Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Harmony Email & Collaboration

Check Point Software Technologies

Reviews from AWS customer

5 AWS reviews

External reviews

574 reviews
from and

External reviews are not included in the AWS star rating for the product.


5-star reviews ( Show all reviews )

    EmilioPalma

Email protection has reduced phishing attacks and now supports reliable cloud-based management

  • March 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

I deal with firewalls, firewall switches, and FortiCloud. Regarding the web application firewall, FortiAppSec Cloud, I have worked on some projects for customers who have switches and firewalls and want to obtain the solution for the management console in the cloud.

I work with Check Point Harmony Email & Collaboration, Harmony Endpoint, and other products from Check Point and firewalls. I have been working with Check Point Harmony Email & Collaboration for about five years.

What is most valuable?

I find the certification for Check Point products most valuable,. Some engineers on my team have obtained Certified Security Administrator (CCSA) and certification.

The automated incident response feature by Check Point CloudGuard is a good product. I assess the effectiveness of AI-powered threat intelligence in blocking email threats as a really good addition for new product services because AI is something that most companies and technologies are now working with.

The way robust inspection technologies have helped safeguard shared files in my collaborative environment depends on the opportunity that the company has with the customer.

I have noticed a significant impact on phishing attack mitigation with Check Point CloudGuard. For us, I prefer Check Point before Palo Alto and before other brands because Check Point is most effective in attack mitigation and attack detection.

What needs improvement?

Check Point Harmony Email & Collaboration is currently working well, as it is able to detect risks before they occur, unlike Microsoft. We have been able to demonstrate to customers that Check Point can detect a risk that Microsoft overlooked.

I do not know what additional features I would like to see in the future to make the product even better because this is a good product.

For how long have I used the solution?

I have been working with Check Point Harmony Email & Collaboration for about five years.

What do I think about the stability of the solution?

I agree with the way that Check Point is working. I do not have ideas on how to improve it because this is the tool that makes the work and the job correctly.

What do I think about the scalability of the solution?

Deployment is easy for the product.

How are customer service and support?

I rate the technical support by Check Point as one out of ten because I did not use Check Point support as we had no problems when we deployed the solution. Once the solution was already in production, it worked properly and never failed. To be honest, I have never worked with Check Point support.

Which solution did I use previously and why did I switch?

We have worked with other brands such as Fortinet, Cisco, and Palo Alto Networks, as we are a partner company for several brands and specialize in networking and cybersecurity solutions. More than just selling products, we are consultants, so we recommend the brand that best suits our clients' needs. It's possible that someone visited our website looking for information about a specific product.

How was the initial setup?

The integration with third-party solutions is straightforward. It is a product that can integrate with another product as well.

What about the implementation team?

No, we haven't used other resellers or integrators, because we are a Checkpoint partner and integrator.

What was our ROI?

In our region here in Peru, Check Point Harmony Email & Collaboration is not as popular as there are some alternatives which are better known.

What's my experience with pricing, setup cost, and licensing?

I am not the person to say what cost Check Point has for their products. However, for partners like us, if we could get some discount or protect our project in front of another competition, that would be great.

Which other solutions did I evaluate?

I represent other brands including Check Point and Palo Alto. Several brands are represented by our company because we are more than just the sales boxes of products—we are a consulting company as well. Depending on the customer necessity, we can find a solution for that customer based on what they want, what they need, and the cost that they are able to spend.

For a small company, I do not think Check Point Harmony Email & Collaboration is the best fit because small companies are always looking for a cheaper product. However, for medium and larger companies, it is better.


    PRADIPJOSHI

Email protection has stopped phishing and secured cloud collaboration across all devices

  • March 23, 2026
  • Review provided by PeerSpot

What is our primary use case?

We are working with Check Point Harmony Email & Collaboration not only for Harmony, but also for their SaaS solution, their CloudGuard solution, their next generation firewall solution, and their SD-WAN solution.

We started working with Check Point Harmony Email & Collaboration, which is a very good solution for Microsoft Office 365 and Google Workspace users. For their office business productivity suite, which includes products and solutions such as email, OneDrive, SharePoint, Slack, and Teams, this solution gives 100% protection. As far as Google Workspace is concerned, it gives protection for Google email, Gmail, and Google Drive. Additionally, it provides protection for other services such as Box and Dropbox.

What is most valuable?

Deployment is very easy since it is API based and does not require any harsh configuration. The DMARC management and DMARC forensic is the best feature. Their security engine provides everything such as DLP and encryption. Check Point Harmony Email & Collaboration provides almost 100% security for phishing emails. Their DMARC management is very standard compared with any other brand or any other email security provider.

The best thing is that on a single tenant I can manage multiple services such as Harmony Endpoint, Check Point Harmony Email & Collaboration, Harmony Browser, mobile security, EDR, XDR, which is endpoint security, and SaaS. All of these services have a single dashboard. When giving security to email, in Check Point Harmony Email & Collaboration, I do not need to change any MX record or any DNS entry changes. I simply add one text record for DMARC and no changes are needed in the MX record of that particular domain. This is very easy because Check Point Harmony Email & Collaboration is in the tenant of Microsoft Office 365 and Google Workspace only.

Check Point works on zero trust network technology. They are not only giving a feature of artificial intelligence but also machine learning summary. Machine learning summary is also given when they catch any kind of incidents such as phishing attacks, malware attacks, and ransomware attacks. They always provide real-time alerts for that.

Real-time URL analysis is provided for phishing links and all these things. It gives 100% output for that and shows the source from where the malicious URL comes from. Additionally, they always provide threat emulation. This means the simulation of what danger happens when I click that particular URL is also provided in their report.

It gives 100% protection to all BYOD devices. For example, one single Microsoft 365 account can be configured on different five devices. Many companies give email access to their employees on their mobile as well. In that case, if any malicious file is on the mobile and the employee would like to save it on OneDrive, due to this security, the user and administrator will get a real-time alert that this file is malicious and cannot be uploaded to OneDrive. This not only saves money but also saves time and prevents the organization from such cyber attacks.

What needs improvement?

Check Point must develop one mobile app for iPhone users, Android phone users, and Windows phone users or at least for the administrator to see that dashboard on that particular app. This would be very helpful for administrators. Currently, every time we need to log in through a computer, we have to go through multi-factor authentication and all these things, which is time-consuming to log in to that portal. If they give such kind of facility, then it will be very helpful for an administrator to manage and maintain the things in a proper way.

For how long have I used the solution?

We have been using this solution for the last three to four years.

How are customer service and support?

Their support is very great. In cloud services, there is no RMA involved, which means no physical device is involved. The service is very up to date.

Which solution did I use previously and why did I switch?

Cisco IronPort technology is available. However, Cisco, Barracuda, and many other solutions are available in the market. The problem is that the customer has to migrate their MX record for a particular domain. The basic thing is that in their technology, you cannot scan internal mail. For example, if two people are part of one enterprise and are using Check Point Harmony Email & Collaboration, the communication between them on the same domain is also scanned. However, when considering competitors such as Cisco, Barracuda, Sophos, and other players in the market such as OPSWAT, there is always a threat that internal mail is not scanned because email is hosted on a Microsoft server and the MX record is hosted on a third-party server. That is the problem. Check Point Harmony Email & Collaboration scans internal as well as external mail, which is why it is the better choice.

How was the initial setup?

Setup is very simple since it is API based. I do not require anything. I just have to enter the credential of Microsoft tenant ID and password or Google super admin username and password and the process is very simple due to artificial intelligence and machine learning technology. It will implement automatically. If I have some knowledge, I can implement the policies and have custom policies as well. In DLP, they have given already many pre-configured policies for data loss prevention. Apart from that, if I would like to have my own policy, they also give that facility where I can put my own policy.

What other advice do I have?

The best thing is that on a single tenant I can manage multiple services such as Harmony Endpoint, Check Point Harmony Email & Collaboration, Harmony Browser, mobile security, EDR, XDR, which is endpoint security, and SaaS. All of these services have a single dashboard.


Check Point offers three features in their solution. The basic package, advanced package, and complete package are available. The complete package comes with encryption and DLP, which is Data Loss Prevention. The price difference between the advanced package and complete package is almost double. They have already given choices regarding which package customers can sustain and according to that they can be provided. As for the price, Check Point always has flexible pricing. They never charge more and can work within any given budget. I give Check Point 10 out of 10 for pricing. My overall review rating for this solution is 10 out of 10.


    Dor A.

Excellent Email Security with Powerful Post-Delivery URL Protection

  • February 19, 2026
  • Review provided by G2

What do you like best about the product?
excellent email security features. fully replaces the need for an external MX relay. provides API capability to extract harmful emails from mailbox post delivery, due to continuous examination of URLs
What do you dislike about the product?
nothing functionally. i would rather filters would not reset upon returning to search screen.
What problems is the product solving and how is that benefiting you?
fully replaced our MX relay, very simple administration and configuration is just a few clicks. provides policy flexibility, DLP capabilities and Shadow IT insights


    MANSI M.

Effortless Email Security with an Intuitive Dashboard

  • December 21, 2025
  • Review provided by G2

What do you like best about the product?
Check Point Harmony Email & Collaboration helps reduce the time and effort spent managing email security. It automatically filters out spam and malicious emails, allowing users to focus on their work without constant interruptions or manual intervention. The dashboard is clear and well organized, making it simple to monitor threats, review alerts, and take quick action when needed.
What do you dislike about the product?
What I like less is the limited flexibility in certain customization areas. In some cases, it would be helpful to have more granular control over policies and rules.
What problems is the product solving and how is that benefiting you?
Check Point Harmony Email & Collaboration solves the problem of phishing, malware, and malicious email threats. From my experience, it prevents harmful emails from reaching users, which greatly reduces security risks and protects sensitive information.


    Shakila Bee S.

Enhanced Security and Compliance with Checkpoint HEC

  • December 08, 2025
  • Review provided by G2

What do you like best about the product?
Checkpoint HEC is the API Inline protection, Improves security by reducing data leaks. helps with compliance. provides visibility into all SAAS applications employees
What do you dislike about the product?
Drawback is no full fledged Email DLP ( Data Classification)
What problems is the product solving and how is that benefiting you?
Its preventing from the BEC attack , account takeover and phishing attacks there three major engines are working
Threat protection
DLP engine
Click time protection

this three engine will protect our email from all kind of attack's


    Denis Dávila

Provides automated email threat detection and allows us to train departments based on real attack patterns

  • November 24, 2025
  • Review provided by PeerSpot

What is our primary use case?

Check Point Harmony Email & Collaboration serves as my main protection platform for Office 365 SaaS platforms, including email, OneDrive, SharePoint, and I utilize some training features. In my daily work, Check Point Harmony Email & Collaboration has become our number one protection platform; it reviews all information that passes through our Office 365 and makes the final decision on whether something poses a risk to the organization. Every day, we review each of the alerts regarding user interactions at the spam, phishing, malware levels and analyze the threat behavior our organization is receiving, including which departments face the most attacks, what is the number one target, and what types of attacks we receive daily, such as phishing, graymail, spam, malware, etc.

What is most valuable?

The process of reviewing alerts in Check Point Harmony Email & Collaboration is automatic; the tool executes the entire process we have configured, checking and taking actions to block anything suspicious automatically, without any action from us. Essentially, we connect to check if the actions taken are correct and whether there are any false positives; otherwise, the tool operates 100% automatically based on the parameters we have configured in each rule.

When Check Point Harmony Email & Collaboration detects something suspicious, it runs a certain number of intelligence engines that analyze the data source, the domain's reputation, and the current interaction of that domain with our platform. If it is the first time an email arrives from that domain, it alerts the user; if the email contains content that could be malicious, the user is also alerted, and a score is assigned to the email. If the score exceeds the thresholds we have set, it is classified as a low, medium, or high threat, resulting in automatic blocking and alerting the user about the action taken, allowing the user to interact with the platform and report false positives if they believe the email is valid.

Additionally, I utilize Check Point Harmony Email & Collaboration as a training tool; its new Security Training module allows us to conduct department-specific training on phishing, controlled tests, and provides a score for our organization, along with further training to raise awareness within the security department. Other very specific use cases involve user engagement, as we strive to provide as many actionable reports to users as possible to help them be aware of the risks they face daily and how these risks could affect the organization as a whole.

In my opinion, the best feature of Check Point Harmony Email & Collaboration is its ease of integration with platforms like Office and Google Cloud, allowing for automatic integration that results in a robust platform that makes decisions based on your organization with just a couple of steps. The most used features include email tracking, which allows us to easily follow up on emails and conversations, helping us understand what is happening within the organization when an alert is detected, providing more context rather than simply blocking an email due to detecting something malicious. Its intelligence engines also review how interactions occur within the platform, and the integration with inspection engines and our infrastructure knowledge at the email level makes it one of its best features.

Those integrations definitely help me save time and improve security, as we no longer need to manually review each alert and are less concerned about false positive reviews. The tool operates automatically, making our workload easier, while also significantly enhancing our overall security.

Since acquiring Check Point Harmony Email & Collaboration, we have seen an increase in the blocking of Business Email Compromise, phishing, and spam emails, drastically reducing our exposure to email security risks. We have noticed a reduction in accepted phishing attempts since we started using Check Point Harmony Email & Collaboration compared to the protection of Microsoft 365. We have graphs showing that Microsoft 365 detects approximately 65% of threats, while Check Point processes the rest of that 65%, thus providing better protection than traditional solutions.

What needs improvement?

To improve Check Point Harmony Email & Collaboration, one notable enhancement would be to fully integrate the DMARC and SPF protections they have; once this is correctly implemented, I believe it will further improve internal email protection outcomes.

We have only encountered some false positives that required us to whitelist certain third-party domains, mostly due to their poor email configuration preventing DMARC or SPF alerts. Frankly, the platform performs very well, and we have not experienced any other issues since we began using it.

Currently, I believe that no further improvements are needed for Check Point Harmony Email & Collaboration.

For how long have I used the solution?

I have used Check Point Harmony Email & Collaboration for seven or eight years.

What do I think about the stability of the solution?

The platform is very stable; we have not encountered any downtime or stability-related issues, so I would say we have had 100% uptime.

What do I think about the scalability of the solution?

The scalability of Check Point Harmony Email & Collaboration is very straightforward; we experience an annual growth rate of about 10 to 15%, and scaling up is simple, as we only increase licensing, and the rest happens automatically. User synchronization and administration detect user license activation, and protection begins from day one.

How are customer service and support?

I have not needed to open any support cases with Check Point Harmony Email & Collaboration, which indicates that my experience with support has been very good.

Which solution did I use previously and why did I switch?

Before using Check Point Harmony Email & Collaboration, we were utilizing Microsoft 365 with Defender for email protection.

We switched from Microsoft Defender to Check Point Harmony Email & Collaboration because we had an event where Defender failed to detect a threat, allowing phishing and spam emails to reach our directors. We chose Check Point Harmony Email & Collaboration because we felt it has better security engines and a more detailed administration of internal security and event management. It also provides graphs and statistics to illuminate how these events occur within the organization, allowing us to identify which departments require closer monitoring or which ones are the main targets for threats, such as directors, purchasing, and HR. We evaluated various tools before choosing Check Point Harmony Email & Collaboration, including Proofpoint, but ultimately, we decided to go with Check Point.

How was the initial setup?

I would advise others considering using Check Point Harmony Email & Collaboration to conduct a proof of concept directly with Check Point to set up the initial configuration and see the platform working at full capacity before making a decision, and that they can compare the detection parameters provided by Check Point with any other email tools they are evaluating.

What about the implementation team?

We are customers and do not have any relationship with the vendor or partner.

What was our ROI?

We have seen a return on investment with Check Point Harmony Email & Collaboration; specifically, we have drastically reduced the time it takes to detect and stop a threat, which has been cut by over 2 hours from detection to the automatic blocking of the threat.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup costs, and licensing for Check Point Harmony Email & Collaboration is quite good; the pricing is based on the number of users. There are three types of licenses that range from basic to advanced, with a Complete version offering DLP characteristics, but if you do not plan to create detection or data protection policies, I believe that the Advanced license is sufficient. It is a very straightforward licensing approach, done per user and for periods of 1 to 5 years.

What other advice do I have?

I have given this review a rating of 10.


    Ruben C.

Comprehensive Protection Across All Channels

  • November 23, 2025
  • Review provided by G2

What do you like best about the product?
Phishing attempts and malicious links are blocked before they reach users, and the solution also monitors platforms like Teams, SharePoint, and OneDrive, which used to be blind spots for us. The biggest advantage is knowing that both communication and file-sharing channels are constantly protected with a single solution.
What do you dislike about the product?
Initial policy configuration can be complex and requires adjustments to avoid blocking legitimate messages.
What problems is the product solving and how is that benefiting you?
Previously, we had weaknesses in security on platforms like Teams, SharePoint, and OneDrive, leaving us vulnerable to targeted attacks.
Now, suspicious emails, links, and files are automatically blocked before they reach users, reducing the risk of data breaches and credential theft.


    M Z.

Effortless Email Protection with Seamless Threat Blocking

  • November 15, 2025
  • Review provided by G2

What do you like best about the product?
I like it because it protects our team across all email tools. It silently blocks phishing and account takeover attempts in the background, so users can continue working normally while the support department has full visibility and the assurance that threats are stopped before they cause problems.
What do you dislike about the product?
The reports and dashboards could be more intuitive and customizable; sometimes extra effort is required to obtain the exact information.
What problems is the product solving and how is that benefiting you?
The advantage is that our security team spends less time managing multiple systems and more time on proactive tasks, while employees can collaborate knowing that sensitive data and accounts are protected across all the tools they use daily.


    Roy Lopez

Supports phishing prevention across collaboration tools

  • November 15, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Check Point Harmony Email & Collaboration is because I use Microsoft 365 and need to integrate with a great tool for security in order to protect email and other collaboration tools, such as Teams, SharePoint, and OneDrive, from phishing, malware, and other account takeover attacks.

What is most valuable?

In the past, when a user copied a file into SharePoint that had malware and shared this file with other users, Check Point Harmony Email & Collaboration protects against this problem.

In our organization, we rely heavily on Microsoft Teams and SharePoint for cross-department projects, and Check Point Harmony Email & Collaboration protects internal file sharing and collaboration across multiple departments by automatically scanning shared files and links before they are accessed by colleagues, preventing malware from spreading internally if someone unknowingly uploads a compromised document.

The best feature that Check Point Harmony Email & Collaboration offers for me is the zero-day threat prevention because it uses sandboxing, and I am driving analysis to catch unknown threats that traditional email and email security means miss.

Check Point Harmony Email & Collaboration has been a game changer for our team because sandboxing and zero-day prevention have helped us, and one specific example is a targeted phishing campaign where attackers tried to deliver malicious Excel files with embedded macros; traditionally, those types of files might slip past basic email filters, but Check Point Harmony Email & Collaboration sandboxing detonated the file in a virtual environment, detected the malicious behavior, and blocked it before it reached the user's inbox.

Check Point Harmony Email & Collaboration has had a very positive impact on our organization across security, workflows, and user experience, for example, workflow improvements, as employees spend less time second-guessing suspicious emails because Check Point Harmony Email & Collaboration automatically blocks phishing attempts and malicious attachments.

I notice time saved because the technical support team has more time for other activities in the organization with Check Point Harmony Email & Collaboration active.

What needs improvement?

The documentation is a little unintuitive, and I make an additional effort for the first deployment.

For how long have I used the solution?

I have been using Check Point Harmony Email & Collaboration for around four or five years.

What do I think about the stability of the solution?

Check Point Harmony Email & Collaboration is very stable.

What do I think about the scalability of the solution?

Check Point Harmony Email & Collaboration is very scalable, especially when I use different tools in the Infinity Portal.

How are customer service and support?

I find customer support for Check Point Harmony Email & Collaboration to be very great.

I would rate customer support for Check Point Harmony Email & Collaboration as a nine.

How was the initial setup?

Integrating Check Point Harmony Email & Collaboration with our existing systems and tools is easy because of native cloud integration; for example, Check Point Harmony Email & Collaboration connects directly with Microsoft 365, so we didn't need to install additional gateways or agents, which made the initial deployment much easier.

What was our ROI?

I have seen a return on investment in the support department, particularly regarding the time saved.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Check Point Harmony Email & Collaboration is great because the pricing is normal compared with other tools in the market.

What other advice do I have?

Check Point Harmony Email & Collaboration is a great opportunity for saving your emails and your collaboration tools with the best tool for security. I rate this solution a nine.


    Carol Berrocal

Real-Time Phishing Defense Strengthens Cloud Email Response

  • November 05, 2025
  • Review provided by PeerSpot

What is our primary use case?

Check Point Harmony Email & Collaboration protects our cloud-based email and cloud collaboration platforms, primarily Microsoft 365, from phishing, malware, and account takeover attempts.

I use Check Point Harmony Email & Collaboration to protect against phishing or account takeover attempts by having a user receive an email that appeared to be a Microsoft 365 login alert with a convincing subject line and branding. However, Harmony flagged it immediately due to a suspicious sender domain and a malicious link embedded in the message.

What is most valuable?

One aspect that stands out in my day-to-day use of Check Point Harmony Email & Collaboration is how seamlessly it integrates into our existing workflows without disrupting users.

The best feature of Check Point Harmony Email & Collaboration is advanced threat prevention because Click-Time Prevention rewrites URLs and scans them when clicked, blocking access to malicious sites even if the email appears legitimate.

URL scanning and Click-Time Protection in Check Point Harmony Email & Collaboration have been critical in our environment, especially as phishing attacks become more sophisticated.

Check Point Harmony Email & Collaboration integrates smoothly with Microsoft 365 via API, so there is no need for agents or complex setup.

Check Point Harmony Email & Collaboration has positively impacted my organization, resulting in faster incident response with real-time alerts and detailed threat insights, enabling our team to act quickly when something suspicious is flagged.

After deploying Check Point Harmony Email & Collaboration, my organization reported a significant reduction in phishing incidents and faster response times to email-based threats.

What needs improvement?

Check Point Harmony Email & Collaboration could be improved by making the experience easier.

While the dashboard of Check Point Harmony Email & Collaboration is powerful, a cleaner layout or customizable views would help users focus on the most relevant alerts and metrics without digging through layers.

What do I think about the stability of the solution?

Check Point Harmony Email & Collaboration is very stable for our organization and is a great tool.

What do I think about the scalability of the solution?

Check Point Harmony Email & Collaboration is a tool with scalability and other great features.

How are customer service and support?

I have not interacted with customer support for Check Point Harmony Email & Collaboration, but I know that in other tools, Check Point customer support is great and very collaborative about any issues or problems.

What was our ROI?

Check Point Harmony Email & Collaboration saves time, saves money, and provides more security.

There are significant savings with Check Point Harmony Email & Collaboration in terms of money saved and time saved.

What other advice do I have?

Check Point Harmony Email & Collaboration is deployed in my organization in the public cloud.

Check Point Harmony Email & Collaboration is a very complete tool for the next generation of our security. I rate this product an eight out of ten.