Overview
Registering with Check Point
This is a required step to complete in order to successfully subscribe to the solution
Check Point Harmony Email & Collaboration offers complete, defense-in-depth security for Microsoft 365 and G-Suite, and extends to the full collaboration environment, including file sharing and chat, as well as Slack and Microsoft Teams. Scan every inbound, outbound and internal em ail. Prevent phishing and malware from spreading within your organization or to your customers and partners. Check every file for malicious content using the most advanced sandboxing and active-content analysis in the industry. Quarantine threats before your users download them Identify confidential information and apply context-aware policies that confine the data to a particular organization or work group. Your users can leverage the full power of collaboration tools, while automated work flows enforce regulatory compliance, ensuring PCI, HIPAA, PII, or other protected content does not leak. Check Point Harmony Email & Collaboration ensures seamless security. Deploy instantly with the only one click, cloud-enabled platform, with no need for a proxy, appliance or endpoint agent.
Highlights
- Complete Protection: Secure all lines of communication, from email to collaboration
- Bulletproof Security: We catch the most sophisticated and evasive attacks that others miss
- Efficient, Effective: A single, effective and cost-efficient solution for email and collaboration suites
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
Harmony Email and Collaboration Complete | Harmony Email+Collab-Complete: Secure O365 Suite(Email,OneDrive,Teams) and GSuite (Gmail,GDrive), Dropbox, Slack (and more) w/ Antiphish, Antimalware, URL Protect+Rewrite+Emulation,BEC Protect,Anomalies,ShadowIT,Sandbox,ThreatExtraction,DLP,Encryption, 1user | $109.14 |
Harmony Email and Collaboration Advanced | Harmony Email+Collab-Advanced: Secure O365 Suite (Email, OneDrive, Teams) and GSuite (Gmail, GDrive), Dropbox, Slack (and more) w/ Antiphishing, Antimalware, URL Protect+Rewrite+Emulation,BEC protection,Anomalies,Shadow IT,Sandboxing,Threat Extraction, 1 user | $83.46 |
Email Archiving | Email Archiving- A license to archive emails up to 10 years old for all licensed users, 1 user. Add-on on top of HEC Advanced / HEC Complete | $51.36 |
IRaaS | Incident Response as a Service (IRaaS) - Management and remediation of end-user quarantine release requests and phishing reports by a Check Point analyst, 1 user. Add-on on top of HEC Advanced / HEC Complete | $15.00 |
DMARC Management | DMARC Management - Quick and safe transition to and maintenance of strict DMARC record, 1 user. Add-on on top of HEC Advanced / HEC Complete | $10.70 |
Vendor refund policy
No Refunds
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Support
Vendor support
This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/ To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Email defenses have blocked phishing attempts and now protect sensitive data across collaboration
What is our primary use case?
My major use cases for Check Point Harmony Email & Collaboration are primarily preventing all means of malicious or phishing emails, and I also want to protect DLP , which means DLP service. These are the major use cases for us.
What is most valuable?
The biggest advantage of Check Point Harmony Email & Collaboration is the security portfolio offered by Check Point, as it is a proven top-tier company. Their security advantages and latest security signatures help us protect our client's network as well as their data. This is clear regarding the effectiveness of Check Point Harmony Email & Collaboration with AI-powered threat intelligence in blocking email threats.
What needs improvement?
The dashboard is the major area for improvement, but apart from that, all the rest is acceptable. The deployment for Check Point Harmony Email & Collaboration is complex and not straightforward.
The biggest challenge in deploying the product is setting up the dashboard for customer use cases, as that customization is more complicated compared to other solutions.
For how long have I used the solution?
I have been using Check Point Harmony Email & Collaboration for almost one and a half years, and I am nearing completion of two years.
What do I think about the stability of the solution?
Check Point Harmony Email & Collaboration is a stable product for me; whether it is for fifty users or fifteen thousand users, the same stability is maintained.
What do I think about the scalability of the solution?
Check Point Harmony Email & Collaboration is scalable, so we can adjust it as needed.
How are customer service and support?
The technical support for Check Point Harmony Email & Collaboration is good.
Which solution did I use previously and why did I switch?
A few years back we were using Cisco solutions, and right now, we are using Cisco Meraki. We are also working with Cisco Wireless access points, and currently, we are focusing on Cisco Meraki.
How was the initial setup?
In terms of the deployment model, it varies case by case; mostly, we deploy it on the cloud, but some customers might have specific requirements. Usually, we suggest deploying on Check Point Harmony Email & Collaboration's cloud or AWS due to better implementation capabilities.
The deployment for Check Point Harmony Email & Collaboration is complex and not straightforward. The biggest challenge in deploying the product is setting up the dashboard for customer use cases, as that customization is more complicated compared to other solutions.
What about the implementation team?
I am the reseller, meaning we are the integrators, so we are integrating all these solutions for our customers.
What was our ROI?
Measuring ROI for Check Point Harmony Email & Collaboration is quite difficult due to the nature of security solutions, but Check Point Harmony Email & Collaboration's ROI is much better than other OEMs because it secures our network and reduces the number of attacks. If I would measure it in percentage, I believe attacks have reduced by around thirty percent based on the effectiveness of the solution.
What's my experience with pricing, setup cost, and licensing?
Check Point Harmony Email & Collaboration is slightly higher in pricing than FortiGate or Sophos, but not excessively high. When considering the initial payment and pricing, CFOs tend to prioritize figures over technical aspects, so it is crucial to get clear instructions from CTOs or COOs to navigate comparisons made by financial teams.
Which other solutions did I evaluate?
We are using Fortinet firewalls and ZTNA . For vulnerability management, we are considering a solution such as Lacework , which I understand is a SIEM solution. We are also using Check Point Harmony Email & Collaboration, specifically Check Point Email Gateway.
What other advice do I have?
I would give Check Point Harmony Email & Collaboration an overall rating of ten points. Even though there is a problem with the dashboard setup being challenging, I would still give it the maximum rating of ten points.
All these automated tools at the gateway level, especially for email gateway, help to prevent data leakage and protect against malware and phishing, which Check Point Harmony Email & Collaboration rates at ninety-nine point nine percent effectiveness, and this will help us protect our network.
In terms of collaboration with security products, we can integrate with SaaS applications such as Microsoft Office, Google Suite, Slack, or even Dropbox, which makes the platform integration more productive for our clients or employees using various applications. The integration process is straightforward, and I do not see any complexity here.
All applications listed on the Check Point Harmony Email & Collaboration site offer straightforward integration capabilities. As a service provider, I can observe a significant impact on phishing attack mitigation with this solution. The overall rating I am providing for this review is ten points.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Email protection has cut phishing and spam, and security teams gain time for other issues
What is our primary use case?
At the moment, most solutions I have been working on are cloud-based, so I do not know if it will be in any of the solutions being reviewed.
Based on what I usually used Check Point Harmony Email & Collaboration for, it is an edge boarding solution to prevent spam, viruses, and other kinds of intrusions from gaining access from the internet to services that are published on the internet. It also protects internal networks, ensuring only the services that are supposed to be talking to each other do so, and provides VPN access for people who are working remotely. On the Harmony side, it was mainly email filters. After we organized it with the consulting company and set the first rules, after one week the system seemed to have learned the company's pattern. So at that time, we managed to achieve a reduction of almost eighty to ninety percent on spam and false emails, which was very good at the time. Later on, once Harmony also integrated with OneDrive, we were also able to stop viruses and files from getting infected inside the OneDrive services as well.
Check Point Harmony Email & Collaboration has had a significant impact on phishing attack mitigation. It reduced phishing attacks quite a bit. One of the other preventative measures we implemented was teaching people how to detect those kinds of emails, and we were able to reduce phishing incidents quite a bit because the system was detecting most of the phishing emails that we were receiving. However, we still needed to ensure that on both sides, both the system and the user were able to detect those kinds of emails so they do not fall into traps.
What is most valuable?
The most valuable features of Check Point Harmony Email & Collaboration include the artificial intelligence, which even before artificial intelligence was popular, was very good because once we programmed the first rules, it learned automatically the patterns of trusted and untrusted emails. It was much easier to manage false positives and spam and those kinds of emails. As I mentioned before, it reduced eighty percent of spam and false emails. Overall, for applying whitelists and rules on it, it was pretty easy because it also integrated quite well with Microsoft's own security systems, especially in the case of Microsoft 365, so we would not have one system onboarding the other; they would work very well together.
I think artificial intelligence-powered threat intelligence in Check Point Harmony Email & Collaboration acts pretty well on the preventive side, which allows us to be more proactive in terms of what domains are trustworthy and which ones are not. We had another case where initially it was blocking a lot of emails from China, but once we were able to filter out which domains were trustworthy, the system learned that those emails were trustworthy and would not tag them as suspicious. I thought it was pretty proactive once certain users get new emails from new domains they have never received before, where the first email does not characterize as suspicious but is monitored to ensure we are aware that this user is now receiving emails from this domain. If the patterns or the attachments inside the email show us to be untrustworthy, then it characterizes it as a suspicious email or, in the worst-case scenario, as spam or phishing email.
Robust inspection technologies in Check Point Harmony Email & Collaboration have helped me safeguard shared files in my collaborative environment. They make us much more aware of the files that are coming in and out, and we have following rules to ensure that they meet the standards as well.
What needs improvement?
I think Check Point Harmony Email & Collaboration could improve or enhance integration with other systems. I know at the moment it works pretty well with Microsoft 365 and Google Workspace. Perhaps in the future, there might be solutions as well that work with on-premise email solutions. Also, in Brazil, if I am not mistaken, at the moment, there are still only servers in the US and Europe, so it would be nice if Check Point Harmony Email & Collaboration had services in Latin America as well.
For how long have I used the solution?
I have been working with Check Point Harmony Email & Collaboration for the past five years.
What do I think about the stability of the solution?
Check Point Harmony Email & Collaboration was very stable and reliable for me.
I do not remember any outages or limitations with Check Point Harmony Email & Collaboration.
What do I think about the scalability of the solution?
I evaluate that Check Point Harmony Email & Collaboration was quite scalable. We started with one hundred users when we began using the solution. When I left the project, they were getting close to two hundred fifty users. It is quite scalable, but we just have to be aware of the licensing costs accordingly. Otherwise, as a cloud solution, we do not have to worry too much about resources other than paying for the necessary licensing.
How are customer service and support?
I mostly communicated with the consultants representing Check Point rather than with their technical support. I only communicated with them mostly about the firewall side, not Harmony, for most things. After everything was set up and in production, my communication was mainly for improvements and questions about new functionalities that were introduced later.
I did not have such serious issues that required me to reach out to technical support or customer support for Check Point Harmony Email & Collaboration. The one time was when a user was looking for some emails that were not arriving. When we checked on Check Point Harmony Email & Collaboration, we discovered the issue was on the Microsoft side, which was blocking the email. However, since Harmony integrates well with the security services of Microsoft, we can unblock those emails directly from Harmony.
Which solution did I use previously and why did I switch?
Before Check Point Harmony Email & Collaboration, we used to use the built-in tools that Exchange on-premise had.
We decided to switch from the previous solution to Check Point Harmony Email & Collaboration because we needed to improve the way we reacted to emails. Since the company relies heavily on emails for both internal and external communication, we needed to ensure we had a good and viable solution that allowed us to concentrate on other problems as well.
How was the initial setup?
The initial setup process for Check Point Harmony Email & Collaboration was pretty easy to set up on the Microsoft side, both for the proof of concept and for the production environment.
What about the implementation team?
I participated in the initial setup of Check Point Harmony Email & Collaboration.
Nothing offhand comes to mind regarding challenges or complexities during the setup process. We followed the instructions in the manual and from the consultants, and everything went smoothly.
What was our ROI?
I have definitely seen a return on investment with Check Point Harmony Email & Collaboration. On the administrative side, both my team and I used to spend much less time troubleshooting phishing, malware, and other email-related issues because of that solution. We gained much more time to address other issues beyond troubleshooting.
What's my experience with pricing, setup cost, and licensing?
So far, the pricing for Check Point Harmony Email & Collaboration is good for what it does. There is always room for improvements, but I think it is a fair price.
Which other solutions did I evaluate?
Other than Check Point, I did not evaluate other options or vendors extensively. I played a little bit with Acronis, which has a similar solution, but I had only done tests with it. They are mainly a backup solution but have also expanded into other services. Comparing Check Point Harmony Email & Collaboration to Acronis, Acronis still has a couple of improvements to do, but Check Point Harmony Email & Collaboration works pretty well on the detection of emails.
What other advice do I have?
I have not utilized the automated incident response feature.
I think we used Microsoft's own real-time URL reputation analysis. I do not remember if we ended up integrating Harmony or if it was part of the package or not, but I do not remember using it.
I was an administrator and I also helped integrate the solution.
I would rate this review as a nine out of ten overall.
Email protection has reduced phishing attacks and now supports reliable cloud-based management
What is our primary use case?
I deal with firewalls, firewall switches, and FortiCloud . Regarding the web application firewall, FortiAppSec Cloud, I have worked on some projects for customers who have switches and firewalls and want to obtain the solution for the management console in the cloud.
I work with Check Point Harmony Email & Collaboration, Harmony Endpoint, and other products from Check Point and firewalls. I have been working with Check Point Harmony Email & Collaboration for about five years.
What is most valuable?
I find the certification for Check Point products most valuable,. Some engineers on my team have obtained Certified Security Administrator (CCSA) and certification.
The automated incident response feature by Check Point CloudGuard is a good product. I assess the effectiveness of AI-powered threat intelligence in blocking email threats as a really good addition for new product services because AI is something that most companies and technologies are now working with.
The way robust inspection technologies have helped safeguard shared files in my collaborative environment depends on the opportunity that the company has with the customer.
I have noticed a significant impact on phishing attack mitigation with Check Point CloudGuard . For us, I prefer Check Point before Palo Alto and before other brands because Check Point is most effective in attack mitigation and attack detection.
What needs improvement?
Check Point Harmony Email & Collaboration is currently working well, as it is able to detect risks before they occur, unlike Microsoft. We have been able to demonstrate to customers that Check Point can detect a risk that Microsoft overlooked.
I do not know what additional features I would like to see in the future to make the product even better because this is a good product.
For how long have I used the solution?
I have been working with Check Point Harmony Email & Collaboration for about five years.
What do I think about the stability of the solution?
I agree with the way that Check Point is working. I do not have ideas on how to improve it because this is the tool that makes the work and the job correctly.
What do I think about the scalability of the solution?
Deployment is easy for the product.
How are customer service and support?
I rate the technical support by Check Point as one out of ten because I did not use Check Point support as we had no problems when we deployed the solution. Once the solution was already in production, it worked properly and never failed. To be honest, I have never worked with Check Point support.
Which solution did I use previously and why did I switch?
We have worked with other brands such as Fortinet, Cisco, and Palo Alto Networks, as we are a partner company for several brands and specialize in networking and cybersecurity solutions. More than just selling products, we are consultants, so we recommend the brand that best suits our clients' needs. It's possible that someone visited our website looking for information about a specific product.
How was the initial setup?
The integration with third-party solutions is straightforward. It is a product that can integrate with another product as well.
What about the implementation team?
No, we haven't used other resellers or integrators, because we are a Checkpoint partner and integrator.
What was our ROI?
In our region here in Peru, Check Point Harmony Email & Collaboration is not as popular as there are some alternatives which are better known.
What's my experience with pricing, setup cost, and licensing?
I am not the person to say what cost Check Point has for their products. However, for partners like us, if we could get some discount or protect our project in front of another competition, that would be great.
Which other solutions did I evaluate?
I represent other brands including Check Point and Palo Alto. Several brands are represented by our company because we are more than just the sales boxes of products—we are a consulting company as well. Depending on the customer necessity, we can find a solution for that customer based on what they want, what they need, and the cost that they are able to spend.
For a small company, I do not think Check Point Harmony Email & Collaboration is the best fit because small companies are always looking for a cheaper product. However, for medium and larger companies, it is better.
Email protection has stopped phishing and secured cloud collaboration across all devices
What is our primary use case?
We are working with Check Point Harmony Email & Collaboration not only for Harmony, but also for their SaaS solution, their CloudGuard solution, their next generation firewall solution, and their SD-WAN solution.
We started working with Check Point Harmony Email & Collaboration, which is a very good solution for Microsoft Office 365 and Google Workspace users. For their office business productivity suite, which includes products and solutions such as email, OneDrive, SharePoint , Slack, and Teams, this solution gives 100% protection. As far as Google Workspace is concerned, it gives protection for Google email, Gmail, and Google Drive . Additionally, it provides protection for other services such as Box and Dropbox.
What is most valuable?
Deployment is very easy since it is API based and does not require any harsh configuration. The DMARC management and DMARC forensic is the best feature. Their security engine provides everything such as DLP and encryption. Check Point Harmony Email & Collaboration provides almost 100% security for phishing emails. Their DMARC management is very standard compared with any other brand or any other email security provider.
The best thing is that on a single tenant I can manage multiple services such as Harmony Endpoint, Check Point Harmony Email & Collaboration, Harmony Browser, mobile security, EDR, XDR , which is endpoint security, and SaaS. All of these services have a single dashboard. When giving security to email, in Check Point Harmony Email & Collaboration, I do not need to change any MX record or any DNS entry changes. I simply add one text record for DMARC and no changes are needed in the MX record of that particular domain. This is very easy because Check Point Harmony Email & Collaboration is in the tenant of Microsoft Office 365 and Google Workspace only.
Check Point works on zero trust network technology. They are not only giving a feature of artificial intelligence but also machine learning summary. Machine learning summary is also given when they catch any kind of incidents such as phishing attacks, malware attacks, and ransomware attacks. They always provide real-time alerts for that.
Real-time URL analysis is provided for phishing links and all these things. It gives 100% output for that and shows the source from where the malicious URL comes from. Additionally, they always provide threat emulation. This means the simulation of what danger happens when I click that particular URL is also provided in their report.
It gives 100% protection to all BYOD devices. For example, one single Microsoft 365 account can be configured on different five devices. Many companies give email access to their employees on their mobile as well. In that case, if any malicious file is on the mobile and the employee would like to save it on OneDrive, due to this security, the user and administrator will get a real-time alert that this file is malicious and cannot be uploaded to OneDrive. This not only saves money but also saves time and prevents the organization from such cyber attacks.
What needs improvement?
Check Point must develop one mobile app for iPhone users, Android phone users, and Windows phone users or at least for the administrator to see that dashboard on that particular app. This would be very helpful for administrators. Currently, every time we need to log in through a computer, we have to go through multi-factor authentication and all these things, which is time-consuming to log in to that portal. If they give such kind of facility, then it will be very helpful for an administrator to manage and maintain the things in a proper way.
For how long have I used the solution?
We have been using this solution for the last three to four years.
How are customer service and support?
Their support is very great. In cloud services, there is no RMA involved, which means no physical device is involved. The service is very up to date.
Which solution did I use previously and why did I switch?
Cisco IronPort technology is available. However, Cisco, Barracuda, and many other solutions are available in the market. The problem is that the customer has to migrate their MX record for a particular domain. The basic thing is that in their technology, you cannot scan internal mail. For example, if two people are part of one enterprise and are using Check Point Harmony Email & Collaboration, the communication between them on the same domain is also scanned. However, when considering competitors such as Cisco, Barracuda, Sophos, and other players in the market such as OPSWAT, there is always a threat that internal mail is not scanned because email is hosted on a Microsoft server and the MX record is hosted on a third-party server. That is the problem. Check Point Harmony Email & Collaboration scans internal as well as external mail, which is why it is the better choice.
How was the initial setup?
Setup is very simple since it is API based. I do not require anything. I just have to enter the credential of Microsoft tenant ID and password or Google super admin username and password and the process is very simple due to artificial intelligence and machine learning technology. It will implement automatically. If I have some knowledge, I can implement the policies and have custom policies as well. In DLP , they have given already many pre-configured policies for data loss prevention. Apart from that, if I would like to have my own policy, they also give that facility where I can put my own policy.
What other advice do I have?
The best thing is that on a single tenant I can manage multiple services such as Harmony Endpoint, Check Point Harmony Email & Collaboration, Harmony Browser, mobile security, EDR, XDR , which is endpoint security, and SaaS. All of these services have a single dashboard.
Check Point offers three features in their solution. The basic package, advanced package, and complete package are available. The complete package comes with encryption and DLP, which is Data Loss Prevention. The price difference between the advanced package and complete package is almost double. They have already given choices regarding which package customers can sustain and according to that they can be provided. As for the price, Check Point always has flexible pricing. They never charge more and can work within any given budget. I give Check Point 10 out of 10 for pricing. My overall review rating for this solution is 10 out of 10.
Email defense has reduced phishing risk and automates incident response for cloud mail platforms
What is our primary use case?
Check Point Harmony Email & Collaboration is used at the OAuth API level for integration with Google Workspace and Office 365 . It is intended for customers who have their environment set up in Office 365 or Google Workspace and does not support any third-party email software.
What is most valuable?
Check Point Harmony Email & Collaboration has a comprehensive analysis page for phishing emails, showing details such as SPF, DKIM, and the AI detection model. The solution also includes sandboxing for links and attachments and has an integrated VirusTotal feature. The relationship between domains is detailed, offering valuable insights including risk analysis and communication history.
The automated incident response feature provides inline prevention by blocking emails before they reach the inbox. It is beneficial for security administrators as they can automate policies without daily manual inspections, leading to fewer false positives.
AI-powered threat intelligence effectively analyzes mail body to detect malicious intent, despite hackers employing new techniques that avoid conventional scans for attachments and links. The effectiveness is rated nine out of ten due to occasional false positives.
URL reputation analysis enhances threat prevention processes, being one of the top URL scanners available. It considers domain age as an indicator of potential malicious activity, alongside VirusTotal and other integrations.
The inspection technologies are robust, safeguarding shared files and integrating with platforms like Teams to block malicious links.
Overall, the benefits of using Check Point Harmony Email & Collaboration include easing system administration tasks. Features such as banners provide end-users with concise email summaries, enhancing usability and security awareness.
What needs improvement?
Improved support is needed as current support is slow. Additionally, the AI engine could improve, particularly concerning text body attacks where false positives have been noted. Latency issues have also been experienced, with some cases taking fifteen to twenty seconds to process, while others take up to one or two minutes.
For how long have I used the solution?
I have been working with Check Point Harmony Email & Collaboration for almost one and a half years.
What do I think about the stability of the solution?
I find Check Point Harmony Email & Collaboration to be quite stable.
What do I think about the scalability of the solution?
In terms of scalability, Check Point Harmony Email & Collaboration is easily scalable. As a cloud-based solution, it accommodates diverse user bases, from thirty thousand users to five hundred users, offering excellent scalability.
How was the initial setup?
My experience with the initial setup and deployment process of Check Point Harmony Email & Collaboration is that it is minimalized, completing in fifteen minutes. However, since it is AI-based, it requires one day to synchronize and learn all mailboxes before policy setup can begin.
What was our ROI?
In terms of ROI, Check Point Harmony Email & Collaboration effectively brings ROI to my clients. It suits both SMB and enterprise customers because it is an affordable solution that performs well, resulting in satisfied customers.
What's my experience with pricing, setup cost, and licensing?
My experience with the pricing aspect, including setup cost and licensing cost of Check Point Harmony Email & Collaboration, is that it is minimal. Compared to competitors, it remains competitive.
Which other solutions did I evaluate?
Apart from Check Point Harmony Email & Collaboration, I also work with other technologies, specifically Trend Micro. When comparing both, Check Point offers more detailed mail quarantine analysis, proving advantageous for system administrators.
What other advice do I have?
From the features perspective of Check Point Harmony Email & Collaboration, it only supports Google Workspace and Office 365 because of its API-based nature. An MX gateway option would enhance the solution.
My advice to other organizations considering Check Point Harmony Email & Collaboration would be that it is a great tool. Use it fully but check for false positives initially until fully streamlined. I rate this solution nine out of ten.