Check Point Harmony Email & Collaboration Valuable Features

Konstantinos Mourikis - PeerSpot reviewer
Senior Presales Engineer at Odyssey Software

The centralized management dashboard is easy to use. We usually sell advanced packets that include sandboxing for attachments, which is highly critical to most customers. The solution has a very effective anti-phishing algorithm that detects a significantly higher number of phishing emails compared to the default Microsoft solution. Additionally, it is user-friendly. When customers need to make exceptions to the policy, they find it quite easy to navigate the dashboard. However, what customers mostly care about are the anti-phishing and sandboxing features.

View full review »
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

The previous solution we had for email protection required a lot of investment from us, both money and time-wise. 

The software is easy to deploy and maintain, and the administration and operation of it require very few interventions from the IT team. 

The solution also integrates amazingly with our network's server environment for collaboration and email apps. The fact that we can share documents without emailing them and still be confident they will go through the corresponding scrutiny is great.

View full review »
Harish (Kumar) - PeerSpot reviewer
Cyber Security and IT Head at a outsourcing company with 51-200 employees

I appreciate the ease of deployment and the intuitive dashboard. Even someone with basic IT knowledge can easily understand the dashboard and identify potential threats. With one hour of training, anyone can effectively use this product.

View full review »
Buyer's Guide
Check Point Harmony Email & Collaboration
March 2024
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
Suresh Pathipatti - PeerSpot reviewer
Senior Information Technology Administrator at Aighospital

The most valuable features of the solution include all of the functionalities offered by the tool, which work fine. I cannot say that a particular feature does not work fine. Each and every feature provided by the product works fine.

View full review »
DA
Manager Firewall and Security at W.R. Grace & Co.

The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour.

I also appreciate the fact that the management aspect of it is all cloud-based and there's very little daily care and feeding and operational work to be done. It just functions.

View full review »
reviewer2584944 - PeerSpot reviewer
Senior Information Security Engineer at Glidewell Laboratories

We like the email search options, availability of information on various aspects, algorithms, and AI models that provide pretty useful data - and the list goes on!

The email search/explore option helped us find the required emails and logs easily with multiple filters to use. 

Information provided in each and every email is very useful for investigating any activity. We do not have to use multiple websites for that information since everything is provided in Check Point itself. 

AI-based models and algorithms provide more accurate and useful information.

View full review »
AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

The tool has many important features. Some of them are very valuable.

One of the most valuable is real-time prevention, which constantly analyzes and provides results. The leak control that comes with DLP is excellent. 

It provides us with a more centralized management where we can monitor everything that happens in our environment and in this way, can manage the security policies necessary for our organization in real time. 

It is fast and quite effective in terms of preventing any security incidents.

View full review »
PRADIPJOSHI - PeerSpot reviewer
Owner at Shree Atharva Sales Corporation

The product is reliable and sturdy. It can be configured within five minutes and has minimal downtime. It provides an in-built API functionality. It supports chat and file sharing from solutions like OneDrive, SharePoint, Google Drive, and Dropbox. Additionally, it offers 100% protection for unified communication or collaboration to prevent hacking incidents like the Zoom hack.

View full review »
NG
Support at a security firm with 51-200 employees

The platform offers advanced security measures to protect emails from cyber threats such as phishing attacks, malware, and ransomware.

The platform is cloud-based, which means users can access their emails and collaboration tools from anywhere and on any device.

The security of collaboration tools is great.

The platform integrates with other productivity and collaboration tools like Microsoft Office, Slack, and Zoom.

View full review »
LW
Project Manager at UFINET

Bulletproof Security catches up with all types of cyber attacks that can lead to account takeover and data compromisation. The entire networking system is secured with end-to-end encryption that enhances the secure flow of data. 

The superior data catch rate has reduced phishing attacks by a high rate of almost 100%, which has boosted productivity. 

It blocks malicious emails that wreak havoc and destroy valuable data in the systems. 

Employees can focus on more productive roles without fear of being attacked by external factors.

View full review »
BW
Digital Coordinator at Modis

Securing major file-sharing services across the company has been productive since we deployed this platform. 

The security system has a stable data protection system that has prevented potential data loss. 

This product detects malicious behavior in advance and immediately quarantines files before they can spread viruses to the entire network. 

URL protection features give me the confidence to browse the internet without fear of visiting unsafe sites. 

The user dashboard updates systems automatically to meet the current enterprise demands.

View full review »
Alejandro Flores. - PeerSpot reviewer
Director de Ingenieria at Smartelecom SA de CV

There are several features that were considered valuable. For example, the fact that the installation and integration of the solution with SaaS tools were very fast and highly recognized by SaaS administrators. I like the fact that having granular information about the potential threats is received in email. Being able to protect information repositories was of great interest to decision-makers. It was also possible to implement an entire environment in record time. Having this information allowed us to better model the attacking surface.

View full review »
RG
CTO & Co-Founder at Cyber Strategic

The API is super valuable because it's not really embedded in the email session. It's more like it comes in, and before it hits your mailbox, Check Point inspects it.

Many products require running it through a specific Web Gateway or some kind of intermediate box like Barracuda, or an agent installed on Outlook among many ways. Check Point is more advanced, so it's up there with the best. In my opinion, it's one of the best products. It does protect other things like Slack and Salesforce, which are more about communication. It also covers collaboration tools like OneDrive, Dropbox, and Box. That's the collaboration part.

View full review »
Ruan Kotze - PeerSpot reviewer
Head: Cloud Platform Security at BCX Namibia

The most valuable feature of the solution is the phishing protection it offers.

View full review »
Anuj Kumar@09 - PeerSpot reviewer
Senior Manager at IRMA Anand

All the features offer great utility, and their performance is quite impressive. 

They have more secure applications than cloud-native security and have a higher security compliance rate. Also, the prevention of systems and servers from phishing attacks and system threats is proactively traceable and immediately diffused with a catchment rate of almost 99.99%, which is great in today's era of cyber threats and attacks. 

Their sound features of security for account protection and data leak protection works great for us, and we never face any compatibility or lag issue while working on the software. 

View full review »
DU
CISO at IMC Companies

The mail firewall and the Office 365 Control are its two most valuable features.

It is very intuitive. It is a point and click type of deal.

The other slick thing is it has a cleanup process. So, we can set it up and tell it to just deliver files that have been cleaned or transformed to a clean type of document.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

We have found several features that are very valuable. One of them is the integration with Office365. In addition to that, it is fast and has a very simple, easy integration. In addition to that, it integrates with other Office 365 products. The false positives are minimal, almost nil. That is very important since it will not generate an absurd amount of emails. The functionality of the tool is very easy to configure and manage. The platform is friendly and makes its integrations even more, so this tool is very efficient.

View full review »
Shrinkhala Jain - PeerSpot reviewer
Project Consultant at a consultancy with 10,001+ employees

Zero-day protection of the cloud and email systems is possible with Check Point Harmony Email and Collaboration. It ensures anti-phishing management end to end, and with this product, there can not be any evasive attack of sophisticated malware and threats on the system. 

Data loss and leakage prevention are one of the best features as it ensures no data loss and that all confidential documents and information is secured forever.

Protection of all confidential and sensitive data base (DLP) is secured in the system forever with complete dashboard and data tracking management.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

One of the best features is the analysis and emulation carried out with each file attached to the emails, which makes each of the deliveries we make via email more secure. This function creates a scalable sandboxing where a copy of the file under analysis is made, and it is verified, scanned, and analyzed to each of our files for malicious links. If it finds a link, it emulates its action to determine if it is benign or malignant to deliver clean and safe data.

View full review »
KP
Network Engineer at LTTS

If you have Check Point Cloud Guard SaaS solution in place, 90% to 95% of the work in protecting your system is complete. There are some additional features that also help including Zero Day, Phasing, Identity Protection, and DLP, which provides us additional protection for our users.

This DLP is very useful, as it gives our users additional protection.

View full review »
MS
Sr. Technology Architect at Incedo Inc.

API-based integration is the most valuable aspect as it will not degrade the email delivery features.

UBA is one of the features which monitors the user behavior and takes actions accordingly.

The product blocks malicious attachments before reaching out to user mailboxes while not impacting business productivity.

We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP).

We can block sophisticated social engineering attacks such as impersonation, zero-day phishing, and Business Email Compromise (BEC) using AI-trained engines.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

This Check Point Harmony Email tool is very modern. Its characteristics are adapted to the most modern threats. One of its main virtues is its monitoring system, which is very important for decision-making, however, it is also very intuitive, easy to understand, and simple to use.

Its DLP policies are quite easy to implement, which help a lot with compliance with the regulations required by our company in addition to shielding sensitive data.

This tool integrates and protects all collaborative tools, in our case, Microsoft 365.

View full review »
CZ
Java Developer at EROAD

The software detects sensitive data that can leak confidential information and stops it immediately from leaving the organization. 

Machine Learning and AI for email security have helped all the organization's members to guard their information against insecure exposure. 

The high-grade email security protection features have blocked many attempts from ransomware attacks. 

Collaboration in a secure environment has been one of the greatest dreams we have longed for, with support from all the enterprise members.

View full review »
JR
Project Manager at Digitas APAC

Sensitive business data is effectively protected from any third-party attacks that can easily destroy confidential information. 

It prevents data from leakages and exposure to unauthorized hands. 

The high-grade bulletproof security model monitors email transfer and content that is contained in the messages. File-sharing security provides a reliable platform for faster sharing of documents without fear of external data threats. 

The dashboard provides real-time insights that provide awareness to members on the best policies for sharing information and engaging each other.

View full review »
JP
Senior IT Security Manager at a tech services company with 51-200 employees

First and foremost, Check Point's ability to detect malicious emails and the filters they put in place are a big improvement on the built-in Google Workspace solution. 

Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size. Admins can be notified as soon as a suspicious email arrives in bulk mailboxes and can act extremely quickly. This has even helped us to notify partners that they had been breached before they knew themselves.

View full review »
reviewer1093134 - PeerSpot reviewer
Pentester at Cybertech Projects

The ease of management and intuitive administration are excellent. Thanks to its dashboard, the most valuable thing is the detection capability provided by this solution. The level of detail offered by Harmony is unique, to the point of showing the differences between what is detected by Office 365 and what is detected by HEC. The organization relies on this email security solution and facilitates the protection of all end users, decreasing security breaches by malicious actors.

View full review »
AG
Planning Analyst at Ovato

Full suite protection of cloud email and collaboration applications has been a great achievement of this tool's performance. 

The security features provide a comprehensive report based on current performance and security situation. 

The platform API closely monitors the behavior of information traffic and prevents account takeover. 

It has reduced phishing attacks at a high rate and blocked many attempted attacks. 

The customer support team is online 24/7 and always offers solutions to any request when reached.

View full review »
Rodrigo Nalda - PeerSpot reviewer
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees

The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user. This facilitates its implementation.

Another very noteworthy feature is that the number of false positives tends to zero, which generates great confidence in both administrators and users.

The system can be easily parameterized and as it is integrated into the Infinity ecosystem, it simplifies the administration and centralization of logs.

All this makes the solution simple, reliable, and above all stable.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

We liked this tool a lot. Its most attractive features were:

1- Check Point Harmony Threat Emulation and Threat Extraction technologies that delivered fast attached files or files with threats.

2-The DLP policies helped us a lot against the loss of sensitive information.

3-Its ease of implementation and its API to connect with solutions safely.

4-Its monitoring dashboard with screens and graphs is very useful for us as administrators.

The product is a complete, centralized solution accessible through the Infinity Portal.

View full review »
JK
Security Consultant at Synergy

The anti-phishing feature is the solution's best feature.

View full review »
PN
Director at Gundo TP

It's been an awesome experience working with Check Point Harmony Email & Collaboration. I can count the number of endpoints, emails, and collaborations being used in the environment. It gives me insights into the number of tools required to block malicious websites. 

View full review »
Suresh Pathipatti - PeerSpot reviewer
Senior Information Technology Administrator at Aighospital

All of Harmony Email & Collaboration's features are valuable.

View full review »
OP
Senior Network/Security Engineer at Skywind Group

As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts. In general, the monitoring and alerting is just great, and the default dashboards provided are used by our support team as part of the SoC solution.

In addition, the CloudGuard SaaS is capable of preventing data leakage, thus may serve as the basic DLP system for the cloud email system. We rely on this functionality and block the emails that contain the card numbers patterns as part of the compliance regulations.

View full review »
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro

Harmony email has many interesting features. Its total protection has been the greatest aspect since it completely protects all the mail from the cloud. It gives 100% protection and is something that is a failsafe. There are no errors. Having an app-based solution that detects everything that is lost helps ensure reliability. It is quite complete, and it integrates with emulation solutions. If an email is ever compromised, you can detect the issue, find out what happened, and protect the company. It is a very complete solution.

View full review »
VR
Network Security Engineer - Presales at a tech services company with 201-500 employees

In terms of technical features, this is the best solution that I have worked with so far. For example:

  • URL Filtering
  • Application control 
  • Threat Prevention
  • Sandboxing

We have found threat prevention using sandboxing from Check Point, after buying the Threat Prevention license, helped with the malware prevention rate and reduced zero-day attacks.

For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good. 

Getting reports and finding threats in the console is easy.

View full review »
Lissette Acurio - PeerSpot reviewer
Solution Engineer at Secure Soft Corporation

The solution can be easily integrated and takes a short time to be implemented.  In addition, it provides a feature that prevents information from leaking from the company and blocks potential threats.

View full review »
KM
Global Manager at a computer software company with 51-200 employees

The API is its most valuable feature. On the API side, relative to the rest of the market, Check Point is decades ahead of its competitors. The APIs on some of their competitors are so archaic, they are not even usable.

View full review »
KC
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees

We need the phishing detection and email quarantine. Once an email is considered malicious, it stays in the quarantine where we can interrogate it. We can check out why it was quarantined and see if it should be delivered to the individual.

With the greater use of mobile phones there is more threat of email being compromised. Having the phishing detection is very valuable because we get hundreds of phishing emails per day. Having something to sift through them and alert us that they may be phishing emails, so that we can go in and further now check them, is a very valuable feature.

View full review »
MS
Cyber Security Supervisor at Hanzolo

The product's environment is easy to work and comprehensive.

View full review »
PD
Associate Consult at Atos

Most organizations that invest in email security opt for MFA. They invest in a Cloud Firewall but they never consider the east-west traffic flow inside their Cloud Applications.

Here, Cloud Guards comes in with the best features, such as protection from zero-day attacks. These are usually reported when we have blades on the perimeter firewall, like Threat Emulation and Extraction or Sandbox. We have complete visibility of email Attacks like spear-phishing, spoofing, etc. Based on domain and URL reputation, it will allow traffic to flow.

Apart from this, we can easily identify users who are going to use cloud applications. These users are logged in via a trusted network or device.

View full review »
JG
Owner at Giliam Network & System Solutions

The security level is fairly high, given the price.

The program has a nice interface and it is easy to use.

There is an extra option available for two-factor authentication that you install an app onto your mobile device for. You can, for example, set it up so that you can't get into Office 365 without authenticating access from your phone.

View full review »
DD
Technology Security Manager at a energy/utilities company with 1,001-5,000 employees

The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc. The ability to sandbox, extract and interrogate email attachments is also key to safeguard user mailboxes. 

View full review »
it_user694761 - PeerSpot reviewer
Managing Partner with 51-200 employees

It is the collaboration between users inside the company. It is a big advantage with Check Point to be able to work together on the same document.

View full review »
RR
Network Security Specialist at a tech services company with 51-200 employees

Elasticsearch and sandboxing are the most valuable features. Check Point is very good for threat protection, which is our customers' primary concern. Everyday, our customers are asking about new threats.

View full review »
SN
Security Specialist at a computer software company with 51-200 employees

Lateral data center: Check Point really adds value with east-west protection in the data center.

View full review »
Buyer's Guide
Check Point Harmony Email & Collaboration
March 2024
Learn what your peers think about Check Point Harmony Email & Collaboration. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.