Try our new research platform with insights from 80,000+ expert users

Abnormal Security vs Check Point Anti-Spam and Email Security Software Blade comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Abnormal Security
Ranking in Email Security
2nd
Average Rating
9.6
Reviews Sentiment
7.9
Number of Reviews
10
Ranking in other categories
Secure Email Gateway (SEG) (2nd)
Check Point Anti-Spam and E...
Ranking in Email Security
11th
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
43
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Email Security category, the mindshare of Abnormal Security is 6.8%, up from 5.5% compared to the previous year. The mindshare of Check Point Anti-Spam and Email Security Software Blade is 0.8%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Market Share Distribution
ProductMarket Share (%)
Abnormal Security6.8%
Check Point Anti-Spam and Email Security Software Blade0.8%
Other92.4%
Email Security
 

Featured Reviews

ChrisBrown5 - PeerSpot reviewer
Automated threat detection that protects against corruption with minimal intervention
Abnormal Security is valuable because it features an automated scoring tool that doesn't require much intervention from our team. It enhances threat detection capabilities by making the process automated and is easy to scale to our entire environment. Additionally, it protects us from being business email compromised, which is invaluable for maintaining our security.
Abnet Tsegaye Belay - PeerSpot reviewer
Has reduced phishing threats and provided better visibility through detailed dashboards and logging
One thing I noticed with Check Point Anti-Spam and Email Security Software Blade is that without configuring the MTA or transfer agent, it cannot work fully. The MTA feature has significant resource needs, and without it, we cannot use the full-fledged features of Anti-Spam and Email Security Blades. Its dependency on MTA is substantial. I chose 8 out of 10 for Check Point Anti-Spam and Email Security Software Blade because of the MTA dependency feature. Disabling MTA is problematic as it is very important for deploying this solution. If you want full content scanning or threat extraction and emulation, you have to enable MTA to work effectively.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Ease of use is undoubtedly one of the most valuable features of Abnormal Security."
"It does some really cool stuff that other tools aren't doing. We found it to be really effective, and the AI/ML functionality is really what differentiates them."
"Their ability to take things out of the mailbox and catch things much faster than users is excellent."
"Initial auto-remediation allows us to auto-remediate before the email lands in the end user's inbox for a split second."
"What I like about Abnormal Security is that it notifies me if any of my partners or suppliers are experiencing a security breach by analyzing their database and identifying potential cyber threats."
"I would recommend Abnormal Security."
"The features that appeal to me most are the combination of auto-remediation and Detection 360."
"It protects us from being business email compromised, which is invaluable for maintaining our security."
"Check Point Anti-Spam and Email Security Software Blade provides an extra level of security against threats and malware along with 2FA support for multiple platform collaboration and integrations in a single click."
"Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security."
"Anti-spam and malware phishing are valuable features of the solution."
"This solution is very efficient."
"Since the engine is made to block by IP, domains, and reputation, we minimized the spam threats that end up in the user's mailbox."
"This solution helped us lock down and have our infrastructure easier to manage."
"Advanced Spam Filtering to identify and block unwanted email messages."
"One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."
 

Cons

"The biggest pain point for us is the lack of support for on-premise email systems."
"I would like to have the ability to customize the auto-remediation feature."
"Abnormal should add more automatic reports. I have an open request to our account team for more notification and report types that can be sent automatically. For example, they have an awesome report that gets sent weekly, and I also want them monthly, so I don't need to do so much adding up when my director wants numbers over time."
"When we're working on something as engineers, and we find an idea or a method of doing something that would be greatly improved by doing it another way, there should be an ability for me to click the ideas button, type in an idea that I have, and submit it to a product review team or developers to have them think through the process a little bit more."
"There could be room for improvement in enhancing integration with other cybersecurity tools."
"The pricing for academic institutions and student mailboxes is challenging."
"The ideal scenario would be for Abnormal Security to work in tandem with Microsoft to analyze incoming emails."
"I, as such, do not have anything that I do not like or would like to add, but you could argue that because they are doing it API-based, there is a chance that something could slip through temporarily before they are able to pull it out. In theory, it could happen just because of the nature of the system. They are not in line with the delivery of the mail. They are kind of asynchronous, which is a pro as well as a con. If it is synchronous, then I know it would always stop them, but because it is asynchronous, things could get through temporarily or because of some system issues on the Microsoft side or their side. It is the nature of the beast, but it is a little bit of a con."
"The interface is a bit overwhelming with information overload for someone new to it."
"The solution's technical support is an area with shortcomings that need to be improved for the better."
"It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting."
"It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting."
"The high-end protection of email servers from any advanced foreign agents and malware is not 100% there currently."
"A possible improvement for the solution would be to be able to implement artificial intelligence and machine learning technologies to improve the accuracy of detecting spam and malicious emails that are constantly arriving."
"Regarding Checkpoint, I would suggest an easier interface to understand. The interface is a bit overwhelming with information overload for someone new to it."
"While we often take advantage of Check Point's cloud part, including Infinity or Harmony, I would like to see products that directly deal with mobile or native environments or other operating systems that we have within the organization."
 

Pricing and Cost Advice

"The license is based on the user count, so the number of users that have an email address in the organization."
"Abnormal Security, on the other hand, provides the same level of functionality for just over $60,000 – that's half the price!"
"The pricing appears fair, and they demonstrate a genuine willingness to work with us on it."
"Overall, we'd certainly prefer lower pricing, but Abnormal Security doesn't seem unreasonable compared to similar offerings in the market."
"I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
"Reasonably priced solution."
"I rate the product pricing a seven out of ten."
"This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
"The cost is competitive with other security products on the market."
"For licensing, my company makes yearly payments, which is expensive."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
868,787 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Financial Services Firm
9%
Manufacturing Company
7%
Government
7%
Security Firm
23%
Computer Software Company
11%
Manufacturing Company
9%
Educational Organization
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Midsize Enterprise2
Large Enterprise8
By reviewers
Company SizeCount
Small Business24
Midsize Enterprise12
Large Enterprise18
 

Questions from the Community

What do you like most about Abnormal Security?
The features that appeal to me most are the combination of auto-remediation and Detection 360.
What is your experience regarding pricing and costs for Abnormal Security?
I find the pricing to be favorable, but I did not disclose the exact cost.
What needs improvement with Abnormal Security?
There could be more selectable options and more granular selections available.
What needs improvement with Check Point Anti-Spam and Email Security Software Blade?
There is room for improvement with Check Point Anti-Spam and Email Security Software Blade, particularly with the interface, which is not new people friendly; however, users will learn it, and it's...
What is your primary use case for Check Point Anti-Spam and Email Security Software Blade?
My main use case for Check Point Anti-Spam and Email Security Software Blade includes phishing protection, ransomware protection, and spam protection. The solution helps with compliance and integra...
 

Overview

 

Sample Customers

Foot Lcoker, Xerox, Liberty Mutual, Mattel, Boston Scientific
SF Police Credit Union (SFPCU)
Find out what your peers are saying about Abnormal Security vs. Check Point Anti-Spam and Email Security Software Blade and other solutions. Updated: September 2025.
868,787 professionals have used our research since 2012.