Try our new research platform with insights from 80,000+ expert users

Check Point Anti-Spam and Email Security Software Blade vs Check Point Harmony Endpoint comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Average Rating
8.8
Reviews Sentiment
6.7
Number of Reviews
22
Ranking in other categories
Email Security (20th), Secure Web Gateways (SWG) (15th), Data Loss Prevention (DLP) (21st), Cloud Access Security Brokers (CASB) (11th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (13th), Access Management (12th), Bot Management (3rd), ZTNA as a Service (8th), ZTNA (3rd), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Check Point Anti-Spam and E...
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
48
Ranking in other categories
Email Security (9th)
Check Point Harmony Endpoint
Average Rating
8.8
Reviews Sentiment
7.3
Number of Reviews
205
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Anti-Malware Tools (3rd), Endpoint Detection and Response (EDR) (6th)
 

Mindshare comparison

Email Security Mindshare Distribution
ProductMindshare (%)
Check Point Anti-Spam and Email Security Software Blade0.7%
Microsoft Defender for Office 3658.8%
Proofpoint Email Protection8.1%
Other82.4%
Email Security
Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Check Point Harmony Endpoint2.2%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.6%
Other83.4%
Endpoint Protection Platform (EPP)
 

Q&A Highlights

reviewer2132481 - PeerSpot reviewer
Investment Banking Summer Analyst at a healthcare company with 10,001+ employees
Aug 24, 2023
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
AimanSayyed - PeerSpot reviewer
Program Lead at DigitalTrack Solutions Pvt Ltd
Has significantly reduced phishing threats through proactive monitoring and centralized visibility
A specific example of how Check Point Anti-Spam and Email Security Software Blade helps protect my organization from spam or phishing is when I log in to my management console of the Check Point tool and I open the email security blade logs, and I see all the overnight status of spam, what was the spam message volume, how many phishing attempts were made, and what kind of attachments were quarantined. This gives a real-time threat intelligence and advanced detection of phishing attacks. Check Point Anti-Spam and Email Security Software Blade offers a very easy-to-use dashboard and a proactive approach. Whatever trends are observed will directly inform us. The dashboard is very easy to understand. It gives a spam detection summary where it provides a visual representation through pie or bar graphs for spam suspected or clean mails. I also really appreciate the quarantine summary as it is very descriptive and gives a quick insight into the user complaints, compliance, and backlog. The system health, such as the CPU and update types of status of signatures, is also very well represented, so it does not cause any overload. Integration with SIEM or SOC dashboards, such as QRadar which we use in the organization, is very easy via Syslog exports. This gives centralized visibility, so you do not need to check with all the other devices as one device will give you a centralized overview. Smart events are also very configurable and will give us notifications or mitigation actions, which is beneficial.
GR
Support at a security firm with 51-200 employees
Remote Access Security Reinforced with Real-Time Device Protection
Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility. It would be helpful to tailor views for different roles, such as IT or security support. Regarding needed improvements, custom report building could be enhanced. Current reports are informative, and a drag-and-drop builder would allow teams to create tailored views for compliance, executive summaries, or operational metrics. For further improvements, enhancing threat simulation and testing would be valuable. Building a threat simulation tool and adding native capabilities to simulate phishing, malware, or ransomware scenarios will help teams validate protection and train users without relying on third-party tools.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This solution is easy to understand and easy to configure."
"The blocking feature is very good."
"Enables me to work from two locations."
"It will take the blow rather than our applications should an attack occur."
"Clover is the best product globally."
"The capabilities of the software are strong enough for me to do what it's supposed to do. For me, we don't need to do a lot of configuration on our site. We just enable it and monitor it."
"Cloudflare Zero Trust Platform removes the risk of exposing the applications to the public."
"It is a stable solution."
"The most valuable features of the solution include advanced threat detection."
"It's a fairly old solution, however, that has been updated over time to become one of the best manufacturers of security solutions."
"It has provided us with an easy way to avoid invasive mail."
"This product integrates well and is easy to manage."
"Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization, as I can see that there is an improvement in our productivity and we are not wasting our time blocking spam, since the solution takes care of all these security features."
"It does a better job of recognizing spammers."
"What I appreciate most about Check Point Anti-Spam and Email Security Software Blade is that it can effectively detect and block malicious emails that could harm user PCs."
"Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization by causing a very steep drop in spam and phishing mail after implementing this, with the risk of ransomware entry now very low and around 80% of spam mails prevented."
"The product improved the overall security of our organization with the features like sandboxing and phishing prevention."
"An incredibly helpful feature we use day-to-day is the automated remediation and rollback capability in Check Point Harmony Endpoint, as if a file is flagged as malicious or if ransomware activity is detected, the system can automatically isolate an endpoint and rollback changes to restore it to a safe state, and that's saved us from having to manually clean up or re-image devices after an incident."
"It helps us to detect running malicious activity in our network and after the COVID situation, most users are working from home where it becomes very difficult for IT admin to maintain security so such type of solution definitely helps us to prevent cyber attacks."
"The insight and visibility of the detection is good."
"It is minimally invasive. From a single installer, the equipment is protected and secured."
"The initial setup is very easy."
"It is one of the best security solutions in the market today."
"It provides remote access for the staff and increases their productivity."
 

Cons

"From a logging perspective, it is still a bit difficult to see exactly what users are being blocked with the current views."
"The software has automated alerts, but the automated alerts are not available in the mobile app."
"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"There are premium tier live service and lower tier live service, so we opted for the lower tier. But there is no medium tier where we pay a little extra and get a bit more service. So if that can be improved."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"Feedback could be enhanced."
"Cloudflare DDoS has poor technical support."
"Operating and tuning the product is difficult."
"Installation time could be improved as it takes too long to install."
"The initial configuration is complex, but apart from that, everything works perfectly."
"Regarding Checkpoint, I would suggest an easier interface to understand. The interface is a bit overwhelming with information overload for someone new to it."
"One thing which annoys me with the Check Point Anti-Spam and Email Security Software Blade is its customer support portal which still lags in service even after so many developments."
"The learning curve is steep, and the initial level configuration could be a bit complex."
"There could be an extension of the trial period to 60 days."
"AI-based threat detection could be enhanced to improve security."
"User experience can be improved."
"Check Point should improve on their patch management by releasing patches more frequently, such as on a weekly basis, to stay ahead of potential vulnerabilities."
"The response from the tool's support team, which starts with L1, is something my company doesn't find helpful, especially when compared to the other solutions that we use."
"Support needs improvement. Currently, support is primarily via email, which leads to longer response times."
"One area of this product that has room for improvement is the disc encryption."
"Dashboard customization is needed for improvements. While the centralized management is strong, the dashboard could offer more flexibility."
"We know that Check Point has a very good database about threats even Check Point tries to make this EDR stable still there are some issues we were facing after upgrading or taking TAC to help its got resolved but Check Point really needs to work on metadata."
"More applications should be supported."
"We did have some early compatibility issues, which I hope Check Point has since resolved."
 

Pricing and Cost Advice

"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The solution is not that expensive."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The prices are slightly expensive."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"Cloudflare Zero Trust Platform's pricing is good."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The solution's pricing lacks transparency."
"I rate the product pricing a seven out of ten."
"Reasonably priced solution."
"For licensing, my company makes yearly payments, which is expensive."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"The cost is competitive with other security products on the market."
"I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
"This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
"In addition to the standard licensing fees, there is a cost for support."
"The cost is huge compared to other products that are available on market."
"Initial monies replacing all AVs with a single product is about £10k."
"The solution is reasonable, but there are cheaper solutions out there."
"Check Point Harmony Endpoint is an expensive solution. My company's clients pay INR 1,000 for each user of the product, while Check Point also provides an option to pay INR 2,300 for three years."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"The price is good."
"There are three different licensing models including basic, advanced, and complete, and it needs to be selected according to the endpoint."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
883,546 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
11%
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
7%
Outsourcing Company
14%
Manufacturing Company
10%
Computer Software Company
9%
Marketing Services Firm
7%
Computer Software Company
11%
Manufacturing Company
9%
Outsourcing Company
7%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise10
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise13
Large Enterprise18
By reviewers
Company SizeCount
Small Business133
Midsize Enterprise70
Large Enterprise75
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What needs improvement with Check Point Anti-Spam and Email Security Software Blade?
At this time, I do not see anything lacking in Check Point Anti-Spam and Email Security Software Blade. It is working...
What is your primary use case for Check Point Anti-Spam and Email Security Software Blade?
My main use case for Check Point Anti-Spam and Email Security Software Blade is to protect document or file links att...
What advice do you have for others considering Check Point Anti-Spam and Email Security Software Blade?
Any organization looking for the best email security solution should consider Check Point Anti-Spam and Email Securit...
What do you like most about Check Point Harmony Endpoint?
The platform's most valuable features are the ability to build API, which meets our business requirements, and the VP...
What is your experience regarding pricing and costs for Check Point Harmony Endpoint?
My experience with pricing indicates that the costs have increased compared to last year. Previously, Check Point Har...
What needs improvement with Check Point Harmony Endpoint?
Check Point Harmony Endpoint works well overall, but one area I would like to see improved is the reporting and dashb...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
No data available
Check Point Endpoint Security, Endpoint Security, Check Point SandBlast Agent, Check Point Antivirus
 

Overview

 

Sample Customers

23andMe
SF Police Credit Union (SFPCU)
Boston Properties, Independence Care System, Melbourne Convention and Exhibition Centre (MCEC), Courtagen Life Sciences, Carmel Partners
Find out what your peers are saying about Proofpoint, Microsoft, Check Point Software Technologies and others in Email Security. Updated: February 2026.
883,546 professionals have used our research since 2012.