Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 20
CheckPoint HE by harmony family tools
Pros and Cons
  • "The product is a fairly complete and centralized solution accessible through the Infinity Portal."
  • "Support can be a bit quicker in helping the customer."

What is our primary use case?

The company desires to protect the current email tool, in this case, Microsoft, and its collaboration products such as One Drive and Sharepoint.

We wanted to avoid malware, phishing, and spam, among other frequent threats in this infrastructure. We managed to solve it through Harmony Email Collaboration.

Other tools provided similar solutions. However, we could not centralize their administration. With the Infinity Check Point Portal, it was possible to meet this requirement.

How has it helped my organization?

Through the modern security tool Harmony Email, we managed to protect our email cloud environment and its main collaboration tools.

It is quite simple to connect through a connection API, achieving the main objective.

Its protection against malicious documents allowed us to review the attached documents through threat emulation and threat extraction and deliver the package or file to the user in just a couple of seconds, in an agile, simple, and fast way, providing an ideal delivery time for the users.

What is most valuable?

We liked this tool a lot. Its most attractive features were:

1- Check Point Harmony Threat Emulation and Threat Extraction technologies that delivered fast attached files or files with threats.

2-The DLP policies helped us a lot against the loss of sensitive information.

3-Its ease of implementation and its API to connect with solutions safely.

4-Its monitoring dashboard with screens and graphs is very useful for us as administrators.

The product is a complete, centralized solution accessible through the Infinity Portal.

What needs improvement?

Some improvements can be provided, including the documentation available. We need it to better establish the manufacturer's best practices since sometimes it is difficult to find public information because the tool is relatively new in the market.

The costs are not publicly available.     

Support can be a bit quicker in helping the customer.

More training and guides should be available for customers.

A few performance issues should be mentioned regarding the Infinity service.

Buyer's Guide
Check Point Harmony Email & Collaboration
June 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.

For how long have I used the solution?

This is a good tool centralized in Check Point's Infinity Portal. We started using it after a POC was given to us.

What do I think about the stability of the solution?

This is an extremely stable tool.

What do I think about the scalability of the solution?

It is administered through the Infinity Portal without worrying about HW administration.

Which solution did I use previously and why did I switch?

Previously, we used the native Office 365 tool, however, we wanted more security power and a centralized environment with our other Check Point solutions.

What's my experience with pricing, setup cost, and licensing?

It is important to have a partner to request help in order to review your business requirements.

Which other solutions did I evaluate?

We always evaluate the security tools available, however, we are inclined to follow the Check Point line. The Harmony family is quite good, effective, and safe.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Support at a security firm with 51-200 employees
User
Good security and integration but needs better documentation
Pros and Cons
  • "We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
  • "They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response."

What is our primary use case?

Our corporate environment requires business protection for email and our collaboration tools to avoid threats, spam, and ransomware, among other threats coming in through email. This could have great effects on our systems and equipment.

With Check Point, we can protect our data in the cloud with tools such as One Drive, among others.

The tool works with different manufacturers, which provides great reliability.

How has it helped my organization?

Check Point has helped us improve our security layer with this complete cloud solution. We no longer depend on a Gateway as it is a complete solution that helps us prevent any type of threat that travels through email.

We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point.

We also really like its centralized environment since the Check Point Infinity Portal really centralizes everything.                 

What is most valuable?

The platform offers advanced security measures to protect emails from cyber threats such as phishing attacks, malware, and ransomware.

The platform is cloud-based, which means users can access their emails and collaboration tools from anywhere and on any device.

The security of collaboration tools is great.

The platform integrates with other productivity and collaboration tools like Microsoft Office, Slack, and Zoom.

What needs improvement?

Maybe they could integrate the solution with Avanan. Doing that would really make it a very robust solution.

They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response.

The solution lacks public documentation and some documentation is not so clear, which means that the client does not understand the implementation that must be carried out.

You can only see the costs through a Check Point partner.                           

For how long have I used the solution?

This is a very productive tool. We used it for a few months. It really helped us protect against threats in email and Microsoft collaborative tools.

Which solution did I use previously and why did I switch?

Previously we did not use more than the security provided by Microsoft itself. We have since changed to Check Point.

What's my experience with pricing, setup cost, and licensing?

As for the cost, it is per protected user. It seems good to me in that aspect however, the issue of implementation sometimes costs a bit. That's okay if it can be done correctly. The licenses are easy to acquire.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
June 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
856,873 professionals have used our research since 2012.
Cloud Support at a tech company with 1-10 employees
User
Excellent alternative mail solution, Modern Harmony E&C
Pros and Cons
  • "Its characteristics are adapted to the most modern threats."
  • "Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix."

What is our primary use case?

Our goal has always been to strengthen our infrastructure. We currently have Microsoft 365. In order to provide a centralized security solution, we use Checkpoint Harmony Email, which provides us with security against phishing attacks, malware, and advanced data protection, among others. Some other features that successfully help provide a robust security infrastructure for all collaborative applications.

It is also important to mention that it is managed under the Check Point Infinity Portal, which is the most modern of the Check Point approaches.

How has it helped my organization?

We have managed to implement this as a totally cloud tool, from the Check Point Infinity Portal. It's super easy. In addition, we have managed to generate DLP policies for the protection of data that is shared to avoid sensitive losses and compliance with regulations.

Also, through the monitoring panel we have been able to see the behavior of our environment and how it is attacked by new threats. We can make decisions to improve our infrastructure thanks to Harmony Email.

What is most valuable?

This Check Point Harmony Email tool is very modern. Its characteristics are adapted to the most modern threats. One of its main virtues is its monitoring system, which is very important for decision-making, however, it is also very intuitive, easy to understand, and simple to use.

Its DLP policies are quite easy to implement, which help a lot with compliance with the regulations required by our company in addition to shielding sensitive data.

This tool integrates and protects all collaborative tools, in our case, Microsoft 365.

What needs improvement?

The key improvement for this tool is the inclusion of more collaborative applications. We know that Microsoft has many tools, however, not all of them are covered.

It is also important to validate the documentation. Not all of it is precise. It is very difficult to find the correct ones. In this area, Check Point could generate a more up-to-date library to be able to help customers or companies use their products more.

Finally, the Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix.

For how long have I used the solution?

A very modern tool, centralized through Check Point Infinity, this is used by our company on a trial basis during the last semester.

Which solution did I use previously and why did I switch?

Previously, we used Microsoft security tools. However, we needed to centralize the security environments, and it was perfect with Infinity.

What's my experience with pricing, setup cost, and licensing?

It is important to evaluate the tools before going into production to verify that everything works correctly.

Which other solutions did I evaluate?

We carried out a previous validation of the functions and current tools of the market. It convinced us to move towards Check Point.

What other advice do I have?

Security applications are validated and I would recommend the solution.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2005803 - PeerSpot reviewer
Digital Coordinator at Modis
Real User
Helpful URL protection, good quarantine capabilities, and a nice user dashboard
Pros and Cons
  • "Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
  • "Some files are not scanned thoroughly due to occasional network failures."

What is our primary use case?

The advanced software blocks advanced email phishing that can affect information infrastructure. 

It keeps my colleagues safe when interacting with our partners through collaboration. 

Our communication networking system is secure from end to end to enhance information safety and prevent cyber attacks. 

Sending emails is fast and efficient within the organization's ecosystem. This product provides security alerts when there is a threat that can affect our communication channel. 

Check Point Harmony Email & Collaboration caters to full cloud email security and other applications in the cloud.

How has it helped my organization?

Encryption of emails enhances safe communication that ransomware attacks cannot compromise. 

A secure collaboration environment has enhanced faster growth due to productive sessions convened by teams. 

It blocks unsafe emails before landing inbox to avoid time wastage. Blocking malicious emails has enabled employees to focus on their roles fully without fear of being attacked. 

Consistent security across the company infrastructure has saved the company costs that could be accrued from an insecure work environment.

What is most valuable?

Securing major file-sharing services across the company has been productive since we deployed this platform. 

The security system has a stable data protection system that has prevented potential data loss. 

This product detects malicious behavior in advance and immediately quarantines files before they can spread viruses to the entire network. 

URL protection features give me the confidence to browse the internet without fear of visiting unsafe sites. 

The user dashboard updates systems automatically to meet the current enterprise demands.

What needs improvement?

The system has programmed categories of threats that are detected automatically. 

This can lead to virus leakage and spread malicious data across the enterprise. 

The cost of deployment and integration with other applications is high. 

Some files are not scanned thoroughly due to occasional network failures.

We have experienced the best services from the performance of this platform despite a few operational challenges that rarely occur. 

Monitoring the system operation for new teams is not easy due to complicated configuration techniques.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

It is highly stable in the provision of email security.

What do I think about the scalability of the solution?

This tool is good in overall performance.

How are customer service and support?

The support staff is kind with fast responses to our requests.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with a different solution.

How was the initial setup?

The setup was complex during integrations though the support staff provided productive guidance.

What about the implementation team?

Implementation took place through the vendor team.

What was our ROI?

There has been increased ROI (from 30% to 55%) since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The licensing terms have favored our organization.

Which other solutions did I evaluate?

We selected this product after a recommendation from our colleagues.

What other advice do I have?

Email security is critical to any enterprise, and with this solution, everything is covered.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2008407 - PeerSpot reviewer
Java Developer at EROAD
User
Great for blocking email, offers comprehensive security measures and has helpful support
Pros and Cons
  • "Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure."
  • "After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."

What is our primary use case?

This platform protects collaboration and email infrastructure from ransomware attacks. 

It helps departments to communicate efficiently and exchange files without any fear. 

It blocks phishing attacks before they reach the inbox. 

Email security has accelerated growth and stimulated new innovative ideas that can boost productivity. Bringing all the teams together has improved teamwork and cooperation among the employees. We deployed this software to enhance effective team coordination and promote secure networking infrastructure.

How has it helped my organization?

The organization has greatly benefited from the strong security measures implemented by this software. 

The capability to block malicious emails from reaching inboxes has helped members to exchange secure messages that cannot spread viruses and lead to delays. 

The comprehensive security measures have enabled members to focus on more productive duties without fear of being attacked. 

The entire supply chain is secured with end-to-end encryption that unauthorized third parties cannot compromise.

What is most valuable?

The software detects sensitive data that can leak confidential information and stops it immediately from leaving the organization. 

Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure. 

The high-grade email security protection features have blocked many attempts from ransomware attacks. 

Collaboration in a secure environment has been one of the greatest dreams we have longed for, with support from all the enterprise members.

What needs improvement?

The set collaboration and email security features have been stable since we deployed this software. Check Point Harmony Email & Collaboration cost is high, and the deployment process may take longer in a new environment. 

It blocks secure communication if the settings are not well set and defined for a given time frame. 

The most set objectives have been achieved with this leading anti-phishing platform that helps to keep the entire organization safe. 

It has prevented account takeover and created the best infrastructure for sharing files and data. 

After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities. 

It is not easy to establish the number of computers that have access to this network.

For how long have I used the solution?

I've used the solution for eight months.

What do I think about the stability of the solution?

This platform is highly stable and offers an enhanced secure collaboration infrastructure.

What do I think about the scalability of the solution?

The comprehensive email security provision has impressed the teams.

How are customer service and support?

The customer service team has always offered the best support services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with other related software.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation was done through the vendor.

What was our ROI?

ROI stands at 45% - currently up from 30%.

What's my experience with pricing, setup cost, and licensing?

The setup cost and set budgets are suitable for most businesses-level enterprises.

Which other solutions did I evaluate?

I evaluated different solutions, however, we decided to settle on Check Point Harmony Email & Collaboration due to its efficiency.

What other advice do I have?

I am impressed by the overall performance of this software.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC
User
Increases productivity, offers good encryption, and is very secure
Pros and Cons
  • "It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
  • "The next release should focus more on email categorization and provide options for unlocking blocked safe emails."

What is our primary use case?

Check Point Harmony Email & Collaboration block any harmful social communication data that can destroy safe information. 

It enables teams in the organization to collaborate under a safe environment when working on various projects and tasks. 

It monitors the flow of emails from one destination to the other with security protocols that block phishing attacks. 

The product stops threats and fraudulent messages before entering the inbox of the receiver. This software has enabled members of the organization to focus on demanding projects without fear of external cyber-attacks.

How has it helped my organization?

Productivity has increased since there are no external detractors. 

Sending email with bulky attachments is safe and faster with guaranteed security encryption. 

It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments. 

It has been able to block malware attacks that could derail workflows and affect overall production. 

The solution cleans unsafe files quickly and eliminates threats that can adversely affect information. 

Engagement with my colleagues is easy, and I no longer fear any ransomware attacks.

What is most valuable?

Sensitive business data is effectively protected from any third-party attacks that can easily destroy confidential information. 

It prevents data from leakages and exposure to unauthorized hands. 

The high-grade bulletproof security model monitors email transfer and content that is contained in the messages. File-sharing security provides a reliable platform for faster sharing of documents without fear of external data threats. 

The dashboard provides real-time insights that provide awareness to members on the best policies for sharing information and engaging each other.

What needs improvement?

The next release should focus more on email categorization and provide options for unlocking blocked safe emails. 

They should release should increase collaboration apps that can be topped with security layers. 

It has developed reliable security infrastructure for guarding our information, and I am proud of that. Most objectives have been achieved with positive results and increased return on investment. The unified dashboard gives departments an easy time monitoring their work progress and security situation in their networking environment.

For how long have I used the solution?

I've used the solution for nine months. 

What do I think about the stability of the solution?

This product is stable with robust performance.

What do I think about the scalability of the solution?

It is easy to master the concept of operations and monitor performance.

How are customer service and support?

The customer service team works closely with all the staff members.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used another solution.

How was the initial setup?

The setup was not complex.

What about the implementation team?

It was deployed by the vendor.

What was our ROI?

ROI has been positive since we deployed it and has highly improved from 15% to 35%.

What's my experience with pricing, setup cost, and licensing?

The setup and cost have been good from my experience, and I recommend it to other organizations.

Which other solutions did I evaluate?

I did not find any other effective platforms like this one.

What other advice do I have?

This is a great product with high-performance features.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
IT specialist at Landpower Australia Pty Ltd
Real User
A stable solution that does a fantastic job of catching things Microsoft doesn't, but implementation could be easier
Pros and Cons
  • "The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic."
  • "The implementation could definitely be better."

What is our primary use case?

At the moment, we're heavily using the email and collaboration features. We are also licensed for the mobile part, which we are sort of working into, and CloudGuard as well. We're kind of working through those features. 

What needs improvement?

The implementation could definitely be better. We had great support from Check Point, but there were some "got-you" moments where we got surprises as we were setting it up. When Check Point talks about it, it's all "plug and play," but it's not really one of those platforms where you can just jump in and click a few buttons and everything works. You need to have a bit of knowledge about what you're doing and it's a bit more complicated than they advertise.

In the future I would like to see something similar to what Proofpoint has, where users can actually go in and make the call to release their own emails. We've got a small number of users, so it's okay for the IT team to constantly be bombarded with our emails for releasing, but I would love to have an option where I can allow users to go in and make the call to release an email, and then of course it would only actually be released if it passes certain things.

For how long have I used the solution?

I have been using this solution for about a year and a half now. 

What do I think about the stability of the solution?

The solution is stable and I think it does a fantastic job. The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic. There's a few things that get flagged by Microsoft, most of them false positives, so it's interesting. Harmony passes it through and Microsoft thinks it's spam, but usually it's not.

What do I think about the scalability of the solution?

The solution is very easy to scale. There are between 500-550 active users in our company. We have a team of three people that look after the environment, but that is only part of their responsibilities. I think it would do very well with one full-time person handling the maintenance. 

How are customer service and support?

The technical support was brilliant, but that's the thing when you're buying something, usually the initial support is top notch. It's been a year and a half now, and we haven't had any urgent technical issues that we've had to go back for help with, but at the start, when we were implementing the solution, we had good support. They were on the ball and they really stepped up.

Which solution did I use previously and why did I switch?

What we used in the past was an outfit called MSX.

What's my experience with pricing, setup cost, and licensing?

Check Point is more expensive. That's the honest truth. So far, it's a good value for the money. 

Which other solutions did I evaluate?

We considered the Microsoft inbuilt solution, and the advice that we got from a lot of people was, if you want to use that one, combine it with something else. That is what we ended up doing, because it came as part of our licensing with 365, but we can tell that it was a good idea to combine it with Check Point because it will let a lot of things pass.

Also, I know CrowdStrike is cheaper with their Falcon offering, but I haven't had the opportunity to work with it. The reason why I went with Check Point was because I have worked with it in the past and I like their product, so that was the biggest push. 

What other advice do I have?

I would rate this solution as a seven out of ten. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Good sandbox and analysis capabilities with the ability to expand
Pros and Cons
  • "Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
  • "Its guides are not great."

What is our primary use case?

With the evolution of technologies, attacks also evolve. This is why we need to secure mail. We have chosen to include Harmony Email in our Office 365 mail solution to thus proactively ensure any incident that we may have in the future is dealt with. It gives us complete security support from anywhere. Wherever our users are, the solution will always be protecting them. 

How has it helped my organization?

Like any company, we care about security and having exposure to various clients and departments. We can be violated or have identity theft attempts, and this is where Check Point Harmony Email (and its computing power that is integrated from the Check Point cloud) comes in. It gives us the protection and analysis, to help us avoid phishing attacks and malware. By integrating solutions such as DLP, we can protect our identity and data. 

Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure.

What is most valuable?

One of the best features is the analysis and emulation carried out with each file attached to the emails, which makes each of the deliveries we make via email more secure. This function creates a scalable sandboxing where a copy of the file under analysis is made, and it is verified, scanned, and analyzed to each of our files for malicious links. If it finds a link, it emulates its action to determine if it is benign or malignant to deliver clean and safe data.

What needs improvement?

Something worth mentioning is the need for Spanish language support and better representation for teams in the Latin American area. There is a growing demand for these IT services and new technologies.

Its guides are not great. It would be more pleasing if these guides could be updated and improved in their design. 

The support that most requires attention is the phone calls or the cases through the support page. Several times, through the chat function, we found that it gets stuck and does not bring up the live chat.

For how long have I used the solution?

I've used the solution for around two years.

What do I think about the scalability of the solution?

The solution is very easy to scale.

How are customer service and support?

There is a need for more support in Spanish. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not previously use a different solution. 

What's my experience with pricing, setup cost, and licensing?

It is quick to configure. The advantage is that it does not need us to install an agent on the machines. Everything is done from the administrators' consoles. 

Which other solutions did I evaluate?

We did not previously evaluate other options. 

What other advice do I have?

It is a simple tool and centralizes its administration. Being able to request a POC from Check Point is a good opportunity that will give new users an opportunity to assess the quality and security capacity that it can provide. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.