considerable leap in the company's security.

In this way, we now have a secure environment throughout the Office 365 platform, integrated into our SIEM and monitored by our SOC.

How has it helped my organization?

In the same way, we have detected malicious files in both OneDrive and SharePoint that have been blocked, which means the elimination of risks in the corporate network.

One of the important characteristics is the visibility that it gives us about suspicious access to accounts, such as several almost simultaneous accesses from impossible geographical locations. This allows us to detect non-legitimate access due to password filtering or brute force attacks.

All this makes the data of our users safer and therefore the integrity of the company is greater.

What is most valuable?

The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user. This facilitates its implementation.

Another very noteworthy feature is that the number of false positives tends to zero, which generates great confidence in both administrators and users.

The system can be easily parameterized and as it is integrated into the Infinity ecosystem, it simplifies the administration and centralization of logs.

All this makes the solution simple, reliable, and above all stable.

What needs improvement?

Check Point has to continue refining the intelligence engine to minimize the number of false positives.

For how long have I used the solution?

We have been using Check Point Harmony Email & Office for two years.

What do I think about the stability of the solution?

For two years, we have not had any problems, so we consider the application very stable.

What do I think about the scalability of the solution?

Scalability-wise, it is easy to expand licenses and therefore coverage.

How are customer service and technical support?

Check Point's technical service is one of the great values ​​of this manufacturer, with prompt attention and they are very professional.

Which solution did I use previously and why did I switch?

We did not use another solution prior to this one.

How was the initial setup?

The initial configuration was completely simple, without any problem.

What about the implementation team?

The integration was carried out by Check Point's professional services, and it was a complete success, both in terms of time and results.

What's my experience with pricing, setup cost, and licensing?

Reasonable cost, quick and easy implementation, and transparent.

Which other solutions did I evaluate?

We evaluated Palo Alto before selecting Check Point.

What other advice do I have?

All these types of tools are gradually refining the intelligence engines that minimize the number of false positives. It is a constant and evolving work that Check Point knows very well and keeps very active.

One of the functionalities that are in the process of coming out is the protection of Teams, a tool that in the current telework situation is essential. This will represent a new leap in communications security.

In any case, Check Point is working on its entire new Harmony environment and surely new ones will appear in the coming months.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
CheckPoint HE by harmony family tools
Pros and Cons
  • "The product is a fairly complete and centralized solution accessible through the Infinity Portal."
  • "Support can be a bit quicker in helping the customer."

What is our primary use case?

The company desires to protect the current email tool, in this case, Microsoft, and its collaboration products such as One Drive and Sharepoint.

We wanted to avoid malware, phishing, and spam, among other frequent threats in this infrastructure. We managed to solve it through Harmony Email Collaboration.

Other tools provided similar solutions. However, we could not centralize their administration. With the Infinity Check Point Portal, it was possible to meet this requirement.

How has it helped my organization?

Through the modern security tool Harmony Email, we managed to protect our email cloud environment and its main collaboration tools.

It is quite simple to connect through a connection API, achieving the main objective.

Its protection against malicious documents allowed us to review the attached documents through threat emulation and threat extraction and deliver the package or file to the user in just a couple of seconds, in an agile, simple, and fast way, providing an ideal delivery time for the users.

What is most valuable?

We liked this tool a lot. Its most attractive features were:

1- Check Point Harmony Threat Emulation and Threat Extraction technologies that delivered fast attached files or files with threats.

2-The DLP policies helped us a lot against the loss of sensitive information.

3-Its ease of implementation and its API to connect with solutions safely.

4-Its monitoring dashboard with screens and graphs is very useful for us as administrators.

The product is a complete, centralized solution accessible through the Infinity Portal.

What needs improvement?

Some improvements can be provided, including the documentation available. We need it to better establish the manufacturer's best practices since sometimes it is difficult to find public information because the tool is relatively new in the market.

The costs are not publicly available.     

Support can be a bit quicker in helping the customer.

More training and guides should be available for customers.

A few performance issues should be mentioned regarding the Infinity service.

For how long have I used the solution?

This is a good tool centralized in Check Point's Infinity Portal. We started using it after a POC was given to us.

What do I think about the stability of the solution?

This is an extremely stable tool.

What do I think about the scalability of the solution?

It is administered through the Infinity Portal without worrying about HW administration.

Which solution did I use previously and why did I switch?

Previously, we used the native Office 365 tool, however, we wanted more security power and a centralized environment with our other Check Point solutions.

What's my experience with pricing, setup cost, and licensing?

It is important to have a partner to request help in order to review your business requirements.

Which other solutions did I evaluate?

We always evaluate the security tools available, however, we are inclined to follow the Check Point line. The Harmony family is quite good, effective, and safe.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IT specialist at Landpower Australia Pty Ltd
Real User
A stable solution that does a fantastic job of catching things Microsoft doesn't, but implementation could be easier
Pros and Cons
  • "The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic."
  • "The implementation could definitely be better."

What is our primary use case?

At the moment, we're heavily using the email and collaboration features. We are also licensed for the mobile part, which we are sort of working into, and CloudGuard as well. We're kind of working through those features. 

What needs improvement?

The implementation could definitely be better. We had great support from Check Point, but there were some "got-you" moments where we got surprises as we were setting it up. When Check Point talks about it, it's all "plug and play," but it's not really one of those platforms where you can just jump in and click a few buttons and everything works. You need to have a bit of knowledge about what you're doing and it's a bit more complicated than they advertise.

In the future I would like to see something similar to what Proofpoint has, where users can actually go in and make the call to release their own emails. We've got a small number of users, so it's okay for the IT team to constantly be bombarded with our emails for releasing, but I would love to have an option where I can allow users to go in and make the call to release an email, and then of course it would only actually be released if it passes certain things.

For how long have I used the solution?

I have been using this solution for about a year and a half now. 

What do I think about the stability of the solution?

The solution is stable and I think it does a fantastic job. The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic. There's a few things that get flagged by Microsoft, most of them false positives, so it's interesting. Harmony passes it through and Microsoft thinks it's spam, but usually it's not.

What do I think about the scalability of the solution?

The solution is very easy to scale. There are between 500-550 active users in our company. We have a team of three people that look after the environment, but that is only part of their responsibilities. I think it would do very well with one full-time person handling the maintenance. 

How are customer service and support?

The technical support was brilliant, but that's the thing when you're buying something, usually the initial support is top notch. It's been a year and a half now, and we haven't had any urgent technical issues that we've had to go back for help with, but at the start, when we were implementing the solution, we had good support. They were on the ball and they really stepped up.

Which solution did I use previously and why did I switch?

What we used in the past was an outfit called MSX.

What's my experience with pricing, setup cost, and licensing?

Check Point is more expensive. That's the honest truth. So far, it's a good value for the money. 

Which other solutions did I evaluate?

We considered the Microsoft inbuilt solution, and the advice that we got from a lot of people was, if you want to use that one, combine it with something else. That is what we ended up doing, because it came as part of our licensing with 365, but we can tell that it was a good idea to combine it with Check Point because it will let a lot of things pass.

Also, I know CrowdStrike is cheaper with their Falcon offering, but I haven't had the opportunity to work with it. The reason why I went with Check Point was because I have worked with it in the past and I like their product, so that was the biggest push. 

What other advice do I have?

I would rate this solution as a seven out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Security Consultant at Synergy
Reseller
Top 5Leaderboard
Effectively secures your users' mailboxes against phishing and spam for any sized enterprise
Pros and Cons
  • "The anti-phishing feature is the solution's best feature."
  • "A signature-based filter could improve the solution's AI model for spam email."

What is our primary use case?

We use the solution to protect Office 365 and Gmail.

What is most valuable?

The anti-phishing feature is the solution's best feature.

What needs improvement?

A signature-based filter could improve the solution's AI model for spam email. It works right most of the time.

For how long have I used the solution?

I've worked with this solution for around a year.

What do I think about the stability of the solution?

The solution is stable, and I rate its stability a ten out of ten.

What do I think about the scalability of the solution?

The solution is scalable, and I rate its scalability a ten out of ten. Both enterprises and SMBs use this solution.

How are customer service and support?

Technical support for the solution is good.

How would you rate customer service and support?

Positive

How was the initial setup?

It is easy to set up the solution. Deploying the solution takes five minutes.

Which other solutions did I evaluate?

Harmony Email is an API-based solution. Legacy email gateway clouds, by comparison, only inspect internal emails, which include users' and end users' emails. Check Point inspects all emails before they reach the end user's mailbox.

What other advice do I have?

If you are looking for an anti-phishing solution, Check Point Harmony Email & Collaboration is the best. I rate the solution a nine out of ten because the spam filtering is still not good enough, though it does not affect the security.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.