Try our new research platform with insights from 80,000+ expert users

Check Point Anti-Spam and Email Security Software Blade vs Check Point Harmony Endpoint comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Average Rating
8.8
Reviews Sentiment
6.7
Number of Reviews
22
Ranking in other categories
Email Security (20th), Secure Web Gateways (SWG) (15th), Data Loss Prevention (DLP) (21st), Cloud Access Security Brokers (CASB) (11th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (13th), Access Management (12th), Bot Management (3rd), ZTNA as a Service (8th), ZTNA (3rd), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Check Point Anti-Spam and E...
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
48
Ranking in other categories
Email Security (9th)
Check Point Harmony Endpoint
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
205
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Anti-Malware Tools (3rd), Endpoint Detection and Response (EDR) (6th)
 

Mindshare comparison

Email Security Mindshare Distribution
ProductMindshare (%)
Check Point Anti-Spam and Email Security Software Blade0.7%
Microsoft Defender for Office 3658.8%
Proofpoint Email Protection8.1%
Other82.4%
Email Security
Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Check Point Harmony Endpoint2.2%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.6%
Other83.4%
Endpoint Protection Platform (EPP)
 

Q&A Highlights

reviewer2132481 - PeerSpot reviewer
Investment Banking Summer Analyst at a healthcare company with 10,001+ employees
Aug 24, 2023
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
AimanSayyed - PeerSpot reviewer
Program Lead at DigitalTrack Solutions Pvt Ltd
Has significantly reduced phishing threats through proactive monitoring and centralized visibility
A specific example of how Check Point Anti-Spam and Email Security Software Blade helps protect my organization from spam or phishing is when I log in to my management console of the Check Point tool and I open the email security blade logs, and I see all the overnight status of spam, what was the spam message volume, how many phishing attempts were made, and what kind of attachments were quarantined. This gives a real-time threat intelligence and advanced detection of phishing attacks. Check Point Anti-Spam and Email Security Software Blade offers a very easy-to-use dashboard and a proactive approach. Whatever trends are observed will directly inform us. The dashboard is very easy to understand. It gives a spam detection summary where it provides a visual representation through pie or bar graphs for spam suspected or clean mails. I also really appreciate the quarantine summary as it is very descriptive and gives a quick insight into the user complaints, compliance, and backlog. The system health, such as the CPU and update types of status of signatures, is also very well represented, so it does not cause any overload. Integration with SIEM or SOC dashboards, such as QRadar which we use in the organization, is very easy via Syslog exports. This gives centralized visibility, so you do not need to check with all the other devices as one device will give you a centralized overview. Smart events are also very configurable and will give us notifications or mitigation actions, which is beneficial.
GR
Support at a security firm with 51-200 employees
Remote Access Security Reinforced with Real-Time Device Protection
Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility. It would be helpful to tailor views for different roles, such as IT or security support. Regarding needed improvements, custom report building could be enhanced. Current reports are informative, and a drag-and-drop builder would allow teams to create tailored views for compliance, executive summaries, or operational metrics. For further improvements, enhancing threat simulation and testing would be valuable. Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloudflare is by far the most effective solution that I have come across."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"Cloudflare DDoS is better than its competitors for its security, deployment, and scalability."
"Cloudflare, in my opinion, was easy to implement."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"It is a stable solution."
"The capabilities of the software are strong enough for me to do what it's supposed to do. For me, we don't need to do a lot of configuration on our site. We just enable it and monitor it."
"Cloudflare Zero Trust Platform removes the risk of exposing the applications to the public."
"Anti-spam and malware phishing are valuable features of the solution."
"Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization by causing a very steep drop in spam and phishing mail after implementing this, with the risk of ransomware entry now very low and around 80% of spam mails prevented."
"It has several very good features that form an excellent tool."
"Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization because unlike my previous dashboard, it shows pop-ups for bot activity or whenever malware or ransomware attacks occur in any system."
"A scalable, stable solution with good technical support."
"Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network."
"Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security."
"The tool helps us see the behavior inside our environment, which is important to us. The solution's capacity integration features are great."
"This solution helps make sure that we can patch and keep security going without having to talk to everyone for change management."
"The best features Check Point Harmony Endpoint offers include outstanding visibility and user's control over the endpoint devices."
"Check Point Harmony Endpoint has one of the most user-friendly dashboards I've seen."
"It offers a centralized administration which allows us to be much more productive."
"Check Point Endpoint Security helps us ensure device control and security. It helps us make sure users can access only the network resources they should be accessing and keep malware to a minimum."
"The most valuable feature of this solution is the VPN."
"Check Point Antivirus is a cost-effective security solution for businesses and that's why its acceptability by various other fields and organizations is humongous."
"They have a better endpoint catchment rate due to their reliability."
 

Cons

"The onboarding process can be improved a little bit."
"The free plan has limitations. For example, I can only set up three rules, and the application firewall is unavailable."
"The software has automated alerts, but the automated alerts are not available in the mobile app."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"They don't have a person to provide support for customers using the solution under their free plan."
"The response time for support must be reduced."
"Cloudflare DDoS has poor technical support."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"The learning curve is steep, and the initial level configuration could be a bit complex."
"Regarding Checkpoint, I would suggest an easier interface to understand. The interface is a bit overwhelming with information overload for someone new to it."
"It does not provide for standalone configuration on the security gateway. Instead, you need to have a management server/smart console for managing it."
"The pattern used to filter emails could be improved"
"Recognizing spammers and spam email sourcing is extremely lagging these days, and the performance could be improved to provide better efficiency."
"The learning curve is steep, and the initial level configuration could be a bit complex."
"There's definitely room for improvement when it comes to adapting to different languages in one environment."
"They should upgrade support services and make a more user-friendly database."
"Legacy VPNs and digital footprints should be minimized."
"We'd like them to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident."
"I see a need for improvement especially in policy management and policy customization with Check Point Harmony Endpoint."
"We'd like to see a friendlier user interface."
"We need the ability to integrate this solution with the other existing solutions, such as Harmony."
"An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher."
"The solutions agent could have better performance, it is a little slow sometimes."
"A little change in the product's user interface is required since it is one of the areas where the product has certain shortcomings."
 

Pricing and Cost Advice

"The solution's pricing lacks transparency."
"Cloudflare Zero Trust Platform's pricing is good."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The prices are slightly expensive."
"The solution is not that expensive."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
"The cost is competitive with other security products on the market."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
"For licensing, my company makes yearly payments, which is expensive."
"Reasonably priced solution."
"I rate the product pricing a seven out of ten."
"Check Point Harmony Endpoint's pricing is more competitive than any other vendor."
"Check Point Antivirus is a good solution, but it's a little costly."
"In addition to the standard licensing fees, there is a cost for support."
"We are paying 2,50,000 Sri Lankan Rupees annually which is the fixed charge."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"The solution is too pricey."
"The pricing is reasonable."
"We pay roughly 80,000 Swedish krona per year. When it comes to the firewall, it's roughly 150,000 Swedish krona yearly. There's also maintenance, of course, which is roughly 10,000 krona per month."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
10%
Computer Software Company
9%
Financial Services Firm
8%
Manufacturing Company
8%
Outsourcing Company
15%
Manufacturing Company
9%
Computer Software Company
9%
Marketing Services Firm
7%
Computer Software Company
10%
Manufacturing Company
9%
Outsourcing Company
8%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise10
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise13
Large Enterprise18
By reviewers
Company SizeCount
Small Business133
Midsize Enterprise70
Large Enterprise75
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What needs improvement with Check Point Anti-Spam and Email Security Software Blade?
At this time, I do not see anything lacking in Check Point Anti-Spam and Email Security Software Blade. It is working...
What is your primary use case for Check Point Anti-Spam and Email Security Software Blade?
My main use case for Check Point Anti-Spam and Email Security Software Blade is to protect document or file links att...
What advice do you have for others considering Check Point Anti-Spam and Email Security Software Blade?
Any organization looking for the best email security solution should consider Check Point Anti-Spam and Email Securit...
What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VP...
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Har...
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint works well overall, but one area I would like to see improved is the reporting and dashb...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
No data available
Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent, Check Point Antivirus
 

Overview

 

Sample Customers

23andMe
SF Police Credit Union (SFPCU)
Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Find out what your peers are saying about Proofpoint, Microsoft, Check Point Software Technologies and others in Email Security. Updated: February 2026.
884,873 professionals have used our research since 2012.