Try our new research platform with insights from 80,000+ expert users
Marghoob AhmadSalik - PeerSpot reviewer
Technical Associate at Seamless Infotech Pvt. Ltd.
Real User
Top 5
Allows safe inspection of links and their destinations within a controlled environment and easy workflow integration
Pros and Cons
  • "The most valuable feature is the sandboxing feature. It provides a sandboxing environment where you can open links and see where they lead. You can see what is presented in the link after opening it."
  • "Maybe Check Point can work on the DLP part."

What is our primary use case?

The customer has a presence in different countries like India, Poland, and the US. They use Office 365 as an email solution, and on top of that, they use Harmony Email & Collaboration.

How has it helped my organization?

All API email security or gateway security solutions work the same as API based. You create an API with the vendor, and it works for all the same. It's just the approach of threat intelligence, how it is taken and how much threat intelligence you have. 

Pushing was a big challenge for email security. Cisco has done that, but now Check Point is also doing the same with the quarantine email. So, it's good. Previously, they didn't have the ability to find and detect the quarantine email, but they are doing it now.

What is most valuable?

The most valuable feature is the sandboxing feature. It provides a sandboxing environment where you can open links and see where they lead. You can see what is presented in the link after opening it.

Other advantages, like workflow integration, are quite simple and offered by other vendors as well. Cisco is also integrating virus totals into their products. 

But the key advantage here is the visibility you get with the sandboxing feature. 

You can see on a map, on the same dashboard, where the mail originated, where it is going, and from which relay servers. You can see everything visually on the portal, including who it's reaching and who is CCed or BCCed.

Every vendor has a different approach. But as far as I have seen with Check Point, it is quite easy and simple to manage. They have the DLP solution integrated with this email. For example, for email, DLP is zero.

What needs improvement?

Maybe Check Point can work on the DLP part. Proofpoint's email DLP is very good, so they can work on that more.

Buyer's Guide
Check Point Harmony Email & Collaboration
September 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.

For how long have I used the solution?

I have been using it for six months. 

What do I think about the stability of the solution?

Stability is not too bad. It's not glitchy. 

What do I think about the scalability of the solution?

Scalability is good. You can add users at any time. You can have hundreds of users in there. No issues or restrictions here. 

How are customer service and support?

The customer service and support are okay. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Compared to other solutions, users have the advantage of cost because Check Point is very easy to handle. You can easily train anyone on Check Point. It's not complex.

How was the initial setup?

It's quite simple. Straightforward provisioning is required. You have to do it with a vendor, like Office 365 or G Suite, and you are good to go. Just onboard the users, and that's it.

You can deploy it in a day. For the refinement of the tool, it takes a little bit of time because all email security works by first keeping it on monitor mode and monitoring what you are getting as spam. You do an audit. It takes time with this. But for the configuration part, you can do it in a single day.

What about the implementation team?

For deployment, one person is enough. For maintenance, you need two or three people to check spam. Sometimes, emails get blocked, and users request them to be unblocked. You have to verify those things. But for deployment, one person is enough.

It's a SaaS portal, so you don't have any maintenance issues because it's all done by the backend OEMs.

What was our ROI?

There is an ROI. In the long run, you will have saved money because it's a cloud-based portal with no maintenance issues.

What's my experience with pricing, setup cost, and licensing?

Compared to other vendors, the pricing is average. I guess FortiMail is a little cheaper.

What other advice do I have?

Overall, I would rate the solution a nine out of ten. I would recommend using it because it is easy to use and manage. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. MSP
PeerSpot user
reviewer2584944 - PeerSpot reviewer
Senior Information Security Engineer at Glidewell Laboratories
User
Top 5
Good for preventing phishing with a nice dashboard and Explore page
Pros and Cons
  • "The dashboard provides information to investigate more about malicious activity and blocked emails."
  • "It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files."

What is our primary use case?

We use the solution to prevent any phishing emails from reaching out to the end users. We also use it for URL protection and DLP, to protect the end users from ransomware attacks, and to avoid any issues that halt business activities.

We used to have another solution for email security and we used to find so many issues while using it. We could not stop some phishing emails from getting into the user's mailbox and were worried about losing data. We had to work on fine-tuning the solution all the time to avoid the issues. We came to know about Check Point and wanted to try for email security.

How has it helped my organization?

We have blocked more phishing emails since we started using Check Point. The solution works brilliantly in filtering and the amount of information provided is unmatched and helped us in various ways. 

The Explore page provides multiple options for searching for emails and other information. Quarantine/removing from Quarantine has become so easy with search options

The dashboard provides information to investigate more about malicious activity and blocked emails. 

Check Point has become our go-to solution for most of our issues.

What is most valuable?

We like the email search options, availability of information on various aspects, algorithms, and AI models that provide pretty useful data - and the list goes on!

The email search/explore option helped us find the required emails and logs easily with multiple filters to use. 

Information provided in each and every email is very useful for investigating any activity. We do not have to use multiple websites for that information since everything is provided in Check Point itself. 

AI-based models and algorithms provide more accurate and useful information.

What needs improvement?

It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files. That will help in creating more filters and analyzing the data.

Providing more Training videos and documentation will be helpful for beginners to understand how checkpoint works. 

For how long have I used the solution?

I've used the solution for the past eight months.

Which solution did I use previously and why did I switch?

We used some other email security tools and we used to have multiple issues with email filtering and available information. We do not see any of those issues after using Check Point.

What's my experience with pricing, setup cost, and licensing?

We are good with the licensing.

Which other solutions did I evaluate?

We directly chose Check Point since we could not find any better alternative.

What other advice do I have?

It is the perfect one-stop solution for securing the organization!

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
September 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Alejandro Flores. - PeerSpot reviewer
Director de Ingenieria at Smartelecom SA de CV
MSP
Top 5
Granular with good integration capabilities and helpful support
Pros and Cons
  • "I like the fact that having granular information about the potential threats is received in email."
  • "They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."

What is our primary use case?

We use the solution for SaaS protection for 10,000 Gsuite users. How collaborators process data with sensitive information and information leaks was a constant concern. The collaboration solution allows you to have visibility of the entire SaaS environment and create customized security profiles to give optimal treatment to the information. This solution allows you to have very granular visibility at all times; this is of utmost importance as it allows you to make immediate and precise decisions about the security environment.

How has it helped my organization?

This solution has allowed us to have visibility of the security environment for the business and has allowed us to have specific treatment by users, user groups, and departments of the information that is processed. This allows users to be certain that their information is protected. Certain security problems were detected. Without this solution at the SaaS level would have been impossible to detect so there has been an improvement in the treatment of the attack surface and the protection of valuable data.

What is most valuable?

There are several features that were considered valuable. For example, the fact that the installation and integration of the solution with SaaS tools were very fast and highly recognized by SaaS administrators. I like the fact that having granular information about the potential threats is received in email. Being able to protect information repositories was of great interest to decision-makers. It was also possible to implement an entire environment in record time. Having this information allowed us to better model the attacking surface.

What needs improvement?

They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment). 

Reports should be presented in such a way that they are readable by non-technical work groups who are involved in information protection and who may misread the information on the dashboard and make incorrect decisions.

For how long have I used the solution?

I've used the solution for four months.

What do I think about the stability of the solution?

The product is very stable; it is a cloud solution and we have not had any operational incidents.

What do I think about the scalability of the solution?

The solution is very scalable since you only have to add licenses.

How are customer service and support?

They offer good support; you have several support options depending on the SLA you need.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup is very straightforward and very fast; it took about 20 minutes.

What about the implementation team?

The setup involved a mix of personnel and Check Point SE are experts in the area of ​​security.

What's my experience with pricing, setup cost, and licensing?

The setup was very fast; the license scheme was very easy to understand.

Which other solutions did I evaluate?

We also evaluated the PAN solution and Fortinet.

What other advice do I have?

I consider it to be a cost-effective solution that focuses on security and is a highly recommended and easy-to-use option.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at IRMA Anand
User
Good support, impressive performance, and helps prevent data loss
Pros and Cons
  • "It helped us to bring security compliance and ensure system robustness throughout."
  • "The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."

What is our primary use case?

Check Point Harmony Email and Collaboration is a one-stop solution for providing the best enterprise security and protecting systems and mail servers from malware and threat attacks. 

Also, It helps in URL protection and DLP quite efficiently without any issues. 

It provides real-time protection to users and their devices from any incoming potential threats and malware sources. 

It helps in bringing security compliance to the system end to end. 

It permanently blocks phishing websites and any ransomware attacks. 

We find that it protects all confidential information from any sort of data leak and ensures data robustness and keeps everything intact in the system.

How has it helped my organization?

It helped us to bring security compliance and ensure system robustness throughout. 

It suspends and proactively blocks the malicious ransomware and threats before reaching the inbox. 

The product prevents data loss or data theft and ensures that the system is secured end to end without any trouble. 

Its API integration with other portals and applications goes smoothly without any hiccups. 

They provide bulletproof security to systems and email servers and ensure round-the-clock security for cloud email servers and other collaborating applications. 

It's an all-in-one security solution for businesses in this current era.

What is most valuable?

All the features offer great utility, and their performance is quite impressive. 

They have more secure applications than cloud-native security and have a higher security compliance rate. Also, the prevention of systems and servers from phishing attacks and system threats is proactively traceable and immediately diffused with a catchment rate of almost 99.99%, which is great in today's era of cyber threats and attacks. 

Their sound features of security for account protection and data leak protection works great for us, and we never face any compatibility or lag issue while working on the software. 

What needs improvement?

I would love to have their ticket resolution process as fast as possible. Fast and accurate ticket resolution can be a game changer for any industry, and the performance and confidence of clients go hand in hand with improved performance efficacy. This will definitely attract more loyal clients, and it helps with retention for longer periods.

The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally.

For how long have I used the solution?

I've been using the solution for precisely two years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The product is scalable and gives users a great opportunity to replicate as well.

How are customer service and support?

Customer service and support are good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first time we are using a solution of this kind formally.

How was the initial setup?

The setup was straightforward and easy.

What about the implementation team?

We implemented the product through our in-house team.

What was our ROI?

The ROI is always better than other alternatives.

What's my experience with pricing, setup cost, and licensing?

Check Point solutions are cost-effective and can be used effortlessly without any hassle. The renewal process for agreement is quite easy and can be done online easily. Licensing is smooth and price affordability is just great and can be recommended to all small and marginal start-up organizations for trial.

Which other solutions did I evaluate?

A lot of security solutions were evaluated. We evaluated Cyber Protect Cloud, Duo Security, Splunk, etc.

What other advice do I have?

This is a must-have solution for all enterprises. People should try it now.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Shrinkhala Jain - PeerSpot reviewer
Project Consultant at a consultancy with 10,001+ employees
User
Great zero-day protection and very useful against data leaks and loss
Pros and Cons
  • "Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble."
  • "They could continue to offer more stringent security policy measures for threat point management."

What is our primary use case?

Check Point Harmony Email and Collaboration is the best security software that protects email and collaboration suites in one of the best possible way. It ensures the restriction of threat points and malware in a comprehensive manner. 

All our Google Workspace applications and Office 365 are thoroughly secured by the software. It's been a great experience so far. 

Multiple phishing activities and complete zero-day protection are all ensured through Check Point. 

Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble.

How has it helped my organization?

Check Point Harmony Email and Collaboration comes with end-to-end capabilities of system protection in a holistic manner. It is restricting the entry of phishing attacks, malware attacks, and ransomware threats. 

It ensures anti-phishing management effectively and prevents any data loss through encrypted database management. Bulletproof security is one of the best features which enables protection from the most sophisticated and evasive threat attacks. It claims to reduce phishing attempts by almost 100%

What is most valuable?

Zero-day protection of the cloud and email systems is possible with Check Point Harmony Email and Collaboration. It ensures anti-phishing management end to end, and with this product, there can not be any evasive attack of sophisticated malware and threats on the system. 

Data loss and leakage prevention are one of the best features as it ensures no data loss and that all confidential documents and information is secured forever.

Protection of all confidential and sensitive data base (DLP) is secured in the system forever with complete dashboard and data tracking management.

What needs improvement?

They could continue to offer more stringent security policy measures for threat point management. Their zero-day threat protection can be further strengthened to have better compliance control, as 1% data loss and data breaches are still possible through existing systems. Even this 1% carries the potential to harm the system for a long time. 

We should have more and more pilots of security systems across different business environments to have 100% security checks and compliance.

For how long have I used the solution?

It's been using the solution for about a year now.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

Technical support is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution. We started using this solution recently and have been happy with the experience so far.

How was the initial setup?

The setup was easy and straightforward.

What about the implementation team?

We implemented the solution through the vendor team.

What was our ROI?

We've seen an ROI of over 80%.

What's my experience with pricing, setup cost, and licensing?

The setup cost is significantly low and quite affordable currently as per other competitive software. Also, the renewal and licensing process is streamlined and not complicated at all.

Which other solutions did I evaluate?

We evaluated a lot of alternatives simultaneously. Some of them included ESET Protect, Forcepoint DLP, Sentinel, and Kaspersky Endpoint Security, among others.

What other advice do I have?

I'd advise new users to go for a trial of Check Point Harmony Email and Collaboration software and use it to its fullest to understand the capabilities at its best practices.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Reseller
Top 5Leaderboard
An easy-to-deploy and scalable tool useful for mail encryption
Pros and Cons
  • "The setup is very easy. I haven't faced any complexity with the setup of the solution."
  • "Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."

What is our primary use case?

If we talk about use cases, one of our customers is using o365, and one of the customers is using G Suite. On top of that, they require email security along with an anti-APT solution, anti-spam, anti-phishing, and business email compromise with next-generation antivirus included. One of the major use cases is internal communication using an encrypted solution or encrypted mail, especially if internal users send some mail to a particular customer and they require encrypted mail. They also require an encrypted mail solution.

What needs improvement?

With the kind of features we are looking for, be it with Barracuda or Check Point, we are looking at how we can showcase them to the customer and claim that this one is the best solution for your infrastructure and use cases.

I would like Check Point's technical support to be improved.

For how long have I used the solution?

I have been using the solution for five to six years. My company is a distributor of multiple OEM solutions.

What do I think about the stability of the solution?

Most of the customers are using another vendor's solution, so most are looking for a particular email security solution. Whoever has used the solution was facing some challenges till some time ago, but gradually Check Point is improving the solution. So now they are still happy with the solution.

What do I think about the scalability of the solution?

There are multiple customers using the solution. Sometimes they have 100 or 200 users, and they are expanding their team and they are purchasing licenses because if they are increasing users, automatically, mailboxes are increased. We are providing the per-mailbox solution. They are ready to purchase the new licenses for those new mailboxes.

I rate the solution's scalability an eight out of ten.

How are customer service and support?

Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs. Check Point tries to ensure that they are providing good technical support with respect to the solutions and services it provides.

How was the initial setup?

The setup is very easy. I haven't faced any complexity with the setup of the solution.

The deployment took almost four to five years.

I am from the presale side, the solution architecture side. The implementation and deployment teams are different. We have a different team for the deployments and implementations of any particular solution.

What's my experience with pricing, setup cost, and licensing?

Usually, we pay for the licensing part on a yearly basis and not on a monthly basis.

If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts.

What other advice do I have?

It is easy to deploy. With every customer, we just share our thoughts and the experience. It's a very easy-to-implement solution. Check Point is a good cloud-based solution with respect to email security, and Check Point is a very powerful tool with respect to other OEMs.

I rate the overall solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
reviewer2107347 - PeerSpot reviewer
Project Manager at UFINET
Real User
reduced phishing attacks, blocks malicious mail, and removes likelihood of data loss
Pros and Cons
  • "Email security has improved since we deployed this platform."
  • "Some undefined threats can bypass the security system when there is a networking failure in the organization."

What is our primary use case?

Check Point Harmony Email and Collaboration has enabled my team to implement projects and tasks effectively. 

It provides a reliable communication pathway that cannot be compromised by cyber attacks. 

It protects confidential data from leaving an organization without a proper channel. It keeps our emails in a unified environment that is secure and highly safeguarded by strong security tools. 

There are advanced collaboration techniques enhanced by this platform in the enterprise. It prevents account takeover and always keeps my colleagues under safe network infrastructure.

How has it helped my organization?

Email security has improved since we deployed this platform. 

This platform has enhanced faster file sharing and improved the collaboration network systems. 

Securing business lines has reduced cases of fraud that used to affect workflows. API connection has enabled us to integrate this platform with applications for the efficient implementation of business programs. 

Sending and receiving emails has been reliable and always productive, with zero phishing attacks. 

Full email protection of both cloud and on-premise emails has reduced the chances of losing data to zero.

What is most valuable?

Bulletproof Security catches up with all types of cyber attacks that can lead to account takeover and data compromisation. The entire networking system is secured with end-to-end encryption that enhances the secure flow of data. 

The superior data catch rate has reduced phishing attacks by a high rate of almost 100%, which has boosted productivity. 

It blocks malicious emails that wreak havoc and destroy valuable data in the systems. 

Employees can focus on more productive roles without fear of being attacked by external factors.

What needs improvement?

Some undefined threats can bypass the security system when there is a networking failure in the organization. 

The next release should have a fixed system that can categorize the various levels of viruses. 

The detection of threats before they reach inboxes has enhanced reliable communication among teams. 

The malware protection system has to be upgraded to catch up with various current threats that can easily affect our systems without precautions. 

Email and collaboration safety has been a great step that we have achieved from the performance of this platform, and I totally recommend it to others.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

This tool is highly powerful in blocking phishing attacks and ransomware attacks.

What do I think about the scalability of the solution?

I love the great performance of this platform.

How are customer service and support?

The customer support staff provides reliable services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the main email and collaboration platform that I have worked with.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

The implementation was done by the vendor.

What was our ROI?

The rate of ROI has increased from 40% to 60%.

What's my experience with pricing, setup cost, and licensing?

The setup cost is good and highly efficient.

Which other solutions did I evaluate?

I have not come across another powerful platform like this one.

What other advice do I have?

I am satisfied with the security measures that have been enhanced by this tool.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2024712 - PeerSpot reviewer
Planning Analyst at Ovato
User
Offers good email security, blocks malicious emails, and protects sensitive data effectively
Pros and Cons
  • "This product enhances faster and more secure sharing of information among colleagues from different departments."
  • "There are sometimes leakages of viruses when the system is experiencing network failures."

What is our primary use case?

This product has been protecting emails across the company communication system. 

It helps my colleagues to share files and send emails without fear of phishing attacks. 

It keeps all the employees safe all the time when sharing confidential information. 

It protects sensitive company data from leaving the organization in to an insecure environment. 

Cases of ransomware attacks are no longer reported since we have the best solution for handling networking security. 

Implementing API email security across the organization enables teams to access the right information at the right time.

How has it helped my organization?

There is improved security across the emailing system and the entire communication networking infrastructure. 

This product enhances faster and more secure sharing of information among colleagues from different departments. 

Blocking malicious emails before landing inbox has enabled each member to access files with viruses and spam. 

The entire communication channels have been fully secured with end-to-end encryption. 

Email security and prevention of data from cyber attacks have been the main goals and have been achieved positively with Check Point Harmony Email & Collaboration.

What is most valuable?

Full suite protection of cloud email and collaboration applications has been a great achievement of this tool's performance. 

The security features provide a comprehensive report based on current performance and security situation. 

The platform API closely monitors the behavior of information traffic and prevents account takeover. 

It has reduced phishing attacks at a high rate and blocked many attempted attacks. 

The customer support team is online 24/7 and always offers solutions to any request when reached.

What needs improvement?

I am happy with the powerful performance of the set features. 

We have achieved the most set goals, and we are grateful for this robust solution. 

There are sometimes leakages of viruses when the system is experiencing network failures. The information may land in unsafe hands and lead to unpredictable attacks. 

Timely updates and system maintenance are encouraged to enhance continuous business operations. 

Efficient categorization of viruses will help filter out advanced phishing attacks before they affect the conversation infrastructure.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

I am impressed by the overall performance.

What do I think about the scalability of the solution?

The solution is highly scalable and powerful.

How are customer service and support?

This is the best support team I have come across. They always offer timely responses.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with a similar tool before.

How was the initial setup?

The setup was relatively complex.

What about the implementation team?

The implementation took place through the vendor team.

What was our ROI?

Our ROI has increased from 30% to 60% this year.

What's my experience with pricing, setup cost, and licensing?

The pricing and setup are suitable for any level of user.

Which other solutions did I evaluate?

I evaluated other tools, however, this was the best solution based on our demands.

What other advice do I have?

This is an excellent product for email security.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.