I work with Check Point Harmony SaaS, as our customer has Check Point Harmony SaaS, and we work on monitoring as we are working as a SOC, that Security Operations Center. We do have that device for monitoring perspective. We only monitor our customers. The logs that we receive from it are being monitored. I want to clarify that for Check Point Harmony SaaS, we only monitor the logs for it. If any suspicious detection is detected, the alert triggers, and we monitor that. That part is what I am aware of because I work as a consultant engineer there, and I am not well aware of the implementation or onboarding part of it.
We resell the product to various customers. We give them the latest version. We use the solution for protection purposes. It can help protect, for example, OneDrive, 365, Google Workspaces, and Exchange.
Find out what your peers are saying about Check Point Software Technologies, Flexera, BetterCloud and others in SaaS Management Platforms. Updated: February 2026.
SaaS Management Platforms streamline the administration of software as a service applications within organizations, enabling efficient license management and usage monitoring. SaaS Management Platforms provide businesses with tools to optimize their software investments, ensuring compliance and uncovering unused or underutilized licenses. These platforms offer detailed visibility into application usage, facilitating better decision-making and cost control. They integrate with existing IT...
I work with Check Point Harmony SaaS, as our customer has Check Point Harmony SaaS, and we work on monitoring as we are working as a SOC, that Security Operations Center. We do have that device for monitoring perspective. We only monitor our customers. The logs that we receive from it are being monitored. I want to clarify that for Check Point Harmony SaaS, we only monitor the logs for it. If any suspicious detection is detected, the alert triggers, and we monitor that. That part is what I am aware of because I work as a consultant engineer there, and I am not well aware of the implementation or onboarding part of it.
As a cybersecurity engineer, I have nothing to do with the use case for Check Point Harmony SaaS.
My typical use case for Check Point Harmony SaaS is to protect all the Microsoft 365 platform; this is the main purpose for secure cyber security.
I work as an engineer, and I deploy security solutions, including Check Point Harmony.
We resell the product to various customers. We give them the latest version. We use the solution for protection purposes. It can help protect, for example, OneDrive, 365, Google Workspaces, and Exchange.
The scope is for email security requirements only.
We use the solution for content solutions for secure web gateway and SMP's model.