Try our new research platform with insights from 80,000+ expert users
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Good anti-spam capabilities with easy management and regional blacklisting
Pros and Cons
  • "This solution helped us lock down and have our infrastructure easier to manage."
  • "I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal."

What is our primary use case?

Check Point Anti-Spam and Email Security Software Blade is one of the valuable features that we have available in quantum equipment. It gave us that layer of protection and event solutions to safeguard the security of events and activities. In our network, it's analyzing everything that enters our network or leaves it.

Among the attacks that we had to avoid events by SMTP, POP, or DDoS, and additionally, protect ourselves from image or language attacks. We've been able to block regions by IP addresses or locations.

How has it helped my organization?

We currently have several regions blocked by blacklisted IP addresses or insecure domain senders, thus raising the level of protection that the institution has. We use this feature frequently due to our mail service, which is a hybrid service.

This solution helped us lock down and have our infrastructure easier to manage.

We've solved protection against buffer overflow that has caused our server to freeze or be slower when receiving or sending emails.

What is most valuable?

The anti-spam feature helps to verify the reputation of the databases in a reputational way. It manages to compare each request with a complete base of IP addresses. This layer eliminates around 70 percent of the attacks that enter through and are part of the most common attacks that our less expert users receive. We are now capable of differentiating this type of incident. This database is constantly updated to protect the equipment and thus validate if these addresses.

What needs improvement?

I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal, thus being even more cloud-based in its management. Among the things that I would also like would be an application for cell phones where you can manage this type of event, if required, be it Android or iOS. It would thus be more disruptive by taking advantage of market demands and ensuring protection.

Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
April 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
847,862 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for two years.

How was the initial setup?

The solution is easy to install and enable.

What's my experience with pricing, setup cost, and licensing?

Its cost is quite high and its package is sold as an additional license.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
User
Top 5Leaderboard
Excellent real-time threat detection, good prevention capabilities and helpful sandboxing
Pros and Cons
  • "Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security."
  • "The solution could be improved by reducing false positives."

What is our primary use case?

The primary use cases for Check Point Anti-Spam and Email Security Software Blade are anti-spam, anti-malware, anti-phishing, content filtering and threat prevention. 

How has it helped my organization?

Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security, increasing productivity, improving compliance, reducing IT support costs, and improving threat visibility.

What is most valuable?

Features like real-time threat detection and prevention, advanced threat intelligence, sandboxing, data loss prevention, and its user-friendly management console make it a very good solution.

What needs improvement?

The solution could be improved by reducing false positives, optimizing performance, improving the user interface, and integrating with other security solutions.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Technical support is okay.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, I didn't use any different solution.

How was the initial setup?

The initial setup was good.

What about the implementation team?

Our internal team managed the initial setup process. 

What was our ROI?

The ROI has been okay.

Which other solutions did I evaluate?

I didn't evaluate any other product.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
April 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
847,862 professionals have used our research since 2012.
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
User
Top 5Leaderboard
Reduces spam, enhances security, and improves compliance
Pros and Cons
  • "The most valuable features of the solution include advanced threat detection."
  • "User experience can be improved."

What is our primary use case?

The primary use cases of this solution include spam filtering, malware protection, phishing prevention, data loss prevention, email continuity, and threat intelligence.

How has it helped my organization?

This solution helped us reduce spam, enhance security, improve compliance, and increase user satisfaction and cost efficiency.

What is most valuable?

The most valuable features of the solution include advanced threat detection, real-time threat intelligence, data loss prevention, email continuity, a user-friendly interface, detailed reporting and analytics.

What needs improvement?

User experience can be improved. 

Performance can be improved in terms of speed, reliability, and scalability. 

The solution can also be improved in terms of features and customer support.

For how long have I used the solution?

I have been using the solution for the past two years.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Technical support should be improved.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, I did not use a different solution. 

How was the initial setup?

The initial setup was good.

What about the implementation team?

We implemented the solution via an in-house team.

What was our ROI?

The ROI is good.

What's my experience with pricing, setup cost, and licensing?

The licensing and pricing can be improved.

Which other solutions did I evaluate?

No, I did not evaluate other options.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Thiago Ribeiro - PeerSpot reviewer
System Analyst at Infrasat
Real User
Top 20
Provides an ease of implementation and a significant reduction in false positives
Pros and Cons
  • "One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."
  • "One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."

    What is most valuable?

    One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails.

    For how long have I used the solution?

    We have been using Check Point Anti-Spam and Email Security Software Blade for two years now.

    What do I think about the scalability of the solution?

    The solution is utilized around the clock as a primary parameter for filtering incoming and outgoing emails.

    How was the initial setup?

    I would rate the initial setup process a nine out of ten.

    What about the implementation team?

    We took help from a third-party partner to assist in deploying the solution. Around two executives were required to work on it. 

    What's my experience with pricing, setup cost, and licensing?

    I rate the product pricing a seven out of ten.

    Which other solutions did I evaluate?

    We considered various products in the market but ultimately chose Check Point due to its reputation and ease of implementation.

    What other advice do I have?

    The solution leverages artificial intelligence to learn email flow patterns, reduce false positives, and identify trustworthy emails based on correspondence frequency and block lists.

    While the initial implementation costs increased, we consider it a valuable investment as it has enhanced productivity and provided better security for our organization.

    I would recommend this solution, especially for medium to large companies seeking a stable and user-friendly email security management system.

    I rate it a nine out of ten. 

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Priyanshu Kumar - PeerSpot reviewer
    Information Technology Specialist at Tech Mahindra
    Real User
    Great threat detection, spam, and email blocking
    Pros and Cons
    • "Check Point Anti-Spam & Email Security software is a modern-day solution for security management and data scrutiny."
    • "They should upgrade support services and make a more user-friendly database."

    What is our primary use case?

    We basically use the solution for threat detection, spam, email blocking, and security against organized email phishing attacks as well as data security management. Nowadays, this has been a prime concern for organizations and working professionals.

    These use cases of Check Point Anti-Spam & Email Security software make it one of the prime products and is highly recommended. It is a must-have integrated product.

    Check Point Anti-Spam & Email Security software is a modern-day solution.

    How has it helped my organization?

    Check Point Anti-Spam & Email Security served out to be highly productive for my organization. It's great for management and data security and generates innovation and growth.

    Check Point Anti-Spam & Email Security software is a modern-day solution for security management and data scrutiny.

    In short, I highly recommend the product.

    What is most valuable?

    There are highly productive features, including threat detection, spam, email blocking, and security.

    It's great against organized email phishing attacks and offers advanced 2FA authentication.

    There is third-party integration possible. There are many other customized tools that can act as a booster to some already great services. 

    It creates a healthy environment for mass adoption of Check Point Anti-Spam & Email Security.

    What needs improvement?

    Check Point Anti-Spam & Email Security is a highly organized tool with many benefits. However, they should upgrade support services and make a more user-friendly database. That would help with higher integration and adoption.

    Check Point Anti-Spam & Email Security software as a platform will catch the eyes of large organizations and MNCs as security concerns have risen significantly in recent years.

    For how long have I used the solution?

    I have been integrating with this software since last year.

    Which solution did I use previously and why did I switch?

    I haven't dealt with any other software.

    What's my experience with pricing, setup cost, and licensing?

    The pricing is in the mid to high range. It's affordable and the setup is smooth.

    Which other solutions did I evaluate?

    I haven't evaluated any other solution. Some other colleagues already recommended it.

    What other advice do I have?

    Just go for it.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    PeerSpot user
    Senior Network/Security Engineer at Skywind Group
    Real User
    Flexible configuration, straightforward to set up, and false positive errors are minimal
    Pros and Cons
    • "I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like."
    • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

    What is our primary use case?

    Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).

    The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

    The Check Point Anti-Spam and Email Security Software Blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of email filtration and anti-spam protection.

    How has it helped my organization?

    We rely on the Check Point HA Clusters to secure the DataCenter of our company that is located in Asia (Taiwan). This software blade - Check Point Anti-Spam & Email Security - is enabled among the number of the others, and is responsible for scanning and blocking the potential malware email or the email that contain Spam messages. 

    As the security administrator, I see that the Check Point Anti-Spam & Email Security works quite well. The logs and reports show the daily number of messages blocked, and it's amazing. 

    From time to time, I manually check the blocked emails and can confirm that 99% of them are trash. I am confident that the number of False Positives is minimal for this solution.

    What is most valuable?

    1. I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like.
    2. The databases of IPs and text strings are updated as per schedule, which can be adjusted in the blade options.
    3. It is possible to create and use the custom block list for the anti-spam blade in the policy, which we have configured.
    4. When you have the IPS software blade purchased and activated, the emails are checked by the email IPS protections, thus increasing the security level even more.

    What needs improvement?

    I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

    Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

    We have also had several support cases opened for software issues, but none of them were connected with the Check Point Anti-Spam and Email Security Software Blade.

    For how long have I used the solution?

    We have been using this product for about three years, starting in late 2017.

    What do I think about the stability of the solution?

    The Check Point Anti-Spam and Email Security Software Blade is stable.

    What do I think about the scalability of the solution?

    The Check Point Anti-Spam and Email Security Software Blade scales well with the gateways we use, since it doesn't affect the overall performance much after activation.

    How are customer service and technical support?

    We have had several support cases opened, but none of them were connected with the Check Point Anti-Spam and Email Security Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

    The longest issue took about one month to be resolved, which we consider too long.

    Which solution did I use previously and why did I switch?

    No, it's the first NGFW with email protection we onboarded.

    How was the initial setup?

    The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

    What about the implementation team?

    Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

    What's my experience with pricing, setup cost, and licensing?

    Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

    Which other solutions did I evaluate?

    No, we decided to stick with Check Point after the demo.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Mitesh D Patel - PeerSpot reviewer
    Senior Technical Consultant- Cyber Security at Ivalue Infosolution
    Real User
    Top 5Leaderboard
    A stable anti-spam and malware phishing solution that can be deployed quickly
    Pros and Cons
    • "Anti-spam and malware phishing are valuable features of the solution."
    • "I can say that the solution's price level is a problematic area that needs to be considered for improvement."

    What is our primary use case?

    We use the solution in our company with respect to the firewall and email security solutions.

    What is most valuable?

    Anti-spam and malware phishing are valuable features of the solution.

    In Email Security Software Blade, if you talk about anti-spam, it is very useful for those customers who are using Microsoft 365's Office Suite or Exchange mail servers. Every customer suggests that you have to use an anti-spam solution or anti-phishing solution. It is used as an email security solution.

    What needs improvement?

    I don't have any kind of point to improve because that's working well from my understanding and from my experience.

    I can say that the solution's price level is a problematic area that needs to be considered for improvement. Prices could be cheaper.

    For how long have I used the solution?

    I have been using Check Point Anti-Spam and Email Security Software Blade for four to five years.

    What do I think about the stability of the solution?

    It's a stable product.

    What do I think about the scalability of the solution?

    It's a scalable product.

    There are multiple customers using the solution.

    How are customer service and support?

    I haven't connected the tech support because the deployment team connected with the Check Point team for support.

    How was the initial setup?

    The initial setup is straightforward.

    The solution is deployed on the cloud.

    The deployment hardly takes half an hour.

    What's my experience with pricing, setup cost, and licensing?

    For licensing, my company makes yearly payments, which is expensive.

    What other advice do I have?

    My suggestion to those planning to use it, I would say that without an anti-spam solution, you are not safe.

    I rate the overall solution a nine out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
    PeerSpot user
    Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
    Perimeter Security Administrator at a security firm with 51-200 employees
    Real User
    Secure with good customization but needs more AI
    Pros and Cons
    • "Check Point offers us flexibility when it comes to customizing the configurations that we want to manage, thus allowing us to meet the specific needs of our company."
    • "A possible improvement for the solution would be to be able to implement artificial intelligence and machine learning technologies to improve the accuracy of detecting spam and malicious emails that are constantly arriving."

    What is our primary use case?

    It is a solution that allows us to quickly install solutions that will protect our mail against viruses or fishing. Of the features that we most want is the ability to protect them against spam. This combination of technology helps us to protect against invasive emails. Being able to prevent these anti-spam attacks from phishing will help us to have protection and control over the identity of users and prevent our users from falling for malicious attempts. 

    How has it helped my organization?

    This solution is designed well and is good for use in small and medium-sized companies as it has an analysis system for spam threats, phishing, and viruses and includes easy-to-install protection. 

    This solution allows us to be effective. It is accessible, which has an economic impact on a small company. Having solutions from large companies that protect our mail system against spam threats is useful. It can help us offer a solution that can maintain secure communication without having to worry about a million-dollar investment. 

    What is most valuable?

    Check Point offers us flexibility when it comes to customizing the configurations that we want to manage, thus allowing us to meet the specific needs of our company. It can be customized in such a way that it allows us to block certain unwanted emails, such as emails from a specific sender, domains, or email addresses, generating an email policy that meets the needs of our institution and being efficient, fast, and secure.

    What needs improvement?

    From my perspective, a possible improvement for the solution would be to be able to implement artificial intelligence and machine learning technologies to improve the accuracy of detecting spam and malicious emails that are constantly arriving. This would allow us a better adapt to new techniques. New analysis techniques on spam, phishing, or viruses would give us greater security by establishing standards and real-time analysis using AI.

    For how long have I used the solution?

    I've used the solution for one year.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.
    Updated: April 2025
    Product Categories
    Email Security
    Buyer's Guide
    Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.