Try our new research platform with insights from 80,000+ expert users

Abnormal Security vs Check Point Anti-Spam and Email Security Software Blade comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Abnormal Security
Ranking in Email Security
3rd
Average Rating
9.6
Reviews Sentiment
7.9
Number of Reviews
10
Ranking in other categories
Secure Email Gateway (SEG) (2nd)
Check Point Anti-Spam and E...
Ranking in Email Security
11th
Average Rating
8.4
Reviews Sentiment
7.6
Number of Reviews
40
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2025, in the Email Security category, the mindshare of Abnormal Security is 7.5%, up from 4.0% compared to the previous year. The mindshare of Check Point Anti-Spam and Email Security Software Blade is 0.9%, up from 0.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security
 

Featured Reviews

ChrisBrown5 - PeerSpot reviewer
Automated threat detection that protects against corruption with minimal intervention
Abnormal Security is valuable because it features an automated scoring tool that doesn't require much intervention from our team. It enhances threat detection capabilities by making the process automated and is easy to scale to our entire environment. Additionally, it protects us from being business email compromised, which is invaluable for maintaining our security.
NareshKumar9 - PeerSpot reviewer
Offers robust threat protection and saves costs significantly
One area for improvement in Check Point Anti-Spam and Email Security Software Blade involves the firmware updates; sometimes, until I update the firmware of the Check Point Quantum Sparks, I cannot access the GUI to see my data usage. If Check Point resolves this issue, everything will be much better.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I like Abnormal's threat protection with auto-remediation, but I also love its abuse mailbox feature, which automatically responds to the end user. That feature has a super-valuable security component and helps improve the user experience."
"Initial auto-remediation allows us to auto-remediate before the email lands in the end user's inbox for a split second."
"What I like about Abnormal Security is that it notifies me if any of my partners or suppliers are experiencing a security breach by analyzing their database and identifying potential cyber threats."
"I have never encountered any stability issues with Abnormal."
"I would recommend Abnormal Security."
"One of the things that I love about them is that the setup and installation are super easy. All you do is give them access to your Microsoft 365 tenant, and through APIs, they are able to do their work. They are doing all this through APIs, so you do not have to install the software and take a month to get it all set up to even see the value of the solution. You could be up and running in less than an hour."
"Their ability to take things out of the mailbox and catch things much faster than users is excellent."
"The features that appeal to me most are the combination of auto-remediation and Detection 360."
"I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like."
"The policies and port blocking are the most valuable features. We have a significant amount of spam emails passing through our network."
"This solution is very efficient."
"This solution helped us lock down and have our infrastructure easier to manage."
"It has several very good features that form an excellent tool."
"We now have better security and fewer false positives."
"Due to its technology, monitoring, and manufacturer features, we have been able to reduce the intrusion of spam and other threats that can be uploaded via email."
"Check Point offers us flexibility when it comes to customizing the configurations that we want to manage, thus allowing us to meet the specific needs of our company."
 

Cons

"The pricing for academic institutions and student mailboxes is challenging."
"I, as such, do not have anything that I do not like or would like to add, but you could argue that because they are doing it API-based, there is a chance that something could slip through temporarily before they are able to pull it out. In theory, it could happen just because of the nature of the system. They are not in line with the delivery of the mail. They are kind of asynchronous, which is a pro as well as a con. If it is synchronous, then I know it would always stop them, but because it is asynchronous, things could get through temporarily or because of some system issues on the Microsoft side or their side. It is the nature of the beast, but it is a little bit of a con."
"There could be room for improvement in enhancing integration with other cybersecurity tools."
"One feature I'd love to see is outbound scanning."
"Abnormal should add more automatic reports. I have an open request to our account team for more notification and report types that can be sent automatically. For example, they have an awesome report that gets sent weekly, and I also want them monthly, so I don't need to do so much adding up when my director wants numbers over time."
"The ideal scenario would be for Abnormal Security to work in tandem with Microsoft to analyze incoming emails."
"There could be more selectable options and more granular selections available."
"When we're working on something as engineers, and we find an idea or a method of doing something that would be greatly improved by doing it another way, there should be an ability for me to click the ideas button, type in an idea that I have, and submit it to a product review team or developers to have them think through the process a little bit more."
"The ease of use with the user interface could be better as it is very static."
"The solution's technical support is an area with shortcomings that need to be improved for the better."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"Regarding Checkpoint, I would suggest an easier interface to understand. The interface is a bit overwhelming with information overload for someone new to it."
"AI-based threat detection could be enhanced to improve security."
"Many would love to have this solution and be able to manage it from any device, including native applications or applications that can be installed on devices such as Android or iOS."
"The pattern used to filter emails could be improved"
"There's definitely room for improvement when it comes to adapting to different languages in one environment."
 

Pricing and Cost Advice

"The license is based on the user count, so the number of users that have an email address in the organization."
"The pricing appears fair, and they demonstrate a genuine willingness to work with us on it."
"Overall, we'd certainly prefer lower pricing, but Abnormal Security doesn't seem unreasonable compared to similar offerings in the market."
"Abnormal Security, on the other hand, provides the same level of functionality for just over $60,000 – that's half the price!"
"For licensing, my company makes yearly payments, which is expensive."
"I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
"Reasonably priced solution."
"The cost is competitive with other security products on the market."
"I rate the product pricing a seven out of ten."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
861,524 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
10%
Manufacturing Company
7%
Government
7%
Security Firm
21%
Computer Software Company
13%
Financial Services Firm
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Abnormal Security?
The features that appeal to me most are the combination of auto-remediation and Detection 360.
What is your experience regarding pricing and costs for Abnormal Security?
I find the pricing to be favorable, but I did not disclose the exact cost.
What needs improvement with Abnormal Security?
There could be more selectable options and more granular selections available.
What needs improvement with Check Point Anti-Spam and Email Security Software Blade?
The user interface can be sometimes less intuitive and complex for new users who are working as admin. Some configurations in Check Point Anti-Spam and Email Security Software Blade, particularly w...
What is your primary use case for Check Point Anti-Spam and Email Security Software Blade?
My main use case for Check Point Anti-Spam and Email Security Software Blade involves addressing email security problems in our organization. It has been helping us identify high volumes of spam em...
 

Overview

 

Sample Customers

Foot Lcoker, Xerox, Liberty Mutual, Mattel, Boston Scientific
SF Police Credit Union (SFPCU)
Find out what your peers are saying about Abnormal Security vs. Check Point Anti-Spam and Email Security Software Blade and other solutions. Updated: July 2025.
861,524 professionals have used our research since 2012.