2019-02-12T12:12:00Z

What is your primary use case for Check Point Harmony Email & Office?

Julia Miller - PeerSpot reviewer
  • 0
  • 184
PeerSpot user
33

33 Answers

Suresh Pathipatti - PeerSpot reviewer
Real User
Top 5
2024-02-27T08:34:54Z
Feb 27, 2024

I use the solution in my company to secure the users' environment so that there are no phishing attacks. The tool operates as an anti-spam solution for the users in our company. Each and every email passes through the email security scanning process. Emails with issues get quarantined by the solution.

Search for a product comparison
AshleyMorales - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-11-21T15:08:00Z
Nov 21, 2023

The company handles confidential information, such as clients' financial data, and it is important to keep that information secure to comply with certain regulations. One of the important challenges was to counteract the amount of phishing, ransomware attacks, and accidental leaks of information through email and collaboration applications. We did not have a tool that would provide this security, so we chose to look for one and apply it to our environment.

JP
User
2023-11-16T14:19:00Z
Nov 16, 2023

We use the solution for preventing malicious emails that we're getting through Google's built-in spam filters. The amount of spam and phishing had greatly increased at our organization and we needed a solution implemented fast. Check Point was really quick to integrate and implement and instantly started providing value. The reporting we got during our trial helped to quantify the value to the executive team, in particular, the report that shows what Check Point caught items that Google's spam filters would've let through.

Harish (Kumar) - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-11-01T16:30:37Z
Nov 1, 2023

Our team primarily uses Google Workspace for email, so we were looking for a solution that could protect us from spam, phishing attacks, and other email threats. Harmony Email fits the bill perfectly because it's an API-based product that doesn't require any MX record or other configuration changes. It's also very easy to use and manage, even for non-technical users.

reviewer2584944 - PeerSpot reviewer
User
Top 10
2023-10-11T20:11:00Z
Oct 11, 2023

We use the solution to prevent any phishing emails from reaching out to the end users. We also use it for URL protection and DLP, to protect the end users from ransomware attacks, and to avoid any issues that halt business activities. We used to have another solution for email security and we used to find so many issues while using it. We could not stop some phishing emails from getting into the user's mailbox and were worried about losing data. We had to work on fine-tuning the solution all the time to avoid the issues. We came to know about Check Point and wanted to try for email security.

Alejandro Flores. - PeerSpot reviewer
MSP
Top 5
2023-10-11T18:41:00Z
Oct 11, 2023

We use the solution for SaaS protection for 10,000 Gsuite users. How collaborators process data with sensitive information and information leaks was a constant concern. The collaboration solution allows you to have visibility of the entire SaaS environment and create customized security profiles to give optimal treatment to the information. This solution allows you to have very granular visibility at all times; this is of utmost importance as it allows you to make immediate and precise decisions about the security environment.

Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
reviewer1093134 - PeerSpot reviewer
User
Top 20
2023-10-11T13:18:00Z
Oct 11, 2023

We use the solution for the protection of email from phishing attacks, spam, and malicious email-related activities. It detects and blocks the most advanced phishing attacks across inbound, outbound, and internal communications, in real-time, before the attack succeeds. The solution is used for email protection, providing IT administrators with a great amount of information about possible attacks faced by the organization, and logins by users. It also has a high level of detail in its reports, facilitating the management and detection of possible threats to the security of the organization.

Lissette Acurio - PeerSpot reviewer
Reseller
Top 5
2023-08-18T15:39:00Z
Aug 18, 2023

The solution helps to block spam emails. With this solution, the users mostly see what the solution posts on its dashboard. This helps users analyze the spam and data.

Konstantinos Mourikis - PeerSpot reviewer
Reseller
Top 10
2023-07-21T08:19:27Z
Jul 21, 2023

Usually, the customer is on Office 365, and the main selling point for us is that approximately 95 percent of customers do not have the E5 license from Microsoft, which is the highest tier. As a result, they lack advanced email protection. Therefore, using a third-party solution is more cost-effective than upgrading to an E5 license, and it also offers greater sophistication. This solution can cover not only Office 365 but also other platforms. Furthermore, it carries the reputable brand name Check Point and is well-known in the security industry.

Mitesh D Patel - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-06-26T10:02:31Z
Jun 26, 2023

If we talk about use cases, one of our customers is using o365, and one of the customers is using G Suite. On top of that, they require email security along with an anti-APT solution, anti-spam, anti-phishing, and business email compromise with next-generation antivirus included. One of the major use cases is internal communication using an encrypted solution or encrypted mail, especially if internal users send some mail to a particular customer and they require encrypted mail. They also require an encrypted mail solution.

RG
Reseller
Top 5
2023-06-01T14:10:00Z
Jun 1, 2023

Basically, it protects email services like Office 365 or G-Suite as well as business communication like Slack and Teams, and offers advanced protection against phishing and attachments even before they reach the mailbox. It also includes a DLP (Data Loss Prevention) feature that can be configured to prevent sensitive information from leaving the organization via email. Additionally, it provides advanced security measures to protect against account takeover. The email protection piece utilizes an API rather than an agent, which is more basic. This API-based approach allows for greater flexibility and integration with other systems. You can also configure it to send suspicious items to a sandbox environment for further analysis if you're not comfortable relying solely on the automated solution.

NG
User
Top 5Leaderboard
2023-02-25T23:43:00Z
Feb 25, 2023

Our corporate environment requires business protection for email and our collaboration tools to avoid threats, spam, and ransomware, among other threats coming in through email. This could have great effects on our systems and equipment. With Check Point, we can protect our data in the cloud with tools such as One Drive, among others. The tool works with different manufacturers, which provides great reliability.

AG
User
Top 5
2023-02-07T12:52:00Z
Feb 7, 2023

This product has been protecting emails across the company communication system. It helps my colleagues to share files and send emails without fear of phishing attacks. It keeps all the employees safe all the time when sharing confidential information. It protects sensitive company data from leaving the organization in to an insecure environment. Cases of ransomware attacks are no longer reported since we have the best solution for handling networking security. Implementing API email security across the organization enables teams to access the right information at the right time.

BW
Real User
Top 5
2023-01-19T15:02:00Z
Jan 19, 2023

The advanced software blocks advanced email phishing that can affect information infrastructure. It keeps my colleagues safe when interacting with our partners through collaboration. Our communication networking system is secure from end to end to enhance information safety and prevent cyber attacks. Sending emails is fast and efficient within the organization's ecosystem. This product provides security alerts when there is a threat that can affect our communication channel. Check Point Harmony Email & Collaboration caters to full cloud email security and other applications in the cloud.

CZ
User
Top 5
2022-12-08T08:46:00Z
Dec 8, 2022

This platform protects collaboration and email infrastructure from ransomware attacks. It helps departments to communicate efficiently and exchange files without any fear. It blocks phishing attacks before they reach the inbox. Email security has accelerated growth and stimulated new innovative ideas that can boost productivity. Bringing all the teams together has improved teamwork and cooperation among the employees. We deployed this software to enhance effective team coordination and promote secure networking infrastructure.

Shrinkhala Jain - PeerSpot reviewer
User
Top 5Leaderboard
2022-11-22T04:36:00Z
Nov 22, 2022

Check Point Harmony Email and Collaboration is the best security software that protects email and collaboration suites in one of the best possible way. It ensures the restriction of threat points and malware in a comprehensive manner. All our Google Workspace applications and Office 365 are thoroughly secured by the software. It's been a great experience so far. Multiple phishing activities and complete zero-day protection are all ensured through Check Point. Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble.

Hazel Zuñiga Rojas - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-11-17T16:27:00Z
Nov 17, 2022

We had the need for a solution that would allow us to integrate search and analysis into the different mail clouds. This allowed us to focus on features that were very important, such as avoiding the loss of data and content. Thanks to the search, analysis, and integration functionalities, we could integrate easily with the cloud that we have. The product gave us a greater ability to search and explore issues while minimally invasive to end users.

Diana Alvarado - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-09-21T08:36:00Z
Sep 21, 2022

The company desires to protect the current email tool, in this case, Microsoft, and its collaboration products such as One Drive and Sharepoint. We wanted to avoid malware, phishing, and spam, among other frequent threats in this infrastructure. We managed to solve it through Harmony Email Collaboration. Other tools provided similar solutions. However, we could not centralize their administration. With the Infinity Check Point Portal, it was possible to meet this requirement.

TM
Real User
2022-09-07T08:58:03Z
Sep 7, 2022

At the moment, we're heavily using the email and collaboration features. We are also licensed for the mobile part, which we are sort of working into, and CloudGuard as well. We're kind of working through those features.

Jonathan Ramos G. - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-08-22T19:36:00Z
Aug 22, 2022

With the evolution of technologies, attacks also evolve. This is why we need to secure mail. We have chosen to include Harmony Email in our Office 365 mail solution to thus proactively ensure any incident that we may have in the future is dealt with. It gives us complete security support from anywhere. Wherever our users are, the solution will always be protecting them.

Adrian Cambronero - PeerSpot reviewer
Reseller
Top 5Leaderboard
2022-07-26T13:57:00Z
Jul 26, 2022

Our company uses Office 365 and clearly, we use Outlook. We needed a tool that had the functionality to verify and validate the emails that enter and leave our organization. With this tool, we can solve security problems since many of the collaborators work from home. With this, we have decreased phishing attacks. It offers quite a few types of analysis and reporting that help to clear up security doubts and how to counter these gaps. Check Point Harmony Email & Collaboration is workload protection in the cloud. This firewall helps us provide controls on our organization's devices and has become our main tool in the analysis and coverage of the infrastructure and also maintains fairly reasonable scalability.

DAlvarado - PeerSpot reviewer
User
Top 5
2022-06-20T05:35:00Z
Jun 20, 2022

Currently, our company uses mail with Microsoft 365, both Exchange, Teams, and One Drive, which always showcases phishing problems, or malware, sent by mail. This Check Point technology application has helped us with validation, revision, and improvements. In security, which shields our current resources in a better way, implementation is really easy to carry out and very useful for us, in terms of reviewing events. It provided us with improvements and records that have happened in our environment, which works perfectly. It allows us to be able to take improvement actions.

MS
Real User
2021-10-09T20:54:00Z
Oct 9, 2021

Our primary use case is for Office 365 email security along with other Office 365 products like SharePoint, Teams, and OneDrive. As people are working from home over the last year and phishing attacks are increasing day by day, it is important to implement an email security solution into an environment. Microsoft itself provides security, but that is not sufficient and we have still received a number of malicious emails. We are looking for a solution that supports API-based integration so that there is no need to re-route email traffic via some third-party solutions. Protection is also required as people share files, store documents, etc.

Rodrigo Nalda - PeerSpot reviewer
Real User
2021-03-26T10:30:00Z
Mar 26, 2021

We have the entire email infrastructure based on Office 365, as well as the file-sharing environment using OneDrive, and Teams as a communication tool. We did not have a specific technology to protect this environment, except that which was provided by Microsoft. After analyzing the market, we opted for the CheckPoint SaaS solution to cover all of these needs, which has led to a considerable leap in the company's security. In this way, we now have a secure environment throughout the Office 365 platform, integrated into our SIEM and monitored by our SOC.

PD
Vendor
2021-02-27T11:34:00Z
Feb 27, 2021

This perimeter firewall provides me control over my perimeter servers and devices. Current Cloud applications are getting good protection from CASB solutions, but are limited to data leakage and application control. Beyond that, I require something to monitor my data that flows inside of my cloud application. Sophisticated threats like zero-day attacks can't be control by CASB solutions, Instead, we are required to have something that can work using Artificial Intelligence and Machine learning algorithms. This helps to defend my cloud applications against today's attacks.

KP
Real User
2021-01-29T06:17:00Z
Jan 29, 2021

As users of Office 365, we are using CloudGuard SaaS to protect this cloud application. We knew that to do so, we would need a very good solution. CloudGaurd SaaS prevents malware and zero-day attacks/threats from attacking our SaaS users. We have 17k+ users and all of them are using Office 365 for email. That's the reason we have implemented the Check Point CloudGuard SaaS solution. We needed protection, and it is working fine as per our requirement.

VR
Real User
2020-12-09T05:46:00Z
Dec 9, 2020

This solution is not for our organization. We are system integrators. We have some projects for our clients, and one of our clients was looking for CloudGuard because they use Check Point Firewall for their on-premise. There are a number of machines and critical servers that they have hosted in AWS; 15 to 20 servers and application servers are hosted in the AWS platform. For those, we have applied Check Point IaaS Firewall for their security and firewall protection. We are using the stable version that was published in March.

DU
Real User
2020-11-01T09:42:00Z
Nov 1, 2020

During the PoC, we have Office 365 linked to CloudGuard, which validates and checks all of the emails that come in and out. It is also checking and looking for anomalies during logon, e.g., in possible traveling type of scenarios, as we see business emails get compromised. Those pieces of it are really slick. It also provides you with a lot of reports and visibility on the environment. Sometimes things are not native on Office 365 or you have to purchase additional licensing, but on CloudGuard you have a single pane of glass with all the metrics you need. It gives you a lot of information. For example, it tells you the successful/unsuccessful attempts to log on.

OP
Real User
2020-09-26T21:08:00Z
Sep 26, 2020

About one year ago, we decided to switch from the on-premises located email server, based on Zimbra software, to the cloud-based Office 365 provided by Microsoft. We did this because of the increased load that followed after the company's growth. To provide the security coverage to the new email service, we chose the Check Point CloudGuard SaaS solution. Now it serves as the main protection mechanism, with about 500 users and up to 10,000 emails per day, and there are no problems with the scalability for future growth.

KC
Real User
2020-07-28T06:50:00Z
Jul 28, 2020

We use it to secure an email gateway.

DA
Real User
2020-05-21T06:20:00Z
May 21, 2020

We have 4,000 users globally, dispersed all over the world including at our manufacturing locations. The CloudGuard SaaS solution is protecting our Office 365 email environment as well as our Office 365 OneDrive environment from malware and other malicious content. Our CloudGuard Connect instance is protecting our remote plants and acting as a cloud-based firewall enforcement point that is 100 percent managed in the cloud as opposed to on-prem.

JG
Real User
2020-04-23T10:13:44Z
Apr 23, 2020

We use CloudGuard SaaS to protect our cloud-based services from security threats. It is responsible for our Office 365 environment, OneDrive, SharePoint, Dropbox, G-Suite, and more.

DD
Real User
2019-02-12T12:12:00Z
Feb 12, 2019

Our primary use is for email protection, though the analytics provided with respect to data leakage and user login activity is invaluable.

Check Point Harmony Email and Office is a cloud-based software offering complete protection to stop malware attacks through emails. The software is designed to provide protection for organizations using Office 365, G Suite, Google Workspace, and all other collaboration and file-sharing apps. Access permissions can be granted and custom policies can be defined for any user of choice. Check Point Harmony Email and Office identifies and blocks advanced malware, phishing, and ransomware attacks...
Download Check Point Harmony Email & Collaboration ReportRead more