Try our new research platform with insights from 80,000+ expert users
William Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Jun 23, 2025
Integrates with Office365, strengthens security, and provides visibility
Pros and Cons
  • "It is fast and has a very simple, easy integration."
  • "Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult."

What is our primary use case?

Our company uses Office 365 and clearly, we use Outlook. We needed a tool that had the functionality to verify and validate the emails that enter and leave our organization. With this tool, we can solve security problems since many of the collaborators work from home. With this, we have decreased phishing attacks. It offers quite a few types of analysis and reporting that help to clear up security doubts and how to counter these gaps.

Check Point Harmony Email & Collaboration is workload protection in the cloud. This firewall helps us provide controls on our organization's devices and has become our main tool in the analysis and coverage of the infrastructure and also maintains fairly reasonable scalability.

How has it helped my organization?

Check Point Harmony Email & Collaboration has helped our company with perimeter security and securing our employees from wherever they are working. It's strengthening security as it is able to stop phishing attacks on Office 365 accounts and block possible account hijacking. It is also responsible for detecting malicious files in both OneDrive and SharePoint. This makes the product more robust and also gives us visibility into suspicious access, and provides the areas from which they are trying to enter. With this other feature, it provides more integrity to our company.

What is most valuable?

We have found several features that are very valuable. One of them is the integration with Office365. In addition to that, it is fast and has a very simple, easy integration. In addition to that, it integrates with other Office 365 products. The false positives are minimal, almost nil. That is very important since it will not generate an absurd amount of emails. The functionality of the tool is very easy to configure and manage. The platform is friendly and makes its integrations even more, so this tool is very efficient.

What needs improvement?

Check Point Harmony Email & Collaboration presents a problem similar to the other Check Point tools that it was able to manage, and that is the access to its administrative functions. Since the portal to the management and administration entry sometimes has performance problems and takes a long time to respond to what has arrived, the handling of the tool is difficult. 

It presents problems in the management of technical support since the SLA is not optimal, causing delays. This means that security problems may arise since it does not provide a quick response or a concrete solution.

Buyer's Guide
Check Point Harmony Email & Collaboration
March 2026
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,933 professionals have used our research since 2012.

For how long have I used the solution?

I have been using it for approximately 4 years.

What do I think about the stability of the solution?

The tool stability is very good.

What do I think about the scalability of the solution?

The scalability that the solution presents is very good. It is quite scalable.

How are customer service and support?

The experience has not been very pleasant since we have opened cases and they take too much time to respond or schedule a meeting even to provide a solution.

Which solution did I use previously and why did I switch?

There was no other solution implemented.

How was the initial setup?

The initial configuration was very simple and fast.

What about the implementation team?

During the implementation, the provider's team helped us, and it was very efficient; they knew what they were doing

What was our ROI?

The functionality that the tool presents with its characteristics and capabilities helped us a lot in our organization.

What's my experience with pricing, setup cost, and licensing?

Like all security tools, they are expensive tools. However, Check Point competes in the market and its accessibility is good, so paying for a tool that provides security is worth it.

Which other solutions did I evaluate?

The company has already had several Check Point tools. For this reason, this tool was implemented to keep in line with the same brand and hopefully not present us with problems if we implement another one.

What other advice do I have?

The only advice is to improve the technical support for your users since it is not very efficient.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1093134 - PeerSpot reviewer
Pentester at Cybertech Projects
User
Top 20
Apr 11, 2025
Reduces spam, offers excellent reporting, and has good management capabilities
Pros and Cons
  • "The ease of management and intuitive administration are excellent."
  • "The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter."

What is our primary use case?

We use the solution for the protection of email from phishing attacks, spam, and malicious email-related activities. 

It detects and blocks the most advanced phishing attacks across inbound, outbound, and internal communications, in real-time, before the attack succeeds.  

The solution is used for email protection, providing IT administrators with a great amount of information about possible attacks faced by the organization, and logins by users. 

It also has a high level of detail in its reports, facilitating the management and detection of possible threats to the security of the organization.

With the addition of the DMARC module, it makes it much easier to monitor the security policies applied and provides visual information about the type of traffic received, avoiding domain spoofing.

How has it helped my organization?

The number of phishing and spam emails has decreased and email security has improved by 80%. The IT team has noticed a great improvement in the number of emails received and a decrease in attacks. The helpful alerts generated by HEC facilitate the management and response. 

Thanks to its dashboard, it displays detailed information about detected activities, suspicious logins, span deletions, or phishing detected and blocked with a high level of detail. The level of reporting detail facilitates threat management; now the organization has an additional layer of protection for end users.

What is most valuable?

The ease of management and intuitive administration are excellent. Thanks to its dashboard, the most valuable thing is the detection capability provided by this solution. The level of detail offered by Harmony is unique, to the point of showing the differences between what is detected by Office 365 and what is detected by HEC. The organization relies on this email security solution and facilitates the protection of all end users, decreasing security breaches by malicious actors.

What needs improvement?

The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter. It could be improved to obtain a greater level of detail, unlike Office 365, which offers an extreme level of detail and facilitates the management and comparison of what is happening with respect to the mail. Its integration with Gsuite is simpler and has that point against it, however high levels of detail can be obtained in the reports of the solution. On the other hand, the ease of administration and threat detection capabilities are its strong points, and it stands out from other solutions that I have had the opportunity to test before.

For how long have I used the solution?

Currently, this solution has been used for the last tree years.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Harmony Email & Collaboration
March 2026
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,933 professionals have used our research since 2012.
Alejandro Flores. - PeerSpot reviewer
Director de Ingenieria at Smartelecom SA de CV
MSP
Oct 18, 2023
Granular with good integration capabilities and helpful support
Pros and Cons
  • "I like the fact that having granular information about the potential threats is received in email."
  • "They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment)."

What is our primary use case?

We use the solution for SaaS protection for 10,000 Gsuite users. How collaborators process data with sensitive information and information leaks was a constant concern. The collaboration solution allows you to have visibility of the entire SaaS environment and create customized security profiles to give optimal treatment to the information. This solution allows you to have very granular visibility at all times; this is of utmost importance as it allows you to make immediate and precise decisions about the security environment.

How has it helped my organization?

This solution has allowed us to have visibility of the security environment for the business and has allowed us to have specific treatment by users, user groups, and departments of the information that is processed. This allows users to be certain that their information is protected. Certain security problems were detected. Without this solution at the SaaS level would have been impossible to detect so there has been an improvement in the treatment of the attack surface and the protection of valuable data.

What is most valuable?

There are several features that were considered valuable. For example, the fact that the installation and integration of the solution with SaaS tools were very fast and highly recognized by SaaS administrators. I like the fact that having granular information about the potential threats is received in email. Being able to protect information repositories was of great interest to decision-makers. It was also possible to implement an entire environment in record time. Having this information allowed us to better model the attacking surface.

What needs improvement?

They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment). 

Reports should be presented in such a way that they are readable by non-technical work groups who are involved in information protection and who may misread the information on the dashboard and make incorrect decisions.

For how long have I used the solution?

I've used the solution for four months.

What do I think about the stability of the solution?

The product is very stable; it is a cloud solution and we have not had any operational incidents.

What do I think about the scalability of the solution?

The solution is very scalable since you only have to add licenses.

How are customer service and support?

They offer good support; you have several support options depending on the SLA you need.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup is very straightforward and very fast; it took about 20 minutes.

What about the implementation team?

The setup involved a mix of personnel and Check Point SE are experts in the area of ​​security.

What's my experience with pricing, setup cost, and licensing?

The setup was very fast; the license scheme was very easy to understand.

Which other solutions did I evaluate?

We also evaluated the PAN solution and Fortinet.

What other advice do I have?

I consider it to be a cost-effective solution that focuses on security and is a highly recommended and easy-to-use option.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2107347 - PeerSpot reviewer
Project Manager at UFINET
Real User
Feb 21, 2023
reduced phishing attacks, blocks malicious mail, and removes likelihood of data loss
Pros and Cons
  • "Email security has improved since we deployed this platform."
  • "Some undefined threats can bypass the security system when there is a networking failure in the organization."

What is our primary use case?

Check Point Harmony Email and Collaboration has enabled my team to implement projects and tasks effectively. 

It provides a reliable communication pathway that cannot be compromised by cyber attacks. 

It protects confidential data from leaving an organization without a proper channel. It keeps our emails in a unified environment that is secure and highly safeguarded by strong security tools. 

There are advanced collaboration techniques enhanced by this platform in the enterprise. It prevents account takeover and always keeps my colleagues under safe network infrastructure.

How has it helped my organization?

Email security has improved since we deployed this platform. 

This platform has enhanced faster file sharing and improved the collaboration network systems. 

Securing business lines has reduced cases of fraud that used to affect workflows. API connection has enabled us to integrate this platform with applications for the efficient implementation of business programs. 

Sending and receiving emails has been reliable and always productive, with zero phishing attacks. 

Full email protection of both cloud and on-premise emails has reduced the chances of losing data to zero.

What is most valuable?

Bulletproof Security catches up with all types of cyber attacks that can lead to account takeover and data compromisation. The entire networking system is secured with end-to-end encryption that enhances the secure flow of data. 

The superior data catch rate has reduced phishing attacks by a high rate of almost 100%, which has boosted productivity. 

It blocks malicious emails that wreak havoc and destroy valuable data in the systems. 

Employees can focus on more productive roles without fear of being attacked by external factors.

What needs improvement?

Some undefined threats can bypass the security system when there is a networking failure in the organization. 

The next release should have a fixed system that can categorize the various levels of viruses. 

The detection of threats before they reach inboxes has enhanced reliable communication among teams. 

The malware protection system has to be upgraded to catch up with various current threats that can easily affect our systems without precautions. 

Email and collaboration safety has been a great step that we have achieved from the performance of this platform, and I totally recommend it to others.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

This tool is highly powerful in blocking phishing attacks and ransomware attacks.

What do I think about the scalability of the solution?

I love the great performance of this platform.

How are customer service and support?

The customer support staff provides reliable services.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the main email and collaboration platform that I have worked with.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

The implementation was done by the vendor.

What was our ROI?

The rate of ROI has increased from 40% to 60%.

What's my experience with pricing, setup cost, and licensing?

The setup cost is good and highly efficient.

Which other solutions did I evaluate?

I have not come across another powerful platform like this one.

What other advice do I have?

I am satisfied with the security measures that have been enhanced by this tool.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2024712 - PeerSpot reviewer
Planning Analyst at Ovato
User
Feb 8, 2023
Offers good email security, blocks malicious emails, and protects sensitive data effectively
Pros and Cons
  • "This product enhances faster and more secure sharing of information among colleagues from different departments."
  • "There are sometimes leakages of viruses when the system is experiencing network failures."

What is our primary use case?

This product has been protecting emails across the company communication system. 

It helps my colleagues to share files and send emails without fear of phishing attacks. 

It keeps all the employees safe all the time when sharing confidential information. 

It protects sensitive company data from leaving the organization in to an insecure environment. 

Cases of ransomware attacks are no longer reported since we have the best solution for handling networking security. 

Implementing API email security across the organization enables teams to access the right information at the right time.

How has it helped my organization?

There is improved security across the emailing system and the entire communication networking infrastructure. 

This product enhances faster and more secure sharing of information among colleagues from different departments. 

Blocking malicious emails before landing inbox has enabled each member to access files with viruses and spam. 

The entire communication channels have been fully secured with end-to-end encryption. 

Email security and prevention of data from cyber attacks have been the main goals and have been achieved positively with Check Point Harmony Email & Collaboration.

What is most valuable?

Full suite protection of cloud email and collaboration applications has been a great achievement of this tool's performance. 

The security features provide a comprehensive report based on current performance and security situation. 

The platform API closely monitors the behavior of information traffic and prevents account takeover. 

It has reduced phishing attacks at a high rate and blocked many attempted attacks. 

The customer support team is online 24/7 and always offers solutions to any request when reached.

What needs improvement?

I am happy with the powerful performance of the set features. 

We have achieved the most set goals, and we are grateful for this robust solution. 

There are sometimes leakages of viruses when the system is experiencing network failures. The information may land in unsafe hands and lead to unpredictable attacks. 

Timely updates and system maintenance are encouraged to enhance continuous business operations. 

Efficient categorization of viruses will help filter out advanced phishing attacks before they affect the conversation infrastructure.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

I am impressed by the overall performance.

What do I think about the scalability of the solution?

The solution is highly scalable and powerful.

How are customer service and support?

This is the best support team I have come across. They always offer timely responses.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with a similar tool before.

How was the initial setup?

The setup was relatively complex.

What about the implementation team?

The implementation took place through the vendor team.

What was our ROI?

Our ROI has increased from 30% to 60% this year.

What's my experience with pricing, setup cost, and licensing?

The pricing and setup are suitable for any level of user.

Which other solutions did I evaluate?

I evaluated other tools, however, this was the best solution based on our demands.

What other advice do I have?

This is an excellent product for email security.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2005803 - PeerSpot reviewer
Digital Coordinator at Modis
Real User
Jan 22, 2023
Helpful URL protection, good quarantine capabilities, and a nice user dashboard
Pros and Cons
  • "Encryption of emails enhances safe communication that ransomware attacks cannot compromise."
  • "Some files are not scanned thoroughly due to occasional network failures."

What is our primary use case?

The advanced software blocks advanced email phishing that can affect information infrastructure. 

It keeps my colleagues safe when interacting with our partners through collaboration. 

Our communication networking system is secure from end to end to enhance information safety and prevent cyber attacks. 

Sending emails is fast and efficient within the organization's ecosystem. This product provides security alerts when there is a threat that can affect our communication channel. 

Check Point Harmony Email & Collaboration caters to full cloud email security and other applications in the cloud.

How has it helped my organization?

Encryption of emails enhances safe communication that ransomware attacks cannot compromise. 

A secure collaboration environment has enhanced faster growth due to productive sessions convened by teams. 

It blocks unsafe emails before landing inbox to avoid time wastage. Blocking malicious emails has enabled employees to focus on their roles fully without fear of being attacked. 

Consistent security across the company infrastructure has saved the company costs that could be accrued from an insecure work environment.

What is most valuable?

Securing major file-sharing services across the company has been productive since we deployed this platform. 

The security system has a stable data protection system that has prevented potential data loss. 

This product detects malicious behavior in advance and immediately quarantines files before they can spread viruses to the entire network. 

URL protection features give me the confidence to browse the internet without fear of visiting unsafe sites. 

The user dashboard updates systems automatically to meet the current enterprise demands.

What needs improvement?

The system has programmed categories of threats that are detected automatically. 

This can lead to virus leakage and spread malicious data across the enterprise. 

The cost of deployment and integration with other applications is high. 

Some files are not scanned thoroughly due to occasional network failures.

We have experienced the best services from the performance of this platform despite a few operational challenges that rarely occur. 

Monitoring the system operation for new teams is not easy due to complicated configuration techniques.

For how long have I used the solution?

I've used the solution for 12 months.

What do I think about the stability of the solution?

It is highly stable in the provision of email security.

What do I think about the scalability of the solution?

This tool is good in overall performance.

How are customer service and support?

The support staff is kind with fast responses to our requests.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with a different solution.

How was the initial setup?

The setup was complex during integrations though the support staff provided productive guidance.

What about the implementation team?

Implementation took place through the vendor team.

What was our ROI?

There has been increased ROI (from 30% to 55%) since we deployed it.

What's my experience with pricing, setup cost, and licensing?

The licensing terms have favored our organization.

Which other solutions did I evaluate?

We selected this product after a recommendation from our colleagues.

What other advice do I have?

Email security is critical to any enterprise, and with this solution, everything is covered.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at Digitas APAC
User
Nov 29, 2022
Increases productivity, offers good encryption, and is very secure
Pros and Cons
  • "It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments."
  • "The next release should focus more on email categorization and provide options for unlocking blocked safe emails."

What is our primary use case?

Check Point Harmony Email & Collaboration block any harmful social communication data that can destroy safe information. 

It enables teams in the organization to collaborate under a safe environment when working on various projects and tasks. 

It monitors the flow of emails from one destination to the other with security protocols that block phishing attacks. 

The product stops threats and fraudulent messages before entering the inbox of the receiver. This software has enabled members of the organization to focus on demanding projects without fear of external cyber-attacks.

How has it helped my organization?

Productivity has increased since there are no external detractors. 

Sending email with bulky attachments is safe and faster with guaranteed security encryption. 

It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments. 

It has been able to block malware attacks that could derail workflows and affect overall production. 

The solution cleans unsafe files quickly and eliminates threats that can adversely affect information. 

Engagement with my colleagues is easy, and I no longer fear any ransomware attacks.

What is most valuable?

Sensitive business data is effectively protected from any third-party attacks that can easily destroy confidential information. 

It prevents data from leakages and exposure to unauthorized hands. 

The high-grade bulletproof security model monitors email transfer and content that is contained in the messages. File-sharing security provides a reliable platform for faster sharing of documents without fear of external data threats. 

The dashboard provides real-time insights that provide awareness to members on the best policies for sharing information and engaging each other.

What needs improvement?

The next release should focus more on email categorization and provide options for unlocking blocked safe emails. 

They should release should increase collaboration apps that can be topped with security layers. 

It has developed reliable security infrastructure for guarding our information, and I am proud of that. Most objectives have been achieved with positive results and increased return on investment. The unified dashboard gives departments an easy time monitoring their work progress and security situation in their networking environment.

For how long have I used the solution?

I've used the solution for nine months. 

What do I think about the stability of the solution?

This product is stable with robust performance.

What do I think about the scalability of the solution?

It is easy to master the concept of operations and monitor performance.

How are customer service and support?

The customer service team works closely with all the staff members.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used another solution.

How was the initial setup?

The setup was not complex.

What about the implementation team?

It was deployed by the vendor.

What was our ROI?

ROI has been positive since we deployed it and has highly improved from 15% to 35%.

What's my experience with pricing, setup cost, and licensing?

The setup and cost have been good from my experience, and I recommend it to other organizations.

Which other solutions did I evaluate?

I did not find any other effective platforms like this one.

What other advice do I have?

This is a great product with high-performance features.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at IRMA Anand
User
Nov 29, 2022
Good support, impressive performance, and helps prevent data loss
Pros and Cons
  • "It helped us to bring security compliance and ensure system robustness throughout."
  • "The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally."

What is our primary use case?

Check Point Harmony Email and Collaboration is a one-stop solution for providing the best enterprise security and protecting systems and mail servers from malware and threat attacks. 

Also, It helps in URL protection and DLP quite efficiently without any issues. 

It provides real-time protection to users and their devices from any incoming potential threats and malware sources. 

It helps in bringing security compliance to the system end to end. 

It permanently blocks phishing websites and any ransomware attacks. 

We find that it protects all confidential information from any sort of data leak and ensures data robustness and keeps everything intact in the system.

How has it helped my organization?

It helped us to bring security compliance and ensure system robustness throughout. 

It suspends and proactively blocks the malicious ransomware and threats before reaching the inbox. 

The product prevents data loss or data theft and ensures that the system is secured end to end without any trouble. 

Its API integration with other portals and applications goes smoothly without any hiccups. 

They provide bulletproof security to systems and email servers and ensure round-the-clock security for cloud email servers and other collaborating applications. 

It's an all-in-one security solution for businesses in this current era.

What is most valuable?

All the features offer great utility, and their performance is quite impressive. 

They have more secure applications than cloud-native security and have a higher security compliance rate. Also, the prevention of systems and servers from phishing attacks and system threats is proactively traceable and immediately diffused with a catchment rate of almost 99.99%, which is great in today's era of cyber threats and attacks. 

Their sound features of security for account protection and data leak protection works great for us, and we never face any compatibility or lag issue while working on the software. 

What needs improvement?

I would love to have their ticket resolution process as fast as possible. Fast and accurate ticket resolution can be a game changer for any industry, and the performance and confidence of clients go hand in hand with improved performance efficacy. This will definitely attract more loyal clients, and it helps with retention for longer periods.

The business team should be further expanded, and more peer feedback should be made available publicly to have better and complete visibility of the application globally.

For how long have I used the solution?

I've been using the solution for precisely two years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The product is scalable and gives users a great opportunity to replicate as well.

How are customer service and support?

Customer service and support are good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

This is the first time we are using a solution of this kind formally.

How was the initial setup?

The setup was straightforward and easy.

What about the implementation team?

We implemented the product through our in-house team.

What was our ROI?

The ROI is always better than other alternatives.

What's my experience with pricing, setup cost, and licensing?

Check Point solutions are cost-effective and can be used effortlessly without any hassle. The renewal process for agreement is quite easy and can be done online easily. Licensing is smooth and price affordability is just great and can be recommended to all small and marginal start-up organizations for trial.

Which other solutions did I evaluate?

A lot of security solutions were evaluated. We evaluated Cyber Protect Cloud, Duo Security, Splunk, etc.

What other advice do I have?

This is a must-have solution for all enterprises. People should try it now.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free Check Point Harmony Email & Collaboration Report and get advice and tips from experienced pros sharing their opinions.