Try our new research platform with insights from 80,000+ expert users
Alejandro Flores. - PeerSpot reviewer
Director de Ingenieria at a tech services company with 11-50 employees
MSP
Oct 18, 2023
Granular with good integration capabilities and helpful support
Pros and Cons
  • "I like the fact that having granular information about the potential threats is received in email."
  • "They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."

What is our primary use case?

We use the solution for SaaS protection for 10,000 Gsuite users. How collaborators process data with sensitive information and information leaks was a constant concern. The collaboration solution allows you to have visibility of the entire SaaS environment and create customized security profiles to give optimal treatment to the information. This solution allows you to have very granular visibility at all times; this is of utmost importance as it allows you to make immediate and precise decisions about the security environment.

How has it helped my organization?

This solution has allowed us to have visibility of the security environment for the business and has allowed us to have specific treatment by users, user groups, and departments of the information that is processed. This allows users to be certain that their information is protected. Certain security problems were detected. Without this solution at the SaaS level would have been impossible to detect so there has been an improvement in the treatment of the attack surface and the protection of valuable data.

What is most valuable?

There are several features that were considered valuable. For example, the fact that the installation and integration of the solution with SaaS tools were very fast and highly recognized by SaaS administrators. I like the fact that having granular information about the potential threats is received in email. Being able to protect information repositories was of great interest to decision-makers. It was also possible to implement an entire environment in record time. Having this information allowed us to better model the attacking surface.

What needs improvement?

They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment). 

Reports should be presented in such a way that they are readable by non-technical work groups who are involved in information protection and who may misread the information on the dashboard and make incorrect decisions.

Buyer's Guide
Check Point Harmony Email & Collaboration
January 2026
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for four months.

What do I think about the stability of the solution?

The product is very stable; it is a cloud solution and we have not had any operational incidents.

What do I think about the scalability of the solution?

The solution is very scalable since you only have to add licenses.

How are customer service and support?

They offer good support; you have several support options depending on the SLA you need.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup is very straightforward and very fast; it took about 20 minutes.

What about the implementation team?

The setup involved a mix of personnel and Check Point SE are experts in the area of ​​security.

What's my experience with pricing, setup cost, and licensing?

The setup was very fast; the license scheme was very easy to understand.

Which other solutions did I evaluate?

We also evaluated the PAN solution and Fortinet.

What other advice do I have?

I consider it to be a cost-effective solution that focuses on security and is a highly recommended and easy-to-use option.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PRADIPJOSHI - PeerSpot reviewer
Owner at a transportation company with 11-50 employees
Real User
Top 5Leaderboard
Aug 6, 2023
Reliable product with a straightforward setup process
Pros and Cons
  • "The product is reliable and sturdy."
  • "They must provide security to more email service providers."

What is most valuable?

The product is reliable and sturdy. It can be configured within five minutes and has minimal downtime. It provides an in-built API functionality. It supports chat and file sharing from solutions like OneDrive, SharePoint, Google Drive, and Dropbox. Additionally, it offers 100% protection for unified communication or collaboration to prevent hacking incidents like the Zoom hack.

What needs improvement?

They must provide security to Rediffmail and other email service providers. At present, it is limited to only two email services. They should also offer additional protection to Zoom, Cisco Webex, BlueJeans, and StarLeaf.

For how long have I used the solution?

We have been using Check Point Harmony Email & Collaboration for five to six days. However, we have been using Check Point for five to six years.

What do I think about the stability of the solution?

I rate the platform’s stability a ten out of ten.

What do I think about the scalability of the solution?

I rate the platform’s scalability a ten out of ten. It is suitable for small, medium, and large companies. Mostly, it will be helpful for small enterprises that can’t afford firewall solutions like Wireshark.

How are customer service and support?

Check Point has a good support system in our country. They are 100% customer-centric and have many support partners as well.

How was the initial setup?

It is straightforward to set up. We can deploy within five minutes.

What about the implementation team?

Check Point is a very user-friendly product. The customers can deploy it easily with some technical knowledge; they can take help for installation and programming for a nominal cost from the product partners.

What's my experience with pricing, setup cost, and licensing?

I rate the platform’s pricing a seven and a half.

What other advice do I have?

I rate Check Point Harmony Email & Collaboration a ten out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
January 2026
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
reviewer2005803 - PeerSpot reviewer
Digital Coordinator at a computer software company with 10,001+ employees
Real User
Jan 22, 2023
Helpful URL protection, good quarantine capabilities, and a nice user dashboard
Pros and Cons
  • "Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
  • "Some files are not scanned thoroughly due to occasional network failures."

What is our primary use case?

The advanced software blocks advanced email phishing that can affect information infrastructure. 

It keeps my colleagues safe when interacting with our partners through collaboration. 

Our communication networking system is secure from end to end to enhance information safety and prevent cyber attacks. 

Sending emails is fast and efficient within the organization's ecosystem. This product provides security alerts when there is a threat that can affect our communication channel. 

Check Point Harmony Email & Collaboration caters to full cloud email security and other applications in the cloud.

How has it helped my organization?

Encryption of emails enhances safe communication that ransomware attacks cannot compromise. 

A secure collaboration environment has enhanced faster growth due to productive sessions convened by teams. 

It blocks unsafe emails before landing inbox to avoid time wastage. Blocking malicious emails has enabled employees to focus on their roles fully without fear of being attacked. 

Consistent security across the company infrastructure has saved the company costs that could be accrued from an insecure work environment.

What is most valuable?

Securing major file-sharing services across the company has been productive since we deployed this platform. 

The security system has a stable data protection system that has prevented potential data loss. 

This product detects malicious behavior in advance and immediately quarantines files before they can spread viruses to the entire network. 

URL protection features give me the confidence to browse the internet without fear of visiting unsafe sites. 

The user dashboard updates systems automatically to meet the current enterprise demands.

What needs improvement?

The system has programmed categories of threats that are detected automatically. 

This can lead to virus leakage and spread malicious data across the enterprise. 

The cost of deployment and integration with other applications is high. 

Some files are not scanned thoroughly due to occasional network failures.

We have experienced the best services from the performance of this platform despite a few operational challenges that rarely occur. 

Monitoring the system operation for new teams is not easy due to complicated configuration techniques.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

It is highly stable in the provision of email security.

What do I think about the scalability of the solution?

This tool is good in overall performance.

How are customer service and support?

The support staff is kind with fast responses to our requests.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with a different solution.

How was the initial setup?

The setup was complex during integrations though the support staff provided productive guidance.

What about the implementation team?

Implementation took place through the vendor team.

What was our ROI?

There has been increased ROI (from 30% to 55%) since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The licensing terms have favored our organization.

Which other solutions did I evaluate?

We selected this product after a recommendation from our colleagues.

What other advice do I have?

Email security is critical to any enterprise, and with this solution, everything is covered.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at a marketing services firm with 501-1,000 employees
User
Nov 29, 2022
Increases productivity, offers good encryption, and is very secure
Pros and Cons
  • "It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
  • "The next release should focus more on email categorization and provide options for unlocking blocked safe emails."

What is our primary use case?

Check Point Harmony Email & Collaboration block any harmful social communication data that can destroy safe information. 

It enables teams in the organization to collaborate under a safe environment when working on various projects and tasks. 

It monitors the flow of emails from one destination to the other with security protocols that block phishing attacks. 

The product stops threats and fraudulent messages before entering the inbox of the receiver. This software has enabled members of the organization to focus on demanding projects without fear of external cyber-attacks.

How has it helped my organization?

Productivity has increased since there are no external detractors. 

Sending email with bulky attachments is safe and faster with guaranteed security encryption. 

It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments. 

It has been able to block malware attacks that could derail workflows and affect overall production. 

The solution cleans unsafe files quickly and eliminates threats that can adversely affect information. 

Engagement with my colleagues is easy, and I no longer fear any ransomware attacks.

What is most valuable?

Sensitive business data is effectively protected from any third-party attacks that can easily destroy confidential information. 

It prevents data from leakages and exposure to unauthorized hands. 

The high-grade bulletproof security model monitors email transfer and content that is contained in the messages. File-sharing security provides a reliable platform for faster sharing of documents without fear of external data threats. 

The dashboard provides real-time insights that provide awareness to members on the best policies for sharing information and engaging each other.

What needs improvement?

The next release should focus more on email categorization and provide options for unlocking blocked safe emails. 

They should release should increase collaboration apps that can be topped with security layers. 

It has developed reliable security infrastructure for guarding our information, and I am proud of that. Most objectives have been achieved with positive results and increased return on investment. The unified dashboard gives departments an easy time monitoring their work progress and security situation in their networking environment.

For how long have I used the solution?

I've used the solution for nine months. 

What do I think about the stability of the solution?

This product is stable with robust performance.

What do I think about the scalability of the solution?

It is easy to master the concept of operations and monitor performance.

How are customer service and support?

The customer service team works closely with all the staff members.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used another solution.

How was the initial setup?

The setup was not complex.

What about the implementation team?

It was deployed by the vendor.

What was our ROI?

ROI has been positive since we deployed it and has highly improved from 15% to 35%.

What's my experience with pricing, setup cost, and licensing?

The setup and cost have been good from my experience, and I recommend it to other organizations.

Which other solutions did I evaluate?

I did not find any other effective platforms like this one.

What other advice do I have?

This is a great product with high-performance features.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at a educational organization with 201-500 employees
User
Nov 29, 2022
Good support, impressive performance, and helps prevent data loss
Pros and Cons
  • "It helped us to bring security compliance and ensure system robustness throughout."
  • "The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."

What is our primary use case?

Check Point Harmony Email and Collaboration is a one-stop solution for providing the best enterprise security and protecting systems and mail servers from malware and threat attacks. 

Also, It helps in URL protection and DLP quite efficiently without any issues. 

It provides real-time protection to users and their devices from any incoming potential threats and malware sources. 

It helps in bringing security compliance to the system end to end. 

It permanently blocks phishing websites and any ransomware attacks. 

We find that it protects all confidential information from any sort of data leak and ensures data robustness and keeps everything intact in the system.

How has it helped my organization?

It helped us to bring security compliance and ensure system robustness throughout. 

It suspends and proactively blocks the malicious ransomware and threats before reaching the inbox. 

The product prevents data loss or data theft and ensures that the system is secured end to end without any trouble. 

Its API integration with other portals and applications goes smoothly without any hiccups. 

They provide bulletproof security to systems and email servers and ensure round-the-clock security for cloud email servers and other collaborating applications. 

It's an all-in-one security solution for businesses in this current era.

What is most valuable?

All the features offer great utility, and their performance is quite impressive. 

They have more secure applications than cloud-native security and have a higher security compliance rate. Also, the prevention of systems and servers from phishing attacks and system threats is proactively traceable and immediately diffused with a catchment rate of almost 99.99%, which is great in today's era of cyber threats and attacks. 

Their sound features of security for account protection and data leak protection works great for us, and we never face any compatibility or lag issue while working on the software. 

What needs improvement?

I would love to have their ticket resolution process as fast as possible. Fast and accurate ticket resolution can be a game changer for any industry, and the performance and confidence of clients go hand in hand with improved performance efficacy. This will definitely attract more loyal clients, and it helps with retention for longer periods.

The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally.

For how long have I used the solution?

I've been using the solution for precisely two years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The product is scalable and gives users a great opportunity to replicate as well.

How are customer service and support?

Customer service and support are good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first time we are using a solution of this kind formally.

How was the initial setup?

The setup was straightforward and easy.

What about the implementation team?

We implemented the product through our in-house team.

What was our ROI?

The ROI is always better than other alternatives.

What's my experience with pricing, setup cost, and licensing?

Check Point solutions are cost-effective and can be used effortlessly without any hassle. The renewal process for agreement is quite easy and can be done online easily. Licensing is smooth and price affordability is just great and can be recommended to all small and marginal start-up organizations for trial.

Which other solutions did I evaluate?

A lot of security solutions were evaluated. We evaluated Cyber Protect Cloud, Duo Security, Splunk, etc.

What other advice do I have?

This is a must-have solution for all enterprises. People should try it now.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Shrinkhala Jain - PeerSpot reviewer
Project Consultant at a consultancy with 10,001+ employees
User
Nov 24, 2022
Great zero-day protection and very useful against data leaks and loss
Pros and Cons
  • "Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble."
  • "They could continue to offer more stringent security policy measures for threat point management."

What is our primary use case?

Check Point Harmony Email and Collaboration is the best security software that protects email and collaboration suites in one of the best possible way. It ensures the restriction of threat points and malware in a comprehensive manner. 

All our Google Workspace applications and Office 365 are thoroughly secured by the software. It's been a great experience so far. 

Multiple phishing activities and complete zero-day protection are all ensured through Check Point. 

Data loss and data leakage prevention are well deployed which helps businesses to scale and expand effortlessly without any trouble.

How has it helped my organization?

Check Point Harmony Email and Collaboration comes with end-to-end capabilities of system protection in a holistic manner. It is restricting the entry of phishing attacks, malware attacks, and ransomware threats. 

It ensures anti-phishing management effectively and prevents any data loss through encrypted database management. Bulletproof security is one of the best features which enables protection from the most sophisticated and evasive threat attacks. It claims to reduce phishing attempts by almost 100%

What is most valuable?

Zero-day protection of the cloud and email systems is possible with Check Point Harmony Email and Collaboration. It ensures anti-phishing management end to end, and with this product, there can not be any evasive attack of sophisticated malware and threats on the system. 

Data loss and leakage prevention are one of the best features as it ensures no data loss and that all confidential documents and information is secured forever.

Protection of all confidential and sensitive data base (DLP) is secured in the system forever with complete dashboard and data tracking management.

What needs improvement?

They could continue to offer more stringent security policy measures for threat point management. Their zero-day threat protection can be further strengthened to have better compliance control, as 1% data loss and data breaches are still possible through existing systems. Even this 1% carries the potential to harm the system for a long time. 

We should have more and more pilots of security systems across different business environments to have 100% security checks and compliance.

For how long have I used the solution?

It's been using the solution for about a year now.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

Technical support is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not use a different solution. We started using this solution recently and have been happy with the experience so far.

How was the initial setup?

The setup was easy and straightforward.

What about the implementation team?

We implemented the solution through the vendor team.

What was our ROI?

We've seen an ROI of over 80%.

What's my experience with pricing, setup cost, and licensing?

The setup cost is significantly low and quite affordable currently as per other competitive software. Also, the renewal and licensing process is streamlined and not complicated at all.

Which other solutions did I evaluate?

We evaluated a lot of alternatives simultaneously. Some of them included ESET Protect, Forcepoint DLP, Sentinel, and Kaspersky Endpoint Security, among others.

What other advice do I have?

I'd advise new users to go for a trial of Check Point Harmony Email and Collaboration software and use it to its fullest to understand the capabilities at its best practices.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
IT specialist
Real User
Sep 19, 2022
A stable solution that does a fantastic job of catching things Microsoft doesn't, but implementation could be easier
Pros and Cons
  • "The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic."
  • "The implementation could definitely be better."

What is our primary use case?

At the moment, we're heavily using the email and collaboration features. We are also licensed for the mobile part, which we are sort of working into, and CloudGuard as well. We're kind of working through those features. 

What needs improvement?

The implementation could definitely be better. We had great support from Check Point, but there were some "got-you" moments where we got surprises as we were setting it up. When Check Point talks about it, it's all "plug and play," but it's not really one of those platforms where you can just jump in and click a few buttons and everything works. You need to have a bit of knowledge about what you're doing and it's a bit more complicated than they advertise.

In the future I would like to see something similar to what Proofpoint has, where users can actually go in and make the call to release their own emails. We've got a small number of users, so it's okay for the IT team to constantly be bombarded with our emails for releasing, but I would love to have an option where I can allow users to go in and make the call to release an email, and then of course it would only actually be released if it passes certain things.

For how long have I used the solution?

I have been using this solution for about a year and a half now. 

What do I think about the stability of the solution?

The solution is stable and I think it does a fantastic job. The stuff that it's picking up and blocking and stopping from coming into our environment has been fantastic. There's a few things that get flagged by Microsoft, most of them false positives, so it's interesting. Harmony passes it through and Microsoft thinks it's spam, but usually it's not.

What do I think about the scalability of the solution?

The solution is very easy to scale. There are between 500-550 active users in our company. We have a team of three people that look after the environment, but that is only part of their responsibilities. I think it would do very well with one full-time person handling the maintenance. 

How are customer service and support?

The technical support was brilliant, but that's the thing when you're buying something, usually the initial support is top notch. It's been a year and a half now, and we haven't had any urgent technical issues that we've had to go back for help with, but at the start, when we were implementing the solution, we had good support. They were on the ball and they really stepped up.

Which solution did I use previously and why did I switch?

What we used in the past was an outfit called MSX.

What's my experience with pricing, setup cost, and licensing?

Check Point is more expensive. That's the honest truth. So far, it's a good value for the money. 

Which other solutions did I evaluate?

We considered the Microsoft inbuilt solution, and the advice that we got from a lot of people was, if you want to use that one, combine it with something else. That is what we ended up doing, because it came as part of our licensing with 365, but we can tell that it was a good idea to combine it with Check Point because it will let a lot of things pass.

Also, I know CrowdStrike is cheaper with their Falcon offering, but I haven't had the opportunity to work with it. The reason why I went with Check Point was because I have worked with it in the past and I like their product, so that was the biggest push. 

What other advice do I have?

I would rate this solution as a seven out of ten. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Fabian Miranda - PeerSpot reviewer
Cloud computing at a security firm with 5,001-10,000 employees
Real User
Top 20
Sep 11, 2022
Easy to deploy with simple integration and straightforward management
Pros and Cons
  • "The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great."
  • "We understand that false positives are always there, but sometimes the notifications are more than expected."

What is our primary use case?

We acquired Check Point Harmony to protect our email environment in Office 365. In general terms, the false positives rate has stayed low, and detection rates and successful threat preventions have increased. It filters malicious emails, cleans documents, and effectively prevents phishing attacks. These processes happening in the cloud give peace of mind that the protective actions are taking place before they reach the endpoint, making it safer and adding layers of protection key to keeping the network safe.

How has it helped my organization?

A lot of these attacks and malware now come hidden in ways we expect the least, and since we never think we'll be targets of a cyber attack, this makes us vulnerable to them. Check Point Harmony gives us great visibility of the threats we are being exposed to, where they are coming from and what were they targeting, giving visibility of the weak gateways that could lead to an infection or a leakage. Management is easy, and integration is too, support is good, and the steps followed to set it up were very simple.

What is most valuable?

The previous solution we had for email protection required a lot of investment from us, both money and time-wise. 

The software is easy to deploy and maintain, and the administration and operation of it require very few interventions from the IT team. 

The solution also integrates amazingly with our network's server environment for collaboration and email apps. The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great.

What needs improvement?

We understand that false positives are always there, but sometimes the notifications are more than expected. We've seen clean emails being blocked, thanks to this. 

There are some delays when applying new administrative functions. Sometimes going through the documentation is complex and can be a bit confusing; reporting from the dashboard could get some improvements, too. However, in general, we feel satisfied with Email and Collaboration as it delivers the expected results regarding threat prevention. 

For how long have I used the solution?

I've used the solution for more than three years.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.