Try our new research platform with insights from 80,000+ expert users
Shyam Lal Navatiya - PeerSpot reviewer
Senior Consultant at EY India
User
Cost efficient with good security and great accuracy

What is our primary use case?

Check Point Anti-Spam and Email Security Software Blade helps us to gain great email security. It is one of the most secure and affordable solutions for mail server security systems and helps with compliance and security management to ensure no data loss or no data theft from the email server under any circumstance. 

It is one of the most high-demand security solutions in the market, with high-level accuracy and a quality assurance system. Their security software is sone of the best in the market, with numerous features for high-end usability.

How has it helped my organization?

Check Point Anti-Spam and Email Security Software Blade is the best available security solution for identifying and detecting potential threats and brings the cost of security management expenses down for the organization. 

It is one of the best security software for businesses and organizations and helps in the potential blocking and restriction of any malware attacks or ransomware entry into the system.

The user-identified IP addresses are thoroughly checked for any malware content and ensure no lapse.

What is most valuable?

The scanning and checking of SMTP and POP3 traffic is not always 100%. The directional scanning left some of the incoming mail unchecked quite often, which carries a higher malware risk. It needs to be improved to bring the efficacy to 100%. Still, it is one of the best solutions in the market for creating a risk-free and virus and malware-free environment where we can do our business activities freely without any tension.

The software is one of the most cost-effective solutions. However, now the competition is coming up with extremely low-end costing models, which is attracting us more than ever. It is high time that they should redefine the cost strategy and models from a new lens so that we can attract and retain more new and existing customers.

What needs improvement?

More and more customized security features on a low-cost model should be incorporated to enhance the affordability and acceptability of the security solution in the market. 

It is one of the most cost-effective and affordable solutions, yet needs a few customsations and quick security scanning features. It should not take much time and can create a strengthened and secure ecosystem for all of us. 

The scanning rate of potential threat points and endpoints should be made faster and more accurate.

Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
December 2024
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for over one year now.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

Technical support has been good so far.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have been using Check Point Security solutions for quite some time now. Before that, we used a local customized security solution from one of our affiliated vendors. It was a bit expensive and ranked low on accuracy and efficacy. We switched to Check Point after that.

How was the initial setup?

The initial setup is easy and not complicated at all.

What about the implementation team?

The solution is implemented through a vendor team only.

What was our ROI?

The ROI is great.  We are at almost 70%

What's my experience with pricing, setup cost, and licensing?

I can strongly recommend Check Point Security solutions due to their high credibility and high-cost efficiency. It is a high-performing security software that is good for blocking and restricting spamming and illegal content points and sources.

The Check Point is easy to install and quite easy to deploy. The pricing is also very low-end and can be brought down further low.

Set-up costs are not complicated at all. The licensing/renewal agreement would not cost too much either, as it is quite handy to use, and due to its simplicity, we have been using it for quite a long time now.

Which other solutions did I evaluate?

We tried a lot of the free trial services for the local security solutions coupled with a few leading ones like McAfee, Trend security, and ESET Protect.

What other advice do I have?

This is a must-have solution for all sizes of businesses and professionals. It is quite a good security software for all of us in the current scenario of unprecedented malware and ransomware risks.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Flexible configuration, straightforward to set up, and false positive errors are minimal
Pros and Cons
  • "I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like."
  • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point Anti-Spam and Email Security Software Blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of email filtration and anti-spam protection.

How has it helped my organization?

We rely on the Check Point HA Clusters to secure the DataCenter of our company that is located in Asia (Taiwan). This software blade - Check Point Anti-Spam & Email Security - is enabled among the number of the others, and is responsible for scanning and blocking the potential malware email or the email that contain Spam messages. 

As the security administrator, I see that the Check Point Anti-Spam & Email Security works quite well. The logs and reports show the daily number of messages blocked, and it's amazing. 

From time to time, I manually check the blocked emails and can confirm that 99% of them are trash. I am confident that the number of False Positives is minimal for this solution.

What is most valuable?

  1. I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like.
  2. The databases of IPs and text strings are updated as per schedule, which can be adjusted in the blade options.
  3. It is possible to create and use the custom block list for the anti-spam blade in the policy, which we have configured.
  4. When you have the IPS software blade purchased and activated, the emails are checked by the email IPS protections, thus increasing the security level even more.

What needs improvement?

I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

We have also had several support cases opened for software issues, but none of them were connected with the Check Point Anti-Spam and Email Security Software Blade.

For how long have I used the solution?

We have been using this product for about three years, starting in late 2017.

What do I think about the stability of the solution?

The Check Point Anti-Spam and Email Security Software Blade is stable.

What do I think about the scalability of the solution?

The Check Point Anti-Spam and Email Security Software Blade scales well with the gateways we use, since it doesn't affect the overall performance much after activation.

How are customer service and technical support?

We have had several support cases opened, but none of them were connected with the Check Point Anti-Spam and Email Security Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

The longest issue took about one month to be resolved, which we consider too long.

Which solution did I use previously and why did I switch?

No, it's the first NGFW with email protection we onboarded.

How was the initial setup?

The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

What about the implementation team?

Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

What's my experience with pricing, setup cost, and licensing?

Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

Which other solutions did I evaluate?

No, we decided to stick with Check Point after the demo.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
December 2024
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
Gaurav Amar - PeerSpot reviewer
Deputy Vice present at PVR Ltd
Real User
Good message encryption and validation features, but the console should be more user-friendly
Pros and Cons
  • "Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network."
  • "The user should be able to perform a real-time search of the objects and see the messages."

What is our primary use case?

Check Point makes up part of our security solution in all of our locations across India. We are in the eCommerce industry and one of the things that we do is set up tickets for moviegoers.

We have categorized our requirements as per the online penetration of our booking agents. As an example, in one of our locations, we have a penetration of filling online tickets that is reaching up to 85%. It is important that this system is safeguarded to ensure that we are not exploited on the ticketing platform using the OCR codes that we are generating and sending to our customers. As the tickets are emailed to the patrons in advance of the show, it is important that this email is secure. This is one of our use cases.

How has it helped my organization?

Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network. We are a PCI DSS compliant company in India and we need to ensure that our patrons' data is protected. At the same time, we want the convenience of being able to send tickets to them. Check Point has allowed us to do that.

What is most valuable?

The features that I like the best are message encryption and message validation.

What needs improvement?

The manageability using this console is complex and it should be a little more user-friendly. If you don't have a good understanding of putting the policies in place then sometimes it is tough to manage from the console. A more intuitive GUI would make it easier to manage.

The user should be able to perform a real-time search of the objects and see the messages. As it is now, when we create an object, sometimes you find out at a later stage that the object already exists. If I could simply type an object into the search bar and find out whether it exists by seeing it in a dropdown then it would save me time.

For how long have I used the solution?

We have been using the Check Point Anti-Spam and Email Security Blade for two years.

What do I think about the stability of the solution?

This solution has been stable and is working very well in our environment.

What do I think about the scalability of the solution?

This is a scalable solution. We have 170 locations across India and all of them have Check Point installed. We had considered scalability from the beginning of this project, with a three to five-year plan. 

How are customer service and technical support?

We have been in direct contact with technical support and our experience has been that they are both nice and helpful. After the deployment was completed, the partner who assisted us had moved out and completed a knowledge transfer to the entire team. There was a subsequent issue that had to do with the VPN, and the Check Point technical support was very helpful in resolving it.

Which solution did I use previously and why did I switch?

We have used other security products by vendors such as Juniper and Palo Alto, but not for the same use cases.

How was the initial setup?

We began our implementation about two and a half years ago and as part of the process, we divided India into different regions. In total, it took us about 120 days to fully deploy across all of our locations.

What about the implementation team?

We have in-house staff who are very well versed in the Check Point technology, however, given the volume of deployment, we contracted a partner that was recommended by the vendor.

What other advice do I have?

My advice to anybody who is considering this solution is that it is a robust and reliable platform. With respect to messaging and firewall products, all of them are pretty good but it depends on your scenario. I would say that Check Point has the best security, the messaging protocols are pretty good, and the reliability is higher than competing products by Palo Alto and Juniper. When adopting Check Point, your skill is one of the key points to consider.

This is a good solution but there are certain complexities that need to be made more user-friendly. It should be more manageable from an IT perspective. This includes things such as setting up specific policies. A more intuitive GUI, for example, would help.

I would rate this solution a seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1661955 - PeerSpot reviewer
Cybersecurity specialist at a maritime company with 10,001+ employees
User
Integrates well and is easy to manage but only offers basic anti-spam filters
Pros and Cons
  • "It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email."
  • "It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting."

What is our primary use case?

The primary use case is to protect the organization from any attacks generated via email. As most of the attacks in recent days are via email, the organization has to be equipped and ready to mitigate this type of attack at the perimeter level, before it has been delivered to the user's mailbox or an endpoint.

Basic anti-spam filters are not capable of protecting against the latest generation of attacks. Therefore, for protecting the organization against this sophisticated or targeted attack, we concluded that the next generation of email security solutions is a must. Ultimately, it should be able to protect against any attack that is sent via email. 

How has it helped my organization?

At first, it seemed like a good solution but it wasn't; we have the mail server on site.

After six months, the mail was in fits and starts and the Check Point infrastructure was not responding properly. We realized that we were under a strong spam attack and had to install another antispam product. We were lucky enough to be supported by the Check Point team of specialists, who helped us to identify and solve the problem.

In fact, even with analyzing the logs, it was not something that was evident at first sight

What is most valuable?

This product integrates well and is easy to manage.

It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email.

It is useful for having alerts on the e-mail traffic trends. 

This solution is ideal for a small business or if you have a mail server in the cloud and most of the spam is blocked by the provider. It is not good for large email flows. If you require or move to large mail flows, the solution needs to be changed. 

What needs improvement?

Determining areas for improvement is not a question that can be answered simply. 

We should separate the antispam engine into two parts; the first that breaks down mass spam, and the second for refinement.

It would be good to dedicate a separate core, at least for the first phase, so that it does not take away resources from the system. The ideal approach would be to enrich the product with more functions, however, this would likely also lead to an increase in cost.

It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting. 

For how long have I used the solution?

I've used the solution for three months.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
User
Top 5Leaderboard
Excellent real-time threat detection, good prevention capabilities and helpful sandboxing
Pros and Cons
  • "Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security."
  • "The solution could be improved by reducing false positives."

What is our primary use case?

The primary use cases for Check Point Anti-Spam and Email Security Software Blade are anti-spam, anti-malware, anti-phishing, content filtering and threat prevention. 

How has it helped my organization?

Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security, increasing productivity, improving compliance, reducing IT support costs, and improving threat visibility.

What is most valuable?

Features like real-time threat detection and prevention, advanced threat intelligence, sandboxing, data loss prevention, and its user-friendly management console make it a very good solution.

What needs improvement?

The solution could be improved by reducing false positives, optimizing performance, improving the user interface, and integrating with other security solutions.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Technical support is okay.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, I didn't use any different solution.

How was the initial setup?

The initial setup was good.

What about the implementation team?

Our internal team managed the initial setup process. 

What was our ROI?

The ROI has been okay.

Which other solutions did I evaluate?

I didn't evaluate any other product.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
User
Top 5Leaderboard
Reduces spam, enhances security, and improves compliance
Pros and Cons
  • "The most valuable features of the solution include advanced threat detection."
  • "User experience can be improved."

What is our primary use case?

The primary use cases of this solution include spam filtering, malware protection, phishing prevention, data loss prevention, email continuity, and threat intelligence.

How has it helped my organization?

This solution helped us reduce spam, enhance security, improve compliance, and increase user satisfaction and cost efficiency.

What is most valuable?

The most valuable features of the solution include advanced threat detection, real-time threat intelligence, data loss prevention, email continuity, a user-friendly interface, detailed reporting and analytics.

What needs improvement?

User experience can be improved. 

Performance can be improved in terms of speed, reliability, and scalability. 

The solution can also be improved in terms of features and customer support.

For how long have I used the solution?

I have been using the solution for the past two years.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Technical support should be improved.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, I did not use a different solution. 

How was the initial setup?

The initial setup was good.

What about the implementation team?

We implemented the solution via an in-house team.

What was our ROI?

The ROI is good.

What's my experience with pricing, setup cost, and licensing?

The licensing and pricing can be improved.

Which other solutions did I evaluate?

No, I did not evaluate other options.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Thiago Ribeiro - PeerSpot reviewer
System Analyst at Infrasat
Real User
Top 20
Provides an ease of implementation and a significant reduction in false positives
Pros and Cons
  • "One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."
  • "One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."

    What is most valuable?

    One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails.

    For how long have I used the solution?

    We have been using Check Point Anti-Spam and Email Security Software Blade for two years now.

    What do I think about the scalability of the solution?

    The solution is utilized around the clock as a primary parameter for filtering incoming and outgoing emails.

    How was the initial setup?

    I would rate the initial setup process a nine out of ten.

    What about the implementation team?

    We took help from a third-party partner to assist in deploying the solution. Around two executives were required to work on it. 

    What's my experience with pricing, setup cost, and licensing?

    I rate the product pricing a seven out of ten.

    Which other solutions did I evaluate?

    We considered various products in the market but ultimately chose Check Point due to its reputation and ease of implementation.

    What other advice do I have?

    The solution leverages artificial intelligence to learn email flow patterns, reduce false positives, and identify trustworthy emails based on correspondence frequency and block lists.

    While the initial implementation costs increased, we consider it a valuable investment as it has enhanced productivity and provided better security for our organization.

    I would recommend this solution, especially for medium to large companies seeking a stable and user-friendly email security management system.

    I rate it a nine out of ten. 

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Adrian Cambronero - PeerSpot reviewer
    Consultant at ITQS
    Reseller
    Top 5Leaderboard
    Flexible with good anti-spam capabilities and effective perimeter security
    Pros and Cons
    • "It does a better job of recognizing spammers."
    • "A major area for improvement is within some of the heavily discounted software blade add-ons on top of the current Next Generation Threat Prevention and SandBlast and Next Generation Threat Prevention offerings."

    What is our primary use case?

    Our company works on the implementation of services in the cloud. We have a large number of employees inside and outside the country. The work from home modality was also added recently, and, for this reason, a solution was needed that would provide security in all aspects of electronic communication. That is why Checkpoint Anti-Spam and Email Security was implemented throughout the company. We wanted to be able to block spam and malware at the connection level and also be able to integrate it with cloud services with Azure and thus be able to have excellent data management.

    How has it helped my organization?

    Check Point Anti-Spam and Email Security Software Blade has improved the perimeter security of our company. Since its implementation it has complemented an essential part of the company's security. One of the features that we liked is the content-based Anti-spam capabilities. It can scan images or attachments. Another feature that it provides us with is the anti-spam block/allow list. This has allowed us to have great control in order to be able to block malicious emails that try to enter our employees' emails.

    What is most valuable?

    Of all the features that Check Point Anti-Spam & Email Security Software Blade brings, all of them fulfill different functions. The one I liked the most is content-based anti-spam. It does a better job of recognizing spammers. It does reconnaissance against advanced forms of spam, including image-based and foreign-language spam, using pattern-based detection. From what I was reading, it has a proprietary algorithm to create unique, fingerprint-like signatures of email messages and practically uses AI.

    I also like the flexible configuration set. Both the content-based anti-spam, IP, and text string databases are updated on a schedule, which can be adjusted in the sheet options. It is possible to create and use the custom block list for the anti-spam sheet in the policy that we have configured.

    What needs improvement?

    For the few years that I have been using Check Point, they have always presented new updates and tries to stay ahead with their tools making them more interactive with the user and not so complicated. They are always at the forefront with new features. It meets and covers all the necessary fields to protect an organization and must be at the forefront as hackers are always one step ahead. They need to continue to make the tool more robust to protect users from new threats.

    A major area for improvement is within some of the heavily discounted software blade add-ons on top of the current Next Generation Threat Prevention and SandBlast and Next Generation Threat Prevention offerings.

    For how long have I used the solution?

    The tool was implemented in 2020. Currently, I have been working with this solution for Three years.

    What do I think about the stability of the solution?

    During the two years of implementation in the organization, it has not presented any problem. Its stability is very good.

    What do I think about the scalability of the solution?

    Its scalability is excellent. It is a super scalable product in security and very robust.

    How are customer service and support?

    Regarding customer service, we have had both good and bad experiences I give them an eight on the support part, however, sometimes we are left wanting.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We only had Office 365 and wanted to make the security more robust.

    How was the initial setup?

    The implementation was simple

    What about the implementation team?

    The implementation was done in conjunction with internal collaborators and with support from Check Point. They were very helpful and very good at their job.

    What was our ROI?

    My return is to have made a single investment and to be able, with that investment, to maintain the privacy and security of the organization.

    What's my experience with pricing, setup cost, and licensing?

    It is a very affordable tool to implement in an organization.

    Which other solutions did I evaluate?

    We looked into Fortinet and Microsoft.

    What other advice do I have?

    You can use this solution without fear as it gives you security and confidence.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.
    Updated: December 2024
    Product Categories
    Email Security
    Buyer's Guide
    Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.