We use two solutions: Check Point Gateway and Harmony Email & Collaboration.
We primarily use it for IDS and threat protection, as well as VPN.
We use two solutions: Check Point Gateway and Harmony Email & Collaboration.
We primarily use it for IDS and threat protection, as well as VPN.
It's very easy to deploy with Microsoft Office 365.
The option to set a copy is beneficial. Additionally, the solution scans OneDrive, Teams, and SharePoint content and provides a full report.
If I store any malicious file in my cloud storage, it will give me detailed information in the Check Point console, including which DLL is infected. That's a very useful feature.
I'm satisfied with the product as it is, especially regarding security.
The reporting could be improved. Also, the predefined workflows cannot be changed. It would be great to add custom workflows to better suit customer requirements.
I've been working with Check Point for the last four years. I perform day-to-day operational tasks with it.
It is stable.
It is scalable. There are around 300 end users.
It's a cloud-based SaaS application, so it doesn't need to be deployed in multiple locations. We integrated it with our existing email solution, and all our email traffic is routed through it.
The customer service and support are very good.
Positive
I've worked with Microsoft Defender, Proofpoint, and Barracuda Email Security.
The pros include quick implementation time and easy policy deployment. Security is also good, as Check Point provides multiple security engines and inline data security. As for cons, having the option for custom workflows would be a great improvement.
I completed the initial setup in about 15 minutes, by myself. It was very easy. There's no need for improvement.
We share product white papers with our customers, understand customers' needs and current email infrastructure, and design a solution before pitching to them. We also create a project timeline for the POC and implementation.
It's easy to integrate, as it supports both cloud-based platforms, O365 and Google Workspace. If you have basic knowledge of your email platform, you can easily integrate the product.
Check Point takes care of the maintenance. It doesn't require any maintenance.
Check Point Harmony Email & Collaboration is beneficial for customers. It brings in the value.
It provides enhanced email content security to prevent external attacks.
I run the proof of concept and submit a report to management. They handle discussions with customers and coordinate with the Check Point sales team.
I would recommend it.
Overall, I would rate it a nine out of ten.
We use the solution to prevent any phishing emails from reaching out to the end users. We also use it for URL protection and DLP, to protect the end users from ransomware attacks, and to avoid any issues that halt business activities.
We used to have another solution for email security and we used to find so many issues while using it. We could not stop some phishing emails from getting into the user's mailbox and were worried about losing data. We had to work on fine-tuning the solution all the time to avoid the issues. We came to know about Check Point and wanted to try for email security.
We have blocked more phishing emails since we started using Check Point. The solution works brilliantly in filtering and the amount of information provided is unmatched and helped us in various ways.
The Explore page provides multiple options for searching for emails and other information. Quarantine/removing from Quarantine has become so easy with search options
The dashboard provides information to investigate more about malicious activity and blocked emails.
Check Point has become our go-to solution for most of our issues.
We like the email search options, availability of information on various aspects, algorithms, and AI models that provide pretty useful data - and the list goes on!
The email search/explore option helped us find the required emails and logs easily with multiple filters to use.
Information provided in each and every email is very useful for investigating any activity. We do not have to use multiple websites for that information since everything is provided in Check Point itself.
AI-based models and algorithms provide more accurate and useful information.
It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files. That will help in creating more filters and analyzing the data.
Providing more Training videos and documentation will be helpful for beginners to understand how checkpoint works.
I've used the solution for the past eight months.
We used some other email security tools and we used to have multiple issues with email filtering and available information. We do not see any of those issues after using Check Point.
We are good with the licensing.
We directly chose Check Point since we could not find any better alternative.
It is the perfect one-stop solution for securing the organization!
My company uses Check Point Harmony Email & Collaboration to provide security for Office 365 email and collaboration apps like Teams, SharePoint, OneDrive, and other related tools.
The most valuable feature of the solution is the phishing protection it offers.
The solution fails to support hybrid deployments.
Currently, the solution supports cloud email only. It would be great if they could also support hybrid deployments.
I have been using Check Point Harmony Email & Collaboration for three years. My company has a partnership with Check Point.
Stability-wise, I rate the solution a nine out of ten since there were a few minor issues that were quickly resolved while the uptime of the product has not been 100 percent.
Scalability-wise, I rate the solution a ten out of ten.
I would say that probably around 50 percent of our customer base uses the solution.
The solution's technical support is very good. I rate the technical support a ten out of ten.
Positive
I rate the product's initial setup a nine out of ten since the setup phase is seamless 99 percent of the time. If the end user customized the Office 365 tenant a lot, then a manual setup might be required.
The solution is deployed on the public cloud while supporting cloud services from Google and Microsoft.
The deployment process of the solution takes about five minutes. It would probably take ten minutes if we consider from start to finish of the deployment process.
For deployment, there is a need to create an account in Check Point Infinity Portal, after which you can activate Harmony Email & Collaboration module and then provide the credentials to your Office 365 tenant, following which the integration process starts.
I rate the product's pricing a five on a scale of one to ten, where one is cheap, and ten is expensive.
It is a reasonably priced product offering good value for money.
I would say that since Check Point Harmony Email & Collaboration provides a two-week evaluation option, it's very easy to integrate into your environment in a read-only mode so that it doesn't interfere with your email. It just scans and then provides you a report afterward of the threats your solution has missed and what Check Point would have caught.
Check Point Harmony Email & Collaboration is a fantastic solution.
I rate the overall tool a ten out of ten.
Basically, it protects email services like Office 365 or G-Suite as well as business communication like Slack and Teams, and offers advanced protection against phishing and attachments even before they reach the mailbox. It also includes a DLP (Data Loss Prevention) feature that can be configured to prevent sensitive information from leaving the organization via email. Additionally, it provides advanced security measures to protect against account takeover.
The email protection piece utilizes an API rather than an agent, which is more basic. This API-based approach allows for greater flexibility and integration with other systems. You can also configure it to send suspicious items to a sandbox environment for further analysis if you're not comfortable relying solely on the automated solution.
The API is super valuable because it's not really embedded in the email session. It's more like it comes in, and before it hits your mailbox, Check Point inspects it.
Many products require running it through a specific Web Gateway or some kind of intermediate box like Barracuda, or an agent installed on Outlook among many ways. Check Point is more advanced, so it's up there with the best. In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication. It also covers collaboration tools like OneDrive, Dropbox, and Box. That's the collaboration part.
It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products. For example, there are other collaboration tools besides Box and Slack that they could explore.
The stability is excellent. Check Point is a company that has acquired matured technology from other companies and integrated it pretty well. I've seen integrations from other companies that were lacking, but Check Point has done a great job.
Check Point has also developed its own solutions based on its security knowledge and experience. Being an Israeli company, they have access to some of the best resources in the field.
Scalability is a significant component of Check Point, as it is built for companies of any size.
The customer service and support team is great. I never had a problem with them.
Positive
I used to work as an IT manager in a biotech company that utilized Check Point, which is why I've always liked their product. It's designed for complex environments and connecting multiple branches. It can be challenging for many companies, but it's intended to handle such complexities. Overall, Check Point Harmony Email & Collaboration is a great product.
The initial setup is very straightforward. It's actually quite easy to set up and configure because the system handles everything. You don't have to install anything separately. You install the agent for the whole solution, and you can choose to enable or disable the email component. Then you simply configure a few settings, and you're done. The real action happens in how it handles incoming emails.
The security solutions of which Email and Collaboration are a part is competitive because Check Point competes on both technology and price.
Check Point often competes with companies like Microsoft, Sophos, and CrowdStrike. Check Point offers competitive prices. Some companies may advertise lower prices, but they exclude essential components like email security or browser security, which you need to pay extra for and in the end they cost the same or even more.
So the pricing is highly competitive. It's comparable to other companies of the same caliber, such as Microsoft and CrowdStrike. However, with all of them, if you opt for managed services, the pricing can vary, becoming more of a black box. It's usually not publicly published and is often negotiated based on specific needs. Similar to storage pricing, you need to be aware of the details and negotiate. But overall, the pricing is excellent and on par with other leading solutions.
When comparing Check Point with lesser-known products like Kaspersky and others, it's important to consider the target market. If you're dealing with multinational corporations, or hospital systems, their requirements differ, from smaller companies, and they may be considering solutions from SentinelOne, CrowdStrike, Sophos, or Cylance, however, you have to make sure the product offers all the specific components like email or browser security that Check Point provides. Check Point is known for its comprehensive range of solutions, including firewalls, which can be deployed to endpoints.
I would give it a nine out of ten. It's a great product overall. I hesitate to give any company a perfect ten because there's always a chance of unexpected issues arising in the future. But so far, I haven't encountered any problems with Check Point. It would be nice to see them expand their collaboration capabilities to include other suites and integrate with lesser-known products. For example, there are other collaboration tools besides Box and Slack that they could explore.
Our corporate environment requires business protection for email and our collaboration tools to avoid threats, spam, and ransomware, among other threats coming in through email. This could have great effects on our systems and equipment.
With Check Point, we can protect our data in the cloud with tools such as One Drive, among others.
The tool works with different manufacturers, which provides great reliability.
Check Point has helped us improve our security layer with this complete cloud solution. We no longer depend on a Gateway as it is a complete solution that helps us prevent any type of threat that travels through email.
We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point.
We also really like its centralized environment since the Check Point Infinity Portal really centralizes everything.
The platform offers advanced security measures to protect emails from cyber threats such as phishing attacks, malware, and ransomware.
The platform is cloud-based, which means users can access their emails and collaboration tools from anywhere and on any device.
The security of collaboration tools is great.
The platform integrates with other productivity and collaboration tools like Microsoft Office, Slack, and Zoom.
Maybe they could integrate the solution with Avanan. Doing that would really make it a very robust solution.
They could improve Check Point support response times. Sometimes it takes days to resolve or even days to get a first response.
The solution lacks public documentation and some documentation is not so clear, which means that the client does not understand the implementation that must be carried out.
You can only see the costs through a Check Point partner.
This is a very productive tool. We used it for a few months. It really helped us protect against threats in email and Microsoft collaborative tools.
yes
excellent
Positive
Previously we did not use more than the security provided by Microsoft itself. We have since changed to Check Point.
As for the cost, it is per protected user. It seems good to me in that aspect however, the issue of implementation sometimes costs a bit. That's okay if it can be done correctly. The licenses are easy to acquire.
Our goal has always been to strengthen our infrastructure. We currently have Microsoft 365. In order to provide a centralized security solution, we use Checkpoint Harmony Email, which provides us with security against phishing attacks, malware, and advanced data protection, among others. Some other features that successfully help provide a robust security infrastructure for all collaborative applications.
It is also important to mention that it is managed under the Check Point Infinity Portal, which is the most modern of the Check Point approaches.
We have managed to implement this as a totally cloud tool, from the Check Point Infinity Portal. It's super easy. In addition, we have managed to generate DLP policies for the protection of data that is shared to avoid sensitive losses and compliance with regulations.
Also, through the monitoring panel we have been able to see the behavior of our environment and how it is attacked by new threats. We can make decisions to improve our infrastructure thanks to Harmony Email.
Check Point Harmony Email tool is very modern. Its characteristics are adapted to the most modern threats. One of its main virtues is its monitoring system, which is very important for decision-making, however, it is also very intuitive, easy to understand, and simple to use.
Its DLP policies are quite easy to implement, which help a lot with compliance with the regulations required by our company in addition to shielding sensitive data.
This tool integrates and protects all collaborative tools, in our case, Microsoft 365.
The key improvement for this tool is the inclusion of more collaborative applications. We know that Microsoft has many tools, however, not all of them are covered.
It is also important to validate the documentation. Not all of it is precise. It is very difficult to find the correct ones. In this area, Check Point could generate a more up-to-date library to be able to help customers or companies use their products more.
Finally, the Check Point Infinity Portal sometimes feels a bit slow, and there are performance issues that should be easy to fix.
A very modern tool, centralized through Check Point Infinity, this is used by our company on a trial basis during the last semester.
Yes
Yes
Great experience with support.
Positive
Previously, we used Microsoft security tools. However, we needed to centralize the security environments, and it was perfect with Infinity.
It is important to evaluate the tools before going into production to verify that everything works correctly.
We carried out a previous validation of the functions and current tools of the market. It convinced us to move towards Check Point.
Security applications are validated and I would recommend the solution.
Our company uses Office 365 and clearly, we use Outlook. We needed a tool that had the functionality to verify and validate the emails that enter and leave our organization. With this tool, we can solve security problems since many of the collaborators work from home. With this, we have decreased phishing attacks. It offers quite a few types of analysis and reporting that help to clear up security doubts and how to counter these gaps.
Check Point Harmony Email & Collaboration is workload protection in the cloud. This firewall helps us provide controls on our organization's devices and has become our main tool in the analysis and coverage of the infrastructure and also maintains fairly reasonable scalability.
Check Point Harmony Email & Collaboration has helped our company with perimeter security and securing our employees from wherever they are working. It's strengthening security as it is able to stop phishing attacks on Office 365 accounts and block possible account hijacking. It is also responsible for detecting malicious files in both OneDrive and SharePoint. This makes the product more robust and also gives us visibility into suspicious access, and provides the areas from which they are trying to enter. With this other feature, it provides more integrity to our company.
We have found several features that are very valuable. One of them is the integration with Office365. In addition to that, it is fast and has a very simple, easy integration. In addition to that, it integrates with other Office 365 products. The false positives are minimal, almost nil. That is very important since it will not generate an absurd amount of emails. The functionality of the tool is very easy to configure and manage. The platform is friendly and makes its integrations even more, so this tool is very efficient.
Check Point Harmony Email & Collaboration presents a problem similar to the other Check Point tools that it was able to manage, and that is the access to its administrative functions. Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult.
It presents problems in the management of technical support since the SLA is not optimal, causing delays. This means that security problems may arise since it does not provide a quick response or a concrete solution.
I have been using it for approximately 4 years.
The tool stability is very good.
The scalability that the solution presents is very good. It is quite scalable.
The experience has not been very pleasant since we have opened cases and they take too much time to respond or schedule a meeting even to provide a solution.
Positive
There was no other solution implemented.
The initial configuration was very simple and fast.
During the implementation, the provider's team helped us, and it was very efficient; they knew what they were doing
The functionality that the tool presents with its characteristics and capabilities helped us a lot in our organization.
Like all security tools, they are expensive tools. However, Check Point competes in the market and its accessibility is good, so paying for a tool that provides security is worth it.
The company has already had several Check Point tools. For this reason, this tool was implemented to keep in line with the same brand and hopefully not present us with problems if we implement another one.
The only advice is to improve the technical support for your users since it is not very efficient.
We use the solution for the protection of email from phishing attacks, spam, and malicious email-related activities.
It detects and blocks the most advanced phishing attacks across inbound, outbound, and internal communications, in real-time, before the attack succeeds.
The solution is used for email protection, providing IT administrators with a great amount of information about possible attacks faced by the organization, and logins by users.
It also has a high level of detail in its reports, facilitating the management and detection of possible threats to the security of the organization.
With the addition of the DMARC module, it makes it much easier to monitor the security policies applied and provides visual information about the type of traffic received, avoiding domain spoofing.
The number of phishing and spam emails has decreased and email security has improved by 80%. The IT team has noticed a great improvement in the number of emails received and a decrease in attacks. The helpful alerts generated by HEC facilitate the management and response.
Thanks to its dashboard, it displays detailed information about detected activities, suspicious logins, span deletions, or phishing detected and blocked with a high level of detail. The level of reporting detail facilitates threat management; now the organization has an additional layer of protection for end users.
The ease of management and intuitive administration are excellent. Thanks to its dashboard, the most valuable thing is the detection capability provided by this solution. The level of detail offered by Harmony is unique, to the point of showing the differences between what is detected by Office 365 and what is detected by HEC. The organization relies on this email security solution and facilitates the protection of all end users, decreasing security breaches by malicious actors.
The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter. It could be improved to obtain a greater level of detail, unlike Office 365, which offers an extreme level of detail and facilitates the management and comparison of what is happening with respect to the mail. Its integration with Gsuite is simpler and has that point against it, however high levels of detail can be obtained in the reports of the solution. On the other hand, the ease of administration and threat detection capabilities are its strong points, and it stands out from other solutions that I have had the opportunity to test before.
Currently, this solution has been used for the last tree years.
