Try our new research platform with insights from 80,000+ expert users

Abnormal Security vs Check Point Anti-Spam and Email Security Software Blade comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Email Security
20th
Average Rating
8.8
Reviews Sentiment
6.7
Number of Reviews
22
Ranking in other categories
Secure Web Gateways (SWG) (16th), Data Loss Prevention (DLP) (21st), Cloud Access Security Brokers (CASB) (11th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (13th), Access Management (11th), Bot Management (3rd), ZTNA as a Service (8th), ZTNA (2nd), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Abnormal Security
Ranking in Email Security
4th
Average Rating
9.4
Reviews Sentiment
7.5
Number of Reviews
11
Ranking in other categories
Secure Email Gateway (SEG) (3rd)
Check Point Anti-Spam and E...
Ranking in Email Security
10th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
48
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of February 2026, in the Email Security category, the mindshare of Cloudflare One is 1.4%, down from 1.7% compared to the previous year. The mindshare of Abnormal Security is 5.7%, down from 6.7% compared to the previous year. The mindshare of Check Point Anti-Spam and Email Security Software Blade is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Market Share Distribution
ProductMarket Share (%)
Abnormal Security5.7%
Check Point Anti-Spam and Email Security Software Blade0.7%
Cloudflare One1.4%
Other92.2%
Email Security
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
William Schellhaas - PeerSpot reviewer
Senior Director of IT at Crunch Fitness West Florida and Atlanta (CR Fitness)
Provides comprehensive email security management, effective in detecting a wide range of email threats
The ideal scenario would be for Abnormal Security to work in tandem with Microsoft to analyze incoming emails. This means Abnormal Security would assess emails before they reach my inbox, even if it happens slightly after Microsoft's initial scan. Currently, the process isn't seamless. Microsoft analyzes emails and delivers legitimate ones to my inbox. Abnormal Security then scans these delivered emails, and if flagged as malicious, they disappear. This creates a problem for our ticketing system mailbox, which is a third-party service. Emails sent to the ticketing system address are automatically forwarded by Microsoft. However, if these emails are malicious, Abnormal Security only cleans them from my Outlook mailbox after they've been forwarded. Since we primarily rely on the ticketing system and not the Outlook mailbox, these malicious emails still reach the ticketing system.
AimanSayyed - PeerSpot reviewer
Program Lead at DigitalTrack Solutions Pvt Ltd
Has significantly reduced phishing threats through proactive monitoring and centralized visibility
A specific example of how Check Point Anti-Spam and Email Security Software Blade helps protect my organization from spam or phishing is when I log in to my management console of the Check Point tool and I open the email security blade logs, and I see all the overnight status of spam, what was the spam message volume, how many phishing attempts were made, and what kind of attachments were quarantined. This gives a real-time threat intelligence and advanced detection of phishing attacks. Check Point Anti-Spam and Email Security Software Blade offers a very easy-to-use dashboard and a proactive approach. Whatever trends are observed will directly inform us. The dashboard is very easy to understand. It gives a spam detection summary where it provides a visual representation through pie or bar graphs for spam suspected or clean mails. I also really appreciate the quarantine summary as it is very descriptive and gives a quick insight into the user complaints, compliance, and backlog. The system health, such as the CPU and update types of status of signatures, is also very well represented, so it does not cause any overload. Integration with SIEM or SOC dashboards, such as QRadar which we use in the organization, is very easy via Syslog exports. This gives centralized visibility, so you do not need to check with all the other devices as one device will give you a centralized overview. Smart events are also very configurable and will give us notifications or mitigation actions, which is beneficial.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is a stable solution."
"What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection."
"Cloudflare Access is part of the Zero Trust philosophy."
"The solution has different options that can be used to differentiate DDoS attacks."
"Cloudflare is by far the most effective solution that I have come across."
"It will take the blow rather than our applications should an attack occur."
"Cloudflare, in my opinion, was easy to implement."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"What I like about Abnormal Security is that it notifies me if any of my partners or suppliers are experiencing a security breach by analyzing their database and identifying potential cyber threats."
"Their ability to take things out of the mailbox and catch things much faster than users is excellent."
"One of the things that I love about them is that the setup and installation are super easy. All you do is give them access to your Microsoft 365 tenant, and through APIs, they are able to do their work. They are doing all this through APIs, so you do not have to install the software and take a month to get it all set up to even see the value of the solution. You could be up and running in less than an hour."
"It protects us from being business email compromised, which is invaluable for maintaining our security."
"Initial auto-remediation allows us to auto-remediate before the email lands in the end user's inbox for a split second."
"I have never encountered any stability issues with Abnormal."
"The features that appeal to me most are the combination of auto-remediation and Detection 360."
"I would recommend Abnormal Security."
"Advanced Spam Filtering to identify and block unwanted email messages."
"Anti-spam and malware phishing are valuable features of the solution."
"Mail sanitisation features are second to none."
"By drastically reducing the volume of spam and unwanted emails, employees can focus more on their work rather than sorting through cluttered inboxes. This leads to improved productivity and efficiency within the organization."
"Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization, as I can see that there is an improvement in our productivity and we are not wasting our time blocking spam, since the solution takes care of all these security features."
"Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization by causing a very steep drop in spam and phishing mail after implementing this, with the risk of ransomware entry now very low and around 80% of spam mails prevented."
"Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization by causing a very steep drop in spam and phishing mail after implementing this, with the risk of ransomware entry now very low and around 80% of spam mails prevented."
"The robust Smart Dashboard enables to us fetch important and accurate data insights concerning the blocking of spammers and malware attacks on the system."
 

Cons

"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"The initial onboarding was causing us some confusion."
"Our subscription plan for the solution has a limitation of bot signatures."
"Feedback could be enhanced."
"From a logging perspective, it is still a bit difficult to see exactly what users are being blocked with the current views."
"They don't have a person to provide support for customers using the solution under their free plan."
"The onboarding process can be improved a little bit."
"One feature I'd love to see is outbound scanning."
"The biggest pain point for us is the lack of support for on-premise email systems."
"There could be more selectable options and more granular selections available."
"The pricing for academic institutions and student mailboxes is challenging."
"The ideal scenario would be for Abnormal Security to work in tandem with Microsoft to analyze incoming emails."
"I, as such, do not have anything that I do not like or would like to add, but you could argue that because they are doing it API-based, there is a chance that something could slip through temporarily before they are able to pull it out. In theory, it could happen just because of the nature of the system. They are not in line with the delivery of the mail. They are kind of asynchronous, which is a pro as well as a con. If it is synchronous, then I know it would always stop them, but because it is asynchronous, things could get through temporarily or because of some system issues on the Microsoft side or their side. It is the nature of the beast, but it is a little bit of a con."
"For Abnormal Security as a product, I would say probably somewhere around a seven, as there are some other areas where they can improve to achieve a higher rating."
"When we're working on something as engineers, and we find an idea or a method of doing something that would be greatly improved by doing it another way, there should be an ability for me to click the ideas button, type in an idea that I have, and submit it to a product review team or developers to have them think through the process a little bit more."
"The learning curve is steep, and the initial level configuration could be a bit complex."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"Check Point Anti-Spam and Email Security Software Blade is great software, but what could be improved is the incident detection and response, which could be faster."
"The support language is only English."
"The user should be able to perform a real-time search of the objects and see the messages."
"One area where Check Point Anti-Spam and Email Security Software Blade can be improved is the knowledge base configuration."
"Mobile solutions should be added to Check Point because business email is also used by users on mobile devices."
"The high-end protection of email servers from any advanced foreign agents and malware is not 100% there currently."
 

Pricing and Cost Advice

"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The prices are slightly expensive."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"Cloudflare Zero Trust Platform's pricing is good."
"The solution's pricing lacks transparency."
"The solution is not that expensive."
"The pricing appears fair, and they demonstrate a genuine willingness to work with us on it."
"Overall, we'd certainly prefer lower pricing, but Abnormal Security doesn't seem unreasonable compared to similar offerings in the market."
"The license is based on the user count, so the number of users that have an email address in the organization."
"Abnormal Security, on the other hand, provides the same level of functionality for just over $60,000 – that's half the price!"
"This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
"I rate the product pricing a seven out of ten."
"For licensing, my company makes yearly payments, which is expensive."
"I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
"Reasonably priced solution."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"The cost is competitive with other security products on the market."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
882,606 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Comms Service Provider
11%
Financial Services Firm
9%
Manufacturing Company
7%
Computer Software Company
11%
Financial Services Firm
10%
Manufacturing Company
8%
Government
7%
Outsourcing Company
14%
Manufacturing Company
10%
Computer Software Company
9%
Marketing Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise10
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise2
Large Enterprise8
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise13
Large Enterprise18
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What do you like most about Abnormal Security?
The features that appeal to me most are the combination of auto-remediation and Detection 360.
What is your experience regarding pricing and costs for Abnormal Security?
I find the pricing to be favorable, but I did not disclose the exact cost.
What needs improvement with Abnormal Security?
Ease of use is important, and Abnormal Security's responsiveness and ability to deliver solutions when issues arise a...
What needs improvement with Check Point Anti-Spam and Email Security Software Blade?
At this time, I do not see anything lacking in Check Point Anti-Spam and Email Security Software Blade. It is working...
What is your primary use case for Check Point Anti-Spam and Email Security Software Blade?
My main use case for Check Point Anti-Spam and Email Security Software Blade is to protect document or file links att...
What advice do you have for others considering Check Point Anti-Spam and Email Security Software Blade?
Any organization looking for the best email security solution should consider Check Point Anti-Spam and Email Securit...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
No data available
No data available
 

Overview

 

Sample Customers

23andMe
Foot Lcoker, Xerox, Liberty Mutual, Mattel, Boston Scientific
SF Police Credit Union (SFPCU)
Find out what your peers are saying about Abnormal Security vs. Check Point Anti-Spam and Email Security Software Blade and other solutions. Updated: February 2026.
882,606 professionals have used our research since 2012.