Try our new research platform with insights from 80,000+ expert users
IT specialist at Landpower Australia Pty Ltd
Real User
A stable solution that does a fantastic job of catching things Microsoft doesn't, but implementation could be easier
Pros and Cons
  • "The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic."
  • "The implementation could definitely be better."

What is our primary use case?

At the moment, we're heavily using the email and collaboration features. We are also licensed for the mobile part, which we are sort of working into, and CloudGuard as well. We're kind of working through those features. 

What needs improvement?

The implementation could definitely be better. We had great support from Check Point, but there were some "got-you" moments where we got surprises as we were setting it up. When Check Point talks about it, it's all "plug and play," but it's not really one of those platforms where you can just jump in and click a few buttons and everything works. You need to have a bit of knowledge about what you're doing and it's a bit more complicated than they advertise.

In the future I would like to see something similar to what Proofpoint has, where users can actually go in and make the call to release their own emails. We've got a small number of users, so it's okay for the IT team to constantly be bombarded with our emails for releasing, but I would love to have an option where I can allow users to go in and make the call to release an email, and then of course it would only actually be released if it passes certain things.

For how long have I used the solution?

I have been using this solution for about a year and a half now. 

What do I think about the stability of the solution?

The solution is stable and I think it does a fantastic job. The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic. There's a few things that get flagged by Microsoft, most of them false positives, so it's interesting. Harmony passes it through and Microsoft thinks it's spam, but usually it's not.

Buyer's Guide
Check Point Harmony Email & Collaboration
June 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.

What do I think about the scalability of the solution?

The solution is very easy to scale. There are between 500-550 active users in our company. We have a team of three people that look after the environment, but that is only part of their responsibilities. I think it would do very well with one full-time person handling the maintenance. 

How are customer service and support?

The technical support was brilliant, but that's the thing when you're buying something, usually the initial support is top notch. It's been a year and a half now, and we haven't had any urgent technical issues that we've had to go back for help with, but at the start, when we were implementing the solution, we had good support. They were on the ball and they really stepped up.

Which solution did I use previously and why did I switch?

What we used in the past was an outfit called MSX.

What's my experience with pricing, setup cost, and licensing?

Check Point is more expensive. That's the honest truth. So far, it's a good value for the money. 

Which other solutions did I evaluate?

We considered the Microsoft inbuilt solution, and the advice that we got from a lot of people was, if you want to use that one, combine it with something else. That is what we ended up doing, because it came as part of our licensing with 365, but we can tell that it was a good idea to combine it with Check Point because it will let a lot of things pass.

Also, I know CrowdStrike is cheaper with their Falcon offering, but I haven't had the opportunity to work with it. The reason why I went with Check Point was because I have worked with it in the past and I like their product, so that was the biggest push. 

What other advice do I have?

I would rate this solution as a seven out of ten. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Good sandbox and analysis capabilities with the ability to expand
Pros and Cons
  • "Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure."
  • "Its guides are not great."

What is our primary use case?

With the evolution of technologies, attacks also evolve. This is why we need to secure mail. We have chosen to include Harmony Email in our Office 365 mail solution to thus proactively ensure any incident that we may have in the future is dealt with. It gives us complete security support from anywhere. Wherever our users are, the solution will always be protecting them. 

How has it helped my organization?

Like any company, we care about security and having exposure to various clients and departments. We can be violated or have identity theft attempts, and this is where Check Point Harmony Email (and its computing power that is integrated from the Check Point cloud) comes in. It gives us the protection and analysis, to help us avoid phishing attacks and malware. By integrating solutions such as DLP, we can protect our identity and data. 

Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure.

What is most valuable?

One of the best features is the analysis and emulation carried out with each file attached to the emails, which makes each of the deliveries we make via email more secure. This function creates a scalable sandboxing where a copy of the file under analysis is made, and it is verified, scanned, and analyzed to each of our files for malicious links. If it finds a link, it emulates its action to determine if it is benign or malignant to deliver clean and safe data.

What needs improvement?

Something worth mentioning is the need for Spanish language support and better representation for teams in the Latin American area. There is a growing demand for these IT services and new technologies.

Its guides are not great. It would be more pleasing if these guides could be updated and improved in their design. 

The support that most requires attention is the phone calls or the cases through the support page. Several times, through the chat function, we found that it gets stuck and does not bring up the live chat.

For how long have I used the solution?

I've used the solution for around two years.

What do I think about the scalability of the solution?

The solution is very easy to scale.

How are customer service and support?

There is a need for more support in Spanish. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not previously use a different solution. 

What's my experience with pricing, setup cost, and licensing?

It is quick to configure. The advantage is that it does not need us to install an agent on the machines. Everything is done from the administrators' consoles. 

Which other solutions did I evaluate?

We did not previously evaluate other options. 

What other advice do I have?

It is a simple tool and centralizes its administration. Being able to request a POC from Check Point is a good opportunity that will give new users an opportunity to assess the quality and security capacity that it can provide. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
June 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Senior IT Security Manager at a tech services company with 51-200 employees
User
Top 20
Helps quarantine and remove threats and detect malicious emails
Pros and Cons
  • "Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size."
  • "It's not fully integrated with Google Workspace, and the statistics don't update in real-time."

What is our primary use case?

We use the solution for preventing malicious emails that we're getting through Google's built-in spam filters. The amount of spam and phishing had greatly increased at our organization and we needed a solution implemented fast. 

Check Point was really quick to integrate and implement and instantly started providing value. The reporting we got during our trial helped to quantify the value to the executive team, in particular, the report that shows what Check Point caught items that Google's spam filters would've let through.

How has it helped my organization?

The amount of spam and phishing getting through to end users has reduced drastically. 

We are also now able to advertise how many malicious emails we get and how it is constantly increasing as we grow. This shows our users how valuable a solution like this is and they appreciate that sometimes it may get a false positive. 

We're abe to show to users why emails are quarantined - which has helped to train them on what to look out for if they do receive a suspicious email. We have also improved our reporting process and notifications to admins.

What is most valuable?

First and foremost, Check Point's ability to detect malicious emails and the filters they put in place are a big improvement on the built-in Google Workspace solution. 

Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size. Admins can be notified as soon as a suspicious email arrives in bulk mailboxes and can act extremely quickly. This has even helped us to notify partners that they had been breached before they knew themselves.

What needs improvement?

There are a few features that are more geared towards Microsoft users rather than Google, for example, user-reported phishing. It's not fully integrated with Google Workspace, and the statistics don't update in real-time. 

We appreciate that Microsoft has the larger market share, and Check Point has been improving its Google integration. However, more advancements would be appreciated. That being said, the "What Google wouldn't have caught" report was extremely valuable to us in showing value. 

For how long have I used the solution?

I've used the solution for nine months.

Which other solutions did I evaluate?

We evaluated other solutions, such as Mimecast, Proofpoint, and Abnormal.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Director at Gundo TP
Real User
Stable platform with efficient reporting features
Pros and Cons
  • "I can count the number of endpoints, emails, and collaborations being used in the environment."
  • "There could be more automation features included for it."

What is our primary use case?

Check Point Harmony Email & Collaboration allows me to monitor the activities in the environment. I can check if there are any phishing or spam emails with its efficient reporting features.

What is most valuable?

It's been an awesome experience working with Check Point Harmony Email & Collaboration. I can count the number of endpoints, emails, and collaborations being used in the environment. It gives me insights into the number of tools required to block malicious websites. 

What needs improvement?

We have to invest a lot of effort in filtering the spam emails. They have not updated any category for phishing or spam emails. There could be more automation features included for it. It will help me with feedback for unusual activities.

For how long have I used the solution?

We have been using Check Point Harmony Email & Collaboration for four months. At present, we are using the latest version.

What do I think about the stability of the solution?

The platform is stable. I rate its stability a nine out of ten.

What do I think about the scalability of the solution?

The platform is scalable. I rate its scalability an eight and a half.

How was the initial setup?

The product’s initial setup process is more straightforward as I am Check Point Harmony Email & Collaboration partner and have the necessary training. It takes less than ten minutes to complete.

What's my experience with pricing, setup cost, and licensing?

The product’s price is very high. I rate its pricing a ten out of ten.

What other advice do I have?

I recommend Check Point Harmony Email & Collaboration to others and rate it an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Non-invasive, helps educate users, and acts as a good failsafe
Pros and Cons
  • "Its total protection has been the greatest aspect since it completely protects all the mail from the cloud."
  • "They could help us be integrating features with solutions from third parties."

What is our primary use case?

We had the need for a solution that would allow us to integrate search and analysis into the different mail clouds. This allowed us to focus on features that were very important, such as avoiding the loss of data and content. Thanks to the search, analysis, and integration functionalities, we could integrate easily with the cloud that we have. The product gave us a greater ability to search and explore issues while minimally invasive to end users.

How has it helped my organization?

Checkpoint Harmony Email and Collaboration is one of the cloud solutions for email that has given us the most added value. It has allowed for the education of users while still keeping them protected in a non-invasive way. When configuring this solution, we have not needed to come and affect management in terms of the day-to-day tasks handled by the users. It is a solution that is directly configured at the service level, not at the user level, so it's quick to install and configure, allowing connectors through APIs that can block malicious emails before they reach the inbox. It is acting as a full replacement for data loss analysis and management issues.

What is most valuable?

Harmony email has many interesting features. Its total protection has been the greatest aspect since it completely protects all the mail from the cloud. It gives 100% protection and is something that is a failsafe. There are no errors. Having an app-based solution that detects everything that is lost helps ensure reliability. It is quite complete, and it integrates with emulation solutions. If an email is ever compromised, you can detect the issue, find out what happened, and protect the company. It is a very complete solution.

What needs improvement?

The solution really has many outstanding features. It is quite easy to install and configure and is very complete. 

We could analyze services such as SharePoint and have more seamless integration. They could help us be integrating features with solutions from third parties. That would be very helpful. Right now, we do not have complete analysis when it comes to analyzing and detecting all the data that is saved. Having a product that could sweep repositories would be great.

For how long have I used the solution?

I've used the solution for about a year and two months.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Suresh Pathipatti - PeerSpot reviewer
Senior Information Technology Administrator at Aighospital
Real User
Top 5
Stable solution with excellent features and support
Pros and Cons
  • "Check Point's technical support is very good."
  • "Harmony Email & Collaboration could be improved by making the whitelist available on the website and application level."

What is most valuable?

All of Harmony Email & Collaboration's features are valuable.

What needs improvement?

Harmony Email & Collaboration could be improved by making the whitelist available on the website and application level.

For how long have I used the solution?

I've been using Harmony Email & Collaboration for a year.

What do I think about the stability of the solution?

Harmony Email & Collaboration is stable.

How are customer service and support?

Check Point's technical support is very good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used McAfee Endpoint.

What other advice do I have?

I would recommend Harmony Email & Collaboration to other users and rate it eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mantu Shaw - PeerSpot reviewer
Project Manager at a outsourcing company with 1,001-5,000 employees
MSP
Top 5
Good API-based integration, can block sophisticated social engineering attacks and has good stability
Pros and Cons
  • "We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP)."
  • "A phishing simulator would be helpful as a user training module."

What is our primary use case?

Our primary use case is for Office 365 email security along with other Office 365 products like SharePoint, Teams, and OneDrive. As people are working from home over the last year and phishing attacks are increasing day by day, it is important to implement an email security solution into an environment. Microsoft itself provides security, but that is not sufficient and we have still received a number of malicious emails.

We are looking for a solution that supports API-based integration so that there is no need to re-route email traffic via some third-party solutions. 

Protection is also required as people share files, store documents, etc.

How has it helped my organization?

After the implementation of the solution, email phishing is stopped and gives complete visibility.

No manual intervention is required once the policy is defined.

Now, all office documents are protected and we have also started to take backups of our user data into a cloud which will improve the dependency of other backup solutions.

API-based integration does not increase the email latency and it's an important aspect.

The single solution provides protection of other cloud applications such as G-suite, Slack, G-Drive, etc.

It reduces the TCO of email security.

What is most valuable?

API-based integration is the most valuable aspect as it will not degrade the email delivery features.

UBA is one of the features which monitors the user behavior and takes actions accordingly.

The product blocks malicious attachments before reaching out to user mailboxes while not impacting business productivity.

We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP).

We can block sophisticated social engineering attacks such as impersonation, zero-day phishing, and Business Email Compromise (BEC) using AI-trained engines.

What needs improvement?

It is one of the best solutions for cloud-based email security. Almost all features are available, which is required by most organizations. Still, some other features could be added to create more advantages, such as integration with on-premises exchange integration with other SaaS clouds. 

Integration with other threat clouds and AI engines would be helpful.

A phishing simulator would be helpful as a user training module.

Publishing future roadmaps would help us understand what to expect. 

The product should offer integration with other SIEM tools.

Improvement is a key element of any product and Check Point is doing improvements very effectively - therefore there are no major concerns. 

For how long have I used the solution?

We have been using the solution for 8+ months.

What do I think about the stability of the solution?

It's a stable solution and does not impact performance. 

What do I think about the scalability of the solution?

It's a highly scalable and simple product.

How are customer service and support?

Customer support is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Check Point is much simpler than other options and offers support with other cloud products - a key advantage.

How was the initial setup?

It's a straightforward setup and the product is easy to implement.

What about the implementation team?

The initial setup was done by OEM and the rest I handled myself.

What was our ROI?

Email security gives good ROI in terms of tools and the support of other cloud features. 

What's my experience with pricing, setup cost, and licensing?

The product has a simple and easy to set up. The initial setup is critical - so plan it accordingly. Email is one of the key components of any organization, so implement it with proper planning.

Which other solutions did I evaluate?

We tested several solutions, including Cisco IronPort and Darktrace.

What other advice do I have?

It is a good solution and easy to implement in any organization.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Engineer at LTTS
Real User
Good protection against zero-day attacks and offers DLP features
Pros and Cons
  • "This DLP is very useful, as it gives our users additional protection."
  • "We are unable to export the reports from the dashboard, and if it is possible to do then it is not intuitive."

What is our primary use case?

As users of Office 365, we are using CloudGuard SaaS to protect this cloud application. We knew that to do so, we would need a very good solution. CloudGaurd SaaS prevents malware and zero-day attacks/threats from attacking our SaaS users.

We have 17k+ users and all of them are using Office 365 for email. That's the reason we have implemented the Check Point CloudGuard SaaS solution. We needed protection, and it is working fine as per our requirement.

How has it helped my organization?

When we moved from an on-premises email solution to Office 365, we no longer had protection against malware or zero-day level attacks. With this SaaS, we prevent these problems, and also, we protect our users against phishing attacks, identity theft, have DLP support, and even SaaS shadow IT discovery protection.

We can say that with Check Point Cloud Guard SaaS, we have improved our security to the next level. Our users and business are more secure, and overall, this is a very impressive solution for us.

What is most valuable?

If you have Check Point Cloud Guard SaaS solution in place, 90% to 95% of the work in protecting your system is complete. There are some additional features that also help including Zero Day, Phasing, Identity Protection, and DLP, which provides us additional protection for our users.

This DLP is very useful, as it gives our users additional protection.

What needs improvement?

We are unable to export the reports from the dashboard, and if it is possible to do then it is not intuitive.

For how long have I used the solution?

We are using Check Point CloudGuard SaaS for the last four to five months.

What do I think about the stability of the solution?

Stability-wise, this is a good product.

What do I think about the scalability of the solution?

We have more than 17,000 users and have not faced any issue from a scalability point of view

What's my experience with pricing, setup cost, and licensing?

The cost of this product huge and it should be lowered because all organizations are going to be using cloud services. If it were more affordable then more organizations can rely on it to make them secure.

This is a very good product if you are on the cloud, but the price is a little more expensive.

What other advice do I have?

As per current threats or malware behaviors, most of the attacks or viruses are coming from email only, and if you have no such solution to protect or prevent it then you are in big trouble.

Overall, this is a good product and it has very little we have found that needs to improve.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.