The most easy to use email protection solution
What do you like best about the product?
Harmony Email and collaboration proved out to be a very helpful solution overall for my organisation and it has very easy to use dashboard.
What do you dislike about the product?
Delayed support from the company
Would like to see more integrations supported soon
What problems is the product solving and how is that benefiting you?
Protecting myself online with the growing phishing trend nowadays is really a challenge and Harmony Email solution helped me achieve that.
Dependable Email security solution for your organization
What do you like best about the product?
The deployment of this product is very easy and required minimal efforts.
The spam protection works efficiently.
What do you dislike about the product?
Faced some glitches in the platform while performing actions in admin dashboard.
What problems is the product solving and how is that benefiting you?
Harmony email & collaboration helped me in securing my organization from spam and phishing emails.
The dashboard being so user friendly delivers great user experience for us.
Good DLP and threat prevention and helpful centralized management
What is our primary use case?
The company handles confidential information, such as clients' financial data, and it is important to keep that information secure to comply with certain regulations.
One of the important challenges was to counteract the amount of phishing, ransomware attacks, and accidental leaks of information through email and collaboration applications.
We did not have a tool that would provide this security, so we chose to look for one and apply it to our environment.
How has it helped my organization?
The company handles a large amount of client information, some of which is confidential, including account numbers and sensitive information. This tool provides us with the features to meet the needs we have.
One of these features is real-time threat prevention. It uses advanced analytics to detect and block malicious emails, phishing, and unwanted content before they reach inboxes. It also has DLP. This helps prevent the leak of information. In this way, we can reduce vulnerabilities.
What is most valuable?
The tool has many important features. Some of them are very valuable.
One of the most valuable is real-time prevention, which constantly analyzes and provides results. The leak control that comes with DLP is excellent.
It provides us with a more centralized management where we can monitor everything that happens in our environment and in this way, can manage the security policies necessary for our organization in real time.
It is fast and quite effective in terms of preventing any security incidents.
What needs improvement?
The product is a very effective tool. It provides a lot of security to ensure the confidentiality of the information.
Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents.
They should also improve the quality of technical support since, in the last few years, they have lowered the quality of SLA response and do not provide concise solutions.
They should also generate a knowledge base where the unified information or the most common errors are found so as not to depend so much on support.
For how long have I used the solution?
I have experience using the solution for four years.
What do I think about the stability of the solution?
The stability presents as efficient.
What do I think about the scalability of the solution?
The scalability is new; it is multi-cloud.
How are customer service and support?
The experience has not been very good since we have had problems with the SLA.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
There was no previous solution in the organization.
How was the initial setup?
The initial implementation is complicated when you do not have experience with said tool.
What about the implementation team?
It was implemented with the seller and his engineer in charge, which was very fast and friendly.
What was our ROI?
The investment is somewhat high. However, it will provide security for all customer information.
What's my experience with pricing, setup cost, and licensing?
The tool is somewhat competitive with the others on the market. The installation has an average learning curve.
Which other solutions did I evaluate?
What other advice do I have?
It is an excellent tool for information security. Before acquiring it, you must analyze whether it meets company needs.
Which deployment model are you using for this solution?
Private Cloud
Helps quarantine and remove threats and detect malicious emails
What is our primary use case?
We use the solution for preventing malicious emails that we're getting through Google's built-in spam filters. The amount of spam and phishing had greatly increased at our organization and we needed a solution implemented fast.
Check Point was really quick to integrate and implement and instantly started providing value. The reporting we got during our trial helped to quantify the value to the executive team, in particular, the report that shows what Check Point caught items that Google's spam filters would've let through.
How has it helped my organization?
The amount of spam and phishing getting through to end users has reduced drastically.
We are also now able to advertise how many malicious emails we get and how it is constantly increasing as we grow. This shows our users how valuable a solution like this is and they appreciate that sometimes it may get a false positive.
We're abe to show to users why emails are quarantined - which has helped to train them on what to look out for if they do receive a suspicious email. We have also improved our reporting process and notifications to admins.
What is most valuable?
First and foremost, Check Point's ability to detect malicious emails and the filters they put in place are a big improvement on the built-in Google Workspace solution.
Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size. Admins can be notified as soon as a suspicious email arrives in bulk mailboxes and can act extremely quickly. This has even helped us to notify partners that they had been breached before they knew themselves.
What needs improvement?
There are a few features that are more geared towards Microsoft users rather than Google, for example, user-reported phishing. It's not fully integrated with Google Workspace, and the statistics don't update in real-time.
We appreciate that Microsoft has the larger market share, and Check Point has been improving its Google integration. However, more advancements would be appreciated. That being said, the "What Google wouldn't have caught" report was extremely valuable to us in showing value.
For how long have I used the solution?
I've used the solution for nine months.
Which other solutions did I evaluate?
We evaluated other solutions, such as Mimecast, Proofpoint, and Abnormal.
Best ever Email Security Platform by Checkpoint
What do you like best about the product?
Hello, I have been using this Harmony email security for the last 6 months, and trust me this platform provides you best-in-class email security to ensure zero impact on your security. This is the best option to replace your legacy email security solution with an advance security platform.
What do you dislike about the product?
There is no point in adding here as the platform is best in class.
What problems is the product solving and how is that benefiting you?
Harmony email platforms help you to reduce spam, spoof, and malicious emails coming inside your organization. By providing AI-driven security, the platform also has some value-added features and services such as DLP over emails, Anamoly protection, Anti-malware engine to protect malicious emails from being delivered to the end user. Post-delivery protection using CDR feature.
Easy to use and manage, even for non-technical users
What is our primary use case?
Our team primarily uses Google Workspace for email, so we were looking for a solution that could protect us from spam, phishing attacks, and other email threats.
Harmony Email fits the bill perfectly because it's an API-based product that doesn't require any MX record or other configuration changes. It's also very easy to use and manage, even for non-technical users.
What is most valuable?
I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats. With one hour of training, anyone can effectively use this product.
What needs improvement?
There are a few areas for improvement. One is the occasional sluggishness or latency, which is likely due to the cloud-based nature of the solution. So, the performance can be better.
Additionally, while Harmony Email can detect phishing emails that Google has missed, it would be even better if it could automatically quarantine or delete these emails.
Since we use multiple Google Workspace accounts across three separate domains, it would be incredibly helpful if Check Point Harmony Email could provide a single dashboard that consolidates all of this information.
Additionally, Harmony Email should support other email providers beyond Microsoft and Google, as I also use Joho with over a thousand email IDs.
Having a unified dashboard and expanding support to other email providers would significantly enhance the product's usability for many users.
Currently, I have to rely on a separate gateway solution, like Cisco, to protect my Joho emails. It would be much more convenient if Harmony Email could handle all of my email protection needs.
For how long have I used the solution?
I've been using Harmony Email for about four or five months now.
What do I think about the stability of the solution?
It is cloud-based, so the performance is low. I would rate the stability an eight out of ten. It is stable but the performance is low.
What do I think about the scalability of the solution?
I would rate the scalability an eight out of ten. We have 300+ end users using this solution.
How are customer service and support?
The customer service and support are not very prompt like SonicWall and other vendors in the same space. Perhaps because Check Point is not as prominent in my region, their SLA is not terrible. It's just not very effective.
For instance, if I need support within 15 or 30 minutes, it won't happen. It could take up to four hours.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I initially started with Cisco Gateway. However, due to ongoing changes, we would have needed to modify MX records or other settings, making the configuration more complex.
As a result, we decided to try Check Point Harmony Email and Collaboration, and after conducting a proof of concept (POC), we decided to deploy it. We also checked Barracuda.
So, we chose Check Point over Barracuda during the POC. The primary reason was that Check Point Harmony Email is easy to configure and requires no MX record changes.
Additionally, it's more effective because it's an AI-based solution. It provides insights into the origin of emails, the connection between the sender and receiver, their previous email history, and the frequency of their communication. These features are unique to Check Point Harmony Email and Collaboration.
How was the initial setup?
The initial setup is very simple because only API configuration was there. We provide a user and password on our dashboard, and we can use it remotely.
It took only 10 to 15 minutes to deploy. Initially, it takes time to collect the data and create timelines. The solution doesn't require any maintenance.
What's my experience with pricing, setup cost, and licensing?
The pricing is in the middle. Check Point's pricing is not the highest in the competitive market.
It's more expensive than Barracuda but less expensive than Cisco. So, I would give it a rating of six out of ten, where one is expensive and ten is cheap.
What other advice do I have?
Overall, I would rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Stable product with easy-to-work and comprehensive environment
What is our primary use case?
We use the product for endpoint security features.
What is most valuable?
The product's environment is easy to work and comprehensive.
What needs improvement?
The product's pricing needs improvement.
For how long have I used the solution?
We have Check Point Harmony Email & Collaboration for five months.
What do I think about the stability of the solution?
How was the initial setup?
We deploy it on the cloud; we use an infinity portal for the process. It takes a day to complete.
What about the implementation team?
We implement the product with the help of an in-house specialist in our company.
What's my experience with pricing, setup cost, and licensing?
The product is expensive. I rate its pricing a seven or eight. There is room for improvement.
What other advice do I have?
I rate CheckPoint Harmony Email & Collaboration a nine out of ten. Even though it is an expensive product, it works efficiently. I advise others to do industry-related research and evaluate the products to suit business requirements regarding pricing and the number of users.
Good for preventing phishing with a nice dashboard and Explore page
What is our primary use case?
We use the solution to prevent any phishing emails from reaching out to the end users. We also use it for URL protection and DLP, to protect the end users from ransomware attacks, and to avoid any issues that halt business activities.
We used to have another solution for email security and we used to find so many issues while using it. We could not stop some phishing emails from getting into the user's mailbox and were worried about losing data. We had to work on fine-tuning the solution all the time to avoid the issues. We came to know about Check Point and wanted to try for email security.
How has it helped my organization?
We have blocked more phishing emails since we started using Check Point. The solution works brilliantly in filtering and the amount of information provided is unmatched and helped us in various ways.
The Explore page provides multiple options for searching for emails and other information. Quarantine/removing from Quarantine has become so easy with search options
The dashboard provides information to investigate more about malicious activity and blocked emails.
Check Point has become our go-to solution for most of our issues.
What is most valuable?
We like the email search options, availability of information on various aspects, algorithms, and AI models that provide pretty useful data - and the list goes on!
The email search/explore option helped us find the required emails and logs easily with multiple filters to use.
Information provided in each and every email is very useful for investigating any activity. We do not have to use multiple websites for that information since everything is provided in Check Point itself.
AI-based models and algorithms provide more accurate and useful information.
What needs improvement?
It would be good to have the option to export the respective record data from dashboards or logs to .csv or other files. That will help in creating more filters and analyzing the data.
Providing more Training videos and documentation will be helpful for beginners to understand how checkpoint works.
For how long have I used the solution?
I've used the solution for the past eight months.
Which solution did I use previously and why did I switch?
We used some other email security tools and we used to have multiple issues with email filtering and available information. We do not see any of those issues after using Check Point.
What's my experience with pricing, setup cost, and licensing?
We are good with the licensing.
Which other solutions did I evaluate?
We directly chose Check Point since we could not find any better alternative.
What other advice do I have?
It is the perfect one-stop solution for securing the organization!
Granular with good integration capabilities and helpful support
What is our primary use case?
We use the solution for SaaS protection for 10,000 Gsuite users. How collaborators process data with sensitive information and information leaks was a constant concern. The collaboration solution allows you to have visibility of the entire SaaS environment and create customized security profiles to give optimal treatment to the information. This solution allows you to have very granular visibility at all times; this is of utmost importance as it allows you to make immediate and precise decisions about the security environment.
How has it helped my organization?
This solution has allowed us to have visibility of the security environment for the business and has allowed us to have specific treatment by users, user groups, and departments of the information that is processed. This allows users to be certain that their information is protected. Certain security problems were detected. Without this solution at the SaaS level would have been impossible to detect so there has been an improvement in the treatment of the attack surface and the protection of valuable data.
What is most valuable?
There are several features that were considered valuable. For example, the fact that the installation and integration of the solution with SaaS tools were very fast and highly recognized by SaaS administrators. I like the fact that having granular information about the potential threats is received in email. Being able to protect information repositories was of great interest to decision-makers. It was also possible to implement an entire environment in record time. Having this information allowed us to better model the attacking surface.
What needs improvement?
They should consider a module that allows the customizing of reports so we can generate executive information for the client (to explain in simple language the general security situation in the SaaS environment).
Reports should be presented in such a way that they are readable by non-technical work groups who are involved in information protection and who may misread the information on the dashboard and make incorrect decisions.
For how long have I used the solution?
I've used the solution for four months.
What do I think about the stability of the solution?
The product is very stable; it is a cloud solution and we have not had any operational incidents.
What do I think about the scalability of the solution?
The solution is very scalable since you only have to add licenses.
How are customer service and support?
They offer good support; you have several support options depending on the SLA you need.
How would you rate customer service and support?
How was the initial setup?
The setup is very straightforward and very fast; it took about 20 minutes.
What about the implementation team?
The setup involved a mix of personnel and Check Point SE are experts in the area of security.
What's my experience with pricing, setup cost, and licensing?
The setup was very fast; the license scheme was very easy to understand.
Which other solutions did I evaluate?
We also evaluated the PAN solution and Fortinet.
What other advice do I have?
I consider it to be a cost-effective solution that focuses on security and is a highly recommended and easy-to-use option.
Reduces spam, offers excellent reporting, and has good management capabilities
What is our primary use case?
We use the solution for the protection of email from phishing attacks, spam, and malicious email-related activities.
It detects and blocks the most advanced phishing attacks across inbound, outbound, and internal communications, in real-time, before the attack succeeds.
The solution is used for email protection, providing IT administrators with a great amount of information about possible attacks faced by the organization, and logins by users.
It also has a high level of detail in its reports, facilitating the management and detection of possible threats to the security of the organization.
With the addition of the DMARC module, it makes it much easier to monitor the security policies applied and provides visual information about the type of traffic received, avoiding domain spoofing.
How has it helped my organization?
The number of phishing and spam emails has decreased and email security has improved by 80%. The IT team has noticed a great improvement in the number of emails received and a decrease in attacks. The helpful alerts generated by HEC facilitate the management and response.
Thanks to its dashboard, it displays detailed information about detected activities, suspicious logins, span deletions, or phishing detected and blocked with a high level of detail. The level of reporting detail facilitates threat management; now the organization has an additional layer of protection for end users.
What is most valuable?
The ease of management and intuitive administration are excellent. Thanks to its dashboard, the most valuable thing is the detection capability provided by this solution. The level of detail offered by Harmony is unique, to the point of showing the differences between what is detected by Office 365 and what is detected by HEC. The organization relies on this email security solution and facilitates the protection of all end users, decreasing security breaches by malicious actors.
What needs improvement?
The integration with Gsuite could be improved, especially when reporting the amount of emails it manages to filter. It could be improved to obtain a greater level of detail, unlike Office 365, which offers an extreme level of detail and facilitates the management and comparison of what is happening with respect to the mail. Its integration with Gsuite is simpler and has that point against it, however high levels of detail can be obtained in the reports of the solution. On the other hand, the ease of administration and threat detection capabilities are its strong points, and it stands out from other solutions that I have had the opportunity to test before.
For how long have I used the solution?
Currently, this solution has been used for the last tree years.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google