We use two solutions: Check Point Gateway and Harmony Email & Collaboration.
We primarily use it for IDS and threat protection, as well as VPN.
External reviews are not included in the AWS star rating for the product.
We use two solutions: Check Point Gateway and Harmony Email & Collaboration.
We primarily use it for IDS and threat protection, as well as VPN.
It's very easy to deploy with Microsoft Office 365.
The option to set a copy is beneficial. Additionally, the solution scans OneDrive, Teams, and SharePoint content and provides a full report.
If I store any malicious file in my cloud storage, it will give me detailed information in the Check Point console, including which DLL is infected. That's a very useful feature.
I'm satisfied with the product as it is, especially regarding security.
The reporting could be improved. Also, the predefined workflows cannot be changed. It would be great to add custom workflows to better suit customer requirements.
I've been working with Check Point for the last four years. I perform day-to-day operational tasks with it.
It is stable.
It is scalable. There are around 300 end users.
It's a cloud-based SaaS application, so it doesn't need to be deployed in multiple locations. We integrated it with our existing email solution, and all our email traffic is routed through it.
The customer service and support are very good.
Positive
I've worked with Microsoft Defender, Proofpoint, and Barracuda Email Security.
The pros include quick implementation time and easy policy deployment. Security is also good, as Check Point provides multiple security engines and inline data security. As for cons, having the option for custom workflows would be a great improvement.
I completed the initial setup in about 15 minutes, by myself. It was very easy. There's no need for improvement.
We share product white papers with our customers, understand customers' needs and current email infrastructure, and design a solution before pitching to them. We also create a project timeline for the POC and implementation.
It's easy to integrate, as it supports both cloud-based platforms, O365 and Google Workspace. If you have basic knowledge of your email platform, you can easily integrate the product.
Check Point takes care of the maintenance. It doesn't require any maintenance.
Check Point Harmony Email & Collaboration is beneficial for customers. It brings in the value.
It provides enhanced email content security to prevent external attacks.
I run the proof of concept and submit a report to management. They handle discussions with customers and coordinate with the Check Point sales team.
I would recommend it.
Overall, I would rate it a nine out of ten.
We mainly use this product for Email Security, and it has an extremely simple setup. We have it installed at one of our client's locations to detect and respond appropriately to common threats such as phishing, scams, and data leakage. This comprehensive coverage allows us to protect the services running within the organization.
Check Point Harmony Email Collaboration enables us to efficiently and confidently implement necessary solutions for our various email configurations. The support services available are outstanding. When we sought a product demo for Harmony Email and Collaboration, it was very thorough.
The product is incredibly easy to set up and deploy, even across multiple tenants. Once we completed the connection process, we selected our policies and configured them to notify users about spam/phishing emails.
It provides recommendations but also allows for customization to suit our needs. After the initial setup, we rarely need to make adjustments.
We've contacted support a few times, and their responses have been quick and helpful. The user interface is very intuitive, and our technicians didn't need formal training because of how well it's laid out. We've implemented this across multiple tenants and have more than 1,000 users, with fewer than 10 tickets about potential false positives/negatives. This has significantly reduced the number of "Is this Spam" tickets from our customers.
The email security solution boasts an exceptional success rate in filtering out junk, spam, and phishing emails while ensuring that legitimate emails reach their intended recipients. The setup process is straightforward and user-friendly. The vendor is highly engaged with monthly meetings to introduce new features, and the account manager is notably responsive. In addition, the pricing offered is remarkably competitive compared to other options available in the email security market.
The ability to customize based on existing organizational goals, milestones, and current or future state designs is important. Customizable policies regarding how to handle specific email files, their contents, and appropriate remediation steps are critical in product selection. In larger organizations, the sheer volume of emails can be daunting when evaluating solutions. Ensuring the integrity of communications and proper collaboration is crucial to establishing the CIA triad. This solution has reduced insecurities and made scaling this product rather seamless.
Initial Learning Mode takes a while. I would like to have protection go live immediately and then have learning mode kick in after the initial scan Email Search can be clunky at times. It would be nice if there was a way to auto-fill recipients or sender fields with known users' payment options.
We have several clients, and one of them uses the Harmony Email gateway. We also plan to use this product because many of our clients are experiencing issues with their mail gateways and are considering using this product for using it against a variety of Cyber threats including malware and ransomware.
Scalability is 10/10 as with a larger organization, the sheer volume of emails can be quite intimidating when evaluating the scale of solutions. Ensuring the integrity of communications and proper collaboration is critical to establishing the CIA triad. This solution has reduced those insecurities and made scaling this product solution rather seamless.
My impression of the stability is 10/10 for this solution.
So far, we have received very good support for our issues, and the TAC for this product is really good. They provide a solution quickly.
Positive
Yes, we have used different products but have switched to this for below features and services.
The solution has an intuitive user interface which makes it easy for users to navigate around. it can streamline our work to become a more efficient organization.
We have an in-house professional services team who do the implementation part for us.
It's worth investing in this solution. We have a client who has recently acquired this solution and they are really happy with this product.
We have multiple clients so do have other vendors as well like Proofpoint and Mimecast.
Overall, we are impressed with how this product allows us to be efficient, confident and successfully implement necessary solutions to our diverse range of email configurations
Some emails, specifically false positive emails, are, at times, detected by Microsoft under the phishing category. Check Point also detects phishing emails. Check Point Harmony Email & Collaboration is a tool that does not pass emails through the user's inbox, even if it feels like an email is not spam or involves phishing. Suppose a tool like Microsoft Defender detects any phishing activity. In such scenarios, emails are quarantined by Microsoft, and then Check Point Harmony Email & Collaboration cannot pass such emails to the user. I feel it is an area that can be improved. There are good options with Check Point Harmony Email & Collaboration, as one can still quarantine suspicious emails, and the users can see those in just a few clicks. The false positives are an area where the tool can introduce certain improvements they can improve by releasing emails to a user's inbox if it feels that there are certain areas consisting of false positives.
In the future, it would be great if it is possible to use the tool with Microsoft to help in the area revolving around false positives. Check Point should be able to release emails to the inbox even if there are some phishing emails. If Check Point finds something to be described as a clean email, it should have the option to automatically release it to the user. At the moment, we don't have that option. They have an option for spam emails but not for the emails associated with phishing.
I have four months of experience with Check Point Harmony Email & Collaboration. I am unsure about the tool's version, but I know it is a cloud platform. The technical people handling Check Point Harmony Email & Collaboration take care of the upgrades.
Stability-wise, I rate the solution a nine out of ten.
Around 500 people use the tool in my company. Two administrators are needed for the tool.
The product's usage would have to be increased if the organization grows.
The technical support for the solution is good because, so far, I have seen that they are very fast. I raised only a couple of tickets in the last four months, so it is not much, but I have seen that the support team is good. The product is very simple to manage and is not very complicated. It is a very straightforward tool. I rate the technical support a nine out of ten.
Positive
I know that my company was using a custom Linux-based system. I am not sure if it was managed by different administrators in our office. As it was a legacy system, my company wanted to go for a professional one that is more of a cloud-based solution.
The product's initial setup phase is very simple and automated. Everything can be made ready within a few clicks.
As we are a non-profit organization, we got the tool with a good offer. On a yearly basis, we pay 10,000 Euro for 500 users, which also includes the technical support part.
Our organization was comparing Check Point Harmony Email & Collaboration with Proofpoint, which is an expensive tool, making it not so cost-effective for non-profit organizations like ours, where we have our budget limitations.
My company had Mimecast and Proofpoint as optional products when we evaluated the tools in the market, but we didn't go with the proof of concept model for both. Proofpoint was expensive when compared to Check Point Harmony Email & Collaboration. Check Point Harmony Email & Collaboration was a little bit better compared to Mimecast.
Check Point Harmony Email & Collaboration is good, especially if you use Microsoft 365. The tool works well with Microsoft 365, which is why I feel it is a good product, as it offers compatibility. I can recommend Check Point Harmony Email & Collaboration if you are a Microsoft 365 customer.
My company has never tried to see if Check Point Harmony Email & Collaboration is compatible with other products. In our organization, we just write this Check Point Harmony Email & Collaboration, which is our first product as an email security platform. We were satisfied with Check Point Harmony Email & Collaboration.
I would recommend the product to others. If people don't use Microsoft 365, then Check Point Harmony Email & Collaboration won't be a compatible tool in their environment. Exchange Online users can use Check Point Harmony Email & Collaboration.
I rate the tool a nine out of ten.
We use Harmony Email & Collaboration to prevent malicious emails from reaching inboxes, guarding against the attacks of threat actors.
We have also enabled a data leakage policy based on our client's needs, with hundreds of predefined and custom data types.
Below are the security elements of Harmony Email & Office which we use in our client environment.
The below features have improved our client experience:
It protects cloud email and collaboration suites from cyber-attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365, G-Suite, Teams, and Slack.
The main features are as follows
Harmony Email & Collaboration secures major file-sharing services such as Google Drive, ShareFile, OneDrive, Sharepoint, Box, and Dropbox from malware, ransomware, and east-west attacks. It also prevents accidental or malicious data loss. 
Mainly, we are using Harmony Email & Collaboration to detect sensitive data sharing via email and other collaboration apps, and immediately limit data exposure. It enables the enforcement of a data leakage policy in our client environment, with predefined and custom data types.
I have been using this for more than a year.
It is 100% percent stable and secure.
I have a really good impression of the scalability as it protects more of the Office 365 suite than just email. I appreciate that system logs capture when someone views the body of an email. It is reasonably priced for the coverage it provides.
Customer support and vendor engagement is really good in comparison to other vendors.
Positive
We have multiple clients. We use Check Point Harmony Email & Collaboration for one of our clients.
It is a much simpler product to set up and support compared to other vendors we have reviewed. It does a much better job of blocking phishing with little to no customization. This product just works out of the box without needing any specific fancy rules.
We have our Professional Services who do implementation-related pieces for our clients. It's really good in comparison to other vendors.
It is very easy to implement and it can see actions taken by Harmony and Microsoft 365 in a single console. It is cost-effective and works well for many of the budget constraint enterprises.
It has an extremely high success rate of keeping junk/spam/phishing emails out while allowing the right emails through. The setup is extremely easy. Vendor Engagement and webinars are always happening- Check Point has monthly new feature meetings, so overall I am having a great experience.
The customer has a presence in different countries like India, Poland, and the US. They use Office 365 as an email solution, and on top of that, they use Harmony Email & Collaboration.
All API email security or gateway security solutions work the same as API based. You create an API with the vendor, and it works for all the same. It's just the approach of threat intelligence, how it is taken and how much threat intelligence you have.
Pushing was a big challenge for email security. Cisco has done that, but now Check Point is also doing the same with the quarantine email. So, it's good. Previously, they didn't have the ability to find and detect the quarantine email, but they are doing it now.
The most valuable feature is the sandboxing feature. It provides a sandboxing environment where you can open links and see where they lead. You can see what is presented in the link after opening it.
Other advantages, like workflow integration, are quite simple and offered by other vendors as well. Cisco is also integrating virus totals into their products.
But the key advantage here is the visibility you get with the sandboxing feature.
You can see on a map, on the same dashboard, where the mail originated, where it is going, and from which relay servers. You can see everything visually on the portal, including who it's reaching and who is CCed or BCCed.
Every vendor has a different approach. But as far as I have seen with Check Point, it is quite easy and simple to manage. They have the DLP solution integrated with this email. For example, for email, DLP is zero.
Maybe Check Point can work on the DLP part. Proofpoint's email DLP is very good, so they can work on that more.
I have been using it for six months.
Stability is not too bad. It's not glitchy.
Scalability is good. You can add users at any time. You can have hundreds of users in there. No issues or restrictions here.
The customer service and support are okay.
Positive
Compared to other solutions, users have the advantage of cost because Check Point is very easy to handle. You can easily train anyone on Check Point. It's not complex.
It's quite simple. Straightforward provisioning is required. You have to do it with a vendor, like Office 365 or G Suite, and you are good to go. Just onboard the users, and that's it.
You can deploy it in a day. For the refinement of the tool, it takes a little bit of time because all email security works by first keeping it on monitor mode and monitoring what you are getting as spam. You do an audit. It takes time with this. But for the configuration part, you can do it in a single day.
For deployment, one person is enough. For maintenance, you need two or three people to check spam. Sometimes, emails get blocked, and users request them to be unblocked. You have to verify those things. But for deployment, one person is enough.
It's a SaaS portal, so you don't have any maintenance issues because it's all done by the backend OEMs.
There is an ROI. In the long run, you will have saved money because it's a cloud-based portal with no maintenance issues.
Compared to other vendors, the pricing is average. I guess FortiMail is a little cheaper.
Overall, I would rate the solution a nine out of ten. I would recommend using it because it is easy to use and manage.
We use the product to address core, perimeter, and administrative security requirements for firewalls within our environment. Additionally, we cater to email security requirements for clients using both Google Workspace and Microsoft 365 platforms.
The product's most valuable features for email security are its ability to safeguard domain names, detect duplicate email users, and identify spam emails impersonating legitimate email IDs, thereby enhancing overall security. It also has a robust filtering system.
It's very easy to use, and the onboarding process is straightforward. We can easily categorize users, create groups, and apply policies accordingly, simplifying policy management for different user groups within an organization.
In India, pricing is a concern, especially for SMEs. Check Point needs to address the pricing segment for SMEs. Apart from that, the technology and other aspects like sales and marketing are satisfactory.
Most OEMs provide similar capabilities. If any OEM introduces new features, Check Point must match those capabilities. It could improve by offering an on-premise solution for customers still using Microsoft Exchange, which currently provides only cloud-based services.
I have been using Check Point Harmony Email & Collaboration for about a year. We directly sell the latest version to customers, including SMEs, enterprises, and SMBs.
The product is stable. We have yet to encounter technical or deployment issues. My team is comfortable working with the solution due to its reliability and the prompt assistance that Check Point's support team provides. I rate the stability an eight out of ten.
We have 35,000 Check Point Harmony Email & Collaboration users, covering all three segments: small, medium, and enterprise.
It is a scalable product and meets the evolving business needs. Their communication and understanding of customer requirements make deploying and scaling the solution easy. I rate the scalability a seven out of ten.
We have yet to encounter many technical issues, but Check Point's support team has been responsive and helpful whenever required.
Positive
We completed ten deployments, including the installation and setup, in one week. Overall, it takes around seven days to complete. It involves collecting information from the customer about the number of users and the email services they use. The onboarding process is easy and takes one to two hours, followed by policy creation based on customer requirements.
I rate the process a nine out of ten.
The product is expensive compared to some competitors, especially for the SME segment in India. On average, it's around 10,00,000 to 15,00,000 lakh rupees for 200 users per year. Additional costs depend on the customer and their requirements.
I rate the pricing a six out of ten.
I suggest conducting a proof of concept (POC) before purchasing the product. Customers will likely find it reliable and effective after analyzing it for 10 to 15 days.
I rate it a seven out of ten.
I use Check Point Harmony as a security using one solution for both mobile and app development. If we use email security like Office 365, Microsoft Office 365, or G-Suite, we can protect all incoming emails from Microsoft Exchange and stop spam mail with all kinds of security check policies with Check Point Harmony.
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session.
As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks.
For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities.
Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors.
Moreover, Check Point Harmony Email incorporates AI technology within its security features.
Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
The sandbox solution is provided by Check Point. It offers complete detection and simple management and is a user-friendly solution. It has zero impact on user experience and privacy.
It helps detect malware, phishing attacks, and malicious calls and emails. It prevents man-in-the-middle attacks and protects corporate assets and resources. Harmony Mobile also blocks network access attempts to corporate resources, protecting our assets.
There is one feature that is robust: it detects OS vulnerabilities.
Check Point could improve its marketing strategy. They need to better reach customers and partners, providing more demonstrations and proof-of-concepts (POCs) to raise awareness and drive business growth.
I have been using it for ten years.
It's very stable. Check Point Harmony is a stable and consistent solution.
I would rate the scalability a nine out of ten. There are around a thousand end users.
If we increase emails, we can increase the number of users in the system.
We get good support from Check Point. Whenever we implement anything and require technical assistance, we receive good support.
Positive
The setup can be completed within minutes. There's no need to install any agent or software on your system. It's configured behind your existing email solution, like Microsoft Exchange.
Your emails will first go through Microsoft Exchange, then through the Check Point agent, and finally, the clean emails will be delivered to the endpoint.
The cost is similar to other competitors. It's not much higher.
It's around INR 2,000 to INR 4,000 per mailbox.
There are no additional costs.
I would recommend Check Point Harmony solutions to customers. It's easy to deploy, and it's in a good position in the MITRE framework as well as a Gartner leader.
Overall, I would rate the solution a ten out of ten.
I use the solution in my company to secure the users' environment so that there are no phishing attacks. The tool operates as an anti-spam solution for the users in our company. Each and every email passes through the email security scanning process. Emails with issues get quarantined by the solution.
The most valuable features of the solution include all of the functionalities offered by the tool, which work fine. I cannot say that a particular feature does not work fine. Each and every feature provided by the product works fine.
At the time of the purchase of the product for the users in my company, I am unable to see or get details of the users for whom the product has been purchased. I need to go to Check Point's admin portal if I want to see the license list and the details of the users of the tool, making it an area of concern where some ease of process should be provided from an improvement perspective.
I have been using Check Point Harmony Email & Collaboration for two years.
There are day-to-day updates in the solution. The product gets updated automatically since it is a SaaS-based tool. My company does not have to invest time to upgrade any applications in the product. In general, it is a hassle-free process to work with the product.
My company has around 50 users of the product.
My company plans to increase the number of uses of the product in the upcoming two or three months.
The need to seek technical support depends upon the severity of the issues that we face in our company with the product. Depending on the severity of the issue, my company connects with the support team in three to four hours. During high-severity cases when our entire organization goes down due to some issue in the product, my company connects directly with the support team.
People already use the product as a SaaS-based tool, but it can be complex if used at an in-house level only. As a SaaS-based tool, the product is easy to use without complexities.
The solution is deployed on the cloud.
The solution can be deployed in twenty minutes to half an hour. 
I work in a hospital where we purchased the tool for security purposes. Being a hospital, we did not purchase the product with an ROI angle in mind.
I don't even have details of the product's single license purchased by my company.
The product is useful as it works fine to secure our company's email communication. My company has not faced any issues since the time we purchased the solution.
The product has improved our organization's functioning as a secure collaboration tool, considering that different products are made available in the market on a day-to-day basis. As a tool for email security, the solution serves as one of the best products in the market.
The product offers good and easy integration capabilities with other products. When it comes to integration, the product will ask about the credentials of the global applications to the tool's admin, after which it will automatically scan the licenses of the integrated products.
The reports and analytics part of the product is fine for my company since it allows us to check the analytical reports on a weekly basis at a user level. The product provides different kinds of reports like anti-spam reports that we can check in our company.
I recommended the product to those who plan to use it for email security purposes, as it offers a seamless and user-friendly experience to its users. There is no complexity involved in integrations with other products for better email security.
The need for cybersecurity will increase in different ways on a daily basis. The product does not provide alerts. The product fails to provide alerts if some issue occurs at a global level. From an improvement perspective, the product should provide alerts related to email security to its users.
I rate the tool a nine out of ten.