Try our new research platform with insights from 80,000+ expert users

Abnormal Security vs Check Point Anti-Spam and Email Security Software Blade comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Abnormal Security
Ranking in Email Security
3rd
Average Rating
9.6
Reviews Sentiment
7.9
Number of Reviews
10
Ranking in other categories
Secure Email Gateway (SEG) (2nd)
Check Point Anti-Spam and E...
Ranking in Email Security
11th
Average Rating
8.4
Reviews Sentiment
7.6
Number of Reviews
40
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Email Security category, the mindshare of Abnormal Security is 7.4%, up from 4.4% compared to the previous year. The mindshare of Check Point Anti-Spam and Email Security Software Blade is 0.8%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

ChrisBrown5 - PeerSpot reviewer
Automated threat detection that protects against corruption with minimal intervention
Abnormal Security is valuable because it features an automated scoring tool that doesn't require much intervention from our team. It enhances threat detection capabilities by making the process automated and is easy to scale to our entire environment. Additionally, it protects us from being business email compromised, which is invaluable for maintaining our security.
NareshKumar9 - PeerSpot reviewer
Offers robust threat protection and saves costs significantly
One area for improvement in Check Point Anti-Spam and Email Security Software Blade involves the firmware updates; sometimes, until I update the firmware of the Check Point Quantum Sparks, I cannot access the GUI to see my data usage. If Check Point resolves this issue, everything will be much better.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I would recommend Abnormal Security."
"I like Abnormal's threat protection with auto-remediation, but I also love its abuse mailbox feature, which automatically responds to the end user. That feature has a super-valuable security component and helps improve the user experience."
"It protects us from being business email compromised, which is invaluable for maintaining our security."
"Initial auto-remediation allows us to auto-remediate before the email lands in the end user's inbox for a split second."
"One of the things that I love about them is that the setup and installation are super easy. All you do is give them access to your Microsoft 365 tenant, and through APIs, they are able to do their work. They are doing all this through APIs, so you do not have to install the software and take a month to get it all set up to even see the value of the solution. You could be up and running in less than an hour."
"Ease of use is undoubtedly one of the most valuable features of Abnormal Security."
"What I like about Abnormal Security is that it notifies me if any of my partners or suppliers are experiencing a security breach by analyzing their database and identifying potential cyber threats."
"The features that appeal to me most are the combination of auto-remediation and Detection 360."
"Since the engine is made to block by IP, domains, and reputation, we minimized the spam threats that end up in the user's mailbox."
"This solution helped us lock down and have our infrastructure easier to manage."
"Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network."
"It helped us to achieve process compliance with over 90% effectiveness."
"The most valuable feature for me is real-time detection and remediation."
"Check Point Anti-Spam and Email Security Software Blade provides an extra level of security against threats and malware along with 2FA support for multiple platform collaboration and integrations in a single click."
"The functionality is better."
"Anti-spam and malware phishing are valuable features of the solution."
 

Cons

"I, as such, do not have anything that I do not like or would like to add, but you could argue that because they are doing it API-based, there is a chance that something could slip through temporarily before they are able to pull it out. In theory, it could happen just because of the nature of the system. They are not in line with the delivery of the mail. They are kind of asynchronous, which is a pro as well as a con. If it is synchronous, then I know it would always stop them, but because it is asynchronous, things could get through temporarily or because of some system issues on the Microsoft side or their side. It is the nature of the beast, but it is a little bit of a con."
"There could be room for improvement in enhancing integration with other cybersecurity tools."
"When we're working on something as engineers, and we find an idea or a method of doing something that would be greatly improved by doing it another way, there should be an ability for me to click the ideas button, type in an idea that I have, and submit it to a product review team or developers to have them think through the process a little bit more."
"I would like to have the ability to customize the auto-remediation feature."
"The biggest pain point for us is the lack of support for on-premise email systems."
"There could be more selectable options and more granular selections available."
"The pricing for academic institutions and student mailboxes is challenging."
"One feature I'd love to see is outbound scanning."
"User experience can be improved."
"There could be an extension of the trial period to 60 days."
"Recognizing spammers and spam email sourcing is extremely lagging these days, and the performance could be improved to provide better efficiency."
"Check Point Anti-Spam and Email Security Software Blade could improve by focusing more on promoting and marketing its products. Despite having a great solution, it hasn't captured a larger market share, possibly due to insufficient promotion. It should also incorporate a module to monitor client identities, similar to CrowdStrike. It could also improve by systemizing and simplifying their documentation to make it easier to find needed information."
"The high-end protection of email servers from any advanced foreign agents and malware is not 100% there currently."
"Installation time could be improved as it takes too long to install."
"It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting."
"I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal."
 

Pricing and Cost Advice

"The license is based on the user count, so the number of users that have an email address in the organization."
"Overall, we'd certainly prefer lower pricing, but Abnormal Security doesn't seem unreasonable compared to similar offerings in the market."
"Abnormal Security, on the other hand, provides the same level of functionality for just over $60,000 – that's half the price!"
"The pricing appears fair, and they demonstrate a genuine willingness to work with us on it."
"The cost is competitive with other security products on the market."
"Reasonably priced solution."
"I rate the product pricing a seven out of ten."
"This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
"I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
"For licensing, my company makes yearly payments, which is expensive."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
865,295 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
9%
Manufacturing Company
7%
Government
7%
Security Firm
23%
Computer Software Company
11%
Manufacturing Company
9%
Financial Services Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Abnormal Security?
The features that appeal to me most are the combination of auto-remediation and Detection 360.
What is your experience regarding pricing and costs for Abnormal Security?
I find the pricing to be favorable, but I did not disclose the exact cost.
What needs improvement with Abnormal Security?
There could be more selectable options and more granular selections available.
What needs improvement with Check Point Anti-Spam and Email Security Software Blade?
The user interface can be sometimes less intuitive and complex for new users who are working as admin. Some configurations in Check Point Anti-Spam and Email Security Software Blade, particularly w...
What is your primary use case for Check Point Anti-Spam and Email Security Software Blade?
My main use case for Check Point Anti-Spam and Email Security Software Blade involves addressing email security problems in our organization. It has been helping us identify high volumes of spam em...
 

Overview

 

Sample Customers

Foot Lcoker, Xerox, Liberty Mutual, Mattel, Boston Scientific
SF Police Credit Union (SFPCU)
Find out what your peers are saying about Abnormal Security vs. Check Point Anti-Spam and Email Security Software Blade and other solutions. Updated: July 2025.
865,295 professionals have used our research since 2012.