Info-Tech Research Group’s 2024 Cloud Email Security Data Quadrant Report
Info-Tech Research Group’s Data Quadrant Report, presented by SoftwareReviews, has named Check Point the Market Leader with the highest scores among all vendors. In the report, it was noted that Harmony Email and Collaboration has:
- Superior efficacy, noted by customers.
- Ease of investigations, noted by customers.
- Highest score possible in deployment options criterion.
- Leverages Check Point’s ThreatCloud for threat intelligence.
A comparison of Harmony Email against Abnormal Security, Proofpoint, Microsoft, and Mimecast can be found on Access the head-to-head reports here.
Interested individuals are invited to send their questions to Computime representatives on [email protected] or the General HEC Support.
Harmony Email and Collaboration’s Webinar on the 23rd September, 2024
Register for the webinar here –
This session focuses on SaaS Security Posture Management (SSPM), a new and important layer of protection for company workspaces leveraging Harmony SaaS:
- Automatically identify and correct misconfigurations in Microsoft 365 and Google Workspace to ensure optimal security and compliance.
- Gain full visibility into the SaaS environment by identifying every application with access to Microsoft/Google environment, while detecting potential risks to critical resources.
- Leverage AI-based detection to identify anomalous behavior in applications with access to Microsoft 365 or Google Workspace, and automatically revoke their access if compromised.
Recap from Check Point’s Last Webinar
- Mail Explorer AI Assistant: The first Generative AI experience for searching through emails in Mail Explorer using native language prompts.
- Automated Handling of Phishing Reports: Save 90-100% of users’ daily load by having Check Point’s AI automatically handle emails that are reported as phishing.
Graymail Workflow: Keep mailboxes for your daily tasks, but still have promotional emails saved in a dedicated folder.
The New and Updated HCE Feature Review
SSPM is Coming Soon! Harmony SaaS for Email
Check Point Harmony Email and Collaboration are releasing an integration with Harmony SaaS specifically for the HEC Portal. The HSaaS add-on allows better visibility into identifying security risks in the SaaS applications connected to either the O365 or Gmail tenant.
With Harmony SaaS, maintain high compliance and low risk
- Get a compliance report that includes a list of prioritised insights and remediation options that will increase compliance and reduce risk
Automatically prevent SaaS threats
- Automatically prevent threats through machine learning to detect anomalous behaviour of 3rd party plugins and stop them in its tracks
Discover your SaaS ecosystem
- Discover the SaaS ecosystem, including Shadow SaaS as well as third party SaaS services that have access to employee emails and other resources
The HSaaS for HEC Add-On will be fully released in the upcoming weeks and Check Point are devoting September’s webinar to reviewing the integration. Reach out to an HEC rep for help activating it in your Portal or a your local Computime rep for a quote.
Gen AI-Based Phishing Training – Add-On Expected End of September
Check Point are introducing an industry-first, GenAI-based phishing training add-on that takes into consideration the end-user’s department, position, industry, as well as the most recent phishing attacks, to generate the most relevant phishing attack for a specific user, at a specific time. Check Point aim to have this ground breaking feature released by the end of September.
This add-on can be purchased on top of Harmony Email and Collaboration.
- Zero Configuration: No need to manually create phishing campaigns.
- Zero Deliverability Issues: Leveraging an API to place the simulation email directly in the end-user’s mailbox, the admin is not required to configure an Allow List and does need to concerned with email ending up in the user’s Spam folder or getting blocked.
- Direct Personalisation: Our AI personalises phishing training to the attack most likely to be seen by a specific end user, in a specific industry, and at a specific time.
Register your interest for phishing training, here. Continue to join informative Check Point Product Webinars and stay up-to-date with Check Point’s Product Update blog for future releases!