The customer has a presence in different countries like India, Poland, and the US. They use Office 365 as an email solution, and on top of that, they use Harmony Email & Collaboration.
Reviews from AWS customer
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Allows safe inspection of links and their destinations within a controlled environment and easy workflow integration
What is our primary use case?
How has it helped my organization?
All API email security or gateway security solutions work the same as API based. You create an API with the vendor, and it works for all the same. It's just the approach of threat intelligence, how it is taken and how much threat intelligence you have.
Pushing was a big challenge for email security. Cisco has done that, but now Check Point is also doing the same with the quarantine email. So, it's good. Previously, they didn't have the ability to find and detect the quarantine email, but they are doing it now.
What is most valuable?
The most valuable feature is the sandboxing feature. It provides a sandboxing environment where you can open links and see where they lead. You can see what is presented in the link after opening it.
Other advantages, like workflow integration, are quite simple and offered by other vendors as well. Cisco is also integrating virus totals into their products.
But the key advantage here is the visibility you get with the sandboxing feature.
You can see on a map, on the same dashboard, where the mail originated, where it is going, and from which relay servers. You can see everything visually on the portal, including who it's reaching and who is CCed or BCCed.
Every vendor has a different approach. But as far as I have seen with Check Point, it is quite easy and simple to manage. They have the DLP solution integrated with this email. For example, for email, DLP is zero.
What needs improvement?
Maybe Check Point can work on the DLP part. Proofpoint's email DLP is very good, so they can work on that more.
For how long have I used the solution?
I have been using it for six months.
What do I think about the stability of the solution?
Stability is not too bad. It's not glitchy.
What do I think about the scalability of the solution?
Scalability is good. You can add users at any time. You can have hundreds of users in there. No issues or restrictions here.
How are customer service and support?
The customer service and support are okay.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Compared to other solutions, users have the advantage of cost because Check Point is very easy to handle. You can easily train anyone on Check Point. It's not complex.
How was the initial setup?
It's quite simple. Straightforward provisioning is required. You have to do it with a vendor, like Office 365 or G Suite, and you are good to go. Just onboard the users, and that's it.
You can deploy it in a day. For the refinement of the tool, it takes a little bit of time because all email security works by first keeping it on monitor mode and monitoring what you are getting as spam. You do an audit. It takes time with this. But for the configuration part, you can do it in a single day.
What about the implementation team?
For deployment, one person is enough. For maintenance, you need two or three people to check spam. Sometimes, emails get blocked, and users request them to be unblocked. You have to verify those things. But for deployment, one person is enough.
It's a SaaS portal, so you don't have any maintenance issues because it's all done by the backend OEMs.
What was our ROI?
There is an ROI. In the long run, you will have saved money because it's a cloud-based portal with no maintenance issues.
What's my experience with pricing, setup cost, and licensing?
Compared to other vendors, the pricing is average. I guess FortiMail is a little cheaper.
What other advice do I have?
Overall, I would rate the solution a nine out of ten. I would recommend using it because it is easy to use and manage.
Which deployment model are you using for this solution?
Provides robust email security features, but the pricing could be affordable
What is our primary use case?
We use the product to address core, perimeter, and administrative security requirements for firewalls within our environment. Additionally, we cater to email security requirements for clients using both Google Workspace and Microsoft 365 platforms.
What is most valuable?
The product's most valuable features for email security are its ability to safeguard domain names, detect duplicate email users, and identify spam emails impersonating legitimate email IDs, thereby enhancing overall security. It also has a robust filtering system.
It's very easy to use, and the onboarding process is straightforward. We can easily categorize users, create groups, and apply policies accordingly, simplifying policy management for different user groups within an organization.
What needs improvement?
In India, pricing is a concern, especially for SMEs. Check Point needs to address the pricing segment for SMEs. Apart from that, the technology and other aspects like sales and marketing are satisfactory.
Most OEMs provide similar capabilities. If any OEM introduces new features, Check Point must match those capabilities. It could improve by offering an on-premise solution for customers still using Microsoft Exchange, which currently provides only cloud-based services.
For how long have I used the solution?
I have been using Check Point Harmony Email & Collaboration for about a year. We directly sell the latest version to customers, including SMEs, enterprises, and SMBs.
What do I think about the stability of the solution?
The product is stable. We have yet to encounter technical or deployment issues. My team is comfortable working with the solution due to its reliability and the prompt assistance that Check Point's support team provides. I rate the stability an eight out of ten.
What do I think about the scalability of the solution?
We have 35,000 Check Point Harmony Email & Collaboration users, covering all three segments: small, medium, and enterprise.
It is a scalable product and meets the evolving business needs. Their communication and understanding of customer requirements make deploying and scaling the solution easy. I rate the scalability a seven out of ten.
How are customer service and support?
We have yet to encounter many technical issues, but Check Point's support team has been responsive and helpful whenever required.
How would you rate customer service and support?
Positive
How was the initial setup?
We completed ten deployments, including the installation and setup, in one week. Overall, it takes around seven days to complete. It involves collecting information from the customer about the number of users and the email services they use. The onboarding process is easy and takes one to two hours, followed by policy creation based on customer requirements.
I rate the process a nine out of ten.
What's my experience with pricing, setup cost, and licensing?
The product is expensive compared to some competitors, especially for the SME segment in India. On average, it's around 10,00,000 to 15,00,000 lakh rupees for 200 users per year. Additional costs depend on the customer and their requirements.
I rate the pricing a six out of ten.
What other advice do I have?
I suggest conducting a proof of concept (POC) before purchasing the product. Customers will likely find it reliable and effective after analyzing it for 10 to 15 days.
I rate it a seven out of ten.
Which deployment model are you using for this solution?
Offers complete detection and simple management and is a user-friendly solution
What is our primary use case?
I use Check Point Harmony as a security using one solution for both mobile and app development. If we use email security like Office 365, Microsoft Office 365, or G-Suite, we can protect all incoming emails from Microsoft Exchange and stop spam mail with all kinds of security check policies with Check Point Harmony.
How has it helped my organization?
It's very effective as a solution to prevent mobile app threats. It has a mobile MDX, mobile detection, and response session.
As a comprehensive solution, Check Point offers a very granular and best-in-class experience. Compared to competitors like Fortinet, Trend Micro, Palo Alto, and Cisco, Check Point provides a superior solution according to both the MITRE and Gartner frameworks.
For example, in a recent attack simulation, Check Point only allowed ten malicious emails through, while Fortinet allowed 1500 and Cisco allowed 1800. Check Point's email attack ratio is nearly 0.10%, while others range from 1% to 3%. This demonstrates Check Point's superior email filtering capabilities.
Check Point's email cleaning ratio is 99.9%, significantly higher than the 98%, 95%, or 93% of its competitors.
Moreover, Check Point Harmony Email incorporates AI technology within its security features.
Harmony Email & Collaboration (HEC) provides full protection and addresses zero-day files. It's the best solution available, as others don't offer protection against zero-day attacks and rely on signature-based solutions. HEC is truly the best option.
What is most valuable?
The sandbox solution is provided by Check Point. It offers complete detection and simple management and is a user-friendly solution. It has zero impact on user experience and privacy.
It helps detect malware, phishing attacks, and malicious calls and emails. It prevents man-in-the-middle attacks and protects corporate assets and resources. Harmony Mobile also blocks network access attempts to corporate resources, protecting our assets.
There is one feature that is robust: it detects OS vulnerabilities.
What needs improvement?
Check Point could improve its marketing strategy. They need to better reach customers and partners, providing more demonstrations and proof-of-concepts (POCs) to raise awareness and drive business growth.
For how long have I used the solution?
I have been using it for ten years.
What do I think about the stability of the solution?
It's very stable. Check Point Harmony is a stable and consistent solution.
What do I think about the scalability of the solution?
I would rate the scalability a nine out of ten. There are around a thousand end users.
If we increase emails, we can increase the number of users in the system.
How are customer service and support?
We get good support from Check Point. Whenever we implement anything and require technical assistance, we receive good support.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup can be completed within minutes. There's no need to install any agent or software on your system. It's configured behind your existing email solution, like Microsoft Exchange.
Your emails will first go through Microsoft Exchange, then through the Check Point agent, and finally, the clean emails will be delivered to the endpoint.
What's my experience with pricing, setup cost, and licensing?
The cost is similar to other competitors. It's not much higher.
It's around INR 2,000 to INR 4,000 per mailbox.
There are no additional costs.
What other advice do I have?
I would recommend Check Point Harmony solutions to customers. It's easy to deploy, and it's in a good position in the MITRE framework as well as a Gartner leader.
Overall, I would rate the solution a ten out of ten.
Helps quarantine emails with security issues
What is our primary use case?
I use the solution in my company to secure the users' environment so that there are no phishing attacks. The tool operates as an anti-spam solution for the users in our company. Each and every email passes through the email security scanning process. Emails with issues get quarantined by the solution.
What is most valuable?
The most valuable features of the solution include all of the functionalities offered by the tool, which work fine. I cannot say that a particular feature does not work fine. Each and every feature provided by the product works fine.
What needs improvement?
At the time of the purchase of the product for the users in my company, I am unable to see or get details of the users for whom the product has been purchased. I need to go to Check Point's admin portal if I want to see the license list and the details of the users of the tool, making it an area of concern where some ease of process should be provided from an improvement perspective.
For how long have I used the solution?
I have been using Check Point Harmony Email & Collaboration for two years.
What do I think about the stability of the solution?
There are day-to-day updates in the solution. The product gets updated automatically since it is a SaaS-based tool. My company does not have to invest time to upgrade any applications in the product. In general, it is a hassle-free process to work with the product.
What do I think about the scalability of the solution?
My company has around 50 users of the product.
My company plans to increase the number of uses of the product in the upcoming two or three months.
How are customer service and support?
The need to seek technical support depends upon the severity of the issues that we face in our company with the product. Depending on the severity of the issue, my company connects with the support team in three to four hours. During high-severity cases when our entire organization goes down due to some issue in the product, my company connects directly with the support team.
How was the initial setup?
People already use the product as a SaaS-based tool, but it can be complex if used at an in-house level only. As a SaaS-based tool, the product is easy to use without complexities.
The solution is deployed on the cloud.
The solution can be deployed in twenty minutes to half an hour.
What was our ROI?
I work in a hospital where we purchased the tool for security purposes. Being a hospital, we did not purchase the product with an ROI angle in mind.
What's my experience with pricing, setup cost, and licensing?
I don't even have details of the product's single license purchased by my company.
What other advice do I have?
The product is useful as it works fine to secure our company's email communication. My company has not faced any issues since the time we purchased the solution.
The product has improved our organization's functioning as a secure collaboration tool, considering that different products are made available in the market on a day-to-day basis. As a tool for email security, the solution serves as one of the best products in the market.
The product offers good and easy integration capabilities with other products. When it comes to integration, the product will ask about the credentials of the global applications to the tool's admin, after which it will automatically scan the licenses of the integrated products.
The reports and analytics part of the product is fine for my company since it allows us to check the analytical reports on a weekly basis at a user level. The product provides different kinds of reports like anti-spam reports that we can check in our company.
I recommended the product to those who plan to use it for email security purposes, as it offers a seamless and user-friendly experience to its users. There is no complexity involved in integrations with other products for better email security.
The need for cybersecurity will increase in different ways on a daily basis. The product does not provide alerts. The product fails to provide alerts if some issue occurs at a global level. From an improvement perspective, the product should provide alerts related to email security to its users.
I rate the tool a nine out of ten.
Complete protection to prevent Malware attacks.
It will detect advanced phishing, malware, and ransomware attacks in real-time to secure your emails and data.
Also the the implementation process is very easy because it is a cloud-based service.
The most easy to use email protection solution
Would like to see more integrations supported soon
Dependable Email security solution for your organization
The spam protection works efficiently.
The dashboard being so user friendly delivers great user experience for us.
Good DLP and threat prevention and helpful centralized management
What is our primary use case?
The company handles confidential information, such as clients' financial data, and it is important to keep that information secure to comply with certain regulations.
One of the important challenges was to counteract the amount of phishing, ransomware attacks, and accidental leaks of information through email and collaboration applications.
We did not have a tool that would provide this security, so we chose to look for one and apply it to our environment.
How has it helped my organization?
The company handles a large amount of client information, some of which is confidential, including account numbers and sensitive information. This tool provides us with the features to meet the needs we have.
One of these features is real-time threat prevention. It uses advanced analytics to detect and block malicious emails, phishing, and unwanted content before they reach inboxes. It also has DLP. This helps prevent the leak of information. In this way, we can reduce vulnerabilities.
What is most valuable?
The tool has many important features. Some of them are very valuable.
One of the most valuable is real-time prevention, which constantly analyzes and provides results. The leak control that comes with DLP is excellent.
It provides us with a more centralized management where we can monitor everything that happens in our environment and in this way, can manage the security policies necessary for our organization in real time.
It is fast and quite effective in terms of preventing any security incidents.
What needs improvement?
The product is a very effective tool. It provides a lot of security to ensure the confidentiality of the information.
Although it has good characteristics, it should improve the graphical interface and the latency that it sometimes presents.
They should also improve the quality of technical support since, in the last few years, they have lowered the quality of SLA response and do not provide concise solutions.
They should also generate a knowledge base where the unified information or the most common errors are found so as not to depend so much on support.
For how long have I used the solution?
I have experience using the solution for four years.
What do I think about the stability of the solution?
The stability presents as efficient.
What do I think about the scalability of the solution?
The scalability is new; it is multi-cloud.
How are customer service and support?
The experience has not been very good since we have had problems with the SLA.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
There was no previous solution in the organization.
How was the initial setup?
The initial implementation is complicated when you do not have experience with said tool.
What about the implementation team?
It was implemented with the seller and his engineer in charge, which was very fast and friendly.
What was our ROI?
The investment is somewhat high. However, it will provide security for all customer information.
What's my experience with pricing, setup cost, and licensing?
The tool is somewhat competitive with the others on the market. The installation has an average learning curve.
Which other solutions did I evaluate?
Several solutions were evaluated, such as Microsoft Defender for Office 365, Proofpoint Email Protection, and Cisco Secure Email.
What other advice do I have?
It is an excellent tool for information security. Before acquiring it, you must analyze whether it meets company needs.
Which deployment model are you using for this solution?
Helps quarantine and remove threats and detect malicious emails
What is our primary use case?
We use the solution for preventing malicious emails that we're getting through Google's built-in spam filters. The amount of spam and phishing had greatly increased at our organization and we needed a solution implemented fast.
Check Point was really quick to integrate and implement and instantly started providing value. The reporting we got during our trial helped to quantify the value to the executive team, in particular, the report that shows what Check Point caught items that Google's spam filters would've let through.
How has it helped my organization?
The amount of spam and phishing getting through to end users has reduced drastically.
We are also now able to advertise how many malicious emails we get and how it is constantly increasing as we grow. This shows our users how valuable a solution like this is and they appreciate that sometimes it may get a false positive.
We're abe to show to users why emails are quarantined - which has helped to train them on what to look out for if they do receive a suspicious email. We have also improved our reporting process and notifications to admins.
What is most valuable?
First and foremost, Check Point's ability to detect malicious emails and the filters they put in place are a big improvement on the built-in Google Workspace solution.
Being able to mass quarantine and remove emails from end users' mailboxes has become extremely important to us as we have grown in size. Admins can be notified as soon as a suspicious email arrives in bulk mailboxes and can act extremely quickly. This has even helped us to notify partners that they had been breached before they knew themselves.
What needs improvement?
There are a few features that are more geared towards Microsoft users rather than Google, for example, user-reported phishing. It's not fully integrated with Google Workspace, and the statistics don't update in real-time.
We appreciate that Microsoft has the larger market share, and Check Point has been improving its Google integration. However, more advancements would be appreciated. That being said, the "What Google wouldn't have caught" report was extremely valuable to us in showing value.
For how long have I used the solution?
I've used the solution for nine months.
Which other solutions did I evaluate?
We evaluated other solutions, such as Mimecast, Proofpoint, and Abnormal.