Arrow Electronics joins Check Point Harmony Email and Collaboration’s MSP Program

Harmony Email and Collaboration offers cloud email security and SaaS collaboration applications, ensuring thorough protection for Microsoft 365, Google Workspace, and other collaboration and file-sharing apps. Tailored for cloud email settings, Harmony Email and Collaboration acts as a shield, stopping threats before they reach the user's mailbox.

  • 1 year ago Posted in

Mike Worby, head of strategic alliances for Arrow’s enterprise computing solutions business in EMEA, remarked, “The collaboration between Arrow and Check Point equips Arrow’s channel partners with a Flexible Consumption Model (FCM). This model empowers channel partners to align resources and services to customer requirements seamlessly, all while sidestepping product intricacies. The upshot? Reduced dependency on long-term contracts, enhanced spend control, and a seamless transition to digital distribution strategies. It aligns perfectly with our vision, offering channel partners monthly billing models, enabling vigilant consumption and cost oversight.”

 

Central to Harmony Email and Collaboration’s prowess is its AI-driven capability, adept at safeguarding cloud email and collaboration suites against sophisticated cyber-attacks that slip past conventional security measures. This invisible, multi-layered security furnishes comprehensive protection for cloud collaboration tools, including Office 365, G-Suite, Teams, and Slack. With a straightforward one-click API deployment, Harmony Email and Collaboration fortifies enterprises against business email compromise, phishing, malware, data leaks, account takeovers, and shadow IT. By eliminating the need for multiple tools to secure the cloud collaboration suite, Harmony Email and Collaboration’s patented solution distinguishes itself, offering unmatched cloud email security.

 

Chris Whitley, email security channel lead for EMEA at Check Point Software Technologies, added, “With Check Point Harmony Email and Collaboration, we're recalibrating cloud email security standards. Given that email remains the primary breach gateway, Harmony's deployment assures businesses of a fortified email infrastructure. Our collaboration with Arrow means we can protect more businesses across diverse regions. With a staggering 99.3% reduction in successful phishing attacks and a 30% edge over native cloud security, our collaboration with Arrow stands poised to set a new industry benchmark."

 

This collaboration spans across numerous European countries, including Austria, Switzerland, Belgium, Luxembourg, Netherlands, Czech, Poland, France, Germany, Denmark, Estonia, Finland, Norway, Sweden, Italy, Portugal, Spain, and UK&I.

 

Harmony Email and Collaboration is a pivotal component of Check Point’s Harmony product suite. It boasts over 14,000 tenants managed under its MSP program since the Harmony MSP Platform's inception, encompassing Endpoint, Mobile, and Cloud Security.

 

Expansion into broader product range with Arrow

Building on the collaboration's momentum, Check Point announces that Harmony Email and Collaboration is merely the inaugural phase of a broader product offering. In the imminent future, Check Point is gearing up to expand the collaboration with Arrow, which will encompass Check Point Harmony Endpoint, Check Point Harmony Mobile, and other leading Check Point products.


Acquisition of leading DSPM company will bolster Proofpoint’s human-centric security platform...
NTT DATA’s new Managed Detection & Response service powered by Palo Alto Networks Cortex XSIAM...
SPG is enhancing its cybersecurity capabilities in a new partnership with Saviynt, a leading...
Graylog has unveiled significant security advancements to drive smarter, faster, and more...
Datadog has published its new report, the State of Cloud Security 2024. The report found that...
ISACA research shows automating threat detection/response and endpoint security are the most...
Strategic partnership unifies AI-native endpoint security and next-generation firewall protection...
Advanced forms of social engineering are on the rise, though obvious gaps like weak passwords are...