We use the product to address core, perimeter, and administrative security requirements for firewalls within our environment. Additionally, we cater to email security requirements for clients using both Google Workspace and Microsoft 365 platforms.
AVP IT & Communication at Proactive Construction Pvt. Ltd at Techtronics Global Innovations Pvt Ltd
Provides robust email security features, but the pricing could be affordable
Pros and Cons
- "It's very easy to use, and the onboarding process is straightforward."
- "Check Point needs to address the pricing segment for SMEs."
What is our primary use case?
What is most valuable?
The product's most valuable features for email security are its ability to safeguard domain names, detect duplicate email users, and identify spam emails impersonating legitimate email IDs, thereby enhancing overall security. It also has a robust filtering system.
It's very easy to use, and the onboarding process is straightforward. We can easily categorize users, create groups, and apply policies accordingly, simplifying policy management for different user groups within an organization.
What needs improvement?
In India, pricing is a concern, especially for SMEs. Check Point needs to address the pricing segment for SMEs. Apart from that, the technology and other aspects like sales and marketing are satisfactory.
Most OEMs provide similar capabilities. If any OEM introduces new features, Check Point must match those capabilities. It could improve by offering an on-premise solution for customers still using Microsoft Exchange, which currently provides only cloud-based services.
For how long have I used the solution?
I have been using Check Point Harmony Email & Collaboration for about a year. We directly sell the latest version to customers, including SMEs, enterprises, and SMBs.
Buyer's Guide
Check Point Harmony Email & Collaboration
June 2025

Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
What do I think about the stability of the solution?
The product is stable. We have yet to encounter technical or deployment issues. My team is comfortable working with the solution due to its reliability and the prompt assistance that Check Point's support team provides. I rate the stability an eight out of ten.
What do I think about the scalability of the solution?
We have 35,000 Check Point Harmony Email & Collaboration users, covering all three segments: small, medium, and enterprise.
It is a scalable product and meets the evolving business needs. Their communication and understanding of customer requirements make deploying and scaling the solution easy. I rate the scalability a seven out of ten.
How are customer service and support?
We have yet to encounter many technical issues, but Check Point's support team has been responsive and helpful whenever required.
How would you rate customer service and support?
Positive
How was the initial setup?
We completed ten deployments, including the installation and setup, in one week. Overall, it takes around seven days to complete. It involves collecting information from the customer about the number of users and the email services they use. The onboarding process is easy and takes one to two hours, followed by policy creation based on customer requirements.
I rate the process a nine out of ten.
What's my experience with pricing, setup cost, and licensing?
The product is expensive compared to some competitors, especially for the SME segment in India. On average, it's around 10,00,000 to 15,00,000 lakh rupees for 200 users per year. Additional costs depend on the customer and their requirements.
I rate the pricing a six out of ten.
What other advice do I have?
I suggest conducting a proof of concept (POC) before purchasing the product. Customers will likely find it reliable and effective after analyzing it for 10 to 15 days.
I rate it a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. partner

Network Security Engineer at NTT Security
The invisible, multi-layer security enables full-suite protection for cloud collaboration solutions
Pros and Cons
- "It protects cloud email and collaboration suites from cyber-attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365, G-Suite, Teams, and Slack."
What is our primary use case?
We use Harmony Email & Collaboration to prevent malicious emails from reaching inboxes, guarding against the attacks of threat actors.
We have also enabled a data leakage policy based on our client's needs, with hundreds of predefined and custom data types.
Below are the security elements of Harmony Email & Office which we use in our client environment.
- Anti-phishing for incoming and internal emails.
- Complete known malware and zero-day malware prevention (Sandboxing)
- Attachment sanitization (CDR, Threat Extraction)
- Malicious URL protection (URL Protection)
How has it helped my organization?
The below features have improved our client experience:
- Anti-phishing for incoming and internal emails.
- Complete known malware and zero-day malware prevention (Sandboxing)
- Attachment sanitization (CDR, Threat Extraction)
- Malicious URL protection (URL Protection)
It protects cloud email and collaboration suites from cyber-attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365, G-Suite, Teams, and Slack.
What is most valuable?
The main features are as follows
Harmony Email & Collaboration secures major file-sharing services such as Google Drive, ShareFile, OneDrive, Sharepoint, Box, and Dropbox from malware, ransomware, and east-west attacks. It also prevents accidental or malicious data loss.
Mainly, we are using Harmony Email & Collaboration to detect sensitive data sharing via email and other collaboration apps, and immediately limit data exposure. It enables the enforcement of a data leakage policy in our client environment, with predefined and custom data types.
What needs improvement?
- Phishing incidents and functionality bugs are misrepresented and can lead to inconsistent email encryption, affecting user experience and potentially compromising security.
- This product should prioritize a zero-trust approach.
- There are unexplained settings in the security console that lack proper documentation or explanation from the vendor, leaving users without support.
- For instance, the back-end query language used to process user-based phishing reports is not documented.
- Additionally, certain features, such as the inability to whitelist DLP events by user, are lacking and their inclusion would reduce unnecessary alerts.
For how long have I used the solution?
I have been using this for more than a year.
What do I think about the stability of the solution?
It is 100% percent stable and secure.
What do I think about the scalability of the solution?
I have a really good impression of the scalability as it protects more of the Office 365 suite than just email. I appreciate that system logs capture when someone views the body of an email. It is reasonably priced for the coverage it provides.
How are customer service and support?
Customer support and vendor engagement is really good in comparison to other vendors.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have multiple clients. We use Check Point Harmony Email & Collaboration for one of our clients.
How was the initial setup?
It is a much simpler product to set up and support compared to other vendors we have reviewed. It does a much better job of blocking phishing with little to no customization. This product just works out of the box without needing any specific fancy rules.
What about the implementation team?
We have our Professional Services who do implementation-related pieces for our clients. It's really good in comparison to other vendors.
What's my experience with pricing, setup cost, and licensing?
It is very easy to implement and it can see actions taken by Harmony and Microsoft 365 in a single console. It is cost-effective and works well for many of the budget constraint enterprises.
What other advice do I have?
It has an extremely high success rate of keeping junk/spam/phishing emails out while allowing the right emails through. The setup is extremely easy. Vendor Engagement and webinars are always happening- Check Point has monthly new feature meetings, so overall I am having a great experience.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Harmony Email & Collaboration
June 2025

Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Cloud computing at ITQS
Good DLP and threat prevention and helpful centralized management
Pros and Cons
- "It is fast and quite effective in terms of preventing any security incidents."
- "Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents."
What is our primary use case?
The company handles confidential information, such as clients' financial data, and it is important to keep that information secure to comply with certain regulations.
One of the important challenges was to counteract the amount of phishing, ransomware attacks, and accidental leaks of information through email and collaboration applications.
We did not have a tool that would provide this security, so we chose to look for one and apply it to our environment.
How has it helped my organization?
The company handles a large amount of client information, some of which is confidential, including account numbers and sensitive information. This tool provides us with the features to meet the needs we have.
One of these features is real-time threat prevention. It uses advanced analytics to detect and block malicious emails, phishing, and unwanted content before they reach inboxes. It also has DLP. This helps prevent the leak of information. In this way, we can reduce vulnerabilities.
What is most valuable?
The tool has many important features. Some of them are very valuable.
One of the most valuable is real-time prevention, which constantly analyzes and provides results. The leak control that comes with DLP is excellent.
It provides us with a more centralized management where we can monitor everything that happens in our environment and in this way, can manage the security policies necessary for our organization in real time.
It is fast and quite effective in terms of preventing any security incidents.
What needs improvement?
The product is a very effective tool. It provides a lot of security to ensure the confidentiality of the information.
Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents.
They should also improve the quality of technical support since, in the last few years, they have lowered the quality of SLA response and do not provide concise solutions.
They should also generate a knowledge base where the unified information or the most common errors are found so as not to depend so much on support.
For how long have I used the solution?
I have experience using the solution for four years.
What do I think about the stability of the solution?
The stability presents as efficient.
What do I think about the scalability of the solution?
The scalability is new; it is multi-cloud.
How are customer service and support?
The experience has not been very good since we have had problems with the SLA.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
There was no previous solution in the organization.
How was the initial setup?
The initial implementation is complicated when you do not have experience with said tool.
What about the implementation team?
It was implemented with the seller and his engineer in charge, which was very fast and friendly.
What was our ROI?
The investment is somewhat high. However, it will provide security for all customer information.
What's my experience with pricing, setup cost, and licensing?
The tool is somewhat competitive with the others on the market. The installation has an average learning curve.
Which other solutions did I evaluate?
Several solutions were evaluated, such as Microsoft Defender for Office 365, Proofpoint Email Protection, and Cisco Secure Email.
What other advice do I have?
It is an excellent tool for information security. Before acquiring it, you must analyze whether it meets company needs.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Information Technology Administrator at Aighospital
Helps quarantine emails with security issues
Pros and Cons
- "The product offers good and easy integration capabilities with other products."
- "I need to go to Check Point's admin portal if I want to see the license list and the details of the users of the tool, making it an area of concern where some ease of process should be provided from an improvement perspective."
What is our primary use case?
I use the solution in my company to secure the users' environment so that there are no phishing attacks. The tool operates as an anti-spam solution for the users in our company. Each and every email passes through the email security scanning process. Emails with issues get quarantined by the solution.
What is most valuable?
The most valuable features of the solution include all of the functionalities offered by the tool, which work fine. I cannot say that a particular feature does not work fine. Each and every feature provided by the product works fine.
What needs improvement?
At the time of the purchase of the product for the users in my company, I am unable to see or get details of the users for whom the product has been purchased. I need to go to Check Point's admin portal if I want to see the license list and the details of the users of the tool, making it an area of concern where some ease of process should be provided from an improvement perspective.
For how long have I used the solution?
I have been using Check Point Harmony Email & Collaboration for two years.
What do I think about the stability of the solution?
There are day-to-day updates in the solution. The product gets updated automatically since it is a SaaS-based tool. My company does not have to invest time to upgrade any applications in the product. In general, it is a hassle-free process to work with the product.
What do I think about the scalability of the solution?
My company has around 50 users of the product.
My company plans to increase the number of uses of the product in the upcoming two or three months.
How are customer service and support?
The need to seek technical support depends upon the severity of the issues that we face in our company with the product. Depending on the severity of the issue, my company connects with the support team in three to four hours. During high-severity cases when our entire organization goes down due to some issue in the product, my company connects directly with the support team.
How was the initial setup?
People already use the product as a SaaS-based tool, but it can be complex if used at an in-house level only. As a SaaS-based tool, the product is easy to use without complexities.
The solution is deployed on the cloud.
The solution can be deployed in twenty minutes to half an hour.
What was our ROI?
I work in a hospital where we purchased the tool for security purposes. Being a hospital, we did not purchase the product with an ROI angle in mind.
What's my experience with pricing, setup cost, and licensing?
I don't even have details of the product's single license purchased by my company.
What other advice do I have?
The product is useful as it works fine to secure our company's email communication. My company has not faced any issues since the time we purchased the solution.
The product has improved our organization's functioning as a secure collaboration tool, considering that different products are made available in the market on a day-to-day basis. As a tool for email security, the solution serves as one of the best products in the market.
The product offers good and easy integration capabilities with other products. When it comes to integration, the product will ask about the credentials of the global applications to the tool's admin, after which it will automatically scan the licenses of the integrated products.
The reports and analytics part of the product is fine for my company since it allows us to check the analytical reports on a weekly basis at a user level. The product provides different kinds of reports like anti-spam reports that we can check in our company.
I recommended the product to those who plan to use it for email security purposes, as it offers a seamless and user-friendly experience to its users. There is no complexity involved in integrations with other products for better email security.
The need for cybersecurity will increase in different ways on a daily basis. The product does not provide alerts. The product fails to provide alerts if some issue occurs at a global level. From an improvement perspective, the product should provide alerts related to email security to its users.
I rate the tool a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
TOC Architect at Infopercept Consulting Limited
Easy to setup, give me detailed information for malicious storage and stable product
Pros and Cons
- "The option to set a copy is beneficial."
- "The reporting could be improved."
What is our primary use case?
We use two solutions: Check Point Gateway and Harmony Email & Collaboration.
We primarily use it for IDS and threat protection, as well as VPN.
What is most valuable?
It's very easy to deploy with Microsoft Office 365.
The option to set a copy is beneficial. Additionally, the solution scans OneDrive, Teams, and SharePoint content and provides a full report.
If I store any malicious file in my cloud storage, it will give me detailed information in the Check Point console, including which DLL is infected. That's a very useful feature.
I'm satisfied with the product as it is, especially regarding security.
What needs improvement?
The reporting could be improved. Also, the predefined workflows cannot be changed. It would be great to add custom workflows to better suit customer requirements.
For how long have I used the solution?
I've been working with Check Point for the last four years. I perform day-to-day operational tasks with it.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
It is scalable. There are around 300 end users.
It's a cloud-based SaaS application, so it doesn't need to be deployed in multiple locations. We integrated it with our existing email solution, and all our email traffic is routed through it.
How are customer service and support?
The customer service and support are very good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I've worked with Microsoft Defender, Proofpoint, and Barracuda Email Security.
The pros include quick implementation time and easy policy deployment. Security is also good, as Check Point provides multiple security engines and inline data security. As for cons, having the option for custom workflows would be a great improvement.
How was the initial setup?
I completed the initial setup in about 15 minutes, by myself. It was very easy. There's no need for improvement.
We share product white papers with our customers, understand customers' needs and current email infrastructure, and design a solution before pitching to them. We also create a project timeline for the POC and implementation.
It's easy to integrate, as it supports both cloud-based platforms, O365 and Google Workspace. If you have basic knowledge of your email platform, you can easily integrate the product.
Check Point takes care of the maintenance. It doesn't require any maintenance.
What was our ROI?
Check Point Harmony Email & Collaboration is beneficial for customers. It brings in the value.
It provides enhanced email content security to prevent external attacks.
What's my experience with pricing, setup cost, and licensing?
I run the proof of concept and submit a report to management. They handle discussions with customers and coordinate with the Check Point sales team.
What other advice do I have?
I would recommend it.
Overall, I would rate it a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
Head: Cloud Platform Security at BCX Namibia
Along with great technical support, the solution also offers phishing protection
Pros and Cons
- "The most valuable feature of the solution is the phishing protection it offers."
- "The solution fails to support hybrid deployments."
What is our primary use case?
My company uses Check Point Harmony Email & Collaboration to provide security for Office 365 email and collaboration apps like Teams, SharePoint, OneDrive, and other related tools.
What is most valuable?
The most valuable feature of the solution is the phishing protection it offers.
What needs improvement?
The solution fails to support hybrid deployments.
Currently, the solution supports cloud email only. It would be great if they could also support hybrid deployments.
For how long have I used the solution?
I have been using Check Point Harmony Email & Collaboration for three years. My company has a partnership with Check Point.
What do I think about the stability of the solution?
Stability-wise, I rate the solution a nine out of ten since there were a few minor issues that were quickly resolved while the uptime of the product has not been 100 percent.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution a ten out of ten.
I would say that probably around 50 percent of our customer base uses the solution.
How are customer service and support?
The solution's technical support is very good. I rate the technical support a ten out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
I rate the product's initial setup a nine out of ten since the setup phase is seamless 99 percent of the time. If the end user customized the Office 365 tenant a lot, then a manual setup might be required.
The solution is deployed on the public cloud while supporting cloud services from Google and Microsoft.
The deployment process of the solution takes about five minutes. It would probably take ten minutes if we consider from start to finish of the deployment process.
For deployment, there is a need to create an account in Check Point Infinity Portal, after which you can activate Harmony Email & Collaboration module and then provide the credentials to your Office 365 tenant, following which the integration process starts.
What's my experience with pricing, setup cost, and licensing?
I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive.
It is a reasonably priced product offering good value for money.
What other advice do I have?
I would say that since Check Point Harmony Email & Collaboration provides a two-week evaluation option, it's very easy to integrate into your environment in a read-only mode so that it doesn't interfere with your email. It just scans and then provides you a report afterward of the threats your solution has missed and what Check Point would have caught.
Check Point Harmony Email & Collaboration is a fantastic solution.
I rate the overall tool a ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.
Senior Information Security Engineer at Glidewell Laboratories
Good for preventing phishing with a nice dashboard and Explore page
Pros and Cons
- "The dashboard provides information to investigate more about malicious activity and blocked emails."
- "It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files."
What is our primary use case?
We use the solution to prevent any phishing emails from reaching out to the end users. We also use it for URL protection and DLP, to protect the end users from ransomware attacks, and to avoid any issues that halt business activities.
We used to have another solution for email security and we used to find so many issues while using it. We could not stop some phishing emails from getting into the user's mailbox and were worried about losing data. We had to work on fine-tuning the solution all the time to avoid the issues. We came to know about Check Point and wanted to try for email security.
How has it helped my organization?
We have blocked more phishing emails since we started using Check Point. The solution works brilliantly in filtering and the amount of information provided is unmatched and helped us in various ways.
The Explore page provides multiple options for searching for emails and other information. Quarantine/removing from Quarantine has become so easy with search options
The dashboard provides information to investigate more about malicious activity and blocked emails.
Check Point has become our go-to solution for most of our issues.
What is most valuable?
We like the email search options, availability of information on various aspects, algorithms, and AI models that provide pretty useful data - and the list goes on!
The email search/explore option helped us find the required emails and logs easily with multiple filters to use.
Information provided in each and every email is very useful for investigating any activity. We do not have to use multiple websites for that information since everything is provided in Check Point itself.
AI-based models and algorithms provide more accurate and useful information.
What needs improvement?
It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files. That will help in creating more filters and analyzing the data.
Providing more Training videos and documentation will be helpful for beginners to understand how checkpoint works.
For how long have I used the solution?
I've used the solution for the past eight months.
Which solution did I use previously and why did I switch?
We used some other email security tools and we used to have multiple issues with email filtering and available information. We do not see any of those issues after using Check Point.
What's my experience with pricing, setup cost, and licensing?
We are good with the licensing.
Which other solutions did I evaluate?
We directly chose Check Point since we could not find any better alternative.
What other advice do I have?
It is the perfect one-stop solution for securing the organization!
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Owner at Shree Atharva Sales Corporation
Reliable product with a straightforward setup process
Pros and Cons
- "The product is reliable and sturdy."
- "They must provide security to more email service providers."
What is most valuable?
The product is reliable and sturdy. It can be configured within five minutes and has minimal downtime. It provides an in-built API functionality. It supports chat and file sharing from solutions like OneDrive, SharePoint, Google Drive, and Dropbox. Additionally, it offers 100% protection for unified communication or collaboration to prevent hacking incidents like the Zoom hack.
What needs improvement?
They must provide security to Rediffmail and other email service providers. At present, it is limited to only two email services. They should also offer additional protection to Zoom, Cisco Webex, BlueJeans, and StarLeaf.
For how long have I used the solution?
We have been using Check Point Harmony Email & Collaboration for five to six days. However, we have been using Check Point for five to six years.
What do I think about the stability of the solution?
I rate the platform’s stability a ten out of ten.
What do I think about the scalability of the solution?
I rate the platform’s scalability a ten out of ten. It is suitable for small, medium, and large companies. Mostly, it will be helpful for small enterprises that can’t afford firewall solutions like Wireshark.
How are customer service and support?
Check Point has a good support system in our country. They are 100% customer-centric and have many support partners as well.
How was the initial setup?
It is straightforward to set up. We can deploy within five minutes.
What about the implementation team?
Check Point is a very user-friendly product. The customers can deploy it easily with some technical knowledge; they can take help for installation and programming for a nominal cost from the product partners.
What's my experience with pricing, setup cost, and licensing?
I rate the platform’s pricing a seven and a half.
What other advice do I have?
I rate Check Point Harmony Email & Collaboration a ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner

Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Email Security Data Loss Prevention (DLP) Cloud Workload Protection Platforms (CWPP)Popular Comparisons
Microsoft Defender for Office 365
Microsoft Defender for Cloud
Proofpoint Email Protection
Microsoft Exchange Online Protection (EOP)
Microsoft Purview Data Loss Prevention
Cisco Secure Email
Abnormal Security
Fortinet FortiMail
Forcepoint Data Loss Prevention
Cisco Secure Workload
Check Point CloudGuard CNAPP
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Messaging Security, what aspect do you think is the most important to look for?
- Which Email Security enterprise solution would you choose: Cisco Secure Email vs Forcepoint Email Security vs Barracuda Email Security Gateway?
- What is the best email encryption software for small enterprises using Office 365?
- What security measures should businesses prioritize to support secure remote work?
- When evaluating Email Security tools, what aspects do you think are the most important to look for?
- Why is Email Security important for companies?
- Which is the best email security gateway?
- Why are Email Security tools important for companies?