CheckPoint Harmony Email & Collaboration (Avanan)
Provides organisations with complete full-suite protection providing security admins with an easy-to-deploy and manage platform, block sophisticated social engineering attacks such as impersonation, zero-day phishing and Business Email Compromise. Using AI-trained engines. Securing inbound, outbound, and internal emails from phishing attacks inspects the communication’s metadata, attachments, links and language.
Features
- Detects malware, ransomware, east west attacks preventing malicious data loss
- Threat emulation evasion resistant CPU level sandbox
- Proactive Threat Extraction, cleans files and eliminates potential threats
- Threat Extraction eliminates unacceptable delays created by traditional threat emulation
- The industry’s only fully integrated document and image sanitization solution
- Protect sensitive data and maintain regulatory compliance with advanced DLP
- Prevent advanced account takeover attacks by augmenting authentication processes
- Uses patent-pending technology to prevent unauthorized users and compromised devices
- Harmony Email & Collaboration intercepts attackers using machine learning algorithms
- Inline API-based protection for inbound, outbound and internal email communication
Benefits
- Recognized by NSS Labs as ‘most effective in breach prevention'
- Complete Protection: Secure all lines of communication, email to collaboration
- Delivers safe file version to users in under two seconds
- Installs within minutes, starts catching malicious activity immediately
- Enables to enforce a data leakage policy based on requirements
- Detects sensitive data sharing via email and collaboration apps
- Proven to have Malware catch rate (99.91%) by NSS labs
- A single license for both email and productivity apps
- Secures major file-sharing services, Google Drive, OneDrive, Sharepoint, Dropbox
- Adds security layers to collaboration apps like Slack and Teams
Pricing
£3.75 to £6.25 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 0 6 3 9 6 0 8 1 4 9 1 2 6 0
Contact
NOC365 LTD
Zeshan Tahir
Telephone: 0345 862 5586
Email: sales@noc365.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
-
- Supports Office 365, email, Sharepoint and OneDrive
- Supports Google Workspace, Drive and Gmail
- Supports Microsoft Teams
- Supports Slack
- Supports Box
- Supports Dropbox
- Supports Citrix Sharefile
- Internet Connection to receive update definitions
- Modern Web Browsers for management portal
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
NOC365 UK Business Hours (9am - 5pm): Business Impact & Target Response Times: High - 1 Hour Medium - 2 Hours Low - 4 Hours None - 8 Hours NOC365 UK Non Business Hours (24/7): Business Impact & Target Response Times: High - 2 Hour Medium - 4 Hours Low - 8 Hours None - Next Business Day
Please note any Escalations to Checkpoint will fall under their SLA's - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide support via email, telephone, on site and through our client portal. Where extra assistance is required that is not covered by the standard service, customers may purchase this at the rates shown in the SFIA rate card.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
A simple and documented onboarding process is available. Individual Admin guides are available for each service giving details on getting started and configuration. In addition, Check Point offers a variety of other resources to educate users on their solutions such as online knowledge base, on-demand webinars, product videos and online training.
At additional cost, Professional Services experts can help with the planning, design, implementation, optimisation and service handover. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The service does not hold customer data only security configuration and log data to generate reports on the service functionality. Report information can be exported from the service web interface in order to archive the information.
- End-of-contract process
- Unless the contract is renewed, functionality of the service (as described in the service features section) will cease on the day of expiration. The service will remain accessible. If the service is not renewed after 90 days of expiry the service will be terminated and all configuration deleted.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service is accessed via the Check Point Portal.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Our service is B2B and currently is not tested according to EN 301 549 accessibility standards.
- Accessibility testing
- Our service is B2B and currently is not tested according to EN 301 549 accessibility standards.
- API
- No
- Customisation available
- Yes
- Description of customisation
- Custom branding for digest emails and web banner.
Scaling
- Independence of resources
- The service is built on public cloud infrastructure and scales automatically to accommodate new users. Each service account is provisioned as a separate tenancy with no interaction between tenancies.
Analytics
- Service usage metrics
- Yes
- Metrics types
- A range of flexible service metrics reports and dashboards are available from the management portal. These include Usage, User Activity, Allowed/ Blocked Emails, Policy Violations and DLP Violations.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Checkpoint
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data export is performed by the customer via the Checkpoint web interface and options available within the management portal. Exporting of data is provided to the customer on a self service and as required basis. Data is not hidden, restricted or locked from end users that hold the correct service access privileges. Data, reports and logs will be available for export from the service in the formats and options supported by Checkpoint.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Availability and how it is calculated can be found in the Terms of Service – Cloud Services; End-user License Agreement. If the Monthly Service Availability or the Monthly Service Latency of the applicable Service during a calendar month is below the thresholds specified, You may request Check Point to extend Your current Service Term by additional days (“Service Credits”) at no extra charge according to the thresholds outlined in the agreement, subject to a maximum of 1 month of Service Credits per year of Service.
- Approach to resilience
-
Service Availability Controls
- Redundant systems and networks are deployed across servicing components.
- Load balancing ensures service availability in case of component failure.
- DRP: In case of data center failure, automatic failover is deployed to an alternate data center. (Note: Selecting a specific data center (for example, in EU) will cause the loss of data center failover functionality.)
- The customer account: policy, users, logs and configurations are stored in redundant locations.
- CheckPoint enforces internal policies to control the retention of backup data. All data is backed up at each data center, on a rotating schedule of incremental and full backups. - Outage reporting
- The current and historical status of all Check Point services is available at https://status.checkpoint.com/. This page can be accessed directly and also from within the service portal. The page shows status, uptime, historical data, incidents and any relevant post-incident reports. From this page users can also subscribe to receive updates via any of the following methods: email, SMS text message, Slack message, RSS feed.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- The service uses role-based administration to restrict access for authorised administrators. There are two types of admin roles, Global roles (which apply to the platform and to all the services in the Portal.) and Specific Service roles (which apply only to a specific service. The specific service roles are in addition to the global roles and do not override them.)
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- NOC365 Internal policies. All staff are security checked and security briefed. We are also certified for the Government Cyber Essentials PLUS accreditation.
- Information security policies and processes
- Several internal security policies exist and are owned to protect customer data. These are tested regularly both formally and ad hoc. The policies are referenced and included in all employment contracts.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
SOC 2 Compliance.
Change requests are documented within the Change Management tool. The request is reviewed and approved by the Director of Operations. Emergency changes are performed and updated as part of hot fixes, which follow the same process as described above though the time frame may be shortened, and approvals may be provided after the change was already performed. Key Check Point personnel are notified of cases of test failures. Every test failure is documented in the change management tool and sent to the relevant personal in the Project manager. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Check Point performs monthly vulnerability scans and employs a centrally managed configuration management system, including infrastructure-as-code systems through which predefined configurations are enforced on its servers, as well as the desired patch levels of the various software components.
There is an internal procedure that defines the Patch management process and employees are trained in the corporate security policy.
In addition to the ongoing patch management processes, Check Point performs security monitoring from three main channels:
1. Internal Security Research (vulnerability scanners, penetration test, company’s Incident response team and researchers, etc.)
2. External sources (threat intelligence, US-CERT, publications, vendors updates, etc.) - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Check Point monitors the production environment with several tool such as grafana ,sumologic and implements a continuous monitoring strategy.
Check Point plans to mandate ongoing security control assessments to be completed in accordance with the FedRAMP continuous monitoring strategy and respond to security related vulnerabilities and issues generated by security assessment and monitoring activities by either fixing, remediating or implementing mitigating controls to reduce the overall risk.
The Check Point CISO team plans to use information obtained from continuous monitoring and ongoing assessments of Check Point for FedRAMP reports the security state of the system via vulnerability scan results - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- In the event of a security incident, Check Point’s security team is responsible for investigating and responding. Check Point has clear risk and damage assessment procedures to define the SLA required to solve any security incident. Check Point’s Information Security Manager, and other managers, will coordinate security response including containment, investigation, infrastructure securing, reporting, closure and follow up. Check Point will respond using the appropriate management and technical resources in order to promptly restore operations impacted by any incident. Check Point will adhere to applicable laws and industry standards in this process, including following any required notifications.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
At NOC365, we are committed to fighting climate change through our social value priorities:
• Sustainability is a key factor in all procurement decisions, including a cloud first approach, and working with vendors who are actively working towards fighting climate change.
• Minimising energy usage in the office and reducing travel by promoting working from home.
• Actively reducing travel and promoting the use of online meetings and electronic communication.
• Investment in paperless-technology with the company now almost entirely paper-free. Examples include electronic signature software, employee records & digital business cards.
• Seek to buy recycled and recyclable products and other consumables.Covid-19 recovery
At NOC365, our workplace conditions have been adjusted to support the fight against Covid-19. Improvements range from safe social distancing, reducing in-person meetings and having virtual meetings instead, and flexible working arrangements.
As an IT provider, we have also helped many organisations develop and maintain their recovery strategies, providing technology solutions (i.e. Virtual Desktops & Online Collaboration tools) to facilitate working from anywhere, anytime, allowing flexibility of working styles and patterns for users.Tackling economic inequality
NOC365 is committed to tackling economic inequality and we ensure that all our employees are provided a level playing field and have the same access to opportunities and pay scales during their employment. We ensure economic equality throughout our recruitment, selection, training, and promotion procedures, ensuring all individuals are selected solely based on their relevant aptitudes, skills and abilities.
We have invested heavily in our infrastructure which allows employment not just in our local community but nationally, and we are committed to offering work experience, apprenticeships, and placements wherever possible.
We support our communities by donating computer equipment and offering support to organisations who are actively tackling inequality.Equal opportunity
NOC365 is committed to creating a working environment in which staff, management, and our customers are treated with dignity and respect, which is free from unlawful discrimination, victimisation, or harassment. We are a dedicated equal opportunities organisation, ensuring diversity and inclusion form part of everything we do.Wellbeing
At NOC365, we take the wellbeing of our staff very seriously. We regularly collect input and feedback from them to ensure we are doing our best to provide a working environment that provides a viable work-life balance for all. We are ISO 45001 accredited and have clear health and safety policies to ensure the long-term wellbeing of our staff.
Pricing
- Price
- £3.75 to £6.25 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A 14 day full feature trial is available. Further details available on request