Try our new research platform with insights from 80,000+ expert users
Support at a security firm with 51-200 employees
User
Good security and integration but needs better documentation
Pros and Cons
  • "We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point."
  • "They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response."

What is our primary use case?

Our corporate environment requires business protection for email and our collaboration tools to avoid threats, spam, and ransomware, among other threats coming in through email. This could have great effects on our systems and equipment.

With Check Point, we can protect our data in the cloud with tools such as One Drive, among others.

The tool works with different manufacturers, which provides great reliability.

How has it helped my organization?

Check Point has helped us improve our security layer with this complete cloud solution. We no longer depend on a Gateway as it is a complete solution that helps us prevent any type of threat that travels through email.

We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point.

We also really like its centralized environment since the Check Point Infinity Portal really centralizes everything.                 

What is most valuable?

The platform offers advanced security measures to protect emails from cyber threats such as phishing attacks, malware, and ransomware.

The platform is cloud-based, which means users can access their emails and collaboration tools from anywhere and on any device.

The security of collaboration tools is great.

The platform integrates with other productivity and collaboration tools like Microsoft Office, Slack, and Zoom.

What needs improvement?

Maybe they could integrate the solution with Avanan. Doing that would really make it a very robust solution.

They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response.

The solution lacks public documentation and some documentation is not so clear, which means that the client does not understand the implementation that must be carried out.

You can only see the costs through a Check Point partner.                           

Buyer's Guide
Check Point Harmony Email & Collaboration
May 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.

For how long have I used the solution?

This is a very productive tool. We used it for a few months. It really helped us protect against threats in email and Microsoft collaborative tools.

Which solution did I use previously and why did I switch?

Previously we did not use more than the security provided by Microsoft itself. We have since changed to Check Point.

What's my experience with pricing, setup cost, and licensing?

As for the cost, it is per protected user. It seems good to me in that aspect however, the issue of implementation sometimes costs a bit. That's okay if it can be done correctly. The licenses are easy to acquire.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2008407 - PeerSpot reviewer
Java Developer at EROAD
User
Great for blocking email, offers comprehensive security measures and has helpful support
Pros and Cons
  • "Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure."
  • "After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities."

What is our primary use case?

This platform protects collaboration and email infrastructure from ransomware attacks. 

It helps departments to communicate efficiently and exchange files without any fear. 

It blocks phishing attacks before they reach the inbox. 

Email security has accelerated growth and stimulated new innovative ideas that can boost productivity. Bringing all the teams together has improved teamwork and cooperation among the employees. We deployed this software to enhance effective team coordination and promote secure networking infrastructure.

How has it helped my organization?

The organization has greatly benefited from the strong security measures implemented by this software. 

The capability to block malicious emails from reaching inboxes has helped members to exchange secure messages that cannot spread viruses and lead to delays. 

The comprehensive security measures have enabled members to focus on more productive duties without fear of being attacked. 

The entire supply chain is secured with end-to-end encryption that unauthorized third parties cannot compromise.

What is most valuable?

The software detects sensitive data that can leak confidential information and stops it immediately from leaving the organization. 

Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure. 

The high-grade email security protection features have blocked many attempts from ransomware attacks. 

Collaboration in a secure environment has been one of the greatest dreams we have longed for, with support from all the enterprise members.

What needs improvement?

The set collaboration and email security features have been stable since we deployed this software. Check Point Harmony Email & Collaboration cost is high, and the deployment process may take longer in a new environment. 

It blocks secure communication if the settings are not well set and defined for a given time frame. 

The most set objectives have been achieved with this leading anti-phishing platform that helps to keep the entire organization safe. 

It has prevented account takeover and created the best infrastructure for sharing files and data. 

After updates, the internet connection fails, and I have to restart my desktop to resume initial functionalities. 

It is not easy to establish the number of computers that have access to this network.

For how long have I used the solution?

I've used the solution for eight months.

What do I think about the stability of the solution?

This platform is highly stable and offers an enhanced secure collaboration infrastructure.

What do I think about the scalability of the solution?

The comprehensive email security provision has impressed the teams.

How are customer service and support?

The customer service team has always offered the best support services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with other related software.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

Implementation was done through the vendor.

What was our ROI?

ROI stands at 45% - currently up from 30%.

What's my experience with pricing, setup cost, and licensing?

The setup cost and set budgets are suitable for most businesses-level enterprises.

Which other solutions did I evaluate?

I evaluated different solutions, however, we decided to settle on Check Point Harmony Email & Collaboration due to its efficiency.

What other advice do I have?

I am impressed by the overall performance of this software.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
May 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
IT specialist at Landpower Australia Pty Ltd
Real User
A stable solution that does a fantastic job of catching things Microsoft doesn't, but implementation could be easier
Pros and Cons
  • "The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic."
  • "The implementation could definitely be better."

What is our primary use case?

At the moment, we're heavily using the email and collaboration features. We are also licensed for the mobile part, which we are sort of working into, and CloudGuard as well. We're kind of working through those features. 

What needs improvement?

The implementation could definitely be better. We had great support from Check Point, but there were some "got-you" moments where we got surprises as we were setting it up. When Check Point talks about it, it's all "plug and play," but it's not really one of those platforms where you can just jump in and click a few buttons and everything works. You need to have a bit of knowledge about what you're doing and it's a bit more complicated than they advertise.

In the future I would like to see something similar to what Proofpoint has, where users can actually go in and make the call to release their own emails. We've got a small number of users, so it's okay for the IT team to constantly be bombarded with our emails for releasing, but I would love to have an option where I can allow users to go in and make the call to release an email, and then of course it would only actually be released if it passes certain things.

For how long have I used the solution?

I have been using this solution for about a year and a half now. 

What do I think about the stability of the solution?

The solution is stable and I think it does a fantastic job. The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic. There's a few things that get flagged by Microsoft, most of them false positives, so it's interesting. Harmony passes it through and Microsoft thinks it's spam, but usually it's not.

What do I think about the scalability of the solution?

The solution is very easy to scale. There are between 500-550 active users in our company. We have a team of three people that look after the environment, but that is only part of their responsibilities. I think it would do very well with one full-time person handling the maintenance. 

How are customer service and support?

The technical support was brilliant, but that's the thing when you're buying something, usually the initial support is top notch. It's been a year and a half now, and we haven't had any urgent technical issues that we've had to go back for help with, but at the start, when we were implementing the solution, we had good support. They were on the ball and they really stepped up.

Which solution did I use previously and why did I switch?

What we used in the past was an outfit called MSX.

What's my experience with pricing, setup cost, and licensing?

Check Point is more expensive. That's the honest truth. So far, it's a good value for the money. 

Which other solutions did I evaluate?

We considered the Microsoft inbuilt solution, and the advice that we got from a lot of people was, if you want to use that one, combine it with something else. That is what we ended up doing, because it came as part of our licensing with 365, but we can tell that it was a good idea to combine it with Check Point because it will let a lot of things pass.

Also, I know CrowdStrike is cheaper with their Falcon offering, but I haven't had the opportunity to work with it. The reason why I went with Check Point was because I have worked with it in the past and I like their product, so that was the biggest push. 

What other advice do I have?

I would rate this solution as a seven out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Offers advanced visibility using good monitoring and alerting capabilities
Pros and Cons
  • "As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts."
  • "From time to time, the system's administrators notice the increase in the false-positive alerts being reported by CloudGuard SaaS."

What is our primary use case?

About one year ago, we decided to switch from the on-premises located email server, based on Zimbra software, to the cloud-based Office 365 provided by Microsoft. We did this because of the increased load that followed after the company's growth.

To provide the security coverage to the new email service, we chose the Check Point CloudGuard SaaS solution. Now it serves as the main protection mechanism, with about 500 users and up to 10,000 emails per day, and there are no problems with the scalability for future growth.

How has it helped my organization?

The Check Point CloudGuard SaaS solution is used mostly to prevent malware and zero-day threats. It protects the Microsoft Office 365 cloud email service users of our company against attacks. It is also capable of stopping the sophisticated phishing attacks on the Office 365 accounts and block the possible account hijacks.

It would be really hard to achieve such a level of protection with the on-premises email server without using some email-server specific software, but with CloudGuard SaaS it was easy to integrate the security into the Microsoft email services.

What is most valuable?

As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts. In general, the monitoring and alerting is just great, and the default dashboards provided are used by our support team as part of the SoC solution.

In addition, the CloudGuard SaaS is capable of preventing data leakage, thus may serve as the basic DLP system for the cloud email system. We rely on this functionality and block the emails that contain the card numbers patterns as part of the compliance regulations.

What needs improvement?

From time to time, the system's administrators notice the increase in the false-positive alerts being reported by CloudGuard SaaS. The increase usually lasts for several days, with the longest we observed being about a week. During these periods, some number of the "clean" emails are blocked and not delivered to the end-users. I hope the Check Point team would work on improving the detection algorithm and the amount of the false-positive alerts would be more predictable, stable on the minimal level. 

For how long have I used the solution?

We onboarded the Check Point CloudGuard SaaS about a year ago, after switching from our on-prem email system to the cloud-based Office 365.

What do I think about the stability of the solution?

The solution is mature and stable.

What do I think about the scalability of the solution?

The solution is scalable. We now have about 500 active users and see no issues with the performance. 

How are customer service and technical support?

We haven't had any support cases opened for Check Point CloudGuard SaaS so far.

Which solution did I use previously and why did I switch?

We didn't have previous experience with any SaaS security solution before switching.

How was the initial setup?

The setup was straightforward, but quite long due to the need for API integration configuration. In total, it took us about a month to deploy.

What about the implementation team?

The solution was implemented by the in-house team of security engineers and email system administrators, without the prior experience of the CloudGuard SaaS.

Which other solutions did I evaluate?

We didn't evaluate the other products, since we have a strong expertise among the team with the other Check Point solution, and were satisfied with them.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2005803 - PeerSpot reviewer
Digital Coordinator at Modis
Real User
Helpful URL protection, good quarantine capabilities, and a nice user dashboard
Pros and Cons
  • "Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
  • "Some files are not scanned thoroughly due to occasional network failures."

What is our primary use case?

The advanced software blocks advanced email phishing that can affect information infrastructure. 

It keeps my colleagues safe when interacting with our partners through collaboration. 

Our communication networking system is secure from end to end to enhance information safety and prevent cyber attacks. 

Sending emails is fast and efficient within the organization's ecosystem. This product provides security alerts when there is a threat that can affect our communication channel. 

Check Point Harmony Email & Collaboration caters to full cloud email security and other applications in the cloud.

How has it helped my organization?

Encryption of emails enhances safe communication that ransomware attacks cannot compromise. 

A secure collaboration environment has enhanced faster growth due to productive sessions convened by teams. 

It blocks unsafe emails before landing inbox to avoid time wastage. Blocking malicious emails has enabled employees to focus on their roles fully without fear of being attacked. 

Consistent security across the company infrastructure has saved the company costs that could be accrued from an insecure work environment.

What is most valuable?

Securing major file-sharing services across the company has been productive since we deployed this platform. 

The security system has a stable data protection system that has prevented potential data loss. 

This product detects malicious behavior in advance and immediately quarantines files before they can spread viruses to the entire network. 

URL protection features give me the confidence to browse the internet without fear of visiting unsafe sites. 

The user dashboard updates systems automatically to meet the current enterprise demands.

What needs improvement?

The system has programmed categories of threats that are detected automatically. 

This can lead to virus leakage and spread malicious data across the enterprise. 

The cost of deployment and integration with other applications is high. 

Some files are not scanned thoroughly due to occasional network failures.

We have experienced the best services from the performance of this platform despite a few operational challenges that rarely occur. 

Monitoring the system operation for new teams is not easy due to complicated configuration techniques.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

It is highly stable in the provision of email security.

What do I think about the scalability of the solution?

This tool is good in overall performance.

How are customer service and support?

The support staff is kind with fast responses to our requests.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with a different solution.

How was the initial setup?

The setup was complex during integrations though the support staff provided productive guidance.

What about the implementation team?

Implementation took place through the vendor team.

What was our ROI?

There has been increased ROI (from 30% to 55%) since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The licensing terms have favored our organization.

Which other solutions did I evaluate?

We selected this product after a recommendation from our colleagues.

What other advice do I have?

Email security is critical to any enterprise, and with this solution, everything is covered.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC
User
Increases productivity, offers good encryption, and is very secure
Pros and Cons
  • "It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
  • "The next release should focus more on email categorization and provide options for unlocking blocked safe emails."

What is our primary use case?

Check Point Harmony Email & Collaboration block any harmful social communication data that can destroy safe information. 

It enables teams in the organization to collaborate under a safe environment when working on various projects and tasks. 

It monitors the flow of emails from one destination to the other with security protocols that block phishing attacks. 

The product stops threats and fraudulent messages before entering the inbox of the receiver. This software has enabled members of the organization to focus on demanding projects without fear of external cyber-attacks.

How has it helped my organization?

Productivity has increased since there are no external detractors. 

Sending email with bulky attachments is safe and faster with guaranteed security encryption. 

It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments. 

It has been able to block malware attacks that could derail workflows and affect overall production. 

The solution cleans unsafe files quickly and eliminates threats that can adversely affect information. 

Engagement with my colleagues is easy, and I no longer fear any ransomware attacks.

What is most valuable?

Sensitive business data is effectively protected from any third-party attacks that can easily destroy confidential information. 

It prevents data from leakages and exposure to unauthorized hands. 

The high-grade bulletproof security model monitors email transfer and content that is contained in the messages. File-sharing security provides a reliable platform for faster sharing of documents without fear of external data threats. 

The dashboard provides real-time insights that provide awareness to members on the best policies for sharing information and engaging each other.

What needs improvement?

The next release should focus more on email categorization and provide options for unlocking blocked safe emails. 

They should release should increase collaboration apps that can be topped with security layers. 

It has developed reliable security infrastructure for guarding our information, and I am proud of that. Most objectives have been achieved with positive results and increased return on investment. The unified dashboard gives departments an easy time monitoring their work progress and security situation in their networking environment.

For how long have I used the solution?

I've used the solution for nine months. 

What do I think about the stability of the solution?

This product is stable with robust performance.

What do I think about the scalability of the solution?

It is easy to master the concept of operations and monitor performance.

How are customer service and support?

The customer service team works closely with all the staff members.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used another solution.

How was the initial setup?

The setup was not complex.

What about the implementation team?

It was deployed by the vendor.

What was our ROI?

ROI has been positive since we deployed it and has highly improved from 15% to 35%.

What's my experience with pricing, setup cost, and licensing?

The setup and cost have been good from my experience, and I recommend it to other organizations.

Which other solutions did I evaluate?

I did not find any other effective platforms like this one.

What other advice do I have?

This is a great product with high-performance features.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Network Security Engineer - Presales at a tech services company with 201-500 employees
Real User
Has efficient, effective security features, but the solution is costly
Pros and Cons
  • "For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good."
  • "Getting reports and finding threats in the console is easy."
  • "Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues."

What is our primary use case?

This solution is not for our organization. We are system integrators. We have some projects for our clients, and one of our clients was looking for CloudGuard because they use Check Point Firewall for their on-premise. There are a number of machines and critical servers that they have hosted in AWS; 15 to 20 servers and application servers are hosted in the AWS platform. For those, we have applied Check Point IaaS Firewall for their security and firewall protection.

We are using the stable version that was published in March.

How has it helped my organization?

I am confident with the block rate. We host our solution in AWS cloud. If someone tries to hit our applications, they could be a legitimate user or a hacker. So, we have found a number of blocked attempts from the external end.

What is most valuable?

In terms of technical features, this is the best solution that I have worked with so far. For example:

  • URL Filtering
  • Application control 
  • Threat Prevention
  • Sandboxing

We have found threat prevention using sandboxing from Check Point, after buying the Threat Prevention license, helped with the malware prevention rate and reduced zero-day attacks.

For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good. 

Getting reports and finding threats in the console is easy.

What needs improvement?

The false positive rate is one of the problems that we had faced with Check Point's information. For example, we have a number of false positives in both CloudGuard SaaS and CloudGuard IaaS, which has been quite disappointing when we find them. However, the moment when we whitelist or blacklist false positive things, the solution gives us more efficient security than other solutions. When I teach Check Point IaaS, I feel like it is putting devices into learning mode and feeding more stuff to the solution, which gives me more efficient security.

We download the SmartConsole from AWS, installing it on our computers, then managing it from our end only on local machines. I need to download agents for every machine from the Check Point instance. To connect with the SmartConsole, then I need to give public access to Check Point's machine. At that moment, there is no configuration in my machine so I need to give some public access to our machine. Giving public access without configuring anything is the first defect or drawback. It takes a few times for every engineer to download the agent and configure the policy, and that takes five to 10 minutes. Within those five to 10 minutes, it is insecure.

The integration with the Check Point console needs improvement, e.g., accessing the SmartConsole is difficult. 

For how long have I used the solution?

I have been working with Check Point for six to seven months.

What do I think about the scalability of the solution?

I haven't tested the scalability.

How are customer service and technical support?

The worst thing that I have faced with Check Point has been their support.

I have sat with all the following support teams:

  • Cisco
  • Fortinet
  • SonicWall
  • Sophos
  • Check Point. 

Other vendor support teams go after fixing the issue the moment that they join the remote session. The problem that I have faced with Check Point support is that they share the case number with me, then it takes at least two days for them to join a remote session with us, even though we have asked for this timeframe to change. Even though we have already explained the problems that we are facing or the business pain points in our network on the call or email, we have to repeat the problem statements again in the console. It can take four or five days to resolve the issue from the moment they understand the problem. This includes the time to teach their R&D or internal team whatever the issue is. I have faced timeframes as long as seven to 10 days for fixing some issues. 

Since this is a cloud-based solution for IaaS and SaaS, I need a different support team for a number of things. So, if they increased or developed their support team, then it would be better for their customers.

How was the initial setup?

Compared to other solutions, like Fortinet, this solution's initial setup is complex. Policy configuration and integrations make Check Point's setup difficult. The setup for on-premise and cloud are the same.

What about the implementation team?

Whenever we need to download the agent from Check Point's console and integrate the SmartConsole with the Check Point solution, the configuration is time consuming and a difficult task for an engineer. Getting the console integrated with the firewall can be difficult, affecting engineers during implementation.

What's my experience with pricing, setup cost, and licensing?

When it comes to Threat Prevention pricing and licensing, it has felt a little costly. For some clients, who are looking at security as their primary concern, then it's better for them. 

I'm in this business as a system integrator, so I need to suggest Check Point to some customers who are comparing products. I sell Check Point, Fortinet, and Palo Alto solutions. In terms of licensing, this solution is quite competitive but very costly. For someone looking at security as a primary concern, they should only invest in Check Point. For a customer who is looking at security combined with pricing, Check Point might not be the core solution for them. In today's market, customers are looking for effective security with efficient pricing, and Check Point is not suitable for these types of customers.

I would like them to improve the pricing.

Which other solutions did I evaluate?

With respect to Check Point's security features, my clients and I feel every feature given by Check Point has been very helpful for us. We have tried FortiGate, Sophos, and Cisco in some places. Even though Check Point wasn't a market leader, like Cisco and FortiGate, they have the most efficient security. Therefore, we feel it is worth the money for their security features.

The cloud security provided by CloudGuard IaaS is simple compared with the security provided by public cloud providers. If I go for Check Point, then I'm getting the complete features of what a firewall does. When I go for AWS, then by default, I don't get anything other than the ACLs.

What other advice do I have?

The security features have been good. The pricing and licensing strategies have been average, but Check Point's support has been the worst.

I would rate the solution as a seven out of 10.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: System Integrator
PeerSpot user
reviewer1093134 - PeerSpot reviewer
Pentester at Cybertech Projects
User
Top 10
Reduces spam, offers excellent reporting, and has good management capabilities
Pros and Cons
  • "The ease of management and intuitive administration are excellent."
  • "The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter."

What is our primary use case?

We use the solution for the protection of email from phishing attacks, spam, and malicious email-related activities. 

It detects and blocks the most advanced phishing attacks across inbound, outbound, and internal communications, in real-time, before the attack succeeds.  

The solution is used for email protection, providing IT administrators with a great amount of information about possible attacks faced by the organization, and logins by users. 

It also has a high level of detail in its reports, facilitating the management and detection of possible threats to the security of the organization.

With the addition of the DMARC module, it makes it much easier to monitor the security policies applied and provides visual information about the type of traffic received, avoiding domain spoofing.

How has it helped my organization?

The number of phishing and spam emails has decreased and email security has improved by 80%. The IT team has noticed a great improvement in the number of emails received and a decrease in attacks. The helpful alerts generated by HEC facilitate the management and response. 

Thanks to its dashboard, it displays detailed information about detected activities, suspicious logins, span deletions, or phishing detected and blocked with a high level of detail. The level of reporting detail facilitates threat management; now the organization has an additional layer of protection for end users.

What is most valuable?

The ease of management and intuitive administration are excellent. Thanks to its dashboard, the most valuable thing is the detection capability provided by this solution. The level of detail offered by Harmony is unique, to the point of showing the differences between what is detected by Office 365 and what is detected by HEC. The organization relies on this email security solution and facilitates the protection of all end users, decreasing security breaches by malicious actors.

What needs improvement?

The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter. It could be improved to obtain a greater level of detail, unlike Office 365, which offers an extreme level of detail and facilitates the management and comparison of what is happening with respect to the mail. Its integration with Gsuite is simpler and has that point against it, however high levels of detail can be obtained in the reports of the solution. On the other hand, the ease of administration and threat detection capabilities are its strong points, and it stands out from other solutions that I have had the opportunity to test before.

For how long have I used the solution?

Currently, this solution has been used for the last tree years.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2025
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.