Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Excellent protection with policies and anti-spam capabilities
Pros and Cons
  • "It's a fairly old solution, however, that has been updated over time to become one of the best manufacturers of security solutions."
  • "The cost is high when putting through Check Point Blade in your Gateway."

What is our primary use case?

It has helped us to avoid large amounts of spam, which consumed space in our online exchange. 

With this, we also avoid expenses and also protect our users.

Protection policies were easy to implement to protect us from existing threats.

This tool is very good. It can be included through the anti-spam blade in our Check Point Gateway and is an easy implementation. The product helped us avoid threats from non-permitted domains and control domains with IPs reported as fraudulent or as threats.       

How has it helped my organization?

Check Point solutions are very good. It's a fairly old solution. However, that has been updated over time to become one of the best manufacturers of security solutions.

Check Point Anti Spam is a very interesting and good tool. It has helped us a lot against modern threats, spam, and domains that are marked as threats. In this way, we have improved business security,

The solution has also been modernized in Harmony. However, this solution is included in our Gateway and makes it easier to use.

It's improved against email attacks greatly.

What is most valuable?

This tool provides several quite interesting features:

1- Ease of Implementation through Check Point Security Management makes it so that it can be implemented through your blade.

2- The blocking policies are very effective. You can provide denial policies by IPs or even by reputation.

3- Monitoring what happens in the perimeter helps verify the tool's behavior in the face of threats, in addition to improving some current vulnerabilities to debug better as we spend time with the tool.

It is an easy-to-use, very good tool.

What needs improvement?

The tool is modernized by Check Point Harmony anti-spam. They can also modernize the tool through their blade.

At the Check Point support level, it has a great slope since the support language is only in English. Service hours are sometimes difficult to find an agent in Latin American hours, so a support case may take longer to resolve than expected.

The cost is high when putting through Check Point Blade in your Gateway.

The documentation is not so easy to validate. Some new users in the Check Point environment have a hard time. Therefore, the guides should be more intuitive.

Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
April 2024
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,479 professionals have used our research since 2012.

For how long have I used the solution?

We currently have a Check Point Gateway administrator through the Check Point Infinity Portal, with the Smart Cloud, where we were able to easily add the anti-spam blade, used for a while with excellent results.

Which solution did I use previously and why did I switch?

We used email security and anti-spam tools from Microsoft. However, we prefer to have all security solutions centralized.

What's my experience with pricing, setup cost, and licensing?

The cost depends on the license that is acquired. Sometimes adding the license later is somewhat high.

I recommend getting a good  Check Point vendor so they can help you with the requirements and costs as they are not that easy to find.

Which other solutions did I evaluate?

We have tested and validated other solutions such as those of Microsoft. However, it is more suited to what is sought in these solutions with  Check Point.

What other advice do I have?

The tool is very good. However, they must validate if it meets expectations. There are already more modern tools that do the same at the Check Point level.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Good modern tool - Excellent Blade
Pros and Cons
  • "Due to its technology, monitoring, and manufacturer features, we have been able to reduce the intrusion of spam and other threats that can be uploaded via email."
  • "It is expensive but worth it."

What is our primary use case?

Our need was to be able to provide greater security to business e-mail, avoid possible threats and completely reduce vulnerabilities within our perimeter, realizing that we could use our checkpoint gateway and security management to, through the anti-spam and email security blade, provide business users an additional layer of security do not hesitate to purchase this modern security tool, part of the family of checkpoint tools.

In this way, checkpoint has improved perimeter security by avoiding spam emails within our infrastructure.

How has it helped my organization?

Check Point Anti-Spam and Email Security Software Blade has helped us considerably to improve the company's email experience because due to its technology, monitoring and manufacturer features we have been able to reduce if not completely almost completely the intrusion of spam and spam. other threats that can be uploaded via email.

Thanks also to its anti-spam policies where we can block from a domain, an email subject or any header any type of spam in the company, also thanks to its alerts we can be completely updated about what is happening around our infrastructure.

It also has a large database that is continuously validated to find IPs cataloged with a spam reputation to avoid being able to accept this type of email or domain.

What is most valuable?

With checkpoint blade anti-spam and email security software we have found great features that helped us protect our infrastructure and email, such as:

-Anti spam policies controlled by reputation, domain, ips, which generated greater control and complete reduction of spam in the company.

-Blade integration with our gateway system.

-Complete administration from checkpoint security management server.

- Easy handling and intuitive administration.

It really is easy, powerful and safe for our company, we liked what it gave us.

For how long have I used the solution?

We have been using Blade for at least two years. We have managed to improve the security experience of our business email.

What do I think about the stability of the solution?

We have had no problems with the performance of the firewalls.

What do I think about the scalability of the solution?

It performs quite well in cluster solutions or VSS provisioned in Azure.

Which solution did I use previously and why did I switch?

Previously we used security functions of Microsoft 365, however we wanted to modernize ourselves with a robust tool, which had prestige in addition to centralizing our security environments, for which we preferred to use checkpoint.

What's my experience with pricing, setup cost, and licensing?

The solutions are excellent, expensive but worth it, you could verify some POC to be able to verify it in a test environment, and verify if it adjusts to the needs of your company.

Which other solutions did I evaluate?

If correct, every serious company should always be able to verify the existing options in the market, cisco, fortinet, microsoft among others.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
April 2024
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,479 professionals have used our research since 2012.
ALEXANDER STEPHENS - PeerSpot reviewer
Security Lead at Global New Age Media
Real User
Top 10
Easy to use and fast with a good signature database
Pros and Cons
  • "We now have better security and fewer false positives."
  • "Installation time could be improved as it takes too long to install."

What is our primary use case?

It is improving our company's security posture.

How has it helped my organization?

We now have better security and fewer false positives.

What is most valuable?

The antivirus is easy to use and fast with a good signature database that is updated in real-time.

What needs improvement?

Installation time could be improved as it takes too long to install. With the software footprint, it should be taking less than the time it took to install. In the future, I hope to see faster installation and easier installation on our platform as time is equal to money.

For how long have I used the solution?

I've used the solution for three months.

Which solution did I use previously and why did I switch?

I did not use a different solution previously.

How was the initial setup?

The initial setup was good.

What's my experience with pricing, setup cost, and licensing?

The product offers a good price.

Which other solutions did I evaluate?

I did not evaluate a different solution. 

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Information Technology Support Analyst at a financial services firm with 11-50 employees
Real User
Though the tool is highly reliable owing to its exceptional stability, it can be difficult to scale up
Pros and Cons
  • "Check Point Anti-Spam and Email Security Software Blade is quite reliable...It is a very stable solution."
  • "The solution's technical support is an area with shortcomings that need to be improved for the better."

What is our primary use case?

What we use in our company from Check Point is not software. We use a box from Check Point, and in that box, we have Check Point Firewall with all those features, like antivirus, web security, etc. It has all the software, so it's not a single software on our systems.

We use Check Point products, which have been good so far. I think the solution has reached the end-of-life stage because we are facing CPU usage issues. There is a need to change something in the solution to make it stronger.

We are a financial institution that requires a certain level of security, so we use Check Point Anti-Spam and Email Security Software Blade.

What is most valuable?

Check Point Anti-Spam and Email Security Software Blade is quite reliable. The solution had stayed reliable up until recently when we applied new updates while having a high memory usage which ultimately affected our network traffic. So far, the solution has been good.

What needs improvement?

The solution's technical support is an area with shortcomings that need to be improved for the better.

For how long have I used the solution?

I have four years of experience with Check Point Anti-Spam and Email Security Software Blade. I need to confirm the version of the solution I use.

What do I think about the stability of the solution?

It is a very stable solution.

What do I think about the scalability of the solution?

It's expensive right now if someone plans to scale up. One needs to pay a lot to get bigger scalability. The scalability of the solution can be very difficult.

We currently have 40 users in our company using the solution.

How are customer service and support?

I rate the technical support an eight out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

I joined my current company after the setup phase.

The solution is deployed on-premises.

What was our ROI?

The worth of the solution depends on one's needs.

What's my experience with pricing, setup cost, and licensing?

The solution is expensive.

I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive.

We have to make yearly payments towards the licensing cost. The additional cost in excess of the licensing cost is done for the support.

Which other solutions did I evaluate?

We evaluated solutions like Sophos and Juniper in our company.

What other advice do I have?

I recommend those planning to use the solution to check their number of users, the solutions you need, along with the products or services you specifically need to run some other solutions.

The solution is difficult to scale up.

Overall, I rate the solution a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Top 5Leaderboard
Non-invasive, easy to deploy, and quick to configure
Pros and Cons
  • "The functionality is better."
  • "Many would love to have this solution and be able to manage it from any device, including native applications or applications that can be installed on devices such as Android or iOS."

What is our primary use case?

Our organization had the need for an efficient way to solve problems surrounding mail, as there are constant places or niches for attackers to strike. We were looking for a solution that could collaborate and integrate in a stealthy and minimally invasive way to protect each of our collaborators and work groups. We had the opportunity to use this solution to assist us with security.

How has it helped my organization?

Check Point Anti Spam and Email Security has given some of the most value to each one of the collaborators of our organization. Once it is installed, it is not invasive. It has not unnecessarily blocked or prevented the normal operation of the users. The product is easy to deploy, quick to configure, and gives added value to each of our users, our accounts, and our organization. It ensures we are protected at all times. It is one of the best solutions we can have in our organization.

What is most valuable?

One of the most outstanding characteristics it has given to our organization and each of our collaborators is that it is not very invasive. The installation has been easy for us and has given us better service than the last generation. It is no longer like the old applications where we had to install user-by-user. The functionality is better. You can place it on your computers, and it is faster when deploying and protecting each one of our accounts. It's helped us avoid a great number of attacks.

What needs improvement?

What I would like to see in the future are new features that can be implemented in this solution. Many would love to have this solution and be able to manage it from any device, including native applications or applications that can be installed on devices such as Android or iOS. We'd like to gradually adopt portability and teleworking capabilities so users can really be anywhere with administrators able to help and give value to our users inside or outside the organization.

For how long have I used the solution?

I've used the solution for about two years.

What do I think about the stability of the solution?

It is one of the most stable solutions. It is worth emphasizing that one of my common uses is to have it established in one of the solutions that are in a cluster, and this gives double stability. 

What do I think about the scalability of the solution?

The solution is quite scalable. It will depend a lot on the capabilities of the SOAP where I have that function enabled. It's fast and simple to scale if I need more computing power.

How are customer service and support?

I had the need for specialized support in Spanish. However, there are only specialists in the English-speaking language, and that has, in some cases, limited support. It's an issue when it is carried out by a third party or a different technician who does not have the capacity or the fluency to speak fluently in English. It is worth emphasizing that the best experts have always given us the most concern in Spanish.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Top 5Leaderboard
Non-invasive, protects from spam, and detects problems fast
Pros and Cons
  • "It has provided us with an easy way to avoid invasive mail."
  • "While we often take advantage of Check Point's cloud part, including Infinity or Harmony, I would like to see products that directly deal with mobile or native environments or other operating systems that we have within the organization."

What is our primary use case?

We use the solution for perimeter safety and to protect emails. Initially, we activated Check Point to offer greater protection against spam and attacks so that our users are safe as our organization is attacked often.

How has it helped my organization?

We managed to give users a non-invasive tool so that they are protected. The solution protects us as long as we are not executing large workloads. It's simple to administer. It's helped our organization detect problems faster when analyzing events, and it is very efficient - even when implementing new functions or configurations within the established policies. 

What is most valuable?

It has provided us with an easy way to avoid invasive mail. When users are constantly receiving advertising attacks, it helps to offer verification of the domains from each of those alerts and to have filtering without the need to get directly to the user. It provides users with less noise when receiving emails. They do not get unnecessary emails and spam has largely stopped. 

What needs improvement?

Today, we have several solutions that give us added value in the catalog of services. While we often take advantage of Check Point's cloud part, including Infinity or Harmony, I would like to see products that directly deal with mobile or native environments or other operating systems that we have within the organization. 

For how long have I used the solution?

I've used the solution for three years.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
System and Network Administrator at Auriga - The banking e-volution
Real User
Would benefit from aggregate logging capabilities, and it does not scale to large email volume
Pros and Cons
  • "This product integrates well and is easy to manage."
  • "It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting."

What is our primary use case?

Like any company, we needed an antispam product so we implemented this solution.

Buying this blade was convenient from an economic point of view and we took advantage of it to have a product that is both well-integrated and easy to manage.

How has it helped my organization?

At first, it seemed like a good solution but it wasn't; we have the mail server on site.

After six months, the mail was in fits and starts and the Check Point infrastructure was not responding properly. We realized that we were under a strong spam attack and had to install another antispam product. We were lucky enough to be supported by the Check Point team of specialists, who helped us to identify and solve the problem.

In fact, analyzing the logs was not something that was evident at first sight. 

What is most valuable?

This product integrates well and is easy to manage.

It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email.

It is useful for having alerts on the e-mail traffic trend.

What needs improvement?

Determining areas for improvement is not a question that can be answered simply. I think we should separate the antispam engine into two parts; the first that breaks down mass spam, and the second for refinement.

It would be good to dedicate a separate core at least for the first phase so that it does not take away resources from the system. The ideal approach would be to enrich the product with more functions but this I imagine would also lead to an increase in cost.

It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting.

For how long have I used the solution?

We have been using the Check Point Anti-Spam and Email Security Software Blade for six months.

What do I think about the stability of the solution?

For small mail flows, this product is stable.

What do I think about the scalability of the solution?

This solution is ideal for a small business or if you have a mail server in the cloud and most of the spam is blocked by the provider. It is not good for large email flows. If you require or move to large mail flows, the solution needs to be changed.

How are customer service and technical support?

Third-party customer service was excellent and the technical team is highly skilled.

Which solution did I use previously and why did I switch?

Previously, there was no specific solution and we relied on the local antispam engine installed on the clients.

How was the initial setup?

The initial setup is simple and it takes just a few steps.

What was our ROI?

Our ROI is in line with the investment.

What's my experience with pricing, setup cost, and licensing?

This is a simple system with a very low cost and basic functions, which surely is ideal for a small company. 

Which other solutions did I evaluate?

We tried Apache SpamAssassin but it was difficult to integrate it into our environment.

What other advice do I have?

Unfortunately, the product has not proved up to par. Every component has to do its job; it is an excellent advanced firewall solution and we cannot expect it to do everything but the Spam and Email Blade must do its job well as Check Point does.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
IT Professional
Vendor
Without this product, we would get 100,000 pieces of spam daily
Pros and Cons
  • "Mail sanitisation features are second to none."
  • "The UX/UI could be more friendly."

What is most valuable?

Mail sanitisation features are second to none.

How has it helped my organization?

  • Without this product, we would get 100,000 pieces of spam daily.
  • With it, we have greater system performance.

What needs improvement?

The UX/UI could be more friendly.

For how long have I used the solution?

10 years.

What do I think about the stability of the solution?

No.

What do I think about the scalability of the solution?

No.

How are customer service and technical support?

Outside of official channels, we could not find a lot of sources of technical material. However, the tech support and documentation provided were adequate.

Which solution did I use previously and why did I switch?

Yes, I previously used a GFI solution. I switched because the GFI solution worked with the Microsoft ISA firewalls and I moved to a different platform.

How was the initial setup?

It was relatively straightforward.

Which other solutions did I evaluate?

Yes, I looked at a few others. This had a higher spam removal percentage.

What other advice do I have?

Spam percentage of more than 98%. It is one of the best products that I have used.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Product Categories
Email Security
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.