Try our new research platform with insights from 80,000+ expert users
Gaurav Amar - PeerSpot reviewer
Deputy Vice present at PVR Ltd
Real User
Good message encryption and validation features, but the console should be more user-friendly
Pros and Cons
  • "Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network."
  • "The user should be able to perform a real-time search of the objects and see the messages."

What is our primary use case?

Check Point makes up part of our security solution in all of our locations across India. We are in the eCommerce industry and one of the things that we do is set up tickets for moviegoers.

We have categorized our requirements as per the online penetration of our booking agents. As an example, in one of our locations, we have a penetration of filling online tickets that is reaching up to 85%. It is important that this system is safeguarded to ensure that we are not exploited on the ticketing platform using the OCR codes that we are generating and sending to our customers. As the tickets are emailed to the patrons in advance of the show, it is important that this email is secure. This is one of our use cases.

How has it helped my organization?

Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network. We are a PCI DSS compliant company in India and we need to ensure that our patrons' data is protected. At the same time, we want the convenience of being able to send tickets to them. Check Point has allowed us to do that.

What is most valuable?

The features that I like the best are message encryption and message validation.

What needs improvement?

The manageability using this console is complex and it should be a little more user-friendly. If you don't have a good understanding of putting the policies in place then sometimes it is tough to manage from the console. A more intuitive GUI would make it easier to manage.

The user should be able to perform a real-time search of the objects and see the messages. As it is now, when we create an object, sometimes you find out at a later stage that the object already exists. If I could simply type an object into the search bar and find out whether it exists by seeing it in a dropdown then it would save me time.

Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
January 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.

For how long have I used the solution?

We have been using the Check Point Anti-Spam and Email Security Blade for two years.

What do I think about the stability of the solution?

This solution has been stable and is working very well in our environment.

What do I think about the scalability of the solution?

This is a scalable solution. We have 170 locations across India and all of them have Check Point installed. We had considered scalability from the beginning of this project, with a three to five-year plan. 

How are customer service and support?

We have been in direct contact with technical support and our experience has been that they are both nice and helpful. After the deployment was completed, the partner who assisted us had moved out and completed a knowledge transfer to the entire team. There was a subsequent issue that had to do with the VPN, and the Check Point technical support was very helpful in resolving it.

Which solution did I use previously and why did I switch?

We have used other security products by vendors such as Juniper and Palo Alto, but not for the same use cases.

How was the initial setup?

We began our implementation about two and a half years ago and as part of the process, we divided India into different regions. In total, it took us about 120 days to fully deploy across all of our locations.

What about the implementation team?

We have in-house staff who are very well versed in the Check Point technology, however, given the volume of deployment, we contracted a partner that was recommended by the vendor.

What other advice do I have?

My advice to anybody who is considering this solution is that it is a robust and reliable platform. With respect to messaging and firewall products, all of them are pretty good but it depends on your scenario. I would say that Check Point has the best security, the messaging protocols are pretty good, and the reliability is higher than competing products by Palo Alto and Juniper. When adopting Check Point, your skill is one of the key points to consider.

This is a good solution but there are certain complexities that need to be made more user-friendly. It should be more manageable from an IT perspective. This includes things such as setting up specific policies. A more intuitive GUI, for example, would help.

I would rate this solution a seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Leaderboard
Good anti-spam capabilities with easy management and regional blacklisting
Pros and Cons
  • "This solution helped us lock down and have our infrastructure easier to manage."
  • "I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal."

What is our primary use case?

Check Point Anti-Spam and Email Security Software Blade is one of the valuable features that we have available in quantum equipment. It gave us that layer of protection and event solutions to safeguard the security of events and activities. In our network, it's analyzing everything that enters our network or leaves it.

Among the attacks that we had to avoid events by SMTP, POP, or DDoS, and additionally, protect ourselves from image or language attacks. We've been able to block regions by IP addresses or locations.

How has it helped my organization?

We currently have several regions blocked by blacklisted IP addresses or insecure domain senders, thus raising the level of protection that the institution has. We use this feature frequently due to our mail service, which is a hybrid service.

This solution helped us lock down and have our infrastructure easier to manage.

We've solved protection against buffer overflow that has caused our server to freeze or be slower when receiving or sending emails.

What is most valuable?

The anti-spam feature helps to verify the reputation of the databases in a reputational way. It manages to compare each request with a complete base of IP addresses. This layer eliminates around 70 percent of the attacks that enter through and are part of the most common attacks that our less expert users receive. We are now capable of differentiating this type of incident. This database is constantly updated to protect the equipment and thus validate if these addresses.

What needs improvement?

I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal, thus being even more cloud-based in its management. Among the things that I would also like would be an application for cell phones where you can manage this type of event, if required, be it Android or iOS. It would thus be more disruptive by taking advantage of market demands and ensuring protection.

For how long have I used the solution?

I've used the solution for two years.

How was the initial setup?

The solution is easy to install and enable.

What's my experience with pricing, setup cost, and licensing?

Its cost is quite high and its package is sold as an additional license.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
January 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
User
Top 5Leaderboard
Excellent real-time threat detection, good prevention capabilities and helpful sandboxing
Pros and Cons
  • "Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security."
  • "The solution could be improved by reducing false positives."

What is our primary use case?

The primary use cases for Check Point Anti-Spam and Email Security Software Blade are anti-spam, anti-malware, anti-phishing, content filtering and threat prevention. 

How has it helped my organization?

Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security, increasing productivity, improving compliance, reducing IT support costs, and improving threat visibility.

What is most valuable?

Features like real-time threat detection and prevention, advanced threat intelligence, sandboxing, data loss prevention, and its user-friendly management console make it a very good solution.

What needs improvement?

The solution could be improved by reducing false positives, optimizing performance, improving the user interface, and integrating with other security solutions.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Technical support is okay.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, I didn't use any different solution.

How was the initial setup?

The initial setup was good.

What about the implementation team?

Our internal team managed the initial setup process. 

What was our ROI?

The ROI has been okay.

Which other solutions did I evaluate?

I didn't evaluate any other product.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
User
Top 5Leaderboard
Reduces spam, enhances security, and improves compliance
Pros and Cons
  • "The most valuable features of the solution include advanced threat detection."
  • "User experience can be improved."

What is our primary use case?

The primary use cases of this solution include spam filtering, malware protection, phishing prevention, data loss prevention, email continuity, and threat intelligence.

How has it helped my organization?

This solution helped us reduce spam, enhance security, improve compliance, and increase user satisfaction and cost efficiency.

What is most valuable?

The most valuable features of the solution include advanced threat detection, real-time threat intelligence, data loss prevention, email continuity, a user-friendly interface, detailed reporting and analytics.

What needs improvement?

User experience can be improved. 

Performance can be improved in terms of speed, reliability, and scalability. 

The solution can also be improved in terms of features and customer support.

For how long have I used the solution?

I have been using the solution for the past two years.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Technical support should be improved.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, I did not use a different solution. 

How was the initial setup?

The initial setup was good.

What about the implementation team?

We implemented the solution via an in-house team.

What was our ROI?

The ROI is good.

What's my experience with pricing, setup cost, and licensing?

The licensing and pricing can be improved.

Which other solutions did I evaluate?

No, I did not evaluate other options.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Thiago Ribeiro - PeerSpot reviewer
System Analyst at Infrasat
Real User
Top 20
Provides an ease of implementation and a significant reduction in false positives
Pros and Cons
  • "One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."
  • "One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."

    What is most valuable?

    One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails.

    For how long have I used the solution?

    We have been using Check Point Anti-Spam and Email Security Software Blade for two years now.

    What do I think about the scalability of the solution?

    The solution is utilized around the clock as a primary parameter for filtering incoming and outgoing emails.

    How was the initial setup?

    I would rate the initial setup process a nine out of ten.

    What about the implementation team?

    We took help from a third-party partner to assist in deploying the solution. Around two executives were required to work on it. 

    What's my experience with pricing, setup cost, and licensing?

    I rate the product pricing a seven out of ten.

    Which other solutions did I evaluate?

    We considered various products in the market but ultimately chose Check Point due to its reputation and ease of implementation.

    What other advice do I have?

    The solution leverages artificial intelligence to learn email flow patterns, reduce false positives, and identify trustworthy emails based on correspondence frequency and block lists.

    While the initial implementation costs increased, we consider it a valuable investment as it has enhanced productivity and provided better security for our organization.

    I would recommend this solution, especially for medium to large companies seeking a stable and user-friendly email security management system.

    I rate it a nine out of ten. 

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Support at a security firm with 51-200 employees
    User
    Top 5Leaderboard
    Good DLP, email filtering, and malware detection
    Pros and Cons
    • "DLP features can help prevent sensitive information from being leaked via email."
    • "The support language is only English."

    What is our primary use case?

    In our company, we use Office 365 to run the office, including email and some security tools from Microsoft. The tools did not satisfy us, so we decided to use Check Point technology. It gave us protection against spam, ransomware, and phishing, among other modern threats that travel through the email of collaborators.

    In the end, the implementation through the Check Point blade is simple and easy to manage. 

    We are really pleased with this tool that facilitated the management of these behaviors and problems that it generated for end users and the company itself.

    How has it helped my organization?

    Thanks to this tool acquired through The Check Point blade, we can have a layer of protection with the manufacturer for our email products. We can regulate and eliminate in a great way the threats that can enter through email.

    The company, in turn, has managed to considerably lower the spam received, which also saturated the company's mailboxes a lot. It is a great tool that is easy to implement and with great considerations to be able to put it in the company.

    What is most valuable?

    Email filtering. The software can filter incoming emails to identify and block spam and other unwanted messages.

    Malware detection. The software can detect and block malware attachments and links in emails. This is important for preventing malware infections and other security threats.

    DLP features can help prevent sensitive information from being leaked via email. This may involve scanning emails for specific types of content or attachments and then either blocking or encrypting those emails.

    What needs improvement?

    Support is really an area that needs to be improved, as they currently take a very long time to resolve cases, which is not acceptable.

    The support language is only English. They could expand other languages to expand more easily and help the client in a better way.

    Regarding cost management, they are only accessible through a partner. This makes it more difficult to find pricing and do budgeting.

    In terms of the ease of documentation, sometimes it is a bit difficult to find the correct information about the product.                   

    For how long have I used the solution?

    We have used this solution for email protection in our company for quite some time with excellent results.

    Which solution did I use previously and why did I switch?

    Previously, Microsoft technology was used, however, we did not like it.

    We moved to Check Point.

    What's my experience with pricing, setup cost, and licensing?

    Regarding its license issues and costs, it seems reasonable to me.

    Which other solutions did I evaluate?

    We always do field and theoretical evaluations to verify the best options for similar products.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Priyanshu Kumar - PeerSpot reviewer
    Information Technology Specialist at Tech Mahindra
    Real User
    Top 5
    Great threat detection, spam, and email blocking
    Pros and Cons
    • "Check Point Anti-Spam & Email Security software is a modern-day solution for security management and data scrutiny."
    • "They should upgrade support services and make a more user-friendly database."

    What is our primary use case?

    We basically use the solution for threat detection, spam, email blocking, and security against organized email phishing attacks as well as data security management. Nowadays, this has been a prime concern for organizations and working professionals.

    These use cases of Check Point Anti-Spam & Email Security software make it one of the prime products and is highly recommended. It is a must-have integrated product.

    Check Point Anti-Spam & Email Security software is a modern-day solution.

    How has it helped my organization?

    Check Point Anti-Spam & Email Security served out to be highly productive for my organization. It's great for management and data security and generates innovation and growth.

    Check Point Anti-Spam & Email Security software is a modern-day solution for security management and data scrutiny.

    In short, I highly recommend the product.

    What is most valuable?

    There are highly productive features, including threat detection, spam, email blocking, and security.

    It's great against organized email phishing attacks and offers advanced 2FA authentication.

    There is third-party integration possible. There are many other customized tools that can act as a booster to some already great services. 

    It creates a healthy environment for mass adoption of Check Point Anti-Spam & Email Security.

    What needs improvement?

    Check Point Anti-Spam & Email Security is a highly organized tool with many benefits. However, they should upgrade support services and make a more user-friendly database. That would help with higher integration and adoption.

    Check Point Anti-Spam & Email Security software as a platform will catch the eyes of large organizations and MNCs as security concerns have risen significantly in recent years.

    For how long have I used the solution?

    I have been integrating with this software since last year.

    Which solution did I use previously and why did I switch?

    I haven't dealt with any other software.

    What's my experience with pricing, setup cost, and licensing?

    The pricing is in the mid to high range. It's affordable and the setup is smooth.

    Which other solutions did I evaluate?

    I haven't evaluated any other solution. Some other colleagues already recommended it.

    What other advice do I have?

    Just go for it.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Executive IT Operations at Indian Immunologicals Limited
    Real User
    Next Gen and SandBlast technology are good for stopping attacks
    Pros and Cons
    • "A scalable, stable solution with good technical support."
    • "The pattern used to filter emails could be improved"

    What is our primary use case?

    We are using 5400, 6700 and 6900 versions of the hardware in our company. We have approximately 1,600 users.

    What is most valuable?

    I find the Next-Gen firewall with SandBlast technology the most valuable feature. It is good for stopping attacks.

    What needs improvement?

    In terms of anti-spam and email, the pattern that they use to filter the emails could be improved. There are too many normal emails being considered spam. There should be an option to learn the different patterns specific to the organization where it is being deployed.

    For how long have I used the solution?

    I have been working with this product for more than three years.

    What do I think about the stability of the solution?

    The product is stable.

    What do I think about the scalability of the solution?

    The product is scalable.

    How are customer service and support?

    Technical support by Check Point is good.

    Which solution did I use previously and why did I switch?

    We previously used a third-party product that was hosted in the cloud.

    How was the initial setup?

    The initial setup is a bit complex. Training the IT admins how to use, understand, and configure Check Point Anti-Spam and Email is a bit complex.

    What about the implementation team?

    We have four people in-house for maintenance of the solution.

    What's my experience with pricing, setup cost, and licensing?

    The pricing of Check Point Anti-Spam and Email Security is reasonable.

    What other advice do I have?

    Check Point Anti-Spam and Email Security is a good product. For a bigger organization, they should consider that the pattern for determining spam does need to be more developed or enhanced.

    I would rate this product a 7 out of 10.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.
    Updated: January 2025
    Product Categories
    Email Security
    Buyer's Guide
    Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.