The primary use cases for Check Point Anti-Spam and Email Security Software Blade are anti-spam, anti-malware, anti-phishing, content filtering and threat prevention.
Engineer at Digitaltrack
Excellent real-time threat detection, good prevention capabilities and helpful sandboxing
Pros and Cons
- "Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security."
- "The solution could be improved by reducing false positives."
What is our primary use case?
How has it helped my organization?
Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security, increasing productivity, improving compliance, reducing IT support costs, and improving threat visibility.
What is most valuable?
Features like real-time threat detection and prevention, advanced threat intelligence, sandboxing, data loss prevention, and its user-friendly management console make it a very good solution.
What needs improvement?
The solution could be improved by reducing false positives, optimizing performance, improving the user interface, and integrating with other security solutions.
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
September 2025

Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for two years.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and support?
Technical support is okay.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
No, I didn't use any different solution.
How was the initial setup?
The initial setup was good.
What about the implementation team?
Our internal team managed the initial setup process.
What was our ROI?
The ROI has been okay.
Which other solutions did I evaluate?
I didn't evaluate any other product.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Engineer at Digitaltrack
Reduces spam, enhances security, and improves compliance
Pros and Cons
- "The most valuable features of the solution include advanced threat detection."
- "User experience can be improved."
What is our primary use case?
The primary use cases of this solution include spam filtering, malware protection, phishing prevention, data loss prevention, email continuity, and threat intelligence.
How has it helped my organization?
This solution helped us reduce spam, enhance security, improve compliance, and increase user satisfaction and cost efficiency.
What is most valuable?
The most valuable features of the solution include advanced threat detection, real-time threat intelligence, data loss prevention, email continuity, a user-friendly interface, detailed reporting and analytics.
What needs improvement?
User experience can be improved.
Performance can be improved in terms of speed, reliability, and scalability.
The solution can also be improved in terms of features and customer support.
For how long have I used the solution?
I have been using the solution for the past two years.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and support?
Technical support should be improved.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
No, I did not use a different solution.
How was the initial setup?
The initial setup was good.
What about the implementation team?
We implemented the solution via an in-house team.
What was our ROI?
The ROI is good.
What's my experience with pricing, setup cost, and licensing?
The licensing and pricing can be improved.
Which other solutions did I evaluate?
No, I did not evaluate other options.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
September 2025

Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Information Technology Support Analyst at a financial services firm with 11-50 employees
Though the tool is highly reliable owing to its exceptional stability, it can be difficult to scale up
Pros and Cons
- "Check Point Anti-Spam and Email Security Software Blade is quite reliable...It is a very stable solution."
- "The solution's technical support is an area with shortcomings that need to be improved for the better."
What is our primary use case?
What we use in our company from Check Point is not software. We use a box from Check Point, and in that box, we have Check Point Firewall with all those features, like antivirus, web security, etc. It has all the software, so it's not a single software on our systems.
We use Check Point products, which have been good so far. I think the solution has reached the end-of-life stage because we are facing CPU usage issues. There is a need to change something in the solution to make it stronger.
We are a financial institution that requires a certain level of security, so we use Check Point Anti-Spam and Email Security Software Blade.
What is most valuable?
Check Point Anti-Spam and Email Security Software Blade is quite reliable. The solution had stayed reliable up until recently when we applied new updates while having a high memory usage which ultimately affected our network traffic. So far, the solution has been good.
What needs improvement?
The solution's technical support is an area with shortcomings that need to be improved for the better.
For how long have I used the solution?
I have four years of experience with Check Point Anti-Spam and Email Security Software Blade. I need to confirm the version of the solution I use.
What do I think about the stability of the solution?
It is a very stable solution.
What do I think about the scalability of the solution?
It's expensive right now if someone plans to scale up. One needs to pay a lot to get bigger scalability. The scalability of the solution can be very difficult.
We currently have 40 users in our company using the solution.
How are customer service and support?
I rate the technical support an eight out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
I joined my current company after the setup phase.
The solution is deployed on-premises.
What was our ROI?
The worth of the solution depends on one's needs.
What's my experience with pricing, setup cost, and licensing?
The solution is expensive.
I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive.
We have to make yearly payments towards the licensing cost. The additional cost in excess of the licensing cost is done for the support.
Which other solutions did I evaluate?
We evaluated solutions like Sophos and Juniper in our company.
What other advice do I have?
I recommend those planning to use the solution to check their number of users, the solutions you need, along with the products or services you specifically need to run some other solutions.
The solution is difficult to scale up.
Overall, I rate the solution a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sr. Security Specialist at a tech vendor with 11-50 employees
Very efficient, stable, with great customer support
Pros and Cons
- "This solution is very efficient."
- "If you face any configuration problems, Check Point is the only solution."
What is our primary use case?
Our customers used this product for internet security, anti-virus, and remote browsing. We are system integrators and worked with Check Point as managed service providers up until a few months ago. I'm a senior security specialist.
What is most valuable?
This solution is very efficient.
What needs improvement?
If you face any configuration problems, you have to involve the Check Point team so they can verify their software.
For how long have I used the solution?
Until recently, we were integrators of this solution for five years.
What do I think about the stability of the solution?
The stability is generally good if there are no power-related issues.
What do I think about the scalability of the solution?
The scalability is very good.
How are customer service and support?
The customer support is excellent - if you're facing any problems, you can write to the Check Point team and you'll receive an immediate reply.
How was the initial setup?
The setup of this solution is complex because it has the concept of software blade instead of appliance which is something that only CheckPoint can identify. Deployment generally takes about a week and requires an engineer.
What's my experience with pricing, setup cost, and licensing?
Palo Alto is very expensive compared to other solutions.
What other advice do I have?
If you're a software company, I recommend this solution and rate it nine out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Soporte técnico superior at Acobo
Non-invasive, protects from spam, and detects problems fast
Pros and Cons
- "It has provided us with an easy way to avoid invasive mail."
- "While we often take advantage of Check Point's cloud part, including Infinity or Harmony, I would like to see products that directly deal with mobile or native environments or other operating systems that we have within the organization."
What is our primary use case?
We use the solution for perimeter safety and to protect emails. Initially, we activated Check Point to offer greater protection against spam and attacks so that our users are safe as our organization is attacked often.
How has it helped my organization?
We managed to give users a non-invasive tool so that they are protected. The solution protects us as long as we are not executing large workloads. It's simple to administer. It's helped our organization detect problems faster when analyzing events, and it is very efficient - even when implementing new functions or configurations within the established policies.
What is most valuable?
It has provided us with an easy way to avoid invasive mail. When users are constantly receiving advertising attacks, it helps to offer verification of the domains from each of those alerts and to have filtering without the need to get directly to the user. It provides users with less noise when receiving emails. They do not get unnecessary emails and spam has largely stopped.
What needs improvement?
Today, we have several solutions that give us added value in the catalog of services. While we often take advantage of Check Point's cloud part, including Infinity or Harmony, I would like to see products that directly deal with mobile or native environments or other operating systems that we have within the organization.
For how long have I used the solution?
I've used the solution for three years.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Administrative Assistant at Tecapro
Non-invasive, easy to deploy, and quick to configure
Pros and Cons
- "The functionality is better."
- "Many would love to have this solution and be able to manage it from any device, including native applications or applications that can be installed on devices such as Android or iOS."
What is our primary use case?
Our organization had the need for an efficient way to solve problems surrounding mail, as there are constant places or niches for attackers to strike. We were looking for a solution that could collaborate and integrate in a stealthy and minimally invasive way to protect each of our collaborators and work groups. We had the opportunity to use this solution to assist us with security.
How has it helped my organization?
Check Point Anti Spam and Email Security has given some of the most value to each one of the collaborators of our organization. Once it is installed, it is not invasive. It has not unnecessarily blocked or prevented the normal operation of the users. The product is easy to deploy, quick to configure, and gives added value to each of our users, our accounts, and our organization. It ensures we are protected at all times. It is one of the best solutions we can have in our organization.
What is most valuable?
One of the most outstanding characteristics it has given to our organization and each of our collaborators is that it is not very invasive. The installation has been easy for us and has given us better service than the last generation. It is no longer like the old applications where we had to install user-by-user. The functionality is better. You can place it on your computers, and it is faster when deploying and protecting each one of our accounts. It's helped us avoid a great number of attacks.
What needs improvement?
What I would like to see in the future are new features that can be implemented in this solution. Many would love to have this solution and be able to manage it from any device, including native applications or applications that can be installed on devices such as Android or iOS. We'd like to gradually adopt portability and teleworking capabilities so users can really be anywhere with administrators able to help and give value to our users inside or outside the organization.
For how long have I used the solution?
I've used the solution for about two years.
What do I think about the stability of the solution?
It is one of the most stable solutions. It is worth emphasizing that one of my common uses is to have it established in one of the solutions that are in a cluster, and this gives double stability.
What do I think about the scalability of the solution?
The solution is quite scalable. It will depend a lot on the capabilities of the SOAP where I have that function enabled. It's fast and simple to scale if I need more computing power.
How are customer service and support?
I had the need for specialized support in Spanish. However, there are only specialists in the English-speaking language, and that has, in some cases, limited support. It's an issue when it is carried out by a third party or a different technician who does not have the capacity or the fluency to speak fluently in English. It is worth emphasizing that the best experts have always given us the most concern in Spanish.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Network/Security Engineer at Skywind Group
Flexible configuration, straightforward to set up, and false positive errors are minimal
Pros and Cons
- "I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like."
- "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
What is our primary use case?
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).
The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.
The Check Point Anti-Spam and Email Security Software Blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of email filtration and anti-spam protection.
How has it helped my organization?
We rely on the Check Point HA Clusters to secure the DataCenter of our company that is located in Asia (Taiwan). This software blade - Check Point Anti-Spam & Email Security - is enabled among the number of the others, and is responsible for scanning and blocking the potential malware email or the email that contain Spam messages.
As the security administrator, I see that the Check Point Anti-Spam & Email Security works quite well. The logs and reports show the daily number of messages blocked, and it's amazing.
From time to time, I manually check the blocked emails and can confirm that 99% of them are trash. I am confident that the number of False Positives is minimal for this solution.
What is most valuable?
- I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like.
- The databases of IPs and text strings are updated as per schedule, which can be adjusted in the blade options.
- It is possible to create and use the custom block list for the anti-spam blade in the policy, which we have configured.
- When you have the IPS software blade purchased and activated, the emails are checked by the email IPS protections, thus increasing the security level even more.
What needs improvement?
I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.
Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.
We have also had several support cases opened for software issues, but none of them were connected with the Check Point Anti-Spam and Email Security Software Blade.
For how long have I used the solution?
We have been using this product for about three years, starting in late 2017.
What do I think about the stability of the solution?
The Check Point Anti-Spam and Email Security Software Blade is stable.
What do I think about the scalability of the solution?
The Check Point Anti-Spam and Email Security Software Blade scales well with the gateways we use, since it doesn't affect the overall performance much after activation.
How are customer service and technical support?
We have had several support cases opened, but none of them were connected with the Check Point Anti-Spam and Email Security Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.
The longest issue took about one month to be resolved, which we consider too long.
Which solution did I use previously and why did I switch?
No, it's the first NGFW with email protection we onboarded.
How was the initial setup?
The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.
What about the implementation team?
Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.
What's my experience with pricing, setup cost, and licensing?
Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.
Which other solutions did I evaluate?
No, we decided to stick with Check Point after the demo.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Deputy Vice present at PVR Ltd
Good message encryption and validation features, but the console should be more user-friendly
Pros and Cons
- "Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network."
- "The user should be able to perform a real-time search of the objects and see the messages."
What is our primary use case?
Check Point makes up part of our security solution in all of our locations across India. We are in the eCommerce industry and one of the things that we do is set up tickets for moviegoers.
We have categorized our requirements as per the online penetration of our booking agents. As an example, in one of our locations, we have a penetration of filling online tickets that is reaching up to 85%. It is important that this system is safeguarded to ensure that we are not exploited on the ticketing platform using the OCR codes that we are generating and sending to our customers. As the tickets are emailed to the patrons in advance of the show, it is important that this email is secure. This is one of our use cases.
How has it helped my organization?
Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network. We are a PCI DSS compliant company in India and we need to ensure that our patrons' data is protected. At the same time, we want the convenience of being able to send tickets to them. Check Point has allowed us to do that.
What is most valuable?
The features that I like the best are message encryption and message validation.
What needs improvement?
The manageability using this console is complex and it should be a little more user-friendly. If you don't have a good understanding of putting the policies in place then sometimes it is tough to manage from the console. A more intuitive GUI would make it easier to manage.
The user should be able to perform a real-time search of the objects and see the messages. As it is now, when we create an object, sometimes you find out at a later stage that the object already exists. If I could simply type an object into the search bar and find out whether it exists by seeing it in a dropdown then it would save me time.
For how long have I used the solution?
We have been using the Check Point Anti-Spam and Email Security Blade for two years.
What do I think about the stability of the solution?
This solution has been stable and is working very well in our environment.
What do I think about the scalability of the solution?
This is a scalable solution. We have 170 locations across India and all of them have Check Point installed. We had considered scalability from the beginning of this project, with a three to five-year plan.
How are customer service and technical support?
We have been in direct contact with technical support and our experience has been that they are both nice and helpful. After the deployment was completed, the partner who assisted us had moved out and completed a knowledge transfer to the entire team. There was a subsequent issue that had to do with the VPN, and the Check Point technical support was very helpful in resolving it.
Which solution did I use previously and why did I switch?
We have used other security products by vendors such as Juniper and Palo Alto, but not for the same use cases.
How was the initial setup?
We began our implementation about two and a half years ago and as part of the process, we divided India into different regions. In total, it took us about 120 days to fully deploy across all of our locations.
What about the implementation team?
We have in-house staff who are very well versed in the Check Point technology, however, given the volume of deployment, we contracted a partner that was recommended by the vendor.
What other advice do I have?
My advice to anybody who is considering this solution is that it is a robust and reliable platform. With respect to messaging and firewall products, all of them are pretty good but it depends on your scenario. I would say that Check Point has the best security, the messaging protocols are pretty good, and the reliability is higher than competing products by Palo Alto and Juniper. When adopting Check Point, your skill is one of the key points to consider.
This is a good solution but there are certain complexities that need to be made more user-friendly. It should be more manageable from an IT perspective. This includes things such as setting up specific policies. A more intuitive GUI, for example, would help.
I would rate this solution a seven out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Product Categories
Email SecurityPopular Comparisons
Microsoft Defender for Office 365
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the pricing for Check Point software?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Messaging Security, what aspect do you think is the most important to look for?
- Which Email Security enterprise solution would you choose: Cisco Secure Email vs Forcepoint Email Security vs Barracuda Email Security Gateway?
- What is the best email encryption software for small enterprises using Office 365?
- What security measures should businesses prioritize to support secure remote work?
- When evaluating Email Security tools, what aspects do you think are the most important to look for?
- Why is Email Security important for companies?
- Which is the best email security gateway?
- Why are Email Security tools important for companies?