Check Point Harmony Email & Collaboration Benefits

Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

A lot of these attacks and malware now come hidden in ways we expect the least, and since we never think we'll be targets of a cyber attack, this makes us vulnerable to them. Check Point Harmony gives us great visibility of the threats we are being exposed to, where they are coming from and what were they targeting, giving visibility of the weak gateways that could lead to an infection or a leakage. Management is easy, and integration is too, support is good, and the steps followed to set it up were very simple.

View full review »
DA
Manager Firewall and Security at W.R. Grace & Co.

Prior to deploying the product, we were getting daily phishing attacks which were directly impacting our business. We had data exfiltration. I can't remember the exact number of incidents we had, but since deploying the product we are now catching approximately 500 phishing attacks a day, attacks that are no longer negatively impacting the organization.

View full review »
reviewer2584944 - PeerSpot reviewer
Senior Information Security Engineer at Glidewell Laboratories

We have blocked more phishing emails since we started using Check Point. The solution works brilliantly in filtering and the amount of information provided is unmatched and helped us in various ways. 

The Explore page provides multiple options for searching for emails and other information. Quarantine/removing from Quarantine has become so easy with search options

The dashboard provides information to investigate more about malicious activity and blocked emails. 

Check Point has become our go-to solution for most of our issues.

View full review »
Buyer's Guide
Check Point Harmony Email & Collaboration
April 2024
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,578 professionals have used our research since 2012.
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

The company handles a large amount of client information, some of which is confidential, including account numbers and sensitive information. This tool provides us with the features to meet the needs we have. 

One of these features is real-time threat prevention. It uses advanced analytics to detect and block malicious emails, phishing, and unwanted content before they reach inboxes. It also has DLP. This helps prevent the leak of information. In this way, we can reduce vulnerabilities.

View full review »
LW
Project Manager at UFINET

Email security has improved since we deployed this platform. 

This platform has enhanced faster file sharing and improved the collaboration network systems. 

Securing business lines has reduced cases of fraud that used to affect workflows. API connection has enabled us to integrate this platform with applications for the efficient implementation of business programs. 

Sending and receiving emails has been reliable and always productive, with zero phishing attacks. 

Full email protection of both cloud and on-premise emails has reduced the chances of losing data to zero.

View full review »
BW
Digital Coordinator at Modis

Encryption of emails enhances safe communication that ransomware attacks cannot compromise. 

A secure collaboration environment has enhanced faster growth due to productive sessions convened by teams. 

It blocks unsafe emails before landing inbox to avoid time wastage. Blocking malicious emails has enabled employees to focus on their roles fully without fear of being attacked. 

Consistent security across the company infrastructure has saved the company costs that could be accrued from an insecure work environment.

View full review »
Alejandro Flores. - PeerSpot reviewer
Director de Ingenieria at Smartelecom SA de CV

This solution has allowed us to have visibility of the security environment for the business and has allowed us to have specific treatment by users, user groups, and departments of the information that is processed. This allows users to be certain that their information is protected. Certain security problems were detected. Without this solution at the SaaS level would have been impossible to detect so there has been an improvement in the treatment of the attack surface and the protection of valuable data.

View full review »
Mantu Shaw - PeerSpot reviewer
Project Manager at Incedo Inc.

After the implementation of the solution, email phishing is stopped and gives complete visibility.

No manual intervention is required once the policy is defined.

Now, all office documents are protected and we have also started to take backups of our user data into a cloud which will improve the dependency of other backup solutions.

API-based integration does not increase the email latency and it's an important aspect.

The single solution provides protection of other cloud applications such as G-suite, Slack, G-Drive, etc.

It reduces the TCO of email security.

View full review »
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at IRMA Anand

It helped us to bring security compliance and ensure system robustness throughout. 

It suspends and proactively blocks the malicious ransomware and threats before reaching the inbox. 

The product prevents data loss or data theft and ensures that the system is secured end to end without any trouble. 

Its API integration with other portals and applications goes smoothly without any hiccups. 

They provide bulletproof security to systems and email servers and ensure round-the-clock security for cloud email servers and other collaborating applications. 

It's an all-in-one security solution for businesses in this current era.

View full review »
DU
CISO at IMC Companies

If we can reduce the number of malicious emails delivered to the inbox of our users, that is a big win. Over 90 percent of breaches start with an email, so the more you can protect your users with the mail firewall piece, the better off you will be. Then, you just do exceptions. That is where endpoint protection comes in. For example, typically, if the mail firewall that we have, which is not CloudGuard, misses something malicious, once a user clicks on that email, opens it, or tries to trigger anything on it, then SandBlast Agent will catch and stop it. Now, that is without using the mail firewall on CloudGuard. However, if we were to stay with CloudGuard and apply the mail firewall, then we will just see less items, messages, and malicious messages being delivered. 

Having CloudGuard would allow us to reduce our vendor footprint. If you have less vendors and tools to manage, it gives a lot of time back to admins and simplifies our overall operations.

It provides visibility of events, what's going on with the environment, what we're missing with our other solution, and the user behavior.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

Check Point Harmony Email & Collaboration has helped our company with perimeter security and securing our employees from wherever they are working. It's strengthening security as it is able to stop phishing attacks on Office 365 accounts and block possible account hijacking. It is also responsible for detecting malicious files in both OneDrive and SharePoint. This makes the product more robust and also gives us visibility into suspicious access, and provides the areas from which they are trying to enter. With this other feature, it provides more integrity to our company.

View full review »
Shrinkhala Jain - PeerSpot reviewer
Project Consultant at a consultancy with 10,001+ employees

Check Point Harmony Email and Collaboration comes with end-to-end capabilities of system protection in a holistic manner. It is restricting the entry of phishing attacks, malware attacks, and ransomware threats. 

It ensures anti-phishing management effectively and prevents any data loss through encrypted database management. Bulletproof security is one of the best features which enables protection from the most sophisticated and evasive threat attacks. It claims to reduce phishing attempts by almost 100%

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

Like any company, we care about security and having exposure to various clients and departments. We can be violated or have identity theft attempts, and this is where Check Point Harmony Email (and its computing power that is integrated from the Check Point cloud) comes in. It gives us the protection and analysis, to help us avoid phishing attacks and malware. By integrating solutions such as DLP, we can protect our identity and data. 

Its analysis or emulation in the review of each file using the cloud and Check Point helps make each interaction via email more secure.

View full review »
KP
Network Engineer at LTTS

When we moved from an on-premises email solution to Office 365, we no longer had protection against malware or zero-day level attacks. With this SaaS, we prevent these problems, and also, we protect our users against phishing attacks, identity theft, have DLP support, and even SaaS shadow IT discovery protection.

We can say that with Check Point Cloud Guard SaaS, we have improved our security to the next level. Our users and business are more secure, and overall, this is a very impressive solution for us.

View full review »
NG
Support at a security firm with 51-200 employees

Check Point has helped us improve our security layer with this complete cloud solution. We no longer depend on a Gateway as it is a complete solution that helps us prevent any type of threat that travels through email.

We have managed to have an impressive reduction in phishing that used to enter our system before applying Check Point.

We also really like its centralized environment since the Check Point Infinity Portal really centralizes everything.                 

View full review »
LD
Cloud Support at a tech company with 1-10 employees

We have managed to implement this as a totally cloud tool, from the Check Point Infinity Portal. It's super easy. In addition, we have managed to generate DLP policies for the protection of data that is shared to avoid sensitive losses and compliance with regulations.

Also, through the monitoring panel we have been able to see the behavior of our environment and how it is attacked by new threats. We can make decisions to improve our infrastructure thanks to Harmony Email.

View full review »
CZ
Java Developer at EROAD

The organization has greatly benefited from the strong security measures implemented by this software. 

The capability to block malicious emails from reaching inboxes has helped members to exchange secure messages that cannot spread viruses and lead to delays. 

The comprehensive security measures have enabled members to focus on more productive duties without fear of being attacked. 

The entire supply chain is secured with end-to-end encryption that unauthorized third parties cannot compromise.

View full review »
JR
Project Manager at Digitas APAC

Productivity has increased since there are no external detractors. 

Sending email with bulky attachments is safe and faster with guaranteed security encryption. 

It fully protects colleagues from visiting insecure sites and browsing in unhealthy environments. 

It has been able to block malware attacks that could derail workflows and affect overall production. 

The solution cleans unsafe files quickly and eliminates threats that can adversely affect information. 

Engagement with my colleagues is easy, and I no longer fear any ransomware attacks.

View full review »
JP
Senior IT Security Manager at a tech services company with 51-200 employees

The amount of spam and phishing getting through to end users has reduced drastically. 

We are also now able to advertise how many malicious emails we get and how it is constantly increasing as we grow. This shows our users how valuable a solution like this is and they appreciate that sometimes it may get a false positive. 

We're abe to show to users why emails are quarantined - which has helped to train them on what to look out for if they do receive a suspicious email. We have also improved our reporting process and notifications to admins.

View full review »
reviewer1093134 - PeerSpot reviewer
Pentester at Cybertech Projects

The number of phishing and spam emails has decreased and email security has improved by 80%. The IT team has noticed a great improvement in the number of emails received and a decrease in attacks. The helpful alerts generated by HEC facilitate the management and response. 

Thanks to its dashboard, it displays detailed information about detected activities, suspicious logins, span deletions, or phishing detected and blocked with a high level of detail. The level of reporting detail facilitates threat management; now the organization has an additional layer of protection for end users.

View full review »
AG
Planning Analyst at Ovato

There is improved security across the emailing system and the entire communication networking infrastructure. 

This product enhances faster and more secure sharing of information among colleagues from different departments. 

Blocking malicious emails before landing inbox has enabled each member to access files with viruses and spam. 

The entire communication channels have been fully secured with end-to-end encryption. 

Email security and prevention of data from cyber attacks have been the main goals and have been achieved positively with Check Point Harmony Email & Collaboration.

View full review »
Rodrigo Nalda - PeerSpot reviewer
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees

In the same way, we have detected malicious files in both OneDrive and SharePoint that have been blocked, which means the elimination of risks in the corporate network.

One of the important characteristics is the visibility that it gives us about suspicious access to accounts, such as several almost simultaneous accesses from impossible geographical locations. This allows us to detect non-legitimate access due to password filtering or brute force attacks.

All this makes the data of our users safer and therefore the integrity of the company is greater.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

Through the modern security tool Harmony Email, we managed to protect our email cloud environment and its main collaboration tools.

It is quite simple to connect through a connection API, achieving the main objective.

Its protection against malicious documents allowed us to review the attached documents through threat emulation and threat extraction and deliver the package or file to the user in just a couple of seconds, in an agile, simple, and fast way, providing an ideal delivery time for the users.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

The Check Point CloudGuard SaaS solution is used mostly to prevent malware and zero-day threats. It protects the Microsoft Office 365 cloud email service users of our company against attacks. It is also capable of stopping the sophisticated phishing attacks on the Office 365 accounts and block the possible account hijacks.

It would be really hard to achieve such a level of protection with the on-premises email server without using some email-server specific software, but with CloudGuard SaaS it was easy to integrate the security into the Microsoft email services.

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

Checkpoint Harmony Email and Collaboration is one of the cloud solutions for email that has given us the most added value. It has allowed for the education of users while still keeping them protected in a non-invasive way. When configuring this solution, we have not needed to come and affect management in terms of the day-to-day tasks handled by the users. It is a solution that is directly configured at the service level, not at the user level, so it's quick to install and configure, allowing connectors through APIs that can block malicious emails before they reach the inbox. It is acting as a full replacement for data loss analysis and management issues.

View full review »
VR
Network Security Engineer - Presales at a tech services company with 201-500 employees

I am confident with the block rate. We host our solution in AWS cloud. If someone tries to hit our applications, they could be a legitimate user or a hacker. So, we have found a number of blocked attempts from the external end.

View full review »
KM
Global Manager at a computer software company with 51-200 employees

The automated rule cleanups and automated policy installs have improved my customers' organizations.

View full review »
KC
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees

People are now thinking twice before clicking on something, and if it's suspicious they don't have a chance to click because it's quarantined.

We also provide a process where someone can request an email from quarantine. There are times when legal email gets through because of the subject line or the content. We're able to check it, and also double-check with our individuals to ask if they expected an email from the sender. They can confirm the sender and it can be released. That added layer of protection is always good.

View full review »
PD
Associate Consult at Atos

Sophisticated attacks can't be prevented by normal SaaS security. Cloud Guard SaaS is a technology that prevents not only Sophisticated attacks but affords protection from Email.

Most attacks are successful because of SPAM emails that effectively cause users to fall into the attacker's trap. As Check Point is a leading technology in the industry, it provides maximum protection against email phishing attacks and provides the identity of users and visibility over shadow IT applications.

Along with the email security solution, Cloud Guard is an additional layer of comprehensive security, so we can completely rely on it.

View full review »
JG
Owner at Giliam Network & System Solutions

This solution has improved our visibility. Last week, one of our Office 365 customers was hacked and we were able to see details such as the attacker's IP address and country. It allows us to better decide what to do, such as activating two-factor authentication.

View full review »
DD
Technology Security Manager at a energy/utilities company with 1,001-5,000 employees

My company is a singular key player in a major industry in my country so we are a target at all times for phishing campaigns. We have had bad experiences in the past. Based on those experiences, we have been using Check Point for a couple of months, and in the reporting, we are seeing very good results.

View full review »
it_user694761 - PeerSpot reviewer
Managing Partner with 51-200 employees

It is a little bit new, but the sharing of documentation is clearly easier now. It is easier to work within your teams using the Check Point solution so you can easily share a file without sending it by mail. This is an advantage, being able to work on the same document in a work group.

View full review »
RR
Network Security Specialist at a tech services company with 51-200 employees

The main benefit is to the user. Hackers can't steal their information.

View full review »
SN
Security Specialist at a computer software company with 51-200 employees

It is a value proposition in the market.

View full review »
Buyer's Guide
Check Point Harmony Email & Collaboration
April 2024
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,578 professionals have used our research since 2012.