Try our new research platform with insights from 80,000+ expert users
Harish (Kumar) - PeerSpot reviewer
Cyber Security and IT Head at a outsourcing company with 51-200 employees
Real User
Top 20
Nov 21, 2023
Easy to use and manage, even for non-technical users
Pros and Cons
  • "I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats."
  • "There are a few areas for improvement. One is the occasional sluggishness or latency, which is likely due to the cloud-based nature of the solution. So, the performance can be better."

What is our primary use case?

Our team primarily uses Google Workspace for email, so we were looking for a solution that could protect us from spam, phishing attacks, and other email threats. 

Harmony Email fits the bill perfectly because it's an API-based product that doesn't require any MX record or other configuration changes. It's also very easy to use and manage, even for non-technical users.

What is most valuable?

I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats. With one hour of training, anyone can effectively use this product.

What needs improvement?

There are a few areas for improvement. One is the occasional sluggishness or latency, which is likely due to the cloud-based nature of the solution. So, the performance can be better.

Additionally, while Harmony Email can detect phishing emails that Google has missed, it would be even better if it could automatically quarantine or delete these emails.

Since we use multiple Google Workspace accounts across three separate domains, it would be incredibly helpful if Check Point Harmony Email could provide a single dashboard that consolidates all of this information. 

Additionally, Harmony Email should support other email providers beyond Microsoft and Google, as I also use Joho with over a thousand email IDs.

Having a unified dashboard and expanding support to other email providers would significantly enhance the product's usability for many users.

Currently, I have to rely on a separate gateway solution, like Cisco, to protect my Joho emails. It would be much more convenient if Harmony Email could handle all of my email protection needs.

For how long have I used the solution?

I've been using Harmony Email for about four or five months now.

Buyer's Guide
Check Point Harmony Email & Collaboration
January 2026
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.

What do I think about the stability of the solution?

It is cloud-based, so the performance is low. I would rate the stability an eight out of ten. It is stable but the performance is low.

What do I think about the scalability of the solution?

I would rate the scalability an eight out of ten. We have 300+ end users using this solution. 

How are customer service and support?

The customer service and support are not very prompt like SonicWall and other vendors in the same space. Perhaps because Check Point is not as prominent in my region, their SLA is not terrible. It's just not very effective. 

For instance, if I need support within 15 or 30 minutes, it won't happen. It could take up to four hours. 

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I initially started with Cisco Gateway. However, due to ongoing changes, we would have needed to modify MX records or other settings, making the configuration more complex. 

As a result, we decided to try Check Point Harmony Email and Collaboration, and after conducting a proof of concept (POC), we decided to deploy it. We also checked Barracuda.

So, we chose Check Point over Barracuda during the POC. The primary reason was that Check Point Harmony Email is easy to configure and requires no MX record changes. 

Additionally, it's more effective because it's an AI-based solution. It provides insights into the origin of emails, the connection between the sender and receiver, their previous email history, and the frequency of their communication. These features are unique to Check Point Harmony Email and Collaboration.

How was the initial setup?

The initial setup is very simple because only API configuration was there. We provide a user and password on our dashboard, and we can use it remotely. 

It took only 10 to 15 minutes to deploy. Initially, it takes time to collect the data and create timelines. The solution doesn't require any maintenance. 

What's my experience with pricing, setup cost, and licensing?

The pricing is in the middle. Check Point's pricing is not the highest in the competitive market. 

It's more expensive than Barracuda but less expensive than Cisco. So, I would give it a rating of six out of ten, where one is expensive and ten is cheap. 

What other advice do I have?

Overall, I would rate the solution an eight out of ten. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Konstantinos Mourikis - PeerSpot reviewer
Senior Presales Engineer at a tech vendor with 51-200 employees
Reseller
Jul 30, 2023
Has a user-friendly dashboard, a great anti-phishing algorithm, and sandboxing for testing
Pros and Cons
  • "The solution has a very effective anti-phishing algorithm that detects a significantly higher number of phishing emails compared to the default Microsoft solution."
  • "I would like Check Point to extend its coverage to include more cloud applications."

What is our primary use case?

Usually, the customer is on Office 365, and the main selling point for us is that approximately 95 percent of customers do not have the E5 license from Microsoft, which is the highest tier. As a result, they lack advanced email protection. Therefore, using a third-party solution is more cost-effective than upgrading to an E5 license, and it also offers greater sophistication. This solution can cover not only Office 365 but also other platforms. Furthermore, it carries the reputable brand name Check Point and is well-known in the security industry.

What is most valuable?

The centralized management dashboard is easy to use. We usually sell advanced packets that include sandboxing for attachments, which is highly critical to most customers. The solution has a very effective anti-phishing algorithm that detects a significantly higher number of phishing emails compared to the default Microsoft solution. Additionally, it is user-friendly. When customers need to make exceptions to the policy, they find it quite easy to navigate the dashboard. However, what customers mostly care about are the anti-phishing and sandboxing features.

What needs improvement?

The price has room for improvement. Perhaps, if Check Point offered an SMB bucket for up to 100 users or a similar option. This could be beneficial as it would likely result in a more cost-effective solution.

I would like Check Point to extend its coverage to include more cloud applications. Currently, 95 percent of our customers are using Office 365 or Google Mail. It would be beneficial if the solution covered a broader range of applications.

For how long have I used the solution?

I have been using Check Point Harmony Email & Collaboration for two years.

What do I think about the stability of the solution?

We haven't experienced any stability issues with the solution as it is cloud-based and thus quite stable. I can't say the same for another cloud product, though. The stability is mainly due to the architecture rather than the solution itself.

What do I think about the scalability of the solution?

Scaling the solution is not a problem because it is cloud-based. The number of customer email accounts can range from fifty to five thousand; it doesn't really matter for the solution.

How are customer service and support?

The technical support is average. Like with most companies, when they are not dealing with an enterprise customer, their response is usually medium to slow, unless it's a very critical issue.

Which solution did I use previously and why did I switch?

Some of our customers used FortiMail but discovered that certain malicious emails were able to bypass the solution, unlike Check Point, which identified and quarantined the emails.

How was the initial setup?

The initial setup is easy. The deployment takes ten minutes and requires only one person.

What's my experience with pricing, setup cost, and licensing?

Due to its pricing, I would say that Check Point Harmony Email & Collaboration is more suitable for medium to enterprise organizations. For smaller customers, they usually require something more affordable, but it's not related to the features of the product. It's clearly about the pricing.

The license is issued on a yearly basis. On their website, we can observe a price per month, but it's derived from the yearly cost. I don't believe we have the option to purchase it for just a few months, for example.

As far as Check Point Harmony Email & Collaboration is concerned, we only need to pay for the license. Additionally, we have the option to integrate or add an additional support package, which includes the implementation course, and so on. However, for the solution, we only need to pay for the license.

What other advice do I have?

I would rate Check Point Harmony Email & Collaboration an eight out of ten. It's a good solution, but I rarely give a perfect ten to any product. So, I believe it offers a fair value with some room for improvement. It could be rated nine out of ten.

As Check Point Harmony Email & Collaboration is a cloud-based solution, there is no need to assist users with hardware-level maintenance. Everything is managed in the cloud, eliminating the necessity for updates or firmware adjustments, among other things. However, like any cybersecurity solution, it is essential to keep the policies up to date. For instance, within our organization, we need to periodically train staff on configuration and maintenance to ensure it remains current. Although it requires some maintenance, it is minimal, and one person is sufficient to handle it.

We work with medium and enterprise customers.

As long as the pricing is acceptable for an organization, I would recommend Check Point Harmony Email & Collaboration because it provides a good solution for its offerings.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
January 2026
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
IT at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Dec 31, 2025
Real-Time Phishing Defense Strengthens Cloud Email Response

What is our primary use case?

Check Point Harmony Email & Collaboration protects our cloud-based email and cloud collaboration platforms, primarily Microsoft 365, from phishing, malware, and account takeover attempts.

I use Check Point Harmony Email & Collaboration to protect against phishing or account takeover attempts by having a user receive an email that appeared to be a Microsoft 365 login alert with a convincing subject line and branding. However, Harmony flagged it immediately due to a suspicious sender domain and a malicious link embedded in the message.

What is most valuable?

One aspect that stands out in my day-to-day use of Check Point Harmony Email & Collaboration is how seamlessly it integrates into our existing workflows without disrupting users.

The best feature of Check Point Harmony Email & Collaboration is advanced threat prevention because Click-Time Prevention rewrites URLs and scans them when clicked, blocking access to malicious sites even if the email appears legitimate.

URL scanning and Click-Time Protection in Check Point Harmony Email & Collaboration have been critical in our environment, especially as phishing attacks become more sophisticated.

Check Point Harmony Email & Collaboration integrates smoothly with Microsoft 365 via API, so there is no need for agents or complex setup.

Check Point Harmony Email & Collaboration has positively impacted my organization, resulting in faster incident response with real-time alerts and detailed threat insights, enabling our team to act quickly when something suspicious is flagged.

After deploying Check Point Harmony Email & Collaboration, my organization reported a significant reduction in phishing incidents and faster response times to email-based threats.

What needs improvement?

Check Point Harmony Email & Collaboration could be improved by making the experience easier.

While the dashboard of Check Point Harmony Email & Collaboration is powerful, a cleaner layout or customizable views would help users focus on the most relevant alerts and metrics without digging through layers.

What do I think about the stability of the solution?

Check Point Harmony Email & Collaboration is very stable for our organization and is a great tool.

What do I think about the scalability of the solution?

Check Point Harmony Email & Collaboration is a tool with scalability and other great features.

How are customer service and support?

I have not interacted with customer support for Check Point Harmony Email & Collaboration, but I know that in other tools, Check Point customer support is great and very collaborative about any issues or problems.

How would you rate customer service and support?

Positive

What was our ROI?

Check Point Harmony Email & Collaboration saves time, saves money, and provides more security.

There are significant savings with Check Point Harmony Email & Collaboration in terms of money saved and time saved.

What other advice do I have?

Check Point Harmony Email & Collaboration is deployed in my organization in the public cloud.

Check Point Harmony Email & Collaboration is a very complete tool for the next generation of our security. I rate this product an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Dec 31, 2025
Flag as inappropriate
PeerSpot user
Marghoob AhmadSalik - PeerSpot reviewer
Technical Associate at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Jun 10, 2024
Allows safe inspection of links and their destinations within a controlled environment and easy workflow integration
Pros and Cons
  • "The most valuable feature is the sandboxing feature. It provides a sandboxing environment where you can open links and see where they lead. You can see what is presented in the link after opening it."
  • "Maybe Check Point can work on the DLP part."

What is our primary use case?

The customer has a presence in different countries like India, Poland, and the US. They use Office 365 as an email solution, and on top of that, they use Harmony Email & Collaboration.

How has it helped my organization?

All API email security or gateway security solutions work the same as API based. You create an API with the vendor, and it works for all the same. It's just the approach of threat intelligence, how it is taken and how much threat intelligence you have. 

Pushing was a big challenge for email security. Cisco has done that, but now Check Point is also doing the same with the quarantine email. So, it's good. Previously, they didn't have the ability to find and detect the quarantine email, but they are doing it now.

What is most valuable?

The most valuable feature is the sandboxing feature. It provides a sandboxing environment where you can open links and see where they lead. You can see what is presented in the link after opening it.

Other advantages, like workflow integration, are quite simple and offered by other vendors as well. Cisco is also integrating virus totals into their products. 

But the key advantage here is the visibility you get with the sandboxing feature. 

You can see on a map, on the same dashboard, where the mail originated, where it is going, and from which relay servers. You can see everything visually on the portal, including who it's reaching and who is CCed or BCCed.

Every vendor has a different approach. But as far as I have seen with Check Point, it is quite easy and simple to manage. They have the DLP solution integrated with this email. For example, for email, DLP is zero.

What needs improvement?

Maybe Check Point can work on the DLP part. Proofpoint's email DLP is very good, so they can work on that more.

For how long have I used the solution?

I have been using it for six months. 

What do I think about the stability of the solution?

Stability is not too bad. It's not glitchy. 

What do I think about the scalability of the solution?

Scalability is good. You can add users at any time. You can have hundreds of users in there. No issues or restrictions here. 

How are customer service and support?

The customer service and support are okay. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Compared to other solutions, users have the advantage of cost because Check Point is very easy to handle. You can easily train anyone on Check Point. It's not complex.

How was the initial setup?

It's quite simple. Straightforward provisioning is required. You have to do it with a vendor, like Office 365 or G Suite, and you are good to go. Just onboard the users, and that's it.

You can deploy it in a day. For the refinement of the tool, it takes a little bit of time because all email security works by first keeping it on monitor mode and monitoring what you are getting as spam. You do an audit. It takes time with this. But for the configuration part, you can do it in a single day.

What about the implementation team?

For deployment, one person is enough. For maintenance, you need two or three people to check spam. Sometimes, emails get blocked, and users request them to be unblocked. You have to verify those things. But for deployment, one person is enough.

It's a SaaS portal, so you don't have any maintenance issues because it's all done by the backend OEMs.

What was our ROI?

There is an ROI. In the long run, you will have saved money because it's a cloud-based portal with no maintenance issues.

What's my experience with pricing, setup cost, and licensing?

Compared to other vendors, the pricing is average. I guess FortiMail is a little cheaper.

What other advice do I have?

Overall, I would rate the solution a nine out of ten. I would recommend using it because it is easy to use and manage. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. MSP
PeerSpot user
AshleyMorales - PeerSpot reviewer
Cloud computing at a cloud solution provider with 51-200 employees
Real User
Nov 22, 2023
Good DLP and threat prevention and helpful centralized management
Pros and Cons
  • "It is fast and quite effective in terms of preventing any security incidents."
  • "Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents."

What is our primary use case?

The company handles confidential information, such as clients' financial data, and it is important to keep that information secure to comply with certain regulations. 

One of the important challenges was to counteract the amount of phishing, ransomware attacks, and accidental leaks of information through email and collaboration applications.

We did not have a tool that would provide this security, so we chose to look for one and apply it to our environment.

How has it helped my organization?

The company handles a large amount of client information, some of which is confidential, including account numbers and sensitive information. This tool provides us with the features to meet the needs we have. 

One of these features is real-time threat prevention. It uses advanced analytics to detect and block malicious emails, phishing, and unwanted content before they reach inboxes. It also has DLP. This helps prevent the leak of information. In this way, we can reduce vulnerabilities.

What is most valuable?

The tool has many important features. Some of them are very valuable.

One of the most valuable is real-time prevention, which constantly analyzes and provides results. The leak control that comes with DLP is excellent. 

It provides us with a more centralized management where we can monitor everything that happens in our environment and in this way, can manage the security policies necessary for our organization in real time. 

It is fast and quite effective in terms of preventing any security incidents.

What needs improvement?

The product is a very effective tool. It provides a lot of security to ensure the confidentiality of the information.

Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents.

They should also improve the quality of technical support since, in the last few years, they have lowered the quality of SLA response and do not provide concise solutions. 

They should also generate a knowledge base where the unified information or the most common errors are found so as not to depend so much on support.

For how long have I used the solution?

I have experience using the solution for four years.

What do I think about the stability of the solution?

The stability presents as efficient.

What do I think about the scalability of the solution?

The scalability is new; it is multi-cloud.

How are customer service and support?

The experience has not been very good since we have had problems with the SLA.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no previous solution in the organization.

How was the initial setup?

The initial implementation is complicated when you do not have experience with said tool.

What about the implementation team?

It was implemented with the seller and his engineer in charge, which was very fast and friendly.

What was our ROI?

The investment is somewhat high. However, it will provide security for all customer information.

What's my experience with pricing, setup cost, and licensing?

The tool is somewhat competitive with the others on the market. The installation has an average learning curve.

Which other solutions did I evaluate?

Several solutions were evaluated, such as Microsoft Defender for Office 365, Proofpoint Email Protection, and Cisco Secure Email.

What other advice do I have?

It is an excellent tool for information security. Before acquiring it, you must analyze whether it meets company needs.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at a tech services company with 51-200 employees
Reseller
Top 5Leaderboard
Jun 28, 2023
An easy-to-deploy and scalable tool useful for mail encryption
Pros and Cons
  • "The setup is very easy. I haven't faced any complexity with the setup of the solution."
  • "Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs."

What is our primary use case?

If we talk about use cases, one of our customers is using o365, and one of the customers is using G Suite. On top of that, they require email security along with an anti-APT solution, anti-spam, anti-phishing, and business email compromise with next-generation antivirus included. One of the major use cases is internal communication using an encrypted solution or encrypted mail, especially if internal users send some mail to a particular customer and they require encrypted mail. They also require an encrypted mail solution.

What needs improvement?

With the kind of features we are looking for, be it with Barracuda or Check Point, we are looking at how we can showcase them to the customer and claim that this one is the best solution for your infrastructure and use cases.

I would like Check Point's technical support to be improved.

For how long have I used the solution?

I have been using the solution for five to six years. My company is a distributor of multiple OEM solutions.

What do I think about the stability of the solution?

Most of the customers are using another vendor's solution, so most are looking for a particular email security solution. Whoever has used the solution was facing some challenges till some time ago, but gradually Check Point is improving the solution. So now they are still happy with the solution.

What do I think about the scalability of the solution?

There are multiple customers using the solution. Sometimes they have 100 or 200 users, and they are expanding their team and they are purchasing licenses because if they are increasing users, automatically, mailboxes are increased. We are providing the per-mailbox solution. They are ready to purchase the new licenses for those new mailboxes.

I rate the solution's scalability an eight out of ten.

How are customer service and support?

Check Point's technical support is very much of a low level, especially with respect to other vendors and OEMs. Check Point tries to ensure that they are providing good technical support with respect to the solutions and services it provides.

How was the initial setup?

The setup is very easy. I haven't faced any complexity with the setup of the solution.

The deployment took almost four to five years.

I am from the presale side, the solution architecture side. The implementation and deployment teams are different. We have a different team for the deployments and implementations of any particular solution.

What's my experience with pricing, setup cost, and licensing?

Usually, we pay for the licensing part on a yearly basis and not on a monthly basis.

If Check Point's team is providing a good amount of discount, then it is very easy for us to select it since its competitors are also giving the best prices or best discounts.

What other advice do I have?

It is easy to deploy. With every customer, we just share our thoughts and the experience. It's a very easy-to-implement solution. Check Point is a good cloud-based solution with respect to email security, and Check Point is a very powerful tool with respect to other OEMs.

I rate the overall solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
reviewer2107347 - PeerSpot reviewer
Project Manager at a comms service provider with 1,001-5,000 employees
Real User
Feb 21, 2023
reduced phishing attacks, blocks malicious mail, and removes likelihood of data loss
Pros and Cons
  • "Email security has improved since we deployed this platform."
  • "Some undefined threats can bypass the security system when there is a networking failure in the organization."

What is our primary use case?

Check Point Harmony Email and Collaboration has enabled my team to implement projects and tasks effectively. 

It provides a reliable communication pathway that cannot be compromised by cyber attacks. 

It protects confidential data from leaving an organization without a proper channel. It keeps our emails in a unified environment that is secure and highly safeguarded by strong security tools. 

There are advanced collaboration techniques enhanced by this platform in the enterprise. It prevents account takeover and always keeps my colleagues under safe network infrastructure.

How has it helped my organization?

Email security has improved since we deployed this platform. 

This platform has enhanced faster file sharing and improved the collaboration network systems. 

Securing business lines has reduced cases of fraud that used to affect workflows. API connection has enabled us to integrate this platform with applications for the efficient implementation of business programs. 

Sending and receiving emails has been reliable and always productive, with zero phishing attacks. 

Full email protection of both cloud and on-premise emails has reduced the chances of losing data to zero.

What is most valuable?

Bulletproof Security catches up with all types of cyber attacks that can lead to account takeover and data compromisation. The entire networking system is secured with end-to-end encryption that enhances the secure flow of data. 

The superior data catch rate has reduced phishing attacks by a high rate of almost 100%, which has boosted productivity. 

It blocks malicious emails that wreak havoc and destroy valuable data in the systems. 

Employees can focus on more productive roles without fear of being attacked by external factors.

What needs improvement?

Some undefined threats can bypass the security system when there is a networking failure in the organization. 

The next release should have a fixed system that can categorize the various levels of viruses. 

The detection of threats before they reach inboxes has enhanced reliable communication among teams. 

The malware protection system has to be upgraded to catch up with various current threats that can easily affect our systems without precautions. 

Email and collaboration safety has been a great step that we have achieved from the performance of this platform, and I totally recommend it to others.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

This tool is highly powerful in blocking phishing attacks and ransomware attacks.

What do I think about the scalability of the solution?

I love the great performance of this platform.

How are customer service and support?

The customer support staff provides reliable services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the main email and collaboration platform that I have worked with.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

The implementation was done by the vendor.

What was our ROI?

The rate of ROI has increased from 40% to 60%.

What's my experience with pricing, setup cost, and licensing?

The setup cost is good and highly efficient.

Which other solutions did I evaluate?

I have not come across another powerful platform like this one.

What other advice do I have?

I am satisfied with the security measures that have been enhanced by this tool.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2024712 - PeerSpot reviewer
Planning Analyst at a printing company with 1,001-5,000 employees
User
Feb 8, 2023
Offers good email security, blocks malicious emails, and protects sensitive data effectively
Pros and Cons
  • "This product enhances faster and more secure sharing of information among colleagues from different departments."
  • "There are sometimes leakages of viruses when the system is experiencing network failures."

What is our primary use case?

This product has been protecting emails across the company communication system. 

It helps my colleagues to share files and send emails without fear of phishing attacks. 

It keeps all the employees safe all the time when sharing confidential information. 

It protects sensitive company data from leaving the organization in to an insecure environment. 

Cases of ransomware attacks are no longer reported since we have the best solution for handling networking security. 

Implementing API email security across the organization enables teams to access the right information at the right time.

How has it helped my organization?

There is improved security across the emailing system and the entire communication networking infrastructure. 

This product enhances faster and more secure sharing of information among colleagues from different departments. 

Blocking malicious emails before landing inbox has enabled each member to access files with viruses and spam. 

The entire communication channels have been fully secured with end-to-end encryption. 

Email security and prevention of data from cyber attacks have been the main goals and have been achieved positively with Check Point Harmony Email & Collaboration.

What is most valuable?

Full suite protection of cloud email and collaboration applications has been a great achievement of this tool's performance. 

The security features provide a comprehensive report based on current performance and security situation. 

The platform API closely monitors the behavior of information traffic and prevents account takeover. 

It has reduced phishing attacks at a high rate and blocked many attempted attacks. 

The customer support team is online 24/7 and always offers solutions to any request when reached.

What needs improvement?

I am happy with the powerful performance of the set features. 

We have achieved the most set goals, and we are grateful for this robust solution. 

There are sometimes leakages of viruses when the system is experiencing network failures. The information may land in unsafe hands and lead to unpredictable attacks. 

Timely updates and system maintenance are encouraged to enhance continuous business operations. 

Efficient categorization of viruses will help filter out advanced phishing attacks before they affect the conversation infrastructure.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

I am impressed by the overall performance.

What do I think about the scalability of the solution?

The solution is highly scalable and powerful.

How are customer service and support?

This is the best support team I have come across. They always offer timely responses.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with a similar tool before.

How was the initial setup?

The setup was relatively complex.

What about the implementation team?

The implementation took place through the vendor team.

What was our ROI?

Our ROI has increased from 30% to 60% this year.

What's my experience with pricing, setup cost, and licensing?

The pricing and setup are suitable for any level of user.

Which other solutions did I evaluate?

I evaluated other tools, however, this was the best solution based on our demands.

What other advice do I have?

This is an excellent product for email security.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.