I don't really have specific suggestions for how Check Point Harmony SaaS could be improved at this time. I would prefer to maintain the current features for now.
There are some issues with the management part, especially in converting central configurations to local configurations within SmartConsole in Check Point Firewall.
Head Of IT Infrastructure Network Security and Compliance at LMW
Real User
Top 5
2024-05-30T07:24:00Z
May 30, 2024
Check Point does not have identity management features, which could be considered for future implementation. The ability to identify the origin country of emails would be useful, allowing me to restrict emails generated outside of India to prevent phishing attacks.
Find out what your peers are saying about Check Point Software Technologies, Veritas, Flexera and others in SaaS Management Platforms. Updated: June 2025.
SaaS Management Platforms streamline the oversight of SaaS applications, aiding in cost optimization, license management, and security compliance. These platforms centralize the control of tools in use, allowing IT departments to manage subscriptions effectively. SaaS Management Platforms provide organizations with a holistic view of their software landscape, enabling better management of software spending, user provisioning, and compliance adherence. This comprehensive monitoring leads to...
I don't really have specific suggestions for how Check Point Harmony SaaS could be improved at this time. I would prefer to maintain the current features for now.
There are some issues with the management part, especially in converting central configurations to local configurations within SmartConsole in Check Point Firewall.
The solution needs to be configured correctly. If it is not, it will begin to generate false positives.
Check Point does not have identity management features, which could be considered for future implementation. The ability to identify the origin country of emails would be useful, allowing me to restrict emails generated outside of India to prevent phishing attacks.
The solution could improve monitoring activity. When users have access to the Internet, they can reduce exposure or maybe change their login password.