Try our new research platform with insights from 80,000+ expert users
Suresh Pathipatti - PeerSpot reviewer
Senior Information Technology Administrator at Aighospital
Real User
Top 5
Stable solution with excellent features and support
Pros and Cons
  • "Check Point's technical support is very good."
  • "Harmony Email & Collaboration could be improved by making the whitelist available on the website and application level."

What is most valuable?

All of Harmony Email & Collaboration's features are valuable.

What needs improvement?

Harmony Email & Collaboration could be improved by making the whitelist available on the website and application level.

For how long have I used the solution?

I've been using Harmony Email & Collaboration for a year.

What do I think about the stability of the solution?

Harmony Email & Collaboration is stable.

Buyer's Guide
Check Point Harmony Email & Collaboration
May 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.

How are customer service and support?

Check Point's technical support is very good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used McAfee Endpoint.

What other advice do I have?

I would recommend Harmony Email & Collaboration to other users and rate it eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Security Consultant at Synergy
Reseller
Top 5Leaderboard
Effectively secures your users' mailboxes against phishing and spam for any sized enterprise
Pros and Cons
  • "The anti-phishing feature is the solution's best feature."
  • "A signature-based filter could improve the solution's AI model for spam email."

What is our primary use case?

We use the solution to protect Office 365 and Gmail.

What is most valuable?

The anti-phishing feature is the solution's best feature.

What needs improvement?

A signature-based filter could improve the solution's AI model for spam email. It works right most of the time.

For how long have I used the solution?

I've worked with this solution for around a year.

What do I think about the stability of the solution?

The solution is stable, and I rate its stability a ten out of ten.

What do I think about the scalability of the solution?

The solution is scalable, and I rate its scalability a ten out of ten. Both enterprises and SMBs use this solution.

How are customer service and support?

Technical support for the solution is good.

How would you rate customer service and support?

Positive

How was the initial setup?

It is easy to set up the solution. Deploying the solution takes five minutes.

Which other solutions did I evaluate?

Harmony Email is an API-based solution. Legacy email gateway clouds, by comparison, only inspect internal emails, which include users' and end users' emails. Check Point inspects all emails before they reach the end user's mailbox.

What other advice do I have?

If you are looking for an anti-phishing solution, Check Point Harmony Email & Collaboration is the best. I rate the solution a nine out of ten because the spam filtering is still not good enough, though it does not affect the security.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
May 2025
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Non-invasive, helps educate users, and acts as a good failsafe
Pros and Cons
  • "Its total protection has been the greatest aspect since it completely protects all the mail from the cloud."
  • "They could help us be integrating features with solutions from third parties."

What is our primary use case?

We had the need for a solution that would allow us to integrate search and analysis into the different mail clouds. This allowed us to focus on features that were very important, such as avoiding the loss of data and content. Thanks to the search, analysis, and integration functionalities, we could integrate easily with the cloud that we have. The product gave us a greater ability to search and explore issues while minimally invasive to end users.

How has it helped my organization?

Checkpoint Harmony Email and Collaboration is one of the cloud solutions for email that has given us the most added value. It has allowed for the education of users while still keeping them protected in a non-invasive way. When configuring this solution, we have not needed to come and affect management in terms of the day-to-day tasks handled by the users. It is a solution that is directly configured at the service level, not at the user level, so it's quick to install and configure, allowing connectors through APIs that can block malicious emails before they reach the inbox. It is acting as a full replacement for data loss analysis and management issues.

What is most valuable?

Harmony email has many interesting features. Its total protection has been the greatest aspect since it completely protects all the mail from the cloud. It gives 100% protection and is something that is a failsafe. There are no errors. Having an app-based solution that detects everything that is lost helps ensure reliability. It is quite complete, and it integrates with emulation solutions. If an email is ever compromised, you can detect the issue, find out what happened, and protect the company. It is a very complete solution.

What needs improvement?

The solution really has many outstanding features. It is quite easy to install and configure and is very complete. 

We could analyze services such as SharePoint and have more seamless integration. They could help us be integrating features with solutions from third parties. That would be very helpful. Right now, we do not have complete analysis when it comes to analyzing and detecting all the data that is saved. Having a product that could sweep repositories would be great.

For how long have I used the solution?

I've used the solution for about a year and two months.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Associate Consult at Atos
Vendor
Good support, protects against zero-day attacks, and provides good visibility
Pros and Cons
  • "Based on domain and URL reputation, it will allow traffic to flow."
  • "Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection."

What is our primary use case?

This perimeter firewall provides me control over my perimeter servers and devices. Current Cloud applications are getting good protection from CASB solutions, but are limited to data leakage and application control. Beyond that, I require something to monitor my data that flows inside of my cloud application.

Sophisticated threats like zero-day attacks can't be control by CASB solutions, Instead, we are required to have something that can work using Artificial Intelligence and Machine learning algorithms. This helps to defend my cloud applications against today's attacks.

How has it helped my organization?

Sophisticated attacks can't be prevented by normal SaaS security. Cloud Guard SaaS is a technology that prevents not only Sophisticated attacks but affords protection from Email.

Most attacks are successful because of SPAM emails that effectively cause users to fall into the attacker's trap. As Check Point is a leading technology in the industry, it provides maximum protection against email phishing attacks and provides the identity of users and visibility over shadow IT applications.

Along with the email security solution, Cloud Guard is an additional layer of comprehensive security, so we can completely rely on it.

What is most valuable?

Most organizations that invest in email security opt for MFA. They invest in a Cloud Firewall but they never consider the east-west traffic flow inside their Cloud Applications.

Here, Cloud Guards comes in with the best features, such as protection from zero-day attacks. These are usually reported when we have blades on the perimeter firewall, like Threat Emulation and Extraction or Sandbox. We have complete visibility of email Attacks like spear-phishing, spoofing, etc. Based on domain and URL reputation, it will allow traffic to flow.

Apart from this, we can easily identify users who are going to use cloud applications. These users are logged in via a trusted network or device.

What needs improvement?

Cloud Guard would be a complete solution if Check Point added a comprehensive data loss solution that included capabilities such as bulk data transfer detection.

I would like to see a centralized gateway so that anyone from any geolocation can access the infrastructure with minimum latency.

I would like to see additional work on protecting against phishing emails by adding more filters to minimize risk or to harden the security.

Stability is the main area that Check Point needs to focus on.

Integration with third-party APIs should be supported, as AI and ML can get more inputs to minimize the false rate ratio.

For how long have I used the solution?

I have been using Check Point CloudGuard SaaS for more than a year.

What do I think about the stability of the solution?

Stability is an area that needs to improve.

What do I think about the scalability of the solution?

It can be scale up to maximum limit.

How are customer service and technical support?

Technical support is good.

Which solution did I use previously and why did I switch?

We did not previously use another solution before this one. However, one of our customers had implemented an on-premises solution by McAfee.

How was the initial setup?

This solution is easy to implement, although it is required that you have knowledge of the Public Cloud domain.

What about the implementation team?

We are vendors and deploy this solution for our clients.

What was our ROI?

We definitely see ROI from this product, and it grows and we have a greater dependency on east-west traffic.

What's my experience with pricing, setup cost, and licensing?

Cost is the main concern that every customer takes into consideration, and Check Point always negotiates a price that is affordable. Pricing is based on the requirements and their relationship.

What other advice do I have?


Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: We are the vendors who provide services to other customers.
PeerSpot user
reviewer2703450 - PeerSpot reviewer
IT Engineer at a construction company with 1,001-5,000 employees
Real User
User-friendly portal protects applications and emails efficiently
Pros and Cons
  • "The solution is easy to customize and the options available on the portal are easily accessible to all technicians."

    How has it helped my organization?

    The solution is easy to customize and the options available on the portal are easily accessible to all technicians. It provides a user-friendly environment where we can protect SAS applications as well as incoming emails.

    What is most valuable?

    When compared to other email security solutions in terms of functionality and product usage, Check Point Harmony Email & Collaboration is very straightforward and simple.

    What needs improvement?

    The main drawback I can see with Check Point Harmony Email & Collaboration is that notifications which are blocked by Microsoft are not able to get notified to the users.

    For how long have I used the solution?

    We are using Check Point Harmony Email & Collaboration for more than five years.

    What other advice do I have?

    When compared to other email security solutions in terms of functionality and product usage, Check Point Harmony Email & Collaboration is very straightforward and simple. These are the major points I can see from the product. On a scale of ten, I would rate this solution an eight.
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    reviewer2296275 - PeerSpot reviewer
    Cyber Security Engineer at a tech services company with 11-50 employees
    Real User
    Top 5Leaderboard
    Phishing attacks are effectively blocked with prompt notifications and email protection

    What is our primary use case?

    We are using Check Point Harmony Email & Collaboration to protect our organization from phishing attacks. For example, our CEO received phishing emails with a subject line 'Fund Relief,' and Check Point Harmony Email & Collaboration helped block it.

    What is most valuable?

    The features I appreciate about Check Point Harmony Email & Collaboration include notifications about email reputation and phishing protection. As the admin, I am notified immediately when phishing attacks occur, allowing me to block harmful emails quickly. This notification feature ensures that I have control over email activity and helps maintain data security.

    What needs improvement?

    Check Point Harmony Email & Collaboration could improve by providing configuration recommendations and use case specific solutions.

    For how long have I used the solution?

    Our company has licensed Check Point Harmony Email & Collaboration for twenty users, and I have just started configuring it.

    What do I think about the scalability of the solution?

    I think Check Point Harmony Email & Collaboration's scalability is excellent. It allows us to scale protection for more users as needed, potentially up to hundreds or thousands.

    How are customer service and support?

    I would rate customer support eight out of ten. Though it's my first product from Check Point, I find the service good.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We did not use any specific email solution before this, except for Microsoft's built-in Defender with Office 365.

    How was the initial setup?

    The initial setup of Check Point Harmony Email & Collaboration was easy because it is cloud-based, and there is a helpful guide on the dashboard.

    What was our ROI?

    Investing in Check Point Harmony Email & Collaboration has protected our company data from theft, providing clear ROI. This solution manages threats, reducing my concern about daily email monitoring.

    What other advice do I have?

    I advise organizations to use Check Point Harmony Email & Collaboration to protect against phishing attacks and data thefts. I would rate the overall solution eight out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Technoloc685 - PeerSpot reviewer
    Technology Security Manager at a energy/utilities company with 1,001-5,000 employees
    Real User
    Intercepts phishing emails and emails laden with malware, viruses, and false links
    Pros and Cons
    • "It seems quite scalable. We don't anticipate any scaling issues. We have it deployed in the cloud."
    • "The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc."
    • "Stability has been a pain point. I was going back and forth with my product engineer and project manager for a couple of months. I had the product in a demonstration mode and wasn't satisfied with the results initially. After a few alterations and a few revisions later, it is fine."

    What is our primary use case?

    Our primary use is for email protection, though the analytics provided with respect to data leakage and user login activity is invaluable.

    How has it helped my organization?

    My company is a singular key player in a major industry in my country so we are a target at all times for phishing campaigns. We have had bad experiences in the past. Based on those experiences, we have been using Check Point for a couple of months, and in the reporting, we are seeing very good results.

    What is most valuable?

    The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc. The ability to sandbox, extract and interrogate email attachments is also key to safeguard user mailboxes. 

    What needs improvement?

    I have a keen interest in being able to consolidate and being able to have one viewpoint. I want to be able to integrate directly into our centralized login. I would love to see the ability to integrate into our SIEM solution which is on-premise. 

    I see where in a later update, they have built ability to integrate with an on-premise logging solution, so this is a big plus.

    For how long have I used the solution?

    Less than one year.

    What do I think about the stability of the solution?

    Stability has been a pain point. I was going back and forth with my product engineer and project manager for a couple of months. I had the product in a demonstration mode and wasn't satisfied with the results initially. After a few alterations and a few revisions later, it is fine.

    What do I think about the scalability of the solution?

    It seems quite scalable. We don't anticipate any scaling issues. We have it deployed in the cloud. 

    How are customer service and technical support?

    Their technical support was very responsive. I was not initially satisfied with the length of time it took to get this solution.

    I've been a Check Point customer for about 17 years, and I am not accustomed to not getting immediate fixes when I contact support. This was different. However, I am glad it eventually worked out.

    Which solution did I use previously and why did I switch?

    A colleague recommend the Check Point solution after we had such significant disruptions with the phishing email campaign. So, we tried it out.

    How was the initial setup?

    The initial setup was was straightforward. It was unknown territory for me, but the instructions from Check Point were very clear and straight to the point. 

    What about the implementation team?

    I worked directly with Check Point for the deployment. We had a good experience with them. 

    What was our ROI?

    Being able to keep the phishing campaigns out of my company has been ROI for me. 

    What's my experience with pricing, setup cost, and licensing?

    Do a full feature evaluation (interactive) with a support person. That is what I did.

    Which other solutions did I evaluate?

    We also considered Fortinet and Proofpoint. We always look at things like stability, feature set, the position in the market, maturity of the product, cost (because we have a budget that we have to work with), and the availability of technical support. This is why we went with Check Point. 

    I was part of the decision-making process to implement the solution.

    What other advice do I have?

    I have been quite pleased with the solution. You have nothing to lose by trying out Check Point.

    I would rate it an eight out of ten with room for improvement. 

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Owner at Giliam Network & System Solutions
    Real User
    Good security, nice interface, easy to use, and the support is good
    Pros and Cons
    • "The program has a nice interface and it is easy to use."
    • "At this time, the two-factor authentication does not work for Active Directory."

    What is our primary use case?

    We use CloudGuard SaaS to protect our cloud-based services from security threats. It is responsible for our Office 365 environment, OneDrive, SharePoint, Dropbox, G-Suite, and more. 

    How has it helped my organization?

    This solution has improved our visibility. Last week, one of our Office 365 customers was hacked and we were able to see details such as the attacker's IP address and country. It allows us to better decide what to do, such as activating two-factor authentication.

    What is most valuable?

    The security level is fairly high, given the price.

    The program has a nice interface and it is easy to use.

    There is an extra option available for two-factor authentication that you install an app onto your mobile device for. You can, for example, set it up so that you can't get into Office 365 without authenticating access from your phone.

    What needs improvement?

    At this time, the two-factor authentication does not work for Active Directory. This is something that we are looking forward to.

    For how long have I used the solution?

    I have been using CloudGuard SaaS for close to six months.

    What do I think about the scalability of the solution?

    I have 60 customers who are using CloudGuard.

    How are customer service and technical support?

    The technical support from Check Point is very good. 

    What's my experience with pricing, setup cost, and licensing?

    The price is very good, based on what they deliver.

    What other advice do I have?

    Overall, this is a solution that we are absolutely satisfied with and I definitely recommend it. In my opinion, using this product is necessary.

    I would rate this solution a nine out of ten.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: My company has a business relationship with this vendor other than being a customer: partner
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
    Updated: May 2025
    Buyer's Guide
    Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.