Check Point Harmony Email & Office Valuable Features

DA
Manager Firewall and Security at W.R. Grace & Co.

The feature I find to be most valuable is very much the zero-touch provisioning. I was able to be up, operational, and 100 percent functional in less than a half an hour.

I also appreciate the fact that the management aspect of it is all cloud-based and there's very little daily care and feeding and operational work to be done. It just functions.

View full review »
CISO at IMC Companies

The mail firewall and the Office 365 Control are its two most valuable features.

It is very intuitive. It is a point and click type of deal.

The other slick thing is it has a cleanup process. So, we can set it up and tell it to just deliver files that have been cleaned or transformed to a clean type of document.

View full review »
Network Security Engineer at a tech services company with 201-500 employees

In terms of technical features, this is the best solution that I have worked with so far. For example:

  • URL Filtering
  • Application control 
  • Threat Prevention
  • Sandboxing

We have found threat prevention using sandboxing from Check Point, after buying the Threat Prevention license, helped with the malware prevention rate and reduced zero-day attacks.

For Threat Prevention, I was impressed with this feature and the solution's effectiveness. It has been very good. 

Getting reports and finding threats in the console is easy.

View full review »
Learn what your peers think about Check Point Harmony Email & Office. Get advice and tips from experienced pros sharing their opinions. Updated: June 2021.
512,711 professionals have used our research since 2012.
KC
IT Security Analyst at a energy/utilities company with 1,001-5,000 employees

We need the phishing detection and email quarantine. Once an email is considered malicious, it stays in the quarantine where we can interrogate it. We can check out why it was quarantined and see if it should be delivered to the individual.

With the greater use of mobile phones there is more threat of email being compromised. Having the phishing detection is very valuable because we get hundreds of phishing emails per day. Having something to sift through them and alert us that they may be phishing emails, so that we can go in and further now check them, is a very valuable feature.

View full review »
Senior Security Analyst at Atos

Most organizations that invest in email security opt for MFA. They invest in a Cloud Firewall but they never consider the east-west traffic flow inside their Cloud Applications.

Here, Cloud Guards comes in with the best features, such as protection from zero-day attacks. These are usually reported when we have blades on the perimeter firewall, like Threat Emulation and Extraction or Sandbox. We have complete visibility of email Attacks like spear-phishing, spoofing, etc. Based on domain and URL reputation, it will allow traffic to flow.

Apart from this, we can easily identify users who are going to use cloud applications. These users are logged in via a trusted network or device.

View full review »
Senior Network/Security Engineer at Skywind Group

As with most of the other Check Point products, the CloudGuard SaaS has the advanced visibility of the events and alerts. In general, the monitoring and alerting is just great, and the default dashboards provided are used by our support team as part of the SoC solution.

In addition, the CloudGuard SaaS is capable of preventing data leakage, thus may serve as the basic DLP system for the cloud email system. We rely on this functionality and block the emails that contain the card numbers patterns as part of the compliance regulations.

View full review »
DD
Technology Security Manager at a energy/utilities company with 1,001-5,000 employees

The most valuable features would be its ability to intercept phishing emails and emails laden with malware, viruses, false links, etc. The ability to sandbox, extract and interrogate email attachments is also key to safeguard user mailboxes. 

View full review »
Responsable de Ciberseguridad. CISO at a printing company with 501-1,000 employees

The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user. This facilitates its implementation.

Another very noteworthy feature is that the number of false positives tends to zero, which generates great confidence in both administrators and users.

The system can be easily parameterized and as it is integrated into the Infinity ecosystem, it simplifies the administration and centralization of logs.

All this makes the solution simple, reliable, and above all stable.

View full review »
Network Engineer at LTTS

If you have Check Point Cloud Guard SaaS solution in place, 90% to 95% of the work in protecting your system is complete. There are some additional features that also help including Zero Day, Phasing, Identity Protection, and DLP, which provides us additional protection for our users.

This DLP is very useful, as it gives our users additional protection.

View full review »
Owner at Giliam Network & System Solutions

The security level is fairly high, given the price.

The program has a nice interface and it is easy to use.

There is an extra option available for two-factor authentication that you install an app onto your mobile device for. You can, for example, set it up so that you can't get into Office 365 without authenticating access from your phone.

View full review »
Learn what your peers think about Check Point Harmony Email & Office. Get advice and tips from experienced pros sharing their opinions. Updated: June 2021.
512,711 professionals have used our research since 2012.