Listing Thumbnail

    Harmony Email & Collaboration (Avanan)

     Info
    Deployed on AWS
    Email is the first link in a chain of attacks, and with the rise of remote work, the use of cloud mailboxes and collaboration apps increased exponentially. Harmony Email & Collaboration provides organizations with complete, full-suite protection that is constantly adapting and evolving to the ever-changing threat landscape, while providing security admins with an easy-to-deploy and manage platform, making your security offerings easy and efficient.
    4.5

    Overview

    Play video

    Check Point Harmony Email & Collaboration offers complete, defense-in-depth security for Microsoft 365 and G-Suite, and extends to the full collaboration environment, including file sharing and chat, as well as Slack and Microsoft Teams. Scan every inbound, outbound and internal em ail. Prevent phishing and malware from spreading within your organization or to your customers and partners. Check every file for malicious content using the most advanced sandboxing and active-content analysis in the industry. Quarantine threats before your users download them Identify confidential information and apply context-aware policies that confine the data to a particular organization or work group. Your users can leverage the full power of collaboration tools, while automated work flows enforce regulatory compliance, ensuring PCI, HIPAA, PII, or other protected content does not leak. Check Point Harmony Email & Collaboration ensures seamless security. Deploy instantly with the only one click, cloud-enabled platform, with no need for a proxy, appliance or endpoint agent.

    Highlights

    • Complete Protection: Secure all lines of communication, from email to collaboration
    • Bulletproof Security: We catch the most sophisticated and evasive attacks that others miss
    • Efficient, Effective: A single, effective and cost-efficient solution for email and collaboration suites

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Harmony Email & Collaboration (Avanan)

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (5)

     Info
    Dimension
    Description
    Cost/12 months
    Harmony Email and Collaboration Complete
    Harmony Email+Collab-Complete: Secure O365 Suite(Email,OneDrive,Teams) and GSuite (Gmail,GDrive), Dropbox, Slack (and more) w/ Antiphish, Antimalware, URL Protect+Rewrite+Emulation,BEC Protect,Anomalies,ShadowIT,Sandbox,ThreatExtraction,DLP,Encryption, 1user
    $109.14
    Harmony Email and Collaboration Advanced
    Harmony Email+Collab-Advanced: Secure O365 Suite (Email, OneDrive, Teams) and GSuite (Gmail, GDrive), Dropbox, Slack (and more) w/ Antiphishing, Antimalware, URL Protect+Rewrite+Emulation,BEC protection,Anomalies,Shadow IT,Sandboxing,Threat Extraction, 1 user
    $83.46
    Email Archiving
    Email Archiving- A license to archive emails up to 10 years old for all licensed users, 1 user. Add-on on top of HEC Advanced / HEC Complete
    $51.36
    IRaaS
    Incident Response as a Service (IRaaS) - Management and remediation of end-user quarantine release requests and phishing reports by a Check Point analyst, 1 user. Add-on on top of HEC Advanced / HEC Complete
    $15.00
    DMARC Management
    DMARC Management - Quick and safe transition to and maintenance of strict DMARC record, 1 user. Add-on on top of HEC Advanced / HEC Complete
    $10.70

    Vendor refund policy

    No Refunds

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    This offer includes Premium Support. For the full list of included support services visit: https://www.checkpoint.com/support-services/support-plans/  To open a support ticket, you would need to have a Check Point user center account. If you do not have a user center account, you can sign up for one here: https://accounts.checkpoint.com . Need support? Contact us at

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4.5
    171 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    38%
    57%
    5%
    0%
    1%
    5 AWS reviews
    |
    166 external reviews
    External reviews are from G2  and PeerSpot .
    Susan Q.

    Seamless Security Integration That Keeps Productivity High

    Reviewed on Nov 26, 2025
    Review provided by G2
    What do you like best about the product?
    Its ability to stop phishing and account takeover attempts before they reach users, while keeping email and collaboration tools running smoothly, is key. The solution integrates seamlessly with platforms like Microsoft 365, providing clear threat visibility and robust protection without disrupting productivity.
    What do you dislike about the product?
    The reporting dashboard could be more intuitive, and integration with certain collaboration platforms requires additional effort. While the security is robust, these usability issues can slow down administration and increase the workload for IT teams.
    What problems is the product solving and how is that benefiting you?
    It solves the problem of phishing, account takeovers, and malicious attachments by blocking threats before they reach users. It protects cloud platforms like Microsoft 365, ensuring the security and reliability of email and collaboration tools.
    Denis Dávila

    Provides automated email threat detection and allows us to train departments based on real attack patterns

    Reviewed on Nov 24, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Check Point Harmony  Email & Collaboration serves as my main protection platform for Office 365  SaaS platforms, including email, OneDrive, SharePoint , and I utilize some training features. In my daily work, Check Point Harmony  Email & Collaboration has become our number one protection platform; it reviews all information that passes through our Office 365  and makes the final decision on whether something poses a risk to the organization. Every day, we review each of the alerts regarding user interactions at the spam, phishing, malware levels and analyze the threat behavior our organization is receiving, including which departments face the most attacks, what is the number one target, and what types of attacks we receive daily, such as phishing, graymail, spam, malware, etc.

    What is most valuable?

    The process of reviewing alerts in Check Point Harmony Email & Collaboration is automatic; the tool executes the entire process we have configured, checking and taking actions to block anything suspicious automatically, without any action from us. Essentially, we connect to check if the actions taken are correct and whether there are any false positives; otherwise, the tool operates 100% automatically based on the parameters we have configured in each rule.

    When Check Point Harmony Email & Collaboration detects something suspicious, it runs a certain number of intelligence engines that analyze the data source, the domain's reputation, and the current interaction of that domain with our platform. If it is the first time an email arrives from that domain, it alerts the user; if the email contains content that could be malicious, the user is also alerted, and a score is assigned to the email. If the score exceeds the thresholds we have set, it is classified as a low, medium, or high threat, resulting in automatic blocking and alerting the user about the action taken, allowing the user to interact with the platform and report false positives if they believe the email is valid.

    Additionally, I utilize Check Point Harmony Email & Collaboration as a training tool; its new Security Training module allows us to conduct department-specific training on phishing, controlled tests, and provides a score for our organization, along with further training to raise awareness within the security department. Other very specific use cases involve user engagement, as we strive to provide as many actionable reports to users as possible to help them be aware of the risks they face daily and how these risks could affect the organization as a whole.

    In my opinion, the best feature of Check Point Harmony Email & Collaboration is its ease of integration with platforms like Office and Google Cloud , allowing for automatic integration that results in a robust platform that makes decisions based on your organization with just a couple of steps. The most used features include email tracking, which allows us to easily follow up on emails and conversations, helping us understand what is happening within the organization when an alert is detected, providing more context rather than simply blocking an email due to detecting something malicious. Its intelligence engines also review how interactions occur within the platform, and the integration with inspection engines and our infrastructure knowledge at the email level makes it one of its best features.

    Those integrations definitely help me save time and improve security, as we no longer need to manually review each alert and are less concerned about false positive reviews. The tool operates automatically, making our workload easier, while also significantly enhancing our overall security.

    Since acquiring Check Point Harmony Email & Collaboration, we have seen an increase in the blocking of Business Email Compromise, phishing, and spam emails, drastically reducing our exposure to email security risks. We have noticed a reduction in accepted phishing attempts since we started using Check Point Harmony Email & Collaboration compared to the protection of Microsoft 365. We have graphs showing that Microsoft 365 detects approximately 65% of threats, while Check Point processes the rest of that 65%, thus providing better protection than traditional solutions.

    What needs improvement?

    To improve Check Point Harmony Email & Collaboration, one notable enhancement would be to fully integrate the DMARC and SPF protections they have; once this is correctly implemented, I believe it will further improve internal email protection outcomes.

    We have only encountered some false positives that required us to whitelist certain third-party domains, mostly due to their poor email configuration preventing DMARC or SPF alerts. Frankly, the platform performs very well, and we have not experienced any other issues since we began using it.

    Currently, I believe that no further improvements are needed for Check Point Harmony Email & Collaboration.

    For how long have I used the solution?

    I have used Check Point Harmony Email & Collaboration for seven or eight years.

    What do I think about the stability of the solution?

    The platform is very stable; we have not encountered any downtime or stability-related issues, so I would say we have had 100% uptime.

    What do I think about the scalability of the solution?

    The scalability of Check Point Harmony Email & Collaboration is very straightforward; we experience an annual growth rate of about 10 to 15%, and scaling up is simple, as we only increase licensing, and the rest happens automatically. User synchronization and administration detect user license activation, and protection begins from day one.

    How are customer service and support?

    I have not needed to open any support cases with Check Point Harmony Email & Collaboration, which indicates that my experience with support has been very good.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Before using Check Point Harmony Email & Collaboration, we were utilizing Microsoft 365 with Defender for email protection.

    We switched from Microsoft Defender to Check Point Harmony Email & Collaboration because we had an event where Defender failed to detect a threat, allowing phishing and spam emails to reach our directors. We chose Check Point Harmony Email & Collaboration because we felt it has better security engines and a more detailed administration of internal security and event management. It also provides graphs and statistics to illuminate how these events occur within the organization, allowing us to identify which departments require closer monitoring or which ones are the main targets for threats, such as directors, purchasing, and HR. We evaluated various tools before choosing Check Point Harmony Email & Collaboration, including Proofpoint, but ultimately, we decided to go with Check Point.

    How was the initial setup?

    I would advise others considering using Check Point Harmony Email & Collaboration to conduct a proof of concept directly with Check Point to set up the initial configuration and see the platform working at full capacity before making a decision, and that they can compare the detection parameters provided by Check Point with any other email tools they are evaluating.

    What about the implementation team?

    We are customers and do not have any relationship with the vendor or partner.

    What was our ROI?

    We have seen a return on investment with Check Point Harmony Email & Collaboration; specifically, we have drastically reduced the time it takes to detect and stop a threat, which has been cut by over 2 hours from detection to the automatic blocking of the threat.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup costs, and licensing for Check Point Harmony Email & Collaboration is quite good; the pricing is based on the number of users. There are three types of licenses that range from basic to advanced, with a Complete version offering DLP  characteristics, but if you do not plan to create detection or data protection policies, I believe that the Advanced license is sufficient. It is a very straightforward licensing approach, done per user and for periods of 1 to 5 years.

    What other advice do I have?

    I have given this review a rating of 10.

    Ruben C.

    Comprehensive Protection Across All Channels

    Reviewed on Nov 23, 2025
    Review provided by G2
    What do you like best about the product?
    Phishing attempts and malicious links are blocked before they reach users, and the solution also monitors platforms like Teams, SharePoint, and OneDrive, which used to be blind spots for us. The biggest advantage is knowing that both communication and file-sharing channels are constantly protected with a single solution.
    What do you dislike about the product?
    Initial policy configuration can be complex and requires adjustments to avoid blocking legitimate messages.
    What problems is the product solving and how is that benefiting you?
    Previously, we had weaknesses in security on platforms like Teams, SharePoint, and OneDrive, leaving us vulnerable to targeted attacks.
    Now, suspicious emails, links, and files are automatically blocked before they reach users, reducing the risk of data breaches and credential theft.
    Ruben Cordero

    Protects users from phishing and malicious links while improving team efficiency

    Reviewed on Nov 22, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Check Point Harmony  Email & Collaboration protects against phishing and malicious attachments across email and cloud tools. I use the Gmail collaboration and ensure suspicious links or files are blocked before they reach users. It helps enforce consistent security policies, reduce the risk of account compromise, and provide quick visibility into attempted attacks.

    One example of how I used Check Point Harmony  Email & Collaboration to block a threat was when a phishing email disguised as a Gmail login request was sent to several employees. The solution automatically flagged the suspicious email, quarantined the message, and prevented users from clicking the malicious links.

    Another way Check Point Harmony Email & Collaboration has helped in similar situations is by consistently stopping targeted spear phishing attacks. In one case, attackers tried to impersonate a trusted vendor with a fake invoice, but the system flagged the unusual sender behavior and quarantined the emails before anyone could open them.

    What is most valuable?

    The best features Check Point Harmony Email & Collaboration offers are the advanced phishing protection and its seamless integration with collaboration tools.

    The advanced phishing protection is proactive in catching threats before users even see them. It does not just block obvious spam; it can spot subtle impersonation attempts and suspicious links that appear legitimate at first glance. The seamless integration has made my workflow easier because the same protection applies across email and collaboration tools without extra configuration.

    Another feature is the detailed reporting and analytics that come with Check Point Harmony Email & Collaboration. They provide clear visibility into attempted attacks, user activity, and overall trends, which helps the team fine-tune policies and demonstrate the value of the solution to management.

    It has impacted my organization positively by reducing the number of phishing attempts that reach our users and giving us greater confidence in every communication. It has improved efficiency because suspicious emails are automatically quarantined, saving the team time that used to be spent on manual investigation. I estimate the team saves at least three to five hours per week, thanks to the automatic quarantine and clear visibility features.

    What needs improvement?

    The only area for improvement is the language of the support. The support is only available in English.

    For how long have I used the solution?

    I have been using Check Point Harmony Email & Collaboration for six years.

    What do I think about the stability of the solution?

    Check Point Harmony Email & Collaboration is very stable.

    What do I think about the scalability of the solution?

    I have no problem with the scalability of Check Point Harmony Email & Collaboration.

    How are customer service and support?

    I find the customer support to be very great and faster. I would rate the customer support a 10.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I did not previously use a different solution.

    What was our ROI?

    From my experience, the return on investment is time saved.

    What's my experience with pricing, setup cost, and licensing?

    I find my experience with pricing, setup cost, and licensing to be great. I have no problem with the pricing.

    Which other solutions did I evaluate?

    I did not evaluate other options before choosing Check Point Harmony Email & Collaboration.

    What other advice do I have?

    Check Point Harmony Email & Collaboration is an excellent tool, and I recommend it for other companies. It is a complete solution with excellent protection and a big, modern solution. I give this product a rating of 10.

    Cristopher Z.

    Exceptional Visibility and Control for Secure Information Flow

    Reviewed on Nov 22, 2025
    Review provided by G2
    What do you like best about the product?
    The platform offers visibility and control over the flow of information within the organization. It not only blocks threats but also provides a clear view of how files and messages move between users and applications. This helps us detect anomalous behavior and meet audit requirements effortlessly.
    What do you dislike about the product?
    Some of the advanced configuration options can be complex at first, especially when adjusting policies for different user groups. Overall, the solution is robust, but it requires time and dedication to fully optimize it.
    What problems is the product solving and how is that benefiting you?
    It's addressing the problem of phishing, account theft, and malicious file sharing on our email and collaboration platforms. Previously, we frequently experienced incidents of suspicious emails slipping through, but now threats are blocked in real time and clearly flagged to users.
    View all reviews