Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Good DLP, email filtering, and malware detection
Pros and Cons
  • "DLP features can help prevent sensitive information from being leaked via email."
  • "The support language is only English."

What is our primary use case?

In our company, we use Office 365 to run the office, including email and some security tools from Microsoft. The tools did not satisfy us, so we decided to use Check Point technology. It gave us protection against spam, ransomware, and phishing, among other modern threats that travel through the email of collaborators.

In the end, the implementation through the Check Point blade is simple and easy to manage. 

We are really pleased with this tool that facilitated the management of these behaviors and problems that it generated for end users and the company itself.

How has it helped my organization?

Thanks to this tool acquired through The Check Point blade, we can have a layer of protection with the manufacturer for our email products. We can regulate and eliminate in a great way the threats that can enter through email.

The company, in turn, has managed to considerably lower the spam received, which also saturated the company's mailboxes a lot. It is a great tool that is easy to implement and with great considerations to be able to put it in the company.

What is most valuable?

Email filtering. The software can filter incoming emails to identify and block spam and other unwanted messages.

Malware detection. The software can detect and block malware attachments and links in emails. This is important for preventing malware infections and other security threats.

DLP features can help prevent sensitive information from being leaked via email. This may involve scanning emails for specific types of content or attachments and then either blocking or encrypting those emails.

What needs improvement?

Support is really an area that needs to be improved, as they currently take a very long time to resolve cases, which is not acceptable.

The support language is only English. They could expand other languages to expand more easily and help the client in a better way.

Regarding cost management, they are only accessible through a partner. This makes it more difficult to find pricing and do budgeting.

In terms of the ease of documentation, sometimes it is a bit difficult to find the correct information about the product.                   

Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
April 2024
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,334 professionals have used our research since 2012.

For how long have I used the solution?

We have used this solution for email protection in our company for quite some time with excellent results.

Which solution did I use previously and why did I switch?

Previously, Microsoft technology was used, however, we did not like it.

We moved to Check Point.

What's my experience with pricing, setup cost, and licensing?

Regarding its license issues and costs, it seems reasonable to me.

Which other solutions did I evaluate?

We always do field and theoretical evaluations to verify the best options for similar products.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Secure with good customization but needs more AI
Pros and Cons
  • "Check Point offers us flexibility when it comes to customizing the configurations that we want to manage, thus allowing us to meet the specific needs of our company."
  • "A possible improvement for the solution would be to be able to implement artificial intelligence and machine learning technologies to improve the accuracy of detecting spam and malicious emails that are constantly arriving."

What is our primary use case?

It is a solution that allows us to quickly install solutions that will protect our mail against viruses or fishing. Of the features that we most want is the ability to protect them against spam. This combination of technology helps us to protect against invasive emails. Being able to prevent these anti-spam attacks from phishing will help us to have protection and control over the identity of users and prevent our users from falling for malicious attempts. 

How has it helped my organization?

This solution is designed well and is good for use in small and medium-sized companies as it has an analysis system for spam threats, phishing, and viruses and includes easy-to-install protection. 

This solution allows us to be effective. It is accessible, which has an economic impact on a small company. Having solutions from large companies that protect our mail system against spam threats is useful. It can help us offer a solution that can maintain secure communication without having to worry about a million-dollar investment. 

What is most valuable?

Check Point offers us flexibility when it comes to customizing the configurations that we want to manage, thus allowing us to meet the specific needs of our company. It can be customized in such a way that it allows us to block certain unwanted emails, such as emails from a specific sender, domains, or email addresses, generating an email policy that meets the needs of our institution and being efficient, fast, and secure.

What needs improvement?

From my perspective, a possible improvement for the solution would be to be able to implement artificial intelligence and machine learning technologies to improve the accuracy of detecting spam and malicious emails that are constantly arriving. This would allow us a better adapt to new techniques. New analysis techniques on spam, phishing, or viruses would give us greater security by establishing standards and real-time analysis using AI.

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
April 2024
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,334 professionals have used our research since 2012.
Database Administrator at Ordina
User
Top 5
Easy to integrate with good spam filtering and excellent dashboards
Pros and Cons
  • "When sharing files with my colleagues, it provides a comprehensive report on the security status of the document."
  • "The anti-spam features could be upgraded to be able to detect unnoticeable spam."

What is our primary use case?

The anti-spam feature has protected the company email infrastructure from viruses that may destroy useful data. 

It has enabled my department to come up with useful policies that prevent our database from ransomware attacks. 

It detects unsafe emails in advance with instant blocking to protect users. 

The product saves us time in terms of email categorization with a reliable classification system. 

When sharing files with my colleagues, it provides a comprehensive report on the security status of the document. 

This product has advanced our email-sharing channels with modern security tools that filter out any unsafe data.

How has it helped my organization?

Check Point Anti-Spam and Email Security Software Blade has created a safe working environment that cannot be easily compromised. 

Sending and receiving emails from secure networks gives teams confidence in the execution of daily duties. 

Data that was being destroyed by viruses is now safe, and we can exchange ideas with our colleagues without any fear. 

It has given an opportunity to each sector to control and monitor their own data with strict set company regulations. It has provided comprehensive security to all the applications and enhanced increased production.

What is most valuable?

It is easy to integrate with other applications and operate. New users find it flexible to work with this tool and interact with all the features. 

The customer support staff provides 24/7 live support to ensure the system keeps on running and helps customers who request any help. 

Maintenance costs are efficient, and the setup process takes a few minutes. 

The spam filtering feature saves and stops the spread of viruses. 

The user dashboards provide results based on real-time insights that enable teams to plan and set achievable objectives.

What needs improvement?

The anti-spam features could be upgraded to be able to detect unnoticeable spam. 

When it comes to languages, they can be updated to cater to all communities. 

The software blade is working well, and most of the time we achieve our goals. Blocking suspicious emails has been a great achievement due to increased online threats. Before the deployment of this product, we had lost useful information to scammers. However, we are now sorted. 

The set features are working well. That said, they have to be updated on time to cater to new security demands that arise daily.

For how long have I used the solution?

I've used the solution for one year and five months.

What do I think about the stability of the solution?

I have not experienced downtime.

What do I think about the scalability of the solution?

It is easy to set up and learn how it works.

How are customer service and support?

The 24/7 customer support services have been good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used different products and have no plans of leaving this platform.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The implementation took place through the vendor team, and their level of professionalism impressed everybody.

What was our ROI?

The return on investment has been positive, and it increases on daily basis based on an excellent performance.

What's my experience with pricing, setup cost, and licensing?

It is easy to set up, and the cost is reliable.

Which other solutions did I evaluate?

I have not engaged with other vendors. 

What other advice do I have?

Email security infrastructure has improved, and any enterprise can try this solution for better performance.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ankita  Singh - PeerSpot reviewer
Application Developer at Capegemini Consulting India Private Limited
Real User
Top 5
Good protection against malware, offers good data protection and has great email management
Pros and Cons
  • "Check Point Anti-Spam and Email Security Software Blade provides an extra level of security against threats and malware along with 2FA support for multiple platform collaboration and integrations in a single click."
  • "One thing which annoys me with the Check Point Anti-Spam and Email Security Software Blade is its customer support portal which still lags in service even after so many developments."

What is our primary use case?

Check Point Anti-Spam and Email Security Software Blade is undoubtedly one of the highly stable and scalable platforms for email management - at a minimal cost.

Check Point Anti-Spam and Email Security Software Blade is highly organized in terms of email synchronization and viewing, email sending/receiving, multiple file transfers on a single click, spam and phishing email blocking, and email restoration, and is much more compatible with various features.

Check Point Anti-Spam and Email Security Software Blade provides a safe passage for email management and data protection.

How has it helped my organization?

The Check Point Anti-Spam and Email Security Software Blade has proven to be highly productive and scalable in terms of what it provides, and at such a minimal cost.

Check Point Anti-Spam and Email Security Software Blade provides a complete solution against phishing email blocking and restoration, email synchronization and viewing, email sending/receiving, and multiple file transfers on a single click.

Check Point Anti-Spam and Email Security Software Blade is a highly recommended tool for professionals.

What is most valuable?

Check Point Anti-Spam and Email Security Software Blade provides multiple support and services. Some of the most valuable ones are the complete solution against phishing emails and the ability to block emails.

It allows for restoration along with email synchronization and viewing, sending/receiving, and multi-file transfer with a single click.

Check Point Anti-Spam and Email Security Software Blade provides an extra level of security against threats and malware along with 2FA support for multiple platform collaboration and integrations in a single click.

What needs improvement?

Usage and access to Check Point Anti-Spam and Email Security Software Blade are highly limited to professionals. However, there has been a bit more dependency in recent months, and one thing which annoys me with the Check Point Anti-Spam and Email Security Software Blade is its customer support portal which still lags in service even after so many developments.

Dealing with unnecessary ads running in the background is an area that Check Point Anti-Spam and Email Security Software Blade need to work on for mass adoption.

For how long have I used the solution?

I have been integrating with Check Point Anti-Spam and Email Security Software Blade for less than one year. However, since the day I joined this platform it has totally changed my way of work and email management.

Which solution did I use previously and why did I switch?

We previously used Protonmail. It was not as compatible according to my usability.

What's my experience with pricing, setup cost, and licensing?

Check Point Anti-Spam and Email Security Software Blade is budget-friendly and scalable.

Which other solutions did I evaluate?

I did not previously use a different solution.

What other advice do I have?

I'd advise potential new users to go for Check Point Anti-Spam and Email Security Software Blade, as it's highly dependable and secure.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Flexible configuration, straightforward to set up, and false positive errors are minimal
Pros and Cons
  • "I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like."
  • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point Anti-Spam and Email Security Software Blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of email filtration and anti-spam protection.

How has it helped my organization?

We rely on the Check Point HA Clusters to secure the DataCenter of our company that is located in Asia (Taiwan). This software blade - Check Point Anti-Spam & Email Security - is enabled among the number of the others, and is responsible for scanning and blocking the potential malware email or the email that contain Spam messages. 

As the security administrator, I see that the Check Point Anti-Spam & Email Security works quite well. The logs and reports show the daily number of messages blocked, and it's amazing. 

From time to time, I manually check the blocked emails and can confirm that 99% of them are trash. I am confident that the number of False Positives is minimal for this solution.

What is most valuable?

  1. I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like.
  2. The databases of IPs and text strings are updated as per schedule, which can be adjusted in the blade options.
  3. It is possible to create and use the custom block list for the anti-spam blade in the policy, which we have configured.
  4. When you have the IPS software blade purchased and activated, the emails are checked by the email IPS protections, thus increasing the security level even more.

What needs improvement?

I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

We have also had several support cases opened for software issues, but none of them were connected with the Check Point Anti-Spam and Email Security Software Blade.

For how long have I used the solution?

We have been using this product for about three years, starting in late 2017.

What do I think about the stability of the solution?

The Check Point Anti-Spam and Email Security Software Blade is stable.

What do I think about the scalability of the solution?

The Check Point Anti-Spam and Email Security Software Blade scales well with the gateways we use, since it doesn't affect the overall performance much after activation.

How are customer service and technical support?

We have had several support cases opened, but none of them were connected with the Check Point Anti-Spam and Email Security Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

The longest issue took about one month to be resolved, which we consider too long.

Which solution did I use previously and why did I switch?

No, it's the first NGFW with email protection we onboarded.

How was the initial setup?

The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

What about the implementation team?

Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

What's my experience with pricing, setup cost, and licensing?

Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

Which other solutions did I evaluate?

No, we decided to stick with Check Point after the demo.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Gaurav Amar - PeerSpot reviewer
Deputy Vice present at PVR Ltd
Real User
Good message encryption and validation features, but the console should be more user-friendly
Pros and Cons
  • "Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network."
  • "The user should be able to perform a real-time search of the objects and see the messages."

What is our primary use case?

Check Point makes up part of our security solution in all of our locations across India. We are in the eCommerce industry and one of the things that we do is set up tickets for moviegoers.

We have categorized our requirements as per the online penetration of our booking agents. As an example, in one of our locations, we have a penetration of filling online tickets that is reaching up to 85%. It is important that this system is safeguarded to ensure that we are not exploited on the ticketing platform using the OCR codes that we are generating and sending to our customers. As the tickets are emailed to the patrons in advance of the show, it is important that this email is secure. This is one of our use cases.

How has it helped my organization?

Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network. We are a PCI DSS compliant company in India and we need to ensure that our patrons' data is protected. At the same time, we want the convenience of being able to send tickets to them. Check Point has allowed us to do that.

What is most valuable?

The features that I like the best are message encryption and message validation.

What needs improvement?

The manageability using this console is complex and it should be a little more user-friendly. If you don't have a good understanding of putting the policies in place then sometimes it is tough to manage from the console. A more intuitive GUI would make it easier to manage.

The user should be able to perform a real-time search of the objects and see the messages. As it is now, when we create an object, sometimes you find out at a later stage that the object already exists. If I could simply type an object into the search bar and find out whether it exists by seeing it in a dropdown then it would save me time.

For how long have I used the solution?

We have been using the Check Point Anti-Spam and Email Security Blade for two years.

What do I think about the stability of the solution?

This solution has been stable and is working very well in our environment.

What do I think about the scalability of the solution?

This is a scalable solution. We have 170 locations across India and all of them have Check Point installed. We had considered scalability from the beginning of this project, with a three to five-year plan. 

How are customer service and technical support?

We have been in direct contact with technical support and our experience has been that they are both nice and helpful. After the deployment was completed, the partner who assisted us had moved out and completed a knowledge transfer to the entire team. There was a subsequent issue that had to do with the VPN, and the Check Point technical support was very helpful in resolving it.

Which solution did I use previously and why did I switch?

We have used other security products by vendors such as Juniper and Palo Alto, but not for the same use cases.

How was the initial setup?

We began our implementation about two and a half years ago and as part of the process, we divided India into different regions. In total, it took us about 120 days to fully deploy across all of our locations.

What about the implementation team?

We have in-house staff who are very well versed in the Check Point technology, however, given the volume of deployment, we contracted a partner that was recommended by the vendor.

What other advice do I have?

My advice to anybody who is considering this solution is that it is a robust and reliable platform. With respect to messaging and firewall products, all of them are pretty good but it depends on your scenario. I would say that Check Point has the best security, the messaging protocols are pretty good, and the reliability is higher than competing products by Palo Alto and Juniper. When adopting Check Point, your skill is one of the key points to consider.

This is a good solution but there are certain complexities that need to be made more user-friendly. It should be more manageable from an IT perspective. This includes things such as setting up specific policies. A more intuitive GUI, for example, would help.

I would rate this solution a seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Cybersecurity specialist at a maritime company with 10,001+ employees
User
Integrates well and is easy to manage but only offers basic anti-spam filters
Pros and Cons
  • "It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email."
  • "It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting."

What is our primary use case?

The primary use case is to protect the organization from any attacks generated via email. As most of the attacks in recent days are via email, the organization has to be equipped and ready to mitigate this type of attack at the perimeter level, before it has been delivered to the user's mailbox or an endpoint.

Basic anti-spam filters are not capable of protecting against the latest generation of attacks. Therefore, for protecting the organization against this sophisticated or targeted attack, we concluded that the next generation of email security solutions is a must. Ultimately, it should be able to protect against any attack that is sent via email. 

How has it helped my organization?

At first, it seemed like a good solution but it wasn't; we have the mail server on site.

After six months, the mail was in fits and starts and the Check Point infrastructure was not responding properly. We realized that we were under a strong spam attack and had to install another antispam product. We were lucky enough to be supported by the Check Point team of specialists, who helped us to identify and solve the problem.

In fact, even with analyzing the logs, it was not something that was evident at first sight

What is most valuable?

This product integrates well and is easy to manage.

It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email.

It is useful for having alerts on the e-mail traffic trends. 

This solution is ideal for a small business or if you have a mail server in the cloud and most of the spam is blocked by the provider. It is not good for large email flows. If you require or move to large mail flows, the solution needs to be changed. 

What needs improvement?

Determining areas for improvement is not a question that can be answered simply. 

We should separate the antispam engine into two parts; the first that breaks down mass spam, and the second for refinement.

It would be good to dedicate a separate core, at least for the first phase, so that it does not take away resources from the system. The ideal approach would be to enrich the product with more functions, however, this would likely also lead to an increase in cost.

It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting. 

For how long have I used the solution?

I've used the solution for three months.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Saurabh-Pal - PeerSpot reviewer
Sr. Security Specialist at a tech vendor with 11-50 employees
Real User
Top 5Leaderboard
Very efficient, stable, with great customer support
Pros and Cons
  • "This solution is very efficient."
  • "If you face any configuration problems, Check Point is the only solution."

What is our primary use case?

Our customers used this product for internet security, anti-virus, and remote browsing. We are system integrators and worked with Check Point as managed service providers up until a few months ago. I'm a senior security specialist.

What is most valuable?

This solution is very efficient. 

What needs improvement?

If you face any configuration problems, you have to involve the Check Point team so they can verify their software.

For how long have I used the solution?

Until recently, we were integrators of this solution for five years. 

What do I think about the stability of the solution?

The stability is generally good if there are no power-related issues. 

What do I think about the scalability of the solution?

The scalability is very good. 

How are customer service and support?

The customer support is excellent - if you're facing any problems, you can write to the Check Point team and you'll receive an immediate reply. 

How was the initial setup?

The setup of this solution is complex because it has the concept of software blade instead of appliance which is something that only CheckPoint can identify. Deployment generally takes about a week and requires an engineer.   

What's my experience with pricing, setup cost, and licensing?

Palo Alto is very expensive compared to other solutions. 

What other advice do I have?

If you're a software company, I recommend this solution and rate it nine out of 10. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Product Categories
Email Security
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.