No more typing reviews! Try our Samantha, our new voice AI agent.
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Nov 25, 2025
Check Point Anti Spam & Email Security - Solid defense against spam and phishing
Pros and Cons
  • "DLP features can help prevent sensitive information from being leaked via email."
  • "The support language is only English."

What is our primary use case?

In our company, we use Office 365 to run the office, including email and some security tools from Microsoft. The tools did not satisfy us, so we decided to use Check Point technology. It gave us protection against spam, ransomware, and phishing, among other modern threats that travel through the email of collaborators.

In the end, the implementation through the Check Point blade is simple and easy to manage. 

We are really pleased with this tool that facilitated the management of these behaviors and problems that it generated for end users and the company itself.

How has it helped my organization?

Thanks to this tool acquired through The Check Point blade, we can have a layer of protection with the manufacturer for our email products. We can regulate and eliminate in a great way the threats that can enter through email.

The company, in turn, has managed to considerably lower the spam received, which also saturated the company's mailboxes a lot. It is a great tool that is easy to implement and with great considerations to be able to put it in the company.

What is most valuable?

Email filtering. The software can filter incoming emails to identify and block spam and other unwanted messages.

Malware detection. The software can detect and block malware attachments and links in emails. This is important for preventing malware infections and other security threats.

DLP features can help prevent sensitive information from being leaked via email. This may involve scanning emails for specific types of content or attachments and then either blocking or encrypting those emails.

What needs improvement?

Support is really an area that needs to be improved, as they currently take a very long time to resolve cases, which is not acceptable.

The support language is only English. They could expand other languages to expand more easily and help the client in a better way.

Regarding cost management, they are only accessible through a partner. This makes it more difficult to find pricing and do budgeting.

In terms of the ease of documentation, sometimes it is a bit difficult to find the correct information about the product.                   

Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
May 2026
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,221 professionals have used our research since 2012.

For how long have I used the solution?

We have used this solution for email protection in our company for quite some time with excellent results.

What do I think about the stability of the solution?

yes

What do I think about the scalability of the solution?

yes

How are customer service and support?

great for all tickets.

Which solution did I use previously and why did I switch?

Previously, Microsoft technology was used, however, we did not like it.

We moved to Check Point.

What's my experience with pricing, setup cost, and licensing?

Regarding its license issues and costs, it seems reasonable to me.

Which other solutions did I evaluate?

We always do field and theoretical evaluations to verify the best options for similar products.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 25, 2025
Flag as inappropriate
PeerSpot user
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
Real User
Top 5Leaderboard
Jul 31, 2024
Excellent real-time threat detection, good prevention capabilities and helpful sandboxing
Pros and Cons
  • "Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security."
  • "The solution could be improved by reducing false positives."

What is our primary use case?

The primary use cases for Check Point Anti-Spam and Email Security Software Blade are anti-spam, anti-malware, anti-phishing, content filtering and threat prevention. 

How has it helped my organization?

Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security, increasing productivity, improving compliance, reducing IT support costs, and improving threat visibility.

What is most valuable?

Features like real-time threat detection and prevention, advanced threat intelligence, sandboxing, data loss prevention, and its user-friendly management console make it a very good solution.

What needs improvement?

The solution could be improved by reducing false positives, optimizing performance, improving the user interface, and integrating with other security solutions.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Technical support is okay.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, I didn't use any different solution.

How was the initial setup?

The initial setup was good.

What about the implementation team?

Our internal team managed the initial setup process. 

What was our ROI?

The ROI has been okay.

Which other solutions did I evaluate?

I didn't evaluate any other product.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
May 2026
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,221 professionals have used our research since 2012.
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
Real User
Top 5Leaderboard
Jul 30, 2024
Reduces spam, enhances security, and improves compliance
Pros and Cons
  • "The most valuable features of the solution include advanced threat detection."
  • "User experience can be improved."

What is our primary use case?

The primary use cases of this solution include spam filtering, malware protection, phishing prevention, data loss prevention, email continuity, and threat intelligence.

How has it helped my organization?

This solution helped us reduce spam, enhance security, improve compliance, and increase user satisfaction and cost efficiency.

What is most valuable?

The most valuable features of the solution include advanced threat detection, real-time threat intelligence, data loss prevention, email continuity, a user-friendly interface, detailed reporting and analytics.

What needs improvement?

User experience can be improved. 

Performance can be improved in terms of speed, reliability, and scalability. 

The solution can also be improved in terms of features and customer support.

For how long have I used the solution?

I have been using the solution for the past two years.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Technical support should be improved.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, I did not use a different solution. 

How was the initial setup?

The initial setup was good.

What about the implementation team?

We implemented the solution via an in-house team.

What was our ROI?

The ROI is good.

What's my experience with pricing, setup cost, and licensing?

The licensing and pricing can be improved.

Which other solutions did I evaluate?

No, I did not evaluate other options.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Saurabh-Pal - PeerSpot reviewer
Sr. Security Specialist at a tech vendor with 11-50 employees
Real User
Apr 25, 2023
Very efficient, stable, with great customer support
Pros and Cons
  • "This solution is very efficient."
  • "If you face any configuration problems, Check Point is the only solution."

What is our primary use case?

Our customers used this product for internet security, anti-virus, and remote browsing. We are system integrators and worked with Check Point as managed service providers up until a few months ago. I'm a senior security specialist.

What is most valuable?

This solution is very efficient. 

What needs improvement?

If you face any configuration problems, you have to involve the Check Point team so they can verify their software.

For how long have I used the solution?

Until recently, we were integrators of this solution for five years. 

What do I think about the stability of the solution?

The stability is generally good if there are no power-related issues. 

What do I think about the scalability of the solution?

The scalability is very good. 

How are customer service and support?

The customer support is excellent - if you're facing any problems, you can write to the Check Point team and you'll receive an immediate reply. 

How was the initial setup?

The setup of this solution is complex because it has the concept of software blade instead of appliance which is something that only CheckPoint can identify. Deployment generally takes about a week and requires an engineer.   

What's my experience with pricing, setup cost, and licensing?

Palo Alto is very expensive compared to other solutions. 

What other advice do I have?

If you're a software company, I recommend this solution and rate it nine out of 10. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Feb 20, 2023
Excellent protection with policies and anti-spam capabilities
Pros and Cons
  • "It's a fairly old solution, however, that has been updated over time to become one of the best manufacturers of security solutions."
  • "The cost is high when putting through Check Point Blade in your Gateway."

What is our primary use case?

It has helped us to avoid large amounts of spam, which consumed space in our online exchange. 

With this, we also avoid expenses and also protect our users.

Protection policies were easy to implement to protect us from existing threats.

This tool is very good. It can be included through the anti-spam blade in our Check Point Gateway and is an easy implementation. The product helped us avoid threats from non-permitted domains and control domains with IPs reported as fraudulent or as threats.       

How has it helped my organization?

Check Point solutions are very good. It's a fairly old solution. However, that has been updated over time to become one of the best manufacturers of security solutions.

Check Point Anti Spam is a very interesting and good tool. It has helped us a lot against modern threats, spam, and domains that are marked as threats. In this way, we have improved business security,

The solution has also been modernized in Harmony. However, this solution is included in our Gateway and makes it easier to use.

It's improved against email attacks greatly.

What is most valuable?

This tool provides several quite interesting features:

1- Ease of Implementation through Check Point Security Management makes it so that it can be implemented through your blade.

2- The blocking policies are very effective. You can provide denial policies by IPs or even by reputation.

3- Monitoring what happens in the perimeter helps verify the tool's behavior in the face of threats, in addition to improving some current vulnerabilities to debug better as we spend time with the tool.

It is an easy-to-use, very good tool.

What needs improvement?

The tool is modernized by Check Point Harmony anti-spam. They can also modernize the tool through their blade.

At the Check Point support level, it has a great slope since the support language is only in English. Service hours are sometimes difficult to find an agent in Latin American hours, so a support case may take longer to resolve than expected.

The cost is high when putting through Check Point Blade in your Gateway.

The documentation is not so easy to validate. Some new users in the Check Point environment have a hard time. Therefore, the guides should be more intuitive.

For how long have I used the solution?

We currently have a Check Point Gateway administrator through the Check Point Infinity Portal, with the Smart Cloud, where we were able to easily add the anti-spam blade, used for a while with excellent results.

Which solution did I use previously and why did I switch?

We used email security and anti-spam tools from Microsoft. However, we prefer to have all security solutions centralized.

What's my experience with pricing, setup cost, and licensing?

The cost depends on the license that is acquired. Sometimes adding the license later is somewhat high.

I recommend getting a good  Check Point vendor so they can help you with the requirements and costs as they are not that easy to find.

Which other solutions did I evaluate?

We have tested and validated other solutions such as those of Microsoft. However, it is more suited to what is sought in these solutions with  Check Point.

What other advice do I have?

The tool is very good. However, they must validate if it meets expectations. There are already more modern tools that do the same at the Check Point level.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Dec 5, 2022
Non-invasive, protects from spam, and detects problems fast
Pros and Cons
  • "It has provided us with an easy way to avoid invasive mail."
  • "While we often take advantage of Check Point's cloud part, including Infinity or Harmony, I would like to see products that directly deal with mobile or native environments or other operating systems that we have within the organization."

What is our primary use case?

We use the solution for perimeter safety and to protect emails. Initially, we activated Check Point to offer greater protection against spam and attacks so that our users are safe as our organization is attacked often.

How has it helped my organization?

We managed to give users a non-invasive tool so that they are protected. The solution protects us as long as we are not executing large workloads. It's simple to administer. It's helped our organization detect problems faster when analyzing events, and it is very efficient - even when implementing new functions or configurations within the established policies. 

What is most valuable?

It has provided us with an easy way to avoid invasive mail. When users are constantly receiving advertising attacks, it helps to offer verification of the domains from each of those alerts and to have filtering without the need to get directly to the user. It provides users with less noise when receiving emails. They do not get unnecessary emails and spam has largely stopped. 

What needs improvement?

Today, we have several solutions that give us added value in the catalog of services. While we often take advantage of Check Point's cloud part, including Infinity or Harmony, I would like to see products that directly deal with mobile or native environments or other operating systems that we have within the organization. 

For how long have I used the solution?

I've used the solution for three years.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Top 20
Nov 3, 2022
Non-invasive, easy to deploy, and quick to configure
Pros and Cons
  • "The functionality is better."
  • "Check Point Anti Spam and Email Security has given some of the most value to each one of the collaborators of our organization; the product is easy to deploy, quick to configure, not invasive, does not unnecessarily block or prevent the normal operation of the users, and ensures we are protected at all times."
  • "Many would love to have this solution and be able to manage it from any device, including native applications or applications that can be installed on devices such as Android or iOS."
  • "I had the need for specialized support in Spanish. However, there are only specialists in the English-speaking language, and that has, in some cases, limited support."

What is our primary use case?

Our organization had the need for an efficient way to solve problems surrounding mail, as there are constant places or niches for attackers to strike. We were looking for a solution that could collaborate and integrate in a stealthy and minimally invasive way to protect each of our collaborators and work groups. We had the opportunity to use this solution to assist us with security.

How has it helped my organization?

Check Point Anti Spam and Email Security has given some of the most value to each one of the collaborators of our organization. Once it is installed, it is not invasive. It has not unnecessarily blocked or prevented the normal operation of the users. The product is easy to deploy, quick to configure, and gives added value to each of our users, our accounts, and our organization. It ensures we are protected at all times. It is one of the best solutions we can have in our organization.

What is most valuable?

One of the most outstanding characteristics it has given to our organization and each of our collaborators is that it is not very invasive. The installation has been easy for us and has given us better service than the last generation. It is no longer like the old applications where we had to install user-by-user. The functionality is better. You can place it on your computers, and it is faster when deploying and protecting each one of our accounts. It's helped us avoid a great number of attacks.

What needs improvement?

What I would like to see in the future are new features that can be implemented in this solution. Many would love to have this solution and be able to manage it from any device, including native applications or applications that can be installed on devices such as Android or iOS. We'd like to gradually adopt portability and teleworking capabilities so users can really be anywhere with administrators able to help and give value to our users inside or outside the organization.

For how long have I used the solution?

I've used the solution for about two years.

What do I think about the stability of the solution?

It is one of the most stable solutions. It is worth emphasizing that one of my common uses is to have it established in one of the solutions that are in a cluster, and this gives double stability. 

What do I think about the scalability of the solution?

The solution is quite scalable. It will depend a lot on the capabilities of the SOAP where I have that function enabled. It's fast and simple to scale if I need more computing power.

How are customer service and support?

I had the need for specialized support in Spanish. However, there are only specialists in the English-speaking language, and that has, in some cases, limited support. It's an issue when it is carried out by a third party or a different technician who does not have the capacity or the fluency to speak fluently in English. It is worth emphasizing that the best experts have always given us the most concern in Spanish.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Executive IT Operations at Indian Immunologicals Limited
Real User
Jan 20, 2022
Next Gen and SandBlast technology are good for stopping attacks
Pros and Cons
  • "A scalable, stable solution with good technical support."
  • "I find the Next-Gen firewall with SandBlast technology the most valuable feature, as it is good for stopping attacks."
  • "The pattern used to filter emails could be improved"
  • "In terms of anti-spam and email, the pattern that they use to filter the emails could be improved."

What is our primary use case?

We are using 5400, 6700 and 6900 versions of the hardware in our company. We have approximately 1,600 users.

What is most valuable?

I find the Next-Gen firewall with SandBlast technology the most valuable feature. It is good for stopping attacks.

What needs improvement?

In terms of anti-spam and email, the pattern that they use to filter the emails could be improved. There are too many normal emails being considered spam. There should be an option to learn the different patterns specific to the organization where it is being deployed.

For how long have I used the solution?

I have been working with this product for more than three years.

What do I think about the stability of the solution?

The product is stable.

What do I think about the scalability of the solution?

The product is scalable.

How are customer service and support?

Technical support by Check Point is good.

Which solution did I use previously and why did I switch?

We previously used a third-party product that was hosted in the cloud.

How was the initial setup?

The initial setup is a bit complex. Training the IT admins how to use, understand, and configure Check Point Anti-Spam and Email is a bit complex.

What about the implementation team?

We have four people in-house for maintenance of the solution.

What's my experience with pricing, setup cost, and licensing?

The pricing of Check Point Anti-Spam and Email Security is reasonable.

What other advice do I have?

Check Point Anti-Spam and Email Security is a good product. For a bigger organization, they should consider that the pattern for determining spam does need to be more developed or enhanced.

I would rate this product a 7 out of 10.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2026
Product Categories
Email Security
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.