Our suite includes literally everything you’d want in an email security solution, from phishing, to advanced malware and sandboxing, to URL analysis and URL sandboxing, to CDR for threat extraction, to DLP and encryption, and to peripheral functions like archiving, awareness training and DMARC. As part of the complete package, we include security for all lines of communication; Sharepoint, OneDrive, Teams, Slack, Box, etc. We also offer integration with broader Check Point Workspace solutions, including those for endpoint, mobile and browser security.
Flexibility of deployment and the ability to clear the email before the inbox
One of the fundamental compromises customers have to make with other API solutions is that they are not able to scan emails before they reach the inbox. Traditionally, API-based solutions were only able to pull the malicious email after it hit the inbox. One of Check Point’s unique differentiators is that while we offer the modern API approach, we’re also able to scan the email in protect mode – before it ever reaches the inbox. This means that the customer does not need to choose or compromise, can enjoy both worlds and pick the mode best suited for them. It’s also not one for all – different parts of the organization can have different modes.
3. How does Harmony Email & Collaboration’s inline architecture enhance security and performance for customers and what unique advantages does it offer?
[GF] That’s a great question. If it’s malware, you japan whatsapp number data just don’t want it in your end-users’ inboxes. Simply put, in-line architecture offers better security.
But there are also security capabilities that you can’t implement if you are not scanning the email inline. For example, no post-delivery solution can wrap all URLs for click-time protection, you can’t implement any enforcement for outgoing DLP, can’t run a true file emulation in a sandbox or threat-extraction (CDR) to every attachment.
So in reality, in order to provide a complete solution for email security, you must have the ability to scan emails in inline mode.
4. 2025 is almost here. Would you like to share a bit about your plans for the year ahead?
[GF] We have big plans for 2025. Too many to list in a short paragraph. But at a high level, as Check Point has experienced significant growth in email security, we plan to grow further in people and offerings.
This will help us provide the best support for our fast-growing customer base and achieve the aggressive goals we’ve set for 2025. We continue to focus on innovating and plan to introduce new features and add-ons, many of which leverage new AI technologies. For example, our upcoming awareness training release doesn’t require the admin to create campaigns or any other special configurations. Rather, it leverages GenAI, from beginning to end, to run phishing training campaigns with zero configuration. And maybe last, but definitely not least, we’re planning an MSP-focused suborganization with dedicated R&D, support, customer success, etc.; creating a company within a company to continue growing our joint business with our MSP partners.
5. For our readers who don’t yet know you – Would you like to share a bit about your background and current role at Check Point?
[GF] I’ve been in cyber security for over 20 years, coincidentally getting into this market as my first job as a software developer. I managed the R&D team for a company called ForeScout in the Network Access Control Market and then started Avanan with a group of friends, where I was the CEO and Co-Founder. After about 7 years, Check Point acquired us, and I’ve been at Check Point for the past 3 years, managing the email security team.