Try our new research platform with insights from 80,000+ expert users
System Admin at a outsourcing company with 11-50 employees
Real User
Top 5
Oct 28, 2025
Has prevented spam from reaching users and improved team productivity through real-time detection
Pros and Cons
  • "Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization, as I can see that there is an improvement in our productivity and we are not wasting our time blocking spam, since the solution takes care of all these security features."
  • "Check Point Anti-Spam and Email Security Software Blade can be improved as there is a lack of KB documentation while deploying and configuring this solution."

What is our primary use case?

My main use case for Check Point Anti-Spam and Email Security Software Blade is to prevent malicious or spam mails that are reaching our user emails, and after deploying this, we are able to prevent spam mails.

What is most valuable?

The best features that Check Point Anti-Spam and Email Security Software Blade offers are the real-time protection and the visibility that it provides, which stand out to me the most.

The real-time protection and visibility that I experience with Check Point Anti-Spam and Email Security Software Blade are supported by a database of spam domains, which helps block spam mails and also detect and prevent them in real-time.

Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization, as I can see that there is an improvement in our productivity and we are not wasting our time blocking spam, since the solution takes care of all these security features.

Regarding the productivity improvement, previously there were at least two to three emails coming from spam, but now they are not reaching any user or devices, allowing a user to focus on their productivity rather than worrying about any spam mails.

What needs improvement?

Check Point Anti-Spam and Email Security Software Blade can be improved as there is a lack of KB documentation while deploying and configuring this solution.

A document on the configuration, implementation, and setup of Check Point Anti-Spam and Email Security Software Blade would be most helpful, and if the OEM would provide the documentation, that would be really beneficial.

For how long have I used the solution?

I have been using Check Point Anti-Spam and Email Security Software Blade for more than four years.

Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
January 2026
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.

What do I think about the stability of the solution?

I do not see any issue with the stability of Check Point Anti-Spam and Email Security Software Blade, as it is stable.

What do I think about the scalability of the solution?

Check Point Anti-Spam and Email Security Software Blade's scalability is good, as it can handle the organizational growth to some extent.

How are customer service and support?

I have a great experience with the customer support for Check Point Anti-Spam and Email Security Software Blade, as they have excellent knowledge and troubleshoot issues effectively.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before using Check Point Anti-Spam and Email Security Software Blade, I was using the same solution only.

What was our ROI?

I can say that I have seen a return on investment since deploying Check Point Anti-Spam and Email Security Software Blade by saving time.

What's my experience with pricing, setup cost, and licensing?

I have no problem at all with the pricing, setup cost, and licensing of Check Point Anti-Spam and Email Security Software Blade.

Which other solutions did I evaluate?

We have evaluated Fortinet Anti-Spam and Email Security before choosing Check Point Anti-Spam and Email Security Software Blade.

What other advice do I have?

My advice to others looking into using Check Point Anti-Spam and Email Security Software Blade is that any company considering this type of solution for their organization should view it as one of the most prominent and dominating solutions, and since Check Point is a reputed company, they can consider it the best solution. I rate this solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 28, 2025
Flag as inappropriate
PeerSpot user
Dhanaji Mali - PeerSpot reviewer
Technical Specialist at a outsourcing company with 501-1,000 employees
Real User
Top 5
Dec 10, 2025
Email filtering has protected users from malicious links and saves daily incident response time
Pros and Cons
  • "Any organization looking for the best email security solution should consider Check Point Anti-Spam and Email Security Software Blade as one of the leading solutions currently present in the IT domain."

    What is our primary use case?

    My main use case for Check Point Anti-Spam and Email Security Software Blade is to protect document or file links attached through emails, and I have applied a security rule so that no malicious mail can reach end user emails.

    A specific example of how I use Check Point Anti-Spam and Email Security Software Blade in my daily work is that it blocks any malicious email that comes through, ensuring that harmful content gets filtered out by this solution.

    What is most valuable?

    Check Point Anti-Spam and Email Security Software Blade offers the ability to intercept and scan all incoming or outgoing emails for any malicious threats, and this feature scans all emails without causing any delays in their delivery.

    Check Point Anti-Spam and Email Security Software Blade scanning all emails without causing delays has impacted my workflow by reducing incidents overall. I have seen a significant reduction in incidents; previously, multiple users received malicious emails in their inboxes, but after deploying Check Point Anti-Spam and Email Security Software Blade, such emails are blocked before they reach the end user outbox.

    What needs improvement?

    At this time, I do not see anything lacking in Check Point Anti-Spam and Email Security Software Blade. It is working fine for my organization and providing an excellent solution and security.

    For how long have I used the solution?

    I have been implementing and deploying Check Point Anti-Spam and Email Security Software Blade for more than three years.

    What do I think about the stability of the solution?

    Check Point Anti-Spam and Email Security Software Blade is stable.

    How are customer service and support?

    Check Point Anti-Spam and Email Security Software Blade customer support is excellent.

    How would you rate customer service and support?

    Which solution did I use previously and why did I switch?

    I am using the same solution and did not use any different solution before Check Point Anti-Spam and Email Security Software Blade.

    What about the implementation team?

    I was not part of the experience with pricing, setup cost, and licensing for Check Point Anti-Spam and Email Security Software Blade.

    What was our ROI?

    I have seen a return on investment with Check Point Anti-Spam and Email Security Software Blade through time saved.

    Check Point Anti-Spam and Email Security Software Blade saves time from an IT and technical perspective, as I am not wasting my time checking for any malicious emails in user inboxes because they are already being blocked by Check Point Anti-Spam and Email Security Software Blade.

    Which other solutions did I evaluate?

    I have not evaluated any other options before choosing Check Point Anti-Spam and Email Security Software Blade.

    What other advice do I have?

    Any organization looking for the best email security solution should consider Check Point Anti-Spam and Email Security Software Blade as one of the leading solutions currently present in the IT domain. I gave this product a rating of 8 out of 10.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    Last updated: Dec 10, 2025
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Check Point Anti-Spam and Email Security Software Blade
    January 2026
    Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
    881,082 professionals have used our research since 2012.
    reviewer2751327 - PeerSpot reviewer
    Cloud network engineer at a manufacturing company with 10,001+ employees
    Real User
    Top 5
    Sep 3, 2025
    Protects against malicious emails and integrates smoothly, but initial setup can be complex
    Pros and Cons
    • "The best features of Check Point Anti-Spam and Email Security Software Blade are its security features, which help the team perform their daily tasks without having to concern for potential security breaches."
    • "Check Point Anti-Spam and Email Security Software Blade can be improved by decreasing the complex initial setup and tweaking, especially when trying to balance security and user convenience."

    What is our primary use case?

    My main use case for Check Point Anti-Spam and Email Security Software Blade is to protect our end users and their email boxes from malicious incoming emails, such as spoofing, phishing, and malware.

    We use Check Point Anti-Spam and Email Security Software Blade to protect against malicious attacks.

    What is most valuable?

    The best features of Check Point Anti-Spam and Email Security Software Blade are its security features, which help the team perform their daily tasks without having to concern for potential security breaches. It's successful in protecting Microsoft 365 platforms, and we are securing users, so the integration is really smooth and the user experience is good.

    It protects my organization from attacks by filtering incoming emails and analyzing if they contain malware.

    What needs improvement?

    Check Point Anti-Spam and Email Security Software Blade can be improved by decreasing the complex initial setup and tweaking, especially when trying to balance security and user convenience. The reporting isn't intuitive.

    For how long have I used the solution?

    I have been using Check Point Anti-Spam and Email Security Software Blade for four years.

    What do I think about the stability of the solution?

    Check Point Anti-Spam and Email Security Software Blade is stable.

    What do I think about the scalability of the solution?

    The scalability of Check Point Anti-Spam and Email Security Software Blade is good.

    How are customer service and support?

    The customer support is not bad.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I did not previously use a different solution before Check Point Anti-Spam and Email Security Software Blade.

    How was the initial setup?

    My experience with pricing, setup cost, and licensing was good.

    What was our ROI?

    I haven't seen a return on investment because it's a security feature.

    Which other solutions did I evaluate?

    Before choosing Check Point Anti-Spam and Email Security Software Blade, I evaluated other options, specifically Mimecast.

    What other advice do I have?

    The advice I would give to others looking into using Check Point Anti-Spam and Email Security Software Blade is that it's good. On a scale of one to ten, I rate this solution a seven out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: Sep 3, 2025
    Flag as inappropriate
    PeerSpot user
    Dushyant Trivedi - PeerSpot reviewer
    SAP BASIS Consultant at a energy/utilities company with 1,001-5,000 employees
    Real User
    Aug 11, 2023
    Effectively secures data centers against various threats, including spam emails and provides policy-based control
    Pros and Cons
    • "The policies and port blocking are the most valuable features. We have a significant amount of spam emails passing through our network."
    • "Mobile solutions should be added to Check Point because business email is also used by users on mobile devices."

    What is our primary use case?

    We have implemented Check Point for all our network traffic and security needs. For network traffic, we currently use on-prem solutions. Our services and servers are solely in our data centers. Our main goal is to secure our data center. This applies to all our services, whether it's email, network, or application security. All applications are thoroughly examined with our security test license. Above all, our system is set up so that the first package entering our network encounters our Check Point devices. These devices ensure that, according to our maintained policy, the package is either cleanly routed to the servers or blocked by Check Point.

    What is most valuable?

    The policies and port blocking are the most valuable features. We have a significant amount of spam emails passing through our network. Before this, we had a Tipping Point solution.

    We previously implemented the Tipping Point solution, but it didn't work effectively in our environment. That's why we replaced Tipping Point with Cisco Check Point.

    What needs improvement?

    Mobile solutions should be added to Check Point because business email is also used by users on mobile devices. And that solution, I cannot process by Check Point Firewalls. 

    For how long have I used the solution?

    We have been using this solution for six months. 

    What do I think about the stability of the solution?

    It is a stable solution. We implemented the solution in HA. This is because the solution is highly available and can withstand hardware failures and software upgrades.

    Once the solution is implemented, there is no need for any further downtime for the Check Point server. Because once we change any policy, we can break the High Availability (HA) session and define the new policy on the Check Point Security Gateway (SGW) in isolation. This allows us to test the new policy without affecting the production traffic. Once the new policy is tested and active, we can then activate it on the HA pair and bring the HA session back up. This process ensures that we can make changes to the policy without any interruption to the user experience.

    It is a really stable solution. I would rate the stability a ten out of ten.

    What do I think about the scalability of the solution?

    It is a scalable solution. We have deployed it in our organization with over 800 users and 96+ servers. The servers are running multiple operating systems, including Windows Server 2019, Windows Server 2016, AIX, and Linux.

    I would rate the scalability a ten out of ten.

    How are customer service and support?

    We raised a request with Check Point technical support during the implementation. If any issues persist during the downtime period, we will get support from Check Point's second-level support. However, we didn't need to use the technical backup support in the end. Our plan was to have a bulletproof plan and an expert plan, so we didn't have any incidents or problems.

    Whenever we required support, they were available for us.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We previously used Symantec as our email security solution, but we had many complaints about its slowness. We also used Tipping Point, but we had to upgrade it biweekly and their customer support was not very good. That's why we are replacing both of those solutions with Check Point.

    How was the initial setup?

    I'm working in IT since 1998. So in my entire career, I've worked with lots of devices and lots of data centers. So, the initial setup of Check Point was not difficult for me.

    In the past, security features were most effectively used when everything was on separate hardware. But now, with virtualization and software-defined networking (SDN), we have to be more aware of security and take more responsibility to secure our entire environment.

    So, in my opinion, the more experience you have in this field, the more valuable your knowledge will be. In addition to IT, I also have experience with SAP. We implemented SAP in our environment in 2008, and I was a core member of the team that looked after technical services and databases. So, I have experience in both IT and SAP.

    What about the implementation team?

    We did not deploy it directly. We first took a Proof of Concept (POC) from our authorized vendor. The vendor used our environment to test the product on our on-premises hardware.

    Once the Proof of Concept (POC) is satisfactory, we will get approval from our management. Once management gives us approval, we will submit a downtime request to management. Once we receive the downtime approval, we will initiate a plan of action.
    The plan of action will define the work tasks for each respective person, as well as technical and functional roles. This is because once the implementation is complete, the functionality of the application must be confirmed.

    We will build a team and make sure that the entire team is available during the downtime. Each and every person should perform their assigned activities.

    What's my experience with pricing, setup cost, and licensing?

    It's priced in the moderate range. If you need 100% security, then you'll have to pay a premium price. But Check Point is a good product for the price.

    Which other solutions did I evaluate?


    What other advice do I have?

    Check Point is a very easy solution to implement. Once you've installed it, you can simply click on a button to configure it for your network. You can also change the settings for each field as needed.

    Overall, I would rate the solution a nine out of ten. It's a great solution, but the only improvement I would like to see is a mobile app upgrades.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    reviewer2751732 - PeerSpot reviewer
    Security Engineer at a tech vendor with 51-200 employees
    Real User
    Top 5
    Aug 22, 2025
    Administrative interface impresses with comprehensive features for effective threat protection
    Pros and Cons
    • "Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization by filtering a lot more spam and phishing attempts."
    • "Check Point Anti-Spam and Email Security Software Blade is not user-friendly the first time you use it."

    What is our primary use case?

    My main use case for Check Point Anti-Spam and Email Security Software Blade includes phishing protection, ransomware protection, and spam protection.

    The solution helps with compliance and integrates nicely with suite 365.

    What is most valuable?

    The best features that Check Point Anti-Spam and Email Security Software Blade offers include a very complete administrative interface, which stands out as better than others.

    Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization by filtering a lot more spam and phishing attempts.

    What needs improvement?

    There is room for improvement with Check Point Anti-Spam and Email Security Software Blade, particularly with the interface, which is not new people friendly; however, users will learn it, and it's not an issue.

    More documentation for Check Point Anti-Spam and Email Security Software Blade would be helpful to help new users get started more easily.

    For how long have I used the solution?

    I have been using Check Point Anti-Spam and Email Security Software Blade for less than a year on our tenant.

    What do I think about the stability of the solution?

    Check Point Anti-Spam and Email Security Software Blade is very stable and reliable for me; I have no issues with downtime.

    What do I think about the scalability of the solution?

    The scalability of Check Point Anti-Spam and Email Security Software Blade is very nice; I did not need to reach out to customer support.

    Which solution did I use previously and why did I switch?

    Before Check Point Anti-Spam and Email Security Software Blade, I used Libra Esva, and it was not easy.

    How was the initial setup?

    Check Point Anti-Spam and Email Security Software Blade is not user-friendly the first time you use it. You will understand that it's very complete and has a lot of features to manage. It's less simple than other vendors, but it's complete.

    What other advice do I have?

    My advice to others looking into using Check Point Anti-Spam and Email Security Software Blade is to not be intimidated by the initial difficulty, as you will learn. I rate this solution 9 out of 10.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    Last updated: Aug 22, 2025
    Flag as inappropriate
    PeerSpot user
    Ajenthan Aiyathurai - PeerSpot reviewer
    Manager - IT at a manufacturing company with 501-1,000 employees
    Real User
    Top 5Leaderboard
    Jun 18, 2024
    Enhances the overall security posture of the organization but also improves productivity by reducing the time spent dealing with unwanted and potentially harmful emails
    Pros and Cons
    • "By drastically reducing the volume of spam and unwanted emails, employees can focus more on their work rather than sorting through cluttered inboxes. This leads to improved productivity and efficiency within the organization."
    • "They should keep the software up to date with the latest patches and updates to ensure optimal protection."

    What is our primary use case?

    This software is designed to block spam, phishing attempts, malware, and other malicious content that can be delivered through email. By employing advanced filtering techniques, real-time threat intelligence, and multi-layered security protocols, it ensures that only legitimate and safe emails reach the users' inboxes. This not only enhances the overall security posture of the organization but also improves productivity by reducing the time spent dealing with unwanted and potentially harmful emails. 

    How has it helped my organization?

    The primary benefit is the robust protection against a wide range of email-borne threats such as spam, phishing, malware, and ransomware. By filtering out malicious emails before they reach end users, the organization can prevent potential data breaches and security incidents. By drastically reducing the volume of spam and unwanted emails, employees can focus more on their work rather than sorting through cluttered inboxes. This leads to improved productivity and efficiency within the organization.

    What is most valuable?

    This feature uses sophisticated techniques such as sandboxing, heuristic analysis, and real-time threat intelligence to detect and block advanced threats like zero-day exploits and ransomware. This is crucial for preventing novel and emerging threats that traditional signature-based methods might miss. The software includes robust anti-phishing capabilities that identify and block phishing attempts, protecting users from credential theft and other forms of social engineering attacks. This is particularly valuable in preventing data breaches and safeguarding sensitive information.

    What needs improvement?

    One area for improvement is the user interface (UI), which could be made more intuitive and user-friendly, simplifying the navigation and management of security settings for administrators. Additionally, enhancing the granularity of reporting and analytics could provide deeper insights into email threat patterns and user behavior, aiding in more effective threat management and decision-making.

    In terms of additional features, integrating advanced machine learning algorithms for threat detection could further improve the identification and mitigation of sophisticated threats. Expanding support for a wider range of email platforms and clients would also be beneficial, ensuring broader compatibility and ease of integration in diverse IT environments.

    For how long have I used the solution?

    I have been using it for two years.

    What do I think about the stability of the solution?

    Users commonly report that the software blade operates smoothly and efficiently, effectively handling email security tasks without causing significant performance degradation.

    What do I think about the scalability of the solution?

    The software blade is capable of handling high volumes of email traffic, making it suitable for both small businesses and large enterprises. It supports scaling out to meet increased demand without compromising performance.

    How are customer service and support?

    Service is good but it needs more enhancement.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The implementation is easy.

    What about the implementation team?

    We implemented in-house.

    What was our ROI?

    Our ROI is ensuring uninterrupted email communication, which is critical for business operations.

    What's my experience with pricing, setup cost, and licensing?

    When considering the setup cost, pricing, and licensing of the Check Point Anti-Spam and Email Security Software Blade, it's important to assess your organization's size, email traffic volume, and specific security needs. Initial setup costs can include software, deployment, and integration expenses. Compare subscription-based pricing, which typically includes updates and support, to perpetual licenses that might have lower long-term costs but require separate maintenance fees. 

    Additionally, consider potential discounts for multi-year commitments or bundling with other security solutions. Always request a detailed quote and explore all available options to ensure you get the best value for your investment.

    What other advice do I have?

    My advice would be to keep the software up to date with the latest patches and updates to ensure optimal protection. 

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Osmany Arruda - PeerSpot reviewer
    Especialista em Segurança da Informação - DFIR at a financial services firm with 501-1,000 employees
    Real User
    Top 20
    Jun 5, 2024
    Has good capacity integration features and helps to see the behavior inside the environment
    Pros and Cons
    • "The tool helps us see the behavior inside our environment, which is important to us. The solution's capacity integration features are great."
    • "Check Point Anti-Spam and Email Security Software Blade could improve by focusing more on promoting and marketing its products. Despite having a great solution, it hasn't captured a larger market share, possibly due to insufficient promotion. It should also incorporate a module to monitor client identities, similar to CrowdStrike. It could also improve by systemizing and simplifying their documentation to make it easier to find needed information."

    What is most valuable?

    The tool helps us see the behavior inside our environment, which is important to us. The solution's capacity integration features are great. 

    What needs improvement?

    Check Point Anti-Spam and Email Security Software Blade could improve by focusing more on promoting and marketing its products. Despite having a great solution, it hasn't captured a larger market share, possibly due to insufficient promotion. It should also incorporate a module to monitor client identities, similar to CrowdStrike. It could also improve by systemizing and simplifying their documentation to make it easier to find needed information.

    For how long have I used the solution?

    I have been working with the product for two years.

    What do I think about the stability of the solution?

    Check Point Anti-Spam and Email Security Software Blade's stability is a ten out of ten. 

    What do I think about the scalability of the solution?

    My company has 500-1000 users. 

    How are customer service and support?

    I don't use support much. 

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I used Cisco before Check Point Anti-Spam and Email Security Software Blade.

    What about the implementation team?

    I design the solution, and we have Check Point expert engineers who help with the tool's implementation. 

    What was our ROI?

    Check Point Anti-Spam and Email Security Software Blade is worth its money. It offers good ROI. 

    What other advice do I have?

    We had a server and created two or three virtual instances of Check Point Anti-Spam and Email Security Software Blade for segmenting. I rate the tool a ten out of ten. 

    When you have a good solution that works fine, you need to try to keep it. I rate the tool a ten out of ten. 

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    PeerSpot user
    Complaints analysis/investigation at a healthcare company with 10,001+ employees
    Real User
    Jan 31, 2023
    Good advanced spam filtering, phishing protection, and compliance
    Pros and Cons
    • "Advanced Spam Filtering to identify and block unwanted email messages."
    • "AI-based threat detection could be enhanced to improve security."

    What is our primary use case?

    The tool was implemented due to the fact that the company, which I audited, had low-security protocols in the areas of electronic mail. It was suggested to use a tool that would help them reduce the gap in the vulnerabilities that they present. A study was made of the needs and requirements in order to search for the best alternative in the market. Check Point Anti-Spam and Email Security Software Blade provides the right features to fight against spam, phishing, and other malicious threats transmitted by email. In addition, the blade software could also provide functionality such as encryption and data loss prevention.

    How has it helped my organization?

    Once the tool was installed and configured with all the characteristics and requirements requested, it provided us with many valuable aspects to help the company improve its security gap. Since the initiation of protection against spam and phishing, it has helped to reduce the number of unwanted messages. We were able to improve security through blade software, and by providing us with features such as encryption and data loss prevention, we raised our compliance score with regulations and industry standards.

    Overall, Check Point Anti-Spam and Email Security Software Blade helped us improve security.

    What is most valuable?

    Check Point Anti-Spam and Email Security Software Blade has several very valuable features, such as:

    • Advanced Spam Filtering to identify and block unwanted email messages.
    • Phishing protection to block malicious email messages.
    • Encryption and data loss prevention to protect email communications.
    • Compliance to help comply with various regulations and standards.

    All these functions and others that the tool offers are very valuable in order to protect your email system against any external or internal malicious attacks.

    What needs improvement?

    Check Point Anti-Spam and Email Security Software Blade must make some improvements in its software. Check Point must also improve in some administrative parts and support.

    In the software, they should improve:

    • False positives to help prevent blocking of legitimate emails.
    • An easy interface. Right now, the UI is hard to navigate or understand.
    • AI-based threat detection could be enhanced to improve security.

    Prices must be improved since it is not within the reach of many companies. They must also improve technical support, which is not very efficient in resolving cases.

    For how long have I used the solution?

    it was implemented three years ago.

    What do I think about the stability of the solution?

    It has excellent stability and has not presented errors since it was implemented.

    What do I think about the scalability of the solution?

    It has excellent scalability and functionality, we have not presented any failures.

    How are customer service and support?

    They need to improve support and their SLA.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    There was no solution before we implemented this product. 

    How was the initial setup?

    The installation and configuration of the tool were very simple since it is a very interactive wizard that guides you in the configuration part. We did find it a bit complex since we did not have much experience with the product beforehand.

    What about the implementation team?

    The implementation was done together with the vendor since a degree of experience is needed in the tool. The engineer who helped us was very well prepared.

    What was our ROI?

    You should always make an investment in something that will be profitable in the long run. The returns are very good.

    What's my experience with pricing, setup cost, and licensing?

    The cost is competitive in the market. If we can balance that with each one of the tools on offer, the investment for Check Point CloudGuard Workload Protection is good.

    Which other solutions did I evaluate?

    Various options were evaluated, including Sophos, Fortinet, Ubiquiti EdgeRouter, OPNSense, and Cisco NGFW.

    What other advice do I have?

    It is important to carry out a study of the requirements that the company needs before acquiring a tool

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.
    Updated: January 2026
    Product Categories
    Email Security
    Buyer's Guide
    Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.