Try our new research platform with insights from 80,000+ expert users
Anuj V. - PeerSpot reviewer
Consultant at ANALYTICS EDGE
Real User
Good logging, monitoring, and blocking capabilities
Pros and Cons
  • "The robust Smart Dashboard enables to us fetch important and accurate data insights concerning the blocking of spammers and malware attacks on the system."
  • "In my book, more and more customized integrations could be made available so that different kinds of mail servers and cloud servers can be internally integrated for real-time system flow and security enablement."

What is our primary use case?

Check Point Anti-Spam and Email Security Software Blade enables all-round security to network servers and cloud servers. Also, it identifies and detects the spam in a proactive manner as it has a high spam detection rate utility and features embedded in the same. It is an intelligent tool with a high restriction rate for spam mails and messages and also fewer false positive cases.

It works excellently on identified IP addresses and diffuses the spammers well in advance. The blocking of spam mails and source points will be done easily without disturbing the system's functioning.

How has it helped my organization?

Check Point Anti-Spam and Email Security Software Blade has improved the performance outcome for our organization to a great extent as it helps in providing the A to Z system and cloud security of IT system and execution the same is effortless and free of hassle.

The robust Smart Dashboard enables to us fetch important and accurate data insights concerning the blocking of spammers and malware attacks on the system. It gives a clear reporting view and is available 24/7/365. 

SMTP and POP3 mail traffic is continuously scanned for spammers and virus attacks and is protected well in advance accordingly.

What is most valuable?

The solution offers a robust architecture of virus and spammer detection. 

The introduction of the software in our IT system has resulted in strengthened security for mail servers and IT system end to end.

Strong reporting and monitoring dashboard offers an overall view of data insights in real-time

Blocking of spam emails and their origin/source points is good. There's no trouble in the operation, deployment, and integration of the same with our internal dashboard.The IT system is effortless and smooth.

Logging and monitoring of an anti-spam mail server is available and runs continuously.

What needs improvement?

In my book, more and more customized integrations could be made available so that different kinds of mail servers and cloud servers can be internally integrated for real-time system flow and security enablement.

A selection of customized servers should be made available on tariffs for shorter duration - for a renewal of tariffs for three months and so. Also, the renewal of the agreement can be made smoother for effortless continuation with vendors

Customized server security can also be accustomed to different pricing options so that all kinds of organizations can come forward and try the services without hesitation or price constraint.

Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
September 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.

For how long have I used the solution?

I have been using the anti-spam and email security software blade of Check Point for the past six months and am well versed with its trial version utilities and features.

What do I think about the stability of the solution?

It's highly stable and can be effortlessly integrated with all kinds of IT systems and internal servers.

What do I think about the scalability of the solution?

It's highly scalable and replicable across multiple kinds of systems

How are customer service and support?

The customer service and support system are highly responsive and quite agile in providing a timely solution to our queries and related concerns. It's commendable and they should keep up the good work 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We had an internal security solution developed by PCC Web Solutions, however, we switched on Check Point due to the larger scope of utility features at affordable pricing.

How was the initial setup?

There is no complexity in the deployment and integration of software in our ecosystem.

What about the implementation team?

We implemented it through the vendor.

What was our ROI?

We've seen over 80% ROI.

What's my experience with pricing, setup cost, and licensing?

I would strongly recommend all the business users out there to come forward and try this amazing system of email security solutions which is essential for all kinds of businesses today.

Which other solutions did I evaluate?

We tried a lot of partner vendors in this area of system and email security. We tried the free version of McAfee and Quick Heal to strengthen the email security system in our organization. 

What other advice do I have?

I'd recommend this amazing email security solution to protect your email server inside and out from all kinds of endpoints. Introducing it brings system security and high-grade efficiency in performance outcomes. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Flexible with good anti-spam capabilities and effective perimeter security
Pros and Cons
  • "It does a better job of recognizing spammers."
  • "A major area for improvement is within some of the heavily discounted software blade add-ons on top of the current Next Generation Threat Prevention and SandBlast and Next Generation Threat Prevention offerings."

What is our primary use case?

Our company works on the implementation of services in the cloud. We have a large number of employees inside and outside the country. The work from home modality was also added recently, and, for this reason, a solution was needed that would provide security in all aspects of electronic communication. That is why Checkpoint Anti-Spam and Email Security was implemented throughout the company. We wanted to be able to block spam and malware at the connection level and also be able to integrate it with cloud services with Azure and thus be able to have excellent data management.

How has it helped my organization?

Check Point Anti-Spam and Email Security Software Blade has improved the perimeter security of our company. Since its implementation it has complemented an essential part of the company's security. One of the features that we liked is the content-based Anti-spam capabilities. It can scan images or attachments. Another feature that it provides us with is the anti-spam block/allow list. This has allowed us to have great control in order to be able to block malicious emails that try to enter our employees' emails.

What is most valuable?

Of all the features that Check Point Anti-Spam & Email Security Software Blade brings, all of them fulfill different functions. The one I liked the most is content-based anti-spam. It does a better job of recognizing spammers. It does reconnaissance against advanced forms of spam, including image-based and foreign-language spam, using pattern-based detection. From what I was reading, it has a proprietary algorithm to create unique, fingerprint-like signatures of email messages and practically uses AI.

I also like the flexible configuration set. Both the content-based anti-spam, IP, and text string databases are updated on a schedule, which can be adjusted in the sheet options. It is possible to create and use the custom block list for the anti-spam sheet in the policy that we have configured.

What needs improvement?

For the few years that I have been using Check Point, they have always presented new updates and tries to stay ahead with their tools making them more interactive with the user and not so complicated. They are always at the forefront with new features. It meets and covers all the necessary fields to protect an organization and must be at the forefront as hackers are always one step ahead. They need to continue to make the tool more robust to protect users from new threats.

A major area for improvement is within some of the heavily discounted software blade add-ons on top of the current Next Generation Threat Prevention and SandBlast and Next Generation Threat Prevention offerings.

For how long have I used the solution?

The tool was implemented in 2020. Currently, I have been working with this solution for Three years..

What do I think about the stability of the solution?

During the two years of implementation in the organization, it has not presented any problem. Its stability is very good.

What do I think about the scalability of the solution?

Its scalability is excellent. It is a super scalable product in security and very robust.

How are customer service and support?

Regarding customer service, we have had both good and bad experiences I give them an eight on the support part, however, sometimes we are left wanting.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We only had Office 365 and wanted to make the security more robust.

How was the initial setup?

The implementation was simple

What about the implementation team?

The implementation was done in conjunction with internal collaborators and with support from Check Point. They were very helpful and very good at their job.

What was our ROI?

My return is to have made a single investment and to be able, with that investment, to maintain the privacy and security of the organization.

What's my experience with pricing, setup cost, and licensing?

It is a very affordable tool to implement in an organization.

Which other solutions did I evaluate?

We looked into Fortinet and Microsoft.

What other advice do I have?

You can use this solution without fear as it gives you security and confidence.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
September 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Thiago Ribeiro - PeerSpot reviewer
System Analyst at Infrasat
Real User
Top 20
Provides an ease of implementation and a significant reduction in false positives
Pros and Cons
  • "One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."
  • "One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."

    What is most valuable?

    One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails.

    For how long have I used the solution?

    We have been using Check Point Anti-Spam and Email Security Software Blade for two years now.

    What do I think about the scalability of the solution?

    The solution is utilized around the clock as a primary parameter for filtering incoming and outgoing emails.

    How was the initial setup?

    I would rate the initial setup process a nine out of ten.

    What about the implementation team?

    We took help from a third-party partner to assist in deploying the solution. Around two executives were required to work on it. 

    What's my experience with pricing, setup cost, and licensing?

    I rate the product pricing a seven out of ten.

    Which other solutions did I evaluate?

    We considered various products in the market but ultimately chose Check Point due to its reputation and ease of implementation.

    What other advice do I have?

    The solution leverages artificial intelligence to learn email flow patterns, reduce false positives, and identify trustworthy emails based on correspondence frequency and block lists.

    While the initial implementation costs increased, we consider it a valuable investment as it has enhanced productivity and provided better security for our organization.

    I would recommend this solution, especially for medium to large companies seeking a stable and user-friendly email security management system.

    I rate it a nine out of ten. 

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    PeerSpot user
    Security IT at a tech services company with 51-200 employees
    Real User
    Top 20
    Good modern tool - Excellent Blade
    Pros and Cons
    • "Due to its technology, monitoring, and manufacturer features, we have been able to reduce the intrusion of spam and other threats that can be uploaded via email."
    • "It is expensive but worth it."

    What is our primary use case?

    Our need was to be able to provide greater security to business e-mail, avoid possible threats and completely reduce vulnerabilities within our perimeter, realizing that we could use our checkpoint gateway and security management to, through the anti-spam and email security blade, provide business users an additional layer of security do not hesitate to purchase this modern security tool, part of the family of checkpoint tools.

    In this way, checkpoint has improved perimeter security by avoiding spam emails within our infrastructure.

    How has it helped my organization?

    Check Point Anti-Spam and Email Security Software Blade has helped us considerably to improve the company's email experience because due to its technology, monitoring and manufacturer features we have been able to reduce if not completely almost completely the intrusion of spam and spam. other threats that can be uploaded via email.

    Thanks also to its anti-spam policies where we can block from a domain, an email subject or any header any type of spam in the company, also thanks to its alerts we can be completely updated about what is happening around our infrastructure.

    It also has a large database that is continuously validated to find IPs cataloged with a spam reputation to avoid being able to accept this type of email or domain.

    What is most valuable?

    With checkpoint blade anti-spam and email security software we have found great features that helped us protect our infrastructure and email, such as:

    -Anti spam policies controlled by reputation, domain, ips, which generated greater control and complete reduction of spam in the company.

    -Blade integration with our gateway system.

    -Complete administration from checkpoint security management server.

    - Easy handling and intuitive administration.

    It really is easy, powerful and safe for our company, we liked what it gave us.

    For how long have I used the solution?

    We have been using Blade for at least two years. We have managed to improve the security experience of our business email.

    What do I think about the stability of the solution?

    We have had no problems with the performance of the firewalls.

    What do I think about the scalability of the solution?

    It performs quite well in cluster solutions or VSS provisioned in Azure.

    Which solution did I use previously and why did I switch?

    Previously we used security functions of Microsoft 365, however we wanted to modernize ourselves with a robust tool, which had prestige in addition to centralizing our security environments, for which we preferred to use checkpoint.

    What's my experience with pricing, setup cost, and licensing?

    The solutions are excellent, expensive but worth it, you could verify some POC to be able to verify it in a test environment, and verify if it adjusts to the needs of your company.

    Which other solutions did I evaluate?

    If correct, every serious company should always be able to verify the existing options in the market, cisco, fortinet, microsoft among others.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Jonathan Ramos G. - PeerSpot reviewer
    Cloud Engineer at ITQS
    Real User
    Top 20
    Good anti-spam capabilities with easy management and regional blacklisting
    Pros and Cons
    • "This solution helped us lock down and have our infrastructure easier to manage."
    • "I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal."

    What is our primary use case?

    Check Point Anti-Spam and Email Security Software Blade is one of the valuable features that we have available in quantum equipment. It gave us that layer of protection and event solutions to safeguard the security of events and activities. In our network, it's analyzing everything that enters our network or leaves it.

    Among the attacks that we had to avoid events by SMTP, POP, or DDoS, and additionally, protect ourselves from image or language attacks. We've been able to block regions by IP addresses or locations.

    How has it helped my organization?

    We currently have several regions blocked by blacklisted IP addresses or insecure domain senders, thus raising the level of protection that the institution has. We use this feature frequently due to our mail service, which is a hybrid service.

    This solution helped us lock down and have our infrastructure easier to manage.

    We've solved protection against buffer overflow that has caused our server to freeze or be slower when receiving or sending emails.

    What is most valuable?

    The anti-spam feature helps to verify the reputation of the databases in a reputational way. It manages to compare each request with a complete base of IP addresses. This layer eliminates around 70 percent of the attacks that enter through and are part of the most common attacks that our less expert users receive. We are now capable of differentiating this type of incident. This database is constantly updated to protect the equipment and thus validate if these addresses.

    What needs improvement?

    I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal, thus being even more cloud-based in its management. Among the things that I would also like would be an application for cell phones where you can manage this type of event, if required, be it Android or iOS. It would thus be more disruptive by taking advantage of market demands and ensuring protection.

    For how long have I used the solution?

    I've used the solution for two years.

    How was the initial setup?

    The solution is easy to install and enable.

    What's my experience with pricing, setup cost, and licensing?

    Its cost is quite high and its package is sold as an additional license.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Executive IT Operations at Indian Immunologicals Limited
    Real User
    Next Gen and SandBlast technology are good for stopping attacks
    Pros and Cons
    • "A scalable, stable solution with good technical support."
    • "The pattern used to filter emails could be improved"

    What is our primary use case?

    We are using 5400, 6700 and 6900 versions of the hardware in our company. We have approximately 1,600 users.

    What is most valuable?

    I find the Next-Gen firewall with SandBlast technology the most valuable feature. It is good for stopping attacks.

    What needs improvement?

    In terms of anti-spam and email, the pattern that they use to filter the emails could be improved. There are too many normal emails being considered spam. There should be an option to learn the different patterns specific to the organization where it is being deployed.

    For how long have I used the solution?

    I have been working with this product for more than three years.

    What do I think about the stability of the solution?

    The product is stable.

    What do I think about the scalability of the solution?

    The product is scalable.

    How are customer service and support?

    Technical support by Check Point is good.

    Which solution did I use previously and why did I switch?

    We previously used a third-party product that was hosted in the cloud.

    How was the initial setup?

    The initial setup is a bit complex. Training the IT admins how to use, understand, and configure Check Point Anti-Spam and Email is a bit complex.

    What about the implementation team?

    We have four people in-house for maintenance of the solution.

    What's my experience with pricing, setup cost, and licensing?

    The pricing of Check Point Anti-Spam and Email Security is reasonable.

    What other advice do I have?

    Check Point Anti-Spam and Email Security is a good product. For a bigger organization, they should consider that the pattern for determining spam does need to be more developed or enhanced.

    I would rate this product a 7 out of 10.

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    reviewer1661955 - PeerSpot reviewer
    Cybersecurity specialist at a maritime company with 10,001+ employees
    User
    Integrates well and is easy to manage but only offers basic anti-spam filters
    Pros and Cons
    • "It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email."
    • "It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting."

    What is our primary use case?

    The primary use case is to protect the organization from any attacks generated via email. As most of the attacks in recent days are via email, the organization has to be equipped and ready to mitigate this type of attack at the perimeter level, before it has been delivered to the user's mailbox or an endpoint.

    Basic anti-spam filters are not capable of protecting against the latest generation of attacks. Therefore, for protecting the organization against this sophisticated or targeted attack, we concluded that the next generation of email security solutions is a must. Ultimately, it should be able to protect against any attack that is sent via email. 

    How has it helped my organization?

    At first, it seemed like a good solution but it wasn't; we have the mail server on site.

    After six months, the mail was in fits and starts and the Check Point infrastructure was not responding properly. We realized that we were under a strong spam attack and had to install another antispam product. We were lucky enough to be supported by the Check Point team of specialists, who helped us to identify and solve the problem.

    In fact, even with analyzing the logs, it was not something that was evident at first sight

    What is most valuable?

    This product integrates well and is easy to manage.

    It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email.

    It is useful for having alerts on the e-mail traffic trends. 

    This solution is ideal for a small business or if you have a mail server in the cloud and most of the spam is blocked by the provider. It is not good for large email flows. If you require or move to large mail flows, the solution needs to be changed. 

    What needs improvement?

    Determining areas for improvement is not a question that can be answered simply. 

    We should separate the antispam engine into two parts; the first that breaks down mass spam, and the second for refinement.

    It would be good to dedicate a separate core, at least for the first phase, so that it does not take away resources from the system. The ideal approach would be to enrich the product with more functions, however, this would likely also lead to an increase in cost.

    It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting. 

    For how long have I used the solution?

    I've used the solution for three months.

    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Chief Information Security Officer at Abcl
    Real User
    Top 20
    Good support and reporting, but the multi-appliance setup process is complex
    Pros and Cons
    • "The solution can be monitored on a single dashboard with actionable insights and reporting."
    • "It does not provide for standalone configuration on the security gateway. Instead, you need to have a management server/smart console for managing it."

    What is our primary use case?

    The primary use case is to protect the organization from any attack generated via email. As most of the attacks in recent days are via email, the organization has to be equipped and ready to mitigate this type of attack at the perimeter level, before it has been delivered to the user mailbox or endpoint.

    Basic anti-spam filters are not capable of protecting against the latest generation of attacks. So, for protecting the organization against this sophisticated or targeted attack, we concluded that the next generation of Email Security solutions is a must. Ultimately, it should be able to protect against any attack that is sent via email.

    How has it helped my organization?

    This product prevents sophisticated attacks, such as:

    • Phishing Email attacks such as impersonation, spear-phishing, and business email compromise
    • Account Takeover protection, where the primary aim of an attacker is to steal user credentials
    • Protection against malicious files, malicious attachments, and malware. The primary aim of this kind of email is to infect user machines and steal data, or injecting malicious code on a machine so that they can move laterally and infect other machines within the organization, or perform a ransomware attack 
    • Protection against data leakage that can be caused by an aforementioned attack, which can result in financial loss or reputation damage to the organization 

    What is most valuable?

    This solution is hosted in an inline mode for the protection of inbound, outbound, and internal email communication. It does not require any change in MX entry on the DNS Server for routing traffic to the service provider for Email Security.

    The complete solution can be hosted on-premises for environments where the organization has an on-premises email solution, and it will remain invisible to the attacker.

    This solution can be integrated with SandBlast Technology provided by Check Point and its most effective solution is breach prevention. 

    It can be extended to the cloud as well, for protecting cloud-hosted email.

    The solution can be monitored on a single dashboard with actionable insights and reporting.

    What needs improvement?

    Our solution required multiple appliances, as a single appliance only supports up to 5,000 files. This means that depending upon the number of files that need to be processed, the number of appliances needs to be increased. Essentially, the number of appliances needs to be sized accordingly for complete protection. The increase in the number of appliances makes it difficult to manage in terms of physical connectivity and configuration.

    The product performs only basic anti-spam capabilities, compared to CloudGuard SaaS, which provides more robust anti-spamming functionality than the on-premises solution. 

    YARA rules can be added only using the CLI, rather than through the GUI, which makes it difficult for the administrator.

    For how long have I used the solution?

    We are not using the Check Point Anti-Spam and Email Security Software Blade at this moment. 

    What do I think about the stability of the solution?

    This solution is stable.

    What do I think about the scalability of the solution?

    This product is easily scalable and a number of devices can be added whenever it is required.

    How are customer service and technical support?

    The support and our experience with the OEM were excellent.

    Which solution did I use previously and why did I switch?

    Previously, we were using the email gateway along with an additional license to protect against email attacks on the same gateway.

    How was the initial setup?

    Setting up the product is complex. In the case of a single appliance, it is simple. However, it becomes complex with several appliances.

    What about the implementation team?

    The solution was implemented with our in-house team along with the OEM.

    What's my experience with pricing, setup cost, and licensing?

    The setup is complex, as it is dependent on the number of files that need to be processed via the email security appliance.

    The cost is competitive with other security products on the market. 

    Which other solutions did I evaluate?

    We evaluated similar solutions by Cisco & Trend Micro.

    What other advice do I have?

    This solution should be designed to support all functionality, including use as an email gateway in case the functionality is required, as well as having a strong anti-spam module 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.
    Updated: September 2025
    Product Categories
    Email Security
    Buyer's Guide
    Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.