Try our new research platform with insights from 80,000+ expert users
reviewer1093134 - PeerSpot reviewer
Pentester at Cybertech Projects
User
Top 10
Reduces spam, offers excellent reporting, and has good management capabilities
Pros and Cons
  • "The ease of management and intuitive administration are excellent."
  • "The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter."

What is our primary use case?

We use the solution for the protection of email from phishing attacks, spam, and malicious email-related activities. 

It detects and blocks the most advanced phishing attacks across inbound, outbound, and internal communications, in real-time, before the attack succeeds.  

The solution is used for email protection, providing IT administrators with a great amount of information about possible attacks faced by the organization, and logins by users. 

It also has a high level of detail in its reports, facilitating the management and detection of possible threats to the security of the organization.

With the addition of the DMARC module, it makes it much easier to monitor the security policies applied and provides visual information about the type of traffic received, avoiding domain spoofing.

How has it helped my organization?

The number of phishing and spam emails has decreased and email security has improved by 80%. The IT team has noticed a great improvement in the number of emails received and a decrease in attacks. The helpful alerts generated by HEC facilitate the management and response. 

Thanks to its dashboard, it displays detailed information about detected activities, suspicious logins, span deletions, or phishing detected and blocked with a high level of detail. The level of reporting detail facilitates threat management; now the organization has an additional layer of protection for end users.

What is most valuable?

The ease of management and intuitive administration are excellent. Thanks to its dashboard, the most valuable thing is the detection capability provided by this solution. The level of detail offered by Harmony is unique, to the point of showing the differences between what is detected by Office 365 and what is detected by HEC. The organization relies on this email security solution and facilitates the protection of all end users, decreasing security breaches by malicious actors.

What needs improvement?

The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter. It could be improved to obtain a greater level of detail, unlike Office 365, which offers an extreme level of detail and facilitates the management and comparison of what is happening with respect to the mail. Its integration with Gsuite is simpler and has that point against it, however high levels of detail can be obtained in the reports of the solution. On the other hand, the ease of administration and threat detection capabilities are its strong points, and it stands out from other solutions that I have had the opportunity to test before.

Buyer's Guide
Check Point Harmony Email & Collaboration
June 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.

For how long have I used the solution?

Currently, this solution has been used for the last tree years.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
CTO & Co-Founder at Cyber Strategic
Reseller
Offers an API that adds significant value to the email session
Pros and Cons
  • "In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication."
  • "It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products."

What is our primary use case?

Basically, it protects email services like Office 365 or G-Suite as well as business communication like Slack and Teams, and offers advanced protection against phishing and attachments even before they reach the mailbox. It also includes a DLP (Data Loss Prevention) feature that can be configured to prevent sensitive information from leaving the organization via email. Additionally, it provides advanced security measures to protect against account takeover. 

The email protection piece utilizes an API rather than an agent, which is more basic. This API-based approach allows for greater flexibility and integration with other systems. You can also configure it to send suspicious items to a sandbox environment for further analysis if you're not comfortable relying solely on the automated solution.

What is most valuable?

The API is super valuable because it's not really embedded in the email session. It's more like it comes in, and before it hits your mailbox, Check Point inspects it.

Many products require running it through a specific Web Gateway or some kind of intermediate box like Barracuda, or an agent installed on Outlook among many ways. Check Point is more advanced, so it's up there with the best. In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication. It also covers collaboration tools like OneDrive, Dropbox, and Box. That's the collaboration part.

What needs improvement?

It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products. For example, there are other collaboration tools besides Box and Slack that they could explore.

For how long have I used the solution?


What do I think about the stability of the solution?

The stability is excellent. Check Point is a company that has acquired matured technology from other companies and integrated it pretty well. I've seen integrations from other companies that were lacking, but Check Point has done a great job. 

Check Point has also developed its own solutions based on its security knowledge and experience. Being an Israeli company, they have access to some of the best resources in the field. 

What do I think about the scalability of the solution?

Scalability is a significant component of Check Point, as it is built for companies of any size.

How are customer service and support?

The customer service and support team is great. I never had a problem with them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used to work as an IT manager in a biotech company that utilized Check Point, which is why I've always liked their product. It's designed for complex environments and connecting multiple branches. It can be challenging for many companies, but it's intended to handle such complexities. Overall, Check Point Harmony Email & Collaboration is a great product.

How was the initial setup?

The initial setup is very straightforward. It's actually quite easy to set up and configure because the system handles everything. You don't have to install anything separately. You install the agent for the whole solution, and you can choose to enable or disable the email component. Then you simply configure a few settings, and you're done. The real action happens in how it handles incoming emails.

What's my experience with pricing, setup cost, and licensing?

The security solutions of which Email and Collaboration are a part is competitive because Check Point competes on both technology and price.

Check Point often competes with companies like Microsoft, Sophos, and CrowdStrike. Check Point offers competitive prices. Some companies may advertise lower prices, but they exclude essential components like email security or browser security, which you need to pay extra for and in the end they cost the same or even more. 

So the pricing is highly competitive. It's comparable to other companies of the same caliber, such as Microsoft and CrowdStrike. However, with all of them, if you opt for managed services, the pricing can vary, becoming more of a black box. It's usually not publicly published and is often negotiated based on specific needs. Similar to storage pricing, you need to be aware of the details and negotiate. But overall, the pricing is excellent and on par with other leading solutions. 

When comparing Check Point with lesser-known products like Kaspersky and others, it's important to consider the target market. If you're dealing with multinational corporations, or hospital systems, their requirements differ, from smaller companies, and they may be considering solutions from SentinelOne, CrowdStrike, Sophos, or Cylance, however, you have to make sure the product offers all the specific components like email or browser security that Check Point provides. Check Point is known for its comprehensive range of solutions, including firewalls, which can be deployed to endpoints.

What other advice do I have?

I would give it a nine out of ten. It's a great product overall. I hesitate to give any company a perfect ten because there's always a chance of unexpected issues arising in the future. But so far, I haven't encountered any problems with Check Point. It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products. For example, there are other collaboration tools besides Box and Slack that they could explore.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
June 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 20
CheckPoint HE by harmony family tools
Pros and Cons
  • "The product is a fairly complete and centralized solution accessible through the Infinity Portal."
  • "Support can be a bit quicker in helping the customer."

What is our primary use case?

The company desires to protect the current email tool, in this case, Microsoft, and its collaboration products such as One Drive and Sharepoint.

We wanted to avoid malware, phishing, and spam, among other frequent threats in this infrastructure. We managed to solve it through Harmony Email Collaboration.

Other tools provided similar solutions. However, we could not centralize their administration. With the Infinity Check Point Portal, it was possible to meet this requirement.

How has it helped my organization?

Through the modern security tool Harmony Email, we managed to protect our email cloud environment and its main collaboration tools.

It is quite simple to connect through a connection API, achieving the main objective.

Its protection against malicious documents allowed us to review the attached documents through threat emulation and threat extraction and deliver the package or file to the user in just a couple of seconds, in an agile, simple, and fast way, providing an ideal delivery time for the users.

What is most valuable?

We liked this tool a lot. Its most attractive features were:

1- Check Point Harmony Threat Emulation and Threat Extraction technologies that delivered fast attached files or files with threats.

2-The DLP policies helped us a lot against the loss of sensitive information.

3-Its ease of implementation and its API to connect with solutions safely.

4-Its monitoring dashboard with screens and graphs is very useful for us as administrators.

The product is a complete, centralized solution accessible through the Infinity Portal.

What needs improvement?

Some improvements can be provided, including the documentation available. We need it to better establish the manufacturer's best practices since sometimes it is difficult to find public information because the tool is relatively new in the market.

The costs are not publicly available.     

Support can be a bit quicker in helping the customer.

More training and guides should be available for customers.

A few performance issues should be mentioned regarding the Infinity service.

For how long have I used the solution?

This is a good tool centralized in Check Point's Infinity Portal. We started using it after a POC was given to us.

What do I think about the stability of the solution?

This is an extremely stable tool.

What do I think about the scalability of the solution?

It is administered through the Infinity Portal without worrying about HW administration.

Which solution did I use previously and why did I switch?

Previously, we used the native Office 365 tool, however, we wanted more security power and a centralized environment with our other Check Point solutions.

What's my experience with pricing, setup cost, and licensing?

It is important to have a partner to request help in order to review your business requirements.

Which other solutions did I evaluate?

We always evaluate the security tools available, however, we are inclined to follow the Check Point line. The Harmony family is quite good, effective, and safe.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Support at a security firm with 51-200 employees
User
Good security and integration but needs better documentation
Pros and Cons
  • "We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
  • "They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response."

What is our primary use case?

Our corporate environment requires business protection for email and our collaboration tools to avoid threats, spam, and ransomware, among other threats coming in through email. This could have great effects on our systems and equipment.

With Check Point, we can protect our data in the cloud with tools such as One Drive, among others.

The tool works with different manufacturers, which provides great reliability.

How has it helped my organization?

Check Point has helped us improve our security layer with this complete cloud solution. We no longer depend on a Gateway as it is a complete solution that helps us prevent any type of threat that travels through email.

We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point.

We also really like its centralized environment since the Check Point Infinity Portal really centralizes everything.                 

What is most valuable?

The platform offers advanced security measures to protect emails from cyber threats such as phishing attacks, malware, and ransomware.

The platform is cloud-based, which means users can access their emails and collaboration tools from anywhere and on any device.

The security of collaboration tools is great.

The platform integrates with other productivity and collaboration tools like Microsoft Office, Slack, and Zoom.

What needs improvement?

Maybe they could integrate the solution with Avanan. Doing that would really make it a very robust solution.

They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response.

The solution lacks public documentation and some documentation is not so clear, which means that the client does not understand the implementation that must be carried out.

You can only see the costs through a Check Point partner.                           

For how long have I used the solution?

This is a very productive tool. We used it for a few months. It really helped us protect against threats in email and Microsoft collaborative tools.

Which solution did I use previously and why did I switch?

Previously we did not use more than the security provided by Microsoft itself. We have since changed to Check Point.

What's my experience with pricing, setup cost, and licensing?

As for the cost, it is per protected user. It seems good to me in that aspect however, the issue of implementation sometimes costs a bit. That's okay if it can be done correctly. The licenses are easy to acquire.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Excellent alternative mail solution, Modern Harmony E&C
Pros and Cons
  • "Its characteristics are adapted to the most modern threats."
  • "Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix."

What is our primary use case?

Our goal has always been to strengthen our infrastructure. We currently have Microsoft 365. In order to provide a centralized security solution, we use Checkpoint Harmony Email, which provides us with security against phishing attacks, malware, and advanced data protection, among others. Some other features that successfully help provide a robust security infrastructure for all collaborative applications.

It is also important to mention that it is managed under the Check Point Infinity Portal, which is the most modern of the Check Point approaches.

How has it helped my organization?

We have managed to implement this as a totally cloud tool, from the Check Point Infinity Portal. It's super easy. In addition, we have managed to generate DLP policies for the protection of data that is shared to avoid sensitive losses and compliance with regulations.

Also, through the monitoring panel we have been able to see the behavior of our environment and how it is attacked by new threats. We can make decisions to improve our infrastructure thanks to Harmony Email.

What is most valuable?

This Check Point Harmony Email tool is very modern. Its characteristics are adapted to the most modern threats. One of its main virtues is its monitoring system, which is very important for decision-making, however, it is also very intuitive, easy to understand, and simple to use.

Its DLP policies are quite easy to implement, which help a lot with compliance with the regulations required by our company in addition to shielding sensitive data.

This tool integrates and protects all collaborative tools, in our case, Microsoft 365.

What needs improvement?

The key improvement for this tool is the inclusion of more collaborative applications. We know that Microsoft has many tools, however, not all of them are covered.

It is also important to validate the documentation. Not all of it is precise. It is very difficult to find the correct ones. In this area, Check Point could generate a more up-to-date library to be able to help customers or companies use their products more.

Finally, the Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix.

For how long have I used the solution?

A very modern tool, centralized through Check Point Infinity, this is used by our company on a trial basis during the last semester.

Which solution did I use previously and why did I switch?

Previously, we used Microsoft security tools. However, we needed to centralize the security environments, and it was perfect with Infinity.

What's my experience with pricing, setup cost, and licensing?

It is important to evaluate the tools before going into production to verify that everything works correctly.

Which other solutions did I evaluate?

We carried out a previous validation of the functions and current tools of the market. It convinced us to move towards Check Point.

What other advice do I have?

Security applications are validated and I would recommend the solution.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2005803 - PeerSpot reviewer
Digital Coordinator at Modis
Real User
Helpful URL protection, good quarantine capabilities, and a nice user dashboard
Pros and Cons
  • "Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
  • "Some files are not scanned thoroughly due to occasional network failures."

What is our primary use case?

The advanced software blocks advanced email phishing that can affect information infrastructure. 

It keeps my colleagues safe when interacting with our partners through collaboration. 

Our communication networking system is secure from end to end to enhance information safety and prevent cyber attacks. 

Sending emails is fast and efficient within the organization's ecosystem. This product provides security alerts when there is a threat that can affect our communication channel. 

Check Point Harmony Email & Collaboration caters to full cloud email security and other applications in the cloud.

How has it helped my organization?

Encryption of emails enhances safe communication that ransomware attacks cannot compromise. 

A secure collaboration environment has enhanced faster growth due to productive sessions convened by teams. 

It blocks unsafe emails before landing inbox to avoid time wastage. Blocking malicious emails has enabled employees to focus on their roles fully without fear of being attacked. 

Consistent security across the company infrastructure has saved the company costs that could be accrued from an insecure work environment.

What is most valuable?

Securing major file-sharing services across the company has been productive since we deployed this platform. 

The security system has a stable data protection system that has prevented potential data loss. 

This product detects malicious behavior in advance and immediately quarantines files before they can spread viruses to the entire network. 

URL protection features give me the confidence to browse the internet without fear of visiting unsafe sites. 

The user dashboard updates systems automatically to meet the current enterprise demands.

What needs improvement?

The system has programmed categories of threats that are detected automatically. 

This can lead to virus leakage and spread malicious data across the enterprise. 

The cost of deployment and integration with other applications is high. 

Some files are not scanned thoroughly due to occasional network failures.

We have experienced the best services from the performance of this platform despite a few operational challenges that rarely occur. 

Monitoring the system operation for new teams is not easy due to complicated configuration techniques.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

It is highly stable in the provision of email security.

What do I think about the scalability of the solution?

This tool is good in overall performance.

How are customer service and support?

The support staff is kind with fast responses to our requests.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with a different solution.

How was the initial setup?

The setup was complex during integrations though the support staff provided productive guidance.

What about the implementation team?

Implementation took place through the vendor team.

What was our ROI?

There has been increased ROI (from 30% to 55%) since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The licensing terms have favored our organization.

Which other solutions did I evaluate?

We selected this product after a recommendation from our colleagues.

What other advice do I have?

Email security is critical to any enterprise, and with this solution, everything is covered.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2008407 - PeerSpot reviewer
Java Developer at EROAD
User
Great for blocking email, offers comprehensive security measures and has helpful support
Pros and Cons
  • "Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure."
  • "After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."

What is our primary use case?

This platform protects collaboration and email infrastructure from ransomware attacks. 

It helps departments to communicate efficiently and exchange files without any fear. 

It blocks phishing attacks before they reach the inbox. 

Email security has accelerated growth and stimulated new innovative ideas that can boost productivity. Bringing all the teams together has improved teamwork and cooperation among the employees. We deployed this software to enhance effective team coordination and promote secure networking infrastructure.

How has it helped my organization?

The organization has greatly benefited from the strong security measures implemented by this software. 

The capability to block malicious emails from reaching inboxes has helped members to exchange secure messages that cannot spread viruses and lead to delays. 

The comprehensive security measures have enabled members to focus on more productive duties without fear of being attacked. 

The entire supply chain is secured with end-to-end encryption that unauthorized third parties cannot compromise.

What is most valuable?

The software detects sensitive data that can leak confidential information and stops it immediately from leaving the organization. 

Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure. 

The high-grade email security protection features have blocked many attempts from ransomware attacks. 

Collaboration in a secure environment has been one of the greatest dreams we have longed for, with support from all the enterprise members.

What needs improvement?

The set collaboration and email security features have been stable since we deployed this software. Check Point Harmony Email & Collaboration cost is high, and the deployment process may take longer in a new environment. 

It blocks secure communication if the settings are not well set and defined for a given time frame. 

The most set objectives have been achieved with this leading anti-phishing platform that helps to keep the entire organization safe. 

It has prevented account takeover and created the best infrastructure for sharing files and data. 

After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities. 

It is not easy to establish the number of computers that have access to this network.

For how long have I used the solution?

I've used the solution for eight months.

What do I think about the stability of the solution?

This platform is highly stable and offers an enhanced secure collaboration infrastructure.

What do I think about the scalability of the solution?

The comprehensive email security provision has impressed the teams.

How are customer service and support?

The customer service team has always offered the best support services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with other related software.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation was done through the vendor.

What was our ROI?

ROI stands at 45% - currently up from 30%.

What's my experience with pricing, setup cost, and licensing?

The setup cost and set budgets are suitable for most businesses-level enterprises.

Which other solutions did I evaluate?

I evaluated different solutions, however, we decided to settle on Check Point Harmony Email & Collaboration due to its efficiency.

What other advice do I have?

I am impressed by the overall performance of this software.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC
User
Increases productivity, offers good encryption, and is very secure
Pros and Cons
  • "It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
  • "The next release should focus more on email categorization and provide options for unlocking blocked safe emails."

What is our primary use case?

Check Point Harmony Email & Collaboration block any harmful social communication data that can destroy safe information. 

It enables teams in the organization to collaborate under a safe environment when working on various projects and tasks. 

It monitors the flow of emails from one destination to the other with security protocols that block phishing attacks. 

The product stops threats and fraudulent messages before entering the inbox of the receiver. This software has enabled members of the organization to focus on demanding projects without fear of external cyber-attacks.

How has it helped my organization?

Productivity has increased since there are no external detractors. 

Sending email with bulky attachments is safe and faster with guaranteed security encryption. 

It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments. 

It has been able to block malware attacks that could derail workflows and affect overall production. 

The solution cleans unsafe files quickly and eliminates threats that can adversely affect information. 

Engagement with my colleagues is easy, and I no longer fear any ransomware attacks.

What is most valuable?

Sensitive business data is effectively protected from any third-party attacks that can easily destroy confidential information. 

It prevents data from leakages and exposure to unauthorized hands. 

The high-grade bulletproof security model monitors email transfer and content that is contained in the messages. File-sharing security provides a reliable platform for faster sharing of documents without fear of external data threats. 

The dashboard provides real-time insights that provide awareness to members on the best policies for sharing information and engaging each other.

What needs improvement?

The next release should focus more on email categorization and provide options for unlocking blocked safe emails. 

They should release should increase collaboration apps that can be topped with security layers. 

It has developed reliable security infrastructure for guarding our information, and I am proud of that. Most objectives have been achieved with positive results and increased return on investment. The unified dashboard gives departments an easy time monitoring their work progress and security situation in their networking environment.

For how long have I used the solution?

I've used the solution for nine months. 

What do I think about the stability of the solution?

This product is stable with robust performance.

What do I think about the scalability of the solution?

It is easy to master the concept of operations and monitor performance.

How are customer service and support?

The customer service team works closely with all the staff members.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used another solution.

How was the initial setup?

The setup was not complex.

What about the implementation team?

It was deployed by the vendor.

What was our ROI?

ROI has been positive since we deployed it and has highly improved from 15% to 35%.

What's my experience with pricing, setup cost, and licensing?

The setup and cost have been good from my experience, and I recommend it to other organizations.

Which other solutions did I evaluate?

I did not find any other effective platforms like this one.

What other advice do I have?

This is a great product with high-performance features.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.