Try our new research platform with insights from 80,000+ expert users
reviewer2130000 - PeerSpot reviewer
Java DeveloperJava at Playtech
User
Comprehensive security that blocks spam and malware attacks
Pros and Cons
  • "It refreshes the dynamic database regularly to ensure IP addresses that no longer misbehave are not blocked by mistake."
  • "The technical team could improve services by ensuring when there are changes they inform enterprise users of effective upgrades."

What is our primary use case?

The advanced anti-spam protection platform prevents time waste and reduces the transfer of spam messages to the email inboxes of colleagues. 

It blocks phishing attacks across the entire collaboration chain among teams. 

The Email IPS protection against Denial of Service (DoS) prevents cyber attacks that can harm data. 

The antivirus protection system checks emails and attached files before sharing to enhance safety. 

It checks for malicious IP addresses that can be used to launch attacks and vulnerabilities in connection levels. 

How has it helped my organization?

It has enhanced comprehensive security in email sharing and collaboration among teams. 

It refreshes the dynamic database regularly to ensure IP addresses that no longer misbehave are not blocked by mistake. 

The anti-spam and email security system protects against advanced forms of spam with misleading patterns. It blocks offenders and easily allows trusted users to use the safeguarded network infrastructure. Employees are free to share information with their colleagues without fear of ransomware attacks.

What is most valuable?

It blocks spam and malware attacks across a secure email connection. It scrutinizes emails to ascertain whether the sender and the receiver are authenticated to share a given information. 

The content-based anti-spam tools ensure the attached files and any information being shared among teams are safe and free from attacks. 

It prevents advanced forms of spam, including image-based and foreign language spam, using pattern-based detection. The block and allow list for anti-spam denies email offenders and only allows approved trusted users. This enhances our data safety.

What needs improvement?

The set security tools can be easily incorporated with existing servers to save time and cost of developing reliable security infrastructure. I have experienced efficient performance from this product with powerful anti-spam and email IPS protection tools. 

The technical team could improve services by ensuring when there are changes they inform enterprise users of effective upgrades. 

Poor network infrastructure and insufficient filters leak information that is not secure sometimes. 

The product features have been doing good, and I like the customer support responses when contacted.

Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
April 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
847,862 professionals have used our research since 2012.

For how long have I used the solution?

I've been using the solution for 12 months.

What do I think about the stability of the solution?

I am impressed by the secure network infrastructure for sharing information.

What do I think about the scalability of the solution?

The performance has been in full gear since we deployed it.

How are customer service and support?

The customer support team works closely with organization members to aid effective performance.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with products from other vendors.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The implementation took place through the vendor for less cost and increased time-saving.

What was our ROI?

There is a continuous increase in ROI due to excellent performance.

What's my experience with pricing, setup cost, and licensing?

The cost has been good with efficient licensing terms.

Which other solutions did I evaluate?

I have not worked with products from other vendors.

What other advice do I have?

This is a smart product that is highly productive in terms of anti-spam and email security in any enterprise.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ankita  Singh - PeerSpot reviewer
Application Developer at Capegemini Consulting India Private Limited
Real User
Top 20
Good protection against malware, offers good data protection and has great email management
Pros and Cons
  • "Check Point Anti-Spam and Email Security Software Blade provides an extra level of security against threats and malware along with 2FA support for multiple platform collaboration and integrations in a single click."
  • "One thing which annoys me with the Check Point Anti-Spam and Email Security Software Blade is its customer support portal which still lags in service even after so many developments."

What is our primary use case?

Check Point Anti-Spam and Email Security Software Blade is undoubtedly one of the highly stable and scalable platforms for email management - at a minimal cost.

Check Point Anti-Spam and Email Security Software Blade is highly organized in terms of email synchronization and viewing, email sending/receiving, multiple file transfers on a single click, spam and phishing email blocking, and email restoration, and is much more compatible with various features.

Check Point Anti-Spam and Email Security Software Blade provides a safe passage for email management and data protection.

How has it helped my organization?

The Check Point Anti-Spam and Email Security Software Blade has proven to be highly productive and scalable in terms of what it provides, and at such a minimal cost.

Check Point Anti-Spam and Email Security Software Blade provides a complete solution against phishing email blocking and restoration, email synchronization and viewing, email sending/receiving, and multiple file transfers on a single click.

Check Point Anti-Spam and Email Security Software Blade is a highly recommended tool for professionals.

What is most valuable?

Check Point Anti-Spam and Email Security Software Blade provides multiple support and services. Some of the most valuable ones are the complete solution against phishing emails and the ability to block emails.

It allows for restoration along with email synchronization and viewing, sending/receiving, and multi-file transfer with a single click.

Check Point Anti-Spam and Email Security Software Blade provides an extra level of security against threats and malware along with 2FA support for multiple platform collaboration and integrations in a single click.

What needs improvement?

Usage and access to Check Point Anti-Spam and Email Security Software Blade are highly limited to professionals. However, there has been a bit more dependency in recent months, and one thing which annoys me with the Check Point Anti-Spam and Email Security Software Blade is its customer support portal which still lags in service even after so many developments.

Dealing with unnecessary ads running in the background is an area that Check Point Anti-Spam and Email Security Software Blade need to work on for mass adoption.

For how long have I used the solution?

I have been integrating with Check Point Anti-Spam and Email Security Software Blade for less than one year. However, since the day I joined this platform it has totally changed my way of work and email management.

Which solution did I use previously and why did I switch?

We previously used Protonmail. It was not as compatible according to my usability.

What's my experience with pricing, setup cost, and licensing?

Check Point Anti-Spam and Email Security Software Blade is budget-friendly and scalable.

Which other solutions did I evaluate?

I did not previously use a different solution.

What other advice do I have?

I'd advise potential new users to go for Check Point Anti-Spam and Email Security Software Blade, as it's highly dependable and secure.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
April 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
847,862 professionals have used our research since 2012.
Saurabh-Pal - PeerSpot reviewer
Sr. Security Specialist at a tech vendor with 11-50 employees
Real User
Top 5Leaderboard
Very efficient, stable, with great customer support
Pros and Cons
  • "This solution is very efficient."
  • "If you face any configuration problems, Check Point is the only solution."

What is our primary use case?

Our customers used this product for internet security, anti-virus, and remote browsing. We are system integrators and worked with Check Point as managed service providers up until a few months ago. I'm a senior security specialist.

What is most valuable?

This solution is very efficient. 

What needs improvement?

If you face any configuration problems, you have to involve the Check Point team so they can verify their software.

For how long have I used the solution?

Until recently, we were integrators of this solution for five years. 

What do I think about the stability of the solution?

The stability is generally good if there are no power-related issues. 

What do I think about the scalability of the solution?

The scalability is very good. 

How are customer service and support?

The customer support is excellent - if you're facing any problems, you can write to the Check Point team and you'll receive an immediate reply. 

How was the initial setup?

The setup of this solution is complex because it has the concept of software blade instead of appliance which is something that only CheckPoint can identify. Deployment generally takes about a week and requires an engineer.   

What's my experience with pricing, setup cost, and licensing?

Palo Alto is very expensive compared to other solutions. 

What other advice do I have?

If you're a software company, I recommend this solution and rate it nine out of 10. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Excellent protection with policies and anti-spam capabilities
Pros and Cons
  • "It's a fairly old solution, however, that has been updated over time to become one of the best manufacturers of security solutions."
  • "The cost is high when putting through Check Point Blade in your Gateway."

What is our primary use case?

It has helped us to avoid large amounts of spam, which consumed space in our online exchange. 

With this, we also avoid expenses and also protect our users.

Protection policies were easy to implement to protect us from existing threats.

This tool is very good. It can be included through the anti-spam blade in our Check Point Gateway and is an easy implementation. The product helped us avoid threats from non-permitted domains and control domains with IPs reported as fraudulent or as threats.       

How has it helped my organization?

Check Point solutions are very good. It's a fairly old solution. However, that has been updated over time to become one of the best manufacturers of security solutions.

Check Point Anti Spam is a very interesting and good tool. It has helped us a lot against modern threats, spam, and domains that are marked as threats. In this way, we have improved business security,

The solution has also been modernized in Harmony. However, this solution is included in our Gateway and makes it easier to use.

It's improved against email attacks greatly.

What is most valuable?

This tool provides several quite interesting features:

1- Ease of Implementation through Check Point Security Management makes it so that it can be implemented through your blade.

2- The blocking policies are very effective. You can provide denial policies by IPs or even by reputation.

3- Monitoring what happens in the perimeter helps verify the tool's behavior in the face of threats, in addition to improving some current vulnerabilities to debug better as we spend time with the tool.

It is an easy-to-use, very good tool.

What needs improvement?

The tool is modernized by Check Point Harmony anti-spam. They can also modernize the tool through their blade.

At the Check Point support level, it has a great slope since the support language is only in English. Service hours are sometimes difficult to find an agent in Latin American hours, so a support case may take longer to resolve than expected.

The cost is high when putting through Check Point Blade in your Gateway.

The documentation is not so easy to validate. Some new users in the Check Point environment have a hard time. Therefore, the guides should be more intuitive.

For how long have I used the solution?

We currently have a Check Point Gateway administrator through the Check Point Infinity Portal, with the Smart Cloud, where we were able to easily add the anti-spam blade, used for a while with excellent results.

Which solution did I use previously and why did I switch?

We used email security and anti-spam tools from Microsoft. However, we prefer to have all security solutions centralized.

What's my experience with pricing, setup cost, and licensing?

The cost depends on the license that is acquired. Sometimes adding the license later is somewhat high.

I recommend getting a good  Check Point vendor so they can help you with the requirements and costs as they are not that easy to find.

Which other solutions did I evaluate?

We have tested and validated other solutions such as those of Microsoft. However, it is more suited to what is sought in these solutions with  Check Point.

What other advice do I have?

The tool is very good. However, they must validate if it meets expectations. There are already more modern tools that do the same at the Check Point level.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Support at a security firm with 51-200 employees
User
Good DLP, email filtering, and malware detection
Pros and Cons
  • "DLP features can help prevent sensitive information from being leaked via email."
  • "The support language is only English."

What is our primary use case?

In our company, we use Office 365 to run the office, including email and some security tools from Microsoft. The tools did not satisfy us, so we decided to use Check Point technology. It gave us protection against spam, ransomware, and phishing, among other modern threats that travel through the email of collaborators.

In the end, the implementation through the Check Point blade is simple and easy to manage. 

We are really pleased with this tool that facilitated the management of these behaviors and problems that it generated for end users and the company itself.

How has it helped my organization?

Thanks to this tool acquired through The Check Point blade, we can have a layer of protection with the manufacturer for our email products. We can regulate and eliminate in a great way the threats that can enter through email.

The company, in turn, has managed to considerably lower the spam received, which also saturated the company's mailboxes a lot. It is a great tool that is easy to implement and with great considerations to be able to put it in the company.

What is most valuable?

Email filtering. The software can filter incoming emails to identify and block spam and other unwanted messages.

Malware detection. The software can detect and block malware attachments and links in emails. This is important for preventing malware infections and other security threats.

DLP features can help prevent sensitive information from being leaked via email. This may involve scanning emails for specific types of content or attachments and then either blocking or encrypting those emails.

What needs improvement?

Support is really an area that needs to be improved, as they currently take a very long time to resolve cases, which is not acceptable.

The support language is only English. They could expand other languages to expand more easily and help the client in a better way.

Regarding cost management, they are only accessible through a partner. This makes it more difficult to find pricing and do budgeting.

In terms of the ease of documentation, sometimes it is a bit difficult to find the correct information about the product.                   

For how long have I used the solution?

We have used this solution for email protection in our company for quite some time with excellent results.

Which solution did I use previously and why did I switch?

Previously, Microsoft technology was used, however, we did not like it.

We moved to Check Point.

What's my experience with pricing, setup cost, and licensing?

Regarding its license issues and costs, it seems reasonable to me.

Which other solutions did I evaluate?

We always do field and theoretical evaluations to verify the best options for similar products.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Executive IT Operations at Indian Immunologicals Limited
Real User
Next Gen and SandBlast technology are good for stopping attacks
Pros and Cons
  • "A scalable, stable solution with good technical support."
  • "The pattern used to filter emails could be improved"

What is our primary use case?

We are using 5400, 6700 and 6900 versions of the hardware in our company. We have approximately 1,600 users.

What is most valuable?

I find the Next-Gen firewall with SandBlast technology the most valuable feature. It is good for stopping attacks.

What needs improvement?

In terms of anti-spam and email, the pattern that they use to filter the emails could be improved. There are too many normal emails being considered spam. There should be an option to learn the different patterns specific to the organization where it is being deployed.

For how long have I used the solution?

I have been working with this product for more than three years.

What do I think about the stability of the solution?

The product is stable.

What do I think about the scalability of the solution?

The product is scalable.

How are customer service and support?

Technical support by Check Point is good.

Which solution did I use previously and why did I switch?

We previously used a third-party product that was hosted in the cloud.

How was the initial setup?

The initial setup is a bit complex. Training the IT admins how to use, understand, and configure Check Point Anti-Spam and Email is a bit complex.

What about the implementation team?

We have four people in-house for maintenance of the solution.

What's my experience with pricing, setup cost, and licensing?

The pricing of Check Point Anti-Spam and Email Security is reasonable.

What other advice do I have?

Check Point Anti-Spam and Email Security is a good product. For a bigger organization, they should consider that the pattern for determining spam does need to be more developed or enhanced.

I would rate this product a 7 out of 10.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1661955 - PeerSpot reviewer
Cybersecurity specialist at a maritime company with 10,001+ employees
User
Integrates well and is easy to manage but only offers basic anti-spam filters
Pros and Cons
  • "It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email."
  • "It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting."

What is our primary use case?

The primary use case is to protect the organization from any attacks generated via email. As most of the attacks in recent days are via email, the organization has to be equipped and ready to mitigate this type of attack at the perimeter level, before it has been delivered to the user's mailbox or an endpoint.

Basic anti-spam filters are not capable of protecting against the latest generation of attacks. Therefore, for protecting the organization against this sophisticated or targeted attack, we concluded that the next generation of email security solutions is a must. Ultimately, it should be able to protect against any attack that is sent via email. 

How has it helped my organization?

At first, it seemed like a good solution but it wasn't; we have the mail server on site.

After six months, the mail was in fits and starts and the Check Point infrastructure was not responding properly. We realized that we were under a strong spam attack and had to install another antispam product. We were lucky enough to be supported by the Check Point team of specialists, who helped us to identify and solve the problem.

In fact, even with analyzing the logs, it was not something that was evident at first sight

What is most valuable?

This product integrates well and is easy to manage.

It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email.

It is useful for having alerts on the e-mail traffic trends. 

This solution is ideal for a small business or if you have a mail server in the cloud and most of the spam is blocked by the provider. It is not good for large email flows. If you require or move to large mail flows, the solution needs to be changed. 

What needs improvement?

Determining areas for improvement is not a question that can be answered simply. 

We should separate the antispam engine into two parts; the first that breaks down mass spam, and the second for refinement.

It would be good to dedicate a separate core, at least for the first phase, so that it does not take away resources from the system. The ideal approach would be to enrich the product with more functions, however, this would likely also lead to an increase in cost.

It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting. 

For how long have I used the solution?

I've used the solution for three months.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
ALEXANDER STEPHENS - PeerSpot reviewer
Security Lead at Global New Age Media
Real User
Top 10
Easy to use and fast with a good signature database
Pros and Cons
  • "We now have better security and fewer false positives."
  • "Installation time could be improved as it takes too long to install."

What is our primary use case?

It is improving our company's security posture.

How has it helped my organization?

We now have better security and fewer false positive and less stress .

What is most valuable?

The antivirus is easy to use and fast with a good signature database that is updated in real-time.

What needs improvement?

Installation time could be improved as it takes too long to install. With the software footprint, it should be taking less than the time it took to install. In the future, I hope to see faster installation and easier installation on our platform as time is equal to money.

For how long have I used the solution?

I've used the solution for three months.

Which solution did I use previously and why did I switch?

I did not use a different solution previously.

How was the initial setup?

The initial setup was good.

What's my experience with pricing, setup cost, and licensing?

The product offers a good price.

Which other solutions did I evaluate?

I did not evaluate a different solution. 

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2025
Product Categories
Email Security
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.