Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Flexible configuration, straightforward to set up, and false positive errors are minimal
Pros and Cons
  • "I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like."
  • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point Anti-Spam and Email Security Software Blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of email filtration and anti-spam protection.

How has it helped my organization?

We rely on the Check Point HA Clusters to secure the DataCenter of our company that is located in Asia (Taiwan). This software blade - Check Point Anti-Spam & Email Security - is enabled among the number of the others, and is responsible for scanning and blocking the potential malware email or the email that contain Spam messages. 

As the security administrator, I see that the Check Point Anti-Spam & Email Security works quite well. The logs and reports show the daily number of messages blocked, and it's amazing. 

From time to time, I manually check the blocked emails and can confirm that 99% of them are trash. I am confident that the number of False Positives is minimal for this solution.

What is most valuable?

  1. I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like.
  2. The databases of IPs and text strings are updated as per schedule, which can be adjusted in the blade options.
  3. It is possible to create and use the custom block list for the anti-spam blade in the policy, which we have configured.
  4. When you have the IPS software blade purchased and activated, the emails are checked by the email IPS protections, thus increasing the security level even more.

What needs improvement?

I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

We have also had several support cases opened for software issues, but none of them were connected with the Check Point Anti-Spam and Email Security Software Blade.

Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
January 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.

For how long have I used the solution?

We have been using this product for about three years, starting in late 2017.

What do I think about the stability of the solution?

The Check Point Anti-Spam and Email Security Software Blade is stable.

What do I think about the scalability of the solution?

The Check Point Anti-Spam and Email Security Software Blade scales well with the gateways we use, since it doesn't affect the overall performance much after activation.

How are customer service and support?

We have had several support cases opened, but none of them were connected with the Check Point Anti-Spam and Email Security Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

The longest issue took about one month to be resolved, which we consider too long.

Which solution did I use previously and why did I switch?

No, it's the first NGFW with email protection we onboarded.

How was the initial setup?

The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

What about the implementation team?

Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

What's my experience with pricing, setup cost, and licensing?

Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

Which other solutions did I evaluate?

No, we decided to stick with Check Point after the demo.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Mitesh D Patel - PeerSpot reviewer
Senior Technical Consultant- Cyber Security at Ivalue Infosolution
Real User
Top 5Leaderboard
A stable anti-spam and malware phishing solution that can be deployed quickly
Pros and Cons
  • "Anti-spam and malware phishing are valuable features of the solution."
  • "I can say that the solution's price level is a problematic area that needs to be considered for improvement."

What is our primary use case?

We use the solution in our company with respect to the firewall and email security solutions.

What is most valuable?

Anti-spam and malware phishing are valuable features of the solution.

In Email Security Software Blade, if you talk about anti-spam, it is very useful for those customers who are using Microsoft 365's Office Suite or Exchange mail servers. Every customer suggests that you have to use an anti-spam solution or anti-phishing solution. It is used as an email security solution.

What needs improvement?

I don't have any kind of point to improve because that's working well from my understanding and from my experience.

I can say that the solution's price level is a problematic area that needs to be considered for improvement. Prices could be cheaper.

For how long have I used the solution?

I have been using Check Point Anti-Spam and Email Security Software Blade for four to five years.

What do I think about the stability of the solution?

It's a stable product.

What do I think about the scalability of the solution?

It's a scalable product.

There are multiple customers using the solution.

How are customer service and support?

I haven't connected the tech support because the deployment team connected with the Check Point team for support.

How was the initial setup?

The initial setup is straightforward.

The solution is deployed on the cloud.

The deployment hardly takes half an hour.

What's my experience with pricing, setup cost, and licensing?

For licensing, my company makes yearly payments, which is expensive.

What other advice do I have?

My suggestion to those planning to use it, I would say that without an anti-spam solution, you are not safe.

I rate the overall solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
January 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
Ankita  Singh - PeerSpot reviewer
Application Developer at Capegemini Consulting India Private Limited
Real User
Top 5
Good protection against malware, offers good data protection and has great email management
Pros and Cons
  • "Check Point Anti-Spam and Email Security Software Blade provides an extra level of security against threats and malware along with 2FA support for multiple platform collaboration and integrations in a single click."
  • "One thing which annoys me with the Check Point Anti-Spam and Email Security Software Blade is its customer support portal which still lags in service even after so many developments."

What is our primary use case?

Check Point Anti-Spam and Email Security Software Blade is undoubtedly one of the highly stable and scalable platforms for email management - at a minimal cost.

Check Point Anti-Spam and Email Security Software Blade is highly organized in terms of email synchronization and viewing, email sending/receiving, multiple file transfers on a single click, spam and phishing email blocking, and email restoration, and is much more compatible with various features.

Check Point Anti-Spam and Email Security Software Blade provides a safe passage for email management and data protection.

How has it helped my organization?

The Check Point Anti-Spam and Email Security Software Blade has proven to be highly productive and scalable in terms of what it provides, and at such a minimal cost.

Check Point Anti-Spam and Email Security Software Blade provides a complete solution against phishing email blocking and restoration, email synchronization and viewing, email sending/receiving, and multiple file transfers on a single click.

Check Point Anti-Spam and Email Security Software Blade is a highly recommended tool for professionals.

What is most valuable?

Check Point Anti-Spam and Email Security Software Blade provides multiple support and services. Some of the most valuable ones are the complete solution against phishing emails and the ability to block emails.

It allows for restoration along with email synchronization and viewing, sending/receiving, and multi-file transfer with a single click.

Check Point Anti-Spam and Email Security Software Blade provides an extra level of security against threats and malware along with 2FA support for multiple platform collaboration and integrations in a single click.

What needs improvement?

Usage and access to Check Point Anti-Spam and Email Security Software Blade are highly limited to professionals. However, there has been a bit more dependency in recent months, and one thing which annoys me with the Check Point Anti-Spam and Email Security Software Blade is its customer support portal which still lags in service even after so many developments.

Dealing with unnecessary ads running in the background is an area that Check Point Anti-Spam and Email Security Software Blade need to work on for mass adoption.

For how long have I used the solution?

I have been integrating with Check Point Anti-Spam and Email Security Software Blade for less than one year. However, since the day I joined this platform it has totally changed my way of work and email management.

Which solution did I use previously and why did I switch?

We previously used Protonmail. It was not as compatible according to my usability.

What's my experience with pricing, setup cost, and licensing?

Check Point Anti-Spam and Email Security Software Blade is budget-friendly and scalable.

Which other solutions did I evaluate?

I did not previously use a different solution.

What other advice do I have?

I'd advise potential new users to go for Check Point Anti-Spam and Email Security Software Blade, as it's highly dependable and secure.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Saurabh-Pal - PeerSpot reviewer
Sr. Security Specialist at a tech vendor with 11-50 employees
Real User
Top 5Leaderboard
Very efficient, stable, with great customer support
Pros and Cons
  • "This solution is very efficient."
  • "If you face any configuration problems, Check Point is the only solution."

What is our primary use case?

Our customers used this product for internet security, anti-virus, and remote browsing. We are system integrators and worked with Check Point as managed service providers up until a few months ago. I'm a senior security specialist.

What is most valuable?

This solution is very efficient. 

What needs improvement?

If you face any configuration problems, you have to involve the Check Point team so they can verify their software.

For how long have I used the solution?

Until recently, we were integrators of this solution for five years. 

What do I think about the stability of the solution?

The stability is generally good if there are no power-related issues. 

What do I think about the scalability of the solution?

The scalability is very good. 

How are customer service and support?

The customer support is excellent - if you're facing any problems, you can write to the Check Point team and you'll receive an immediate reply. 

How was the initial setup?

The setup of this solution is complex because it has the concept of software blade instead of appliance which is something that only CheckPoint can identify. Deployment generally takes about a week and requires an engineer.   

What's my experience with pricing, setup cost, and licensing?

Palo Alto is very expensive compared to other solutions. 

What other advice do I have?

If you're a software company, I recommend this solution and rate it nine out of 10. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Excellent protection with policies and anti-spam capabilities
Pros and Cons
  • "It's a fairly old solution, however, that has been updated over time to become one of the best manufacturers of security solutions."
  • "The cost is high when putting through Check Point Blade in your Gateway."

What is our primary use case?

It has helped us to avoid large amounts of spam, which consumed space in our online exchange. 

With this, we also avoid expenses and also protect our users.

Protection policies were easy to implement to protect us from existing threats.

This tool is very good. It can be included through the anti-spam blade in our Check Point Gateway and is an easy implementation. The product helped us avoid threats from non-permitted domains and control domains with IPs reported as fraudulent or as threats.       

How has it helped my organization?

Check Point solutions are very good. It's a fairly old solution. However, that has been updated over time to become one of the best manufacturers of security solutions.

Check Point Anti Spam is a very interesting and good tool. It has helped us a lot against modern threats, spam, and domains that are marked as threats. In this way, we have improved business security,

The solution has also been modernized in Harmony. However, this solution is included in our Gateway and makes it easier to use.

It's improved against email attacks greatly.

What is most valuable?

This tool provides several quite interesting features:

1- Ease of Implementation through Check Point Security Management makes it so that it can be implemented through your blade.

2- The blocking policies are very effective. You can provide denial policies by IPs or even by reputation.

3- Monitoring what happens in the perimeter helps verify the tool's behavior in the face of threats, in addition to improving some current vulnerabilities to debug better as we spend time with the tool.

It is an easy-to-use, very good tool.

What needs improvement?

The tool is modernized by Check Point Harmony anti-spam. They can also modernize the tool through their blade.

At the Check Point support level, it has a great slope since the support language is only in English. Service hours are sometimes difficult to find an agent in Latin American hours, so a support case may take longer to resolve than expected.

The cost is high when putting through Check Point Blade in your Gateway.

The documentation is not so easy to validate. Some new users in the Check Point environment have a hard time. Therefore, the guides should be more intuitive.

For how long have I used the solution?

We currently have a Check Point Gateway administrator through the Check Point Infinity Portal, with the Smart Cloud, where we were able to easily add the anti-spam blade, used for a while with excellent results.

Which solution did I use previously and why did I switch?

We used email security and anti-spam tools from Microsoft. However, we prefer to have all security solutions centralized.

What's my experience with pricing, setup cost, and licensing?

The cost depends on the license that is acquired. Sometimes adding the license later is somewhat high.

I recommend getting a good  Check Point vendor so they can help you with the requirements and costs as they are not that easy to find.

Which other solutions did I evaluate?

We have tested and validated other solutions such as those of Microsoft. However, it is more suited to what is sought in these solutions with  Check Point.

What other advice do I have?

The tool is very good. However, they must validate if it meets expectations. There are already more modern tools that do the same at the Check Point level.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1661955 - PeerSpot reviewer
Cybersecurity specialist at a maritime company with 10,001+ employees
User
Integrates well and is easy to manage but only offers basic anti-spam filters
Pros and Cons
  • "It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email."
  • "It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting."

What is our primary use case?

The primary use case is to protect the organization from any attacks generated via email. As most of the attacks in recent days are via email, the organization has to be equipped and ready to mitigate this type of attack at the perimeter level, before it has been delivered to the user's mailbox or an endpoint.

Basic anti-spam filters are not capable of protecting against the latest generation of attacks. Therefore, for protecting the organization against this sophisticated or targeted attack, we concluded that the next generation of email security solutions is a must. Ultimately, it should be able to protect against any attack that is sent via email. 

How has it helped my organization?

At first, it seemed like a good solution but it wasn't; we have the mail server on site.

After six months, the mail was in fits and starts and the Check Point infrastructure was not responding properly. We realized that we were under a strong spam attack and had to install another antispam product. We were lucky enough to be supported by the Check Point team of specialists, who helped us to identify and solve the problem.

In fact, even with analyzing the logs, it was not something that was evident at first sight

What is most valuable?

This product integrates well and is easy to manage.

It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email.

It is useful for having alerts on the e-mail traffic trends. 

This solution is ideal for a small business or if you have a mail server in the cloud and most of the spam is blocked by the provider. It is not good for large email flows. If you require or move to large mail flows, the solution needs to be changed. 

What needs improvement?

Determining areas for improvement is not a question that can be answered simply. 

We should separate the antispam engine into two parts; the first that breaks down mass spam, and the second for refinement.

It would be good to dedicate a separate core, at least for the first phase, so that it does not take away resources from the system. The ideal approach would be to enrich the product with more functions, however, this would likely also lead to an increase in cost.

It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting. 

For how long have I used the solution?

I've used the solution for three months.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
ALEXANDER STEPHENS - PeerSpot reviewer
Security Lead at Global New Age Media
Real User
Top 10
Easy to use and fast with a good signature database
Pros and Cons
  • "We now have better security and fewer false positives."
  • "Installation time could be improved as it takes too long to install."

What is our primary use case?

It is improving our company's security posture.

How has it helped my organization?

We now have better security and fewer false positives.

What is most valuable?

The antivirus is easy to use and fast with a good signature database that is updated in real-time.

What needs improvement?

Installation time could be improved as it takes too long to install. With the software footprint, it should be taking less than the time it took to install. In the future, I hope to see faster installation and easier installation on our platform as time is equal to money.

For how long have I used the solution?

I've used the solution for three months.

Which solution did I use previously and why did I switch?

I did not use a different solution previously.

How was the initial setup?

The initial setup was good.

What's my experience with pricing, setup cost, and licensing?

The product offers a good price.

Which other solutions did I evaluate?

I did not evaluate a different solution. 

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2226597 - PeerSpot reviewer
Information Technology Support Analyst at a financial services firm with 11-50 employees
Real User
Though the tool is highly reliable owing to its exceptional stability, it can be difficult to scale up
Pros and Cons
  • "Check Point Anti-Spam and Email Security Software Blade is quite reliable...It is a very stable solution."
  • "The solution's technical support is an area with shortcomings that need to be improved for the better."

What is our primary use case?

What we use in our company from Check Point is not software. We use a box from Check Point, and in that box, we have Check Point Firewall with all those features, like antivirus, web security, etc. It has all the software, so it's not a single software on our systems.

We use Check Point products, which have been good so far. I think the solution has reached the end-of-life stage because we are facing CPU usage issues. There is a need to change something in the solution to make it stronger.

We are a financial institution that requires a certain level of security, so we use Check Point Anti-Spam and Email Security Software Blade.

What is most valuable?

Check Point Anti-Spam and Email Security Software Blade is quite reliable. The solution had stayed reliable up until recently when we applied new updates while having a high memory usage which ultimately affected our network traffic. So far, the solution has been good.

What needs improvement?

The solution's technical support is an area with shortcomings that need to be improved for the better.

For how long have I used the solution?

I have four years of experience with Check Point Anti-Spam and Email Security Software Blade. I need to confirm the version of the solution I use.

What do I think about the stability of the solution?

It is a very stable solution.

What do I think about the scalability of the solution?

It's expensive right now if someone plans to scale up. One needs to pay a lot to get bigger scalability. The scalability of the solution can be very difficult.

We currently have 40 users in our company using the solution.

How are customer service and support?

I rate the technical support an eight out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

I joined my current company after the setup phase.

The solution is deployed on-premises.

What was our ROI?

The worth of the solution depends on one's needs.

What's my experience with pricing, setup cost, and licensing?

The solution is expensive.

I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive.

We have to make yearly payments towards the licensing cost. The additional cost in excess of the licensing cost is done for the support.

Which other solutions did I evaluate?

We evaluated solutions like Sophos and Juniper in our company.

What other advice do I have?

I recommend those planning to use the solution to check their number of users, the solutions you need, along with the products or services you specifically need to run some other solutions.

The solution is difficult to scale up.

Overall, I rate the solution a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2025
Product Categories
Email Security
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.