The process of reviewing alerts in Check Point Harmony Email & Collaboration is automatic; the tool executes the entire process we have configured, checking and taking actions to block anything suspicious automatically, without any action from us. Essentially, we connect to check if the actions taken are correct and whether there are any false positives; otherwise, the tool operates 100% automatically based on the parameters we have configured in each rule.
When Check Point Harmony Email & Collaboration detects something suspicious, it runs a certain number of intelligence engines that analyze the data source, the domain's reputation, and the current interaction of that domain with our platform. If it is the first time an email arrives from that domain, it alerts the user; if the email contains content that could be malicious, the user is also alerted, and a score is assigned to the email. If the score exceeds the thresholds we have set, it is classified as a low, medium, or high threat, resulting in automatic blocking and alerting the user about the action taken, allowing the user to interact with the platform and report false positives if they believe the email is valid.
Additionally, I utilize Check Point Harmony Email & Collaboration as a training tool; its new Security Training module allows us to conduct department-specific training on phishing, controlled tests, and provides a score for our organization, along with further training to raise awareness within the security department. Other very specific use cases involve user engagement, as we strive to provide as many actionable reports to users as possible to help them be aware of the risks they face daily and how these risks could affect the organization as a whole.
In my opinion, the best feature of Check Point Harmony Email & Collaboration is its ease of integration with platforms like Office and Google Cloud, allowing for automatic integration that results in a robust platform that makes decisions based on your organization with just a couple of steps. The most used features include email tracking, which allows us to easily follow up on emails and conversations, helping us understand what is happening within the organization when an alert is detected, providing more context rather than simply blocking an email due to detecting something malicious. Its intelligence engines also review how interactions occur within the platform, and the integration with inspection engines and our infrastructure knowledge at the email level makes it one of its best features.
Those integrations definitely help me save time and improve security, as we no longer need to manually review each alert and are less concerned about false positive reviews. The tool operates automatically, making our workload easier, while also significantly enhancing our overall security.
Since acquiring Check Point Harmony Email & Collaboration, we have seen an increase in the blocking of Business Email Compromise, phishing, and spam emails, drastically reducing our exposure to email security risks. We have noticed a reduction in accepted phishing attempts since we started using Check Point Harmony Email & Collaboration compared to the protection of Microsoft 365. We have graphs showing that Microsoft 365 detects approximately 65% of threats, while Check Point processes the rest of that 65%, thus providing better protection than traditional solutions.