Try our new research platform with insights from 80,000+ expert users
Priyanshu Kumar - PeerSpot reviewer
Information Technology Specialist at a tech services company with 10,001+ employees
Real User
Top 20
Sep 30, 2022
Great threat detection, spam, and email blocking
Pros and Cons
  • "Check Point Anti-Spam & Email Security software is a modern-day solution for security management and data scrutiny."
  • "They should upgrade support services and make a more user-friendly database."

What is our primary use case?

We basically use the solution for threat detection, spam, email blocking, and security against organized email phishing attacks as well as data security management. Nowadays, this has been a prime concern for organizations and working professionals.

These use cases of Check Point Anti-Spam & Email Security software make it one of the prime products and is highly recommended. It is a must-have integrated product.

Check Point Anti-Spam & Email Security software is a modern-day solution.

How has it helped my organization?

Check Point Anti-Spam & Email Security served out to be highly productive for my organization. It's great for management and data security and generates innovation and growth.

Check Point Anti-Spam & Email Security software is a modern-day solution for security management and data scrutiny.

In short, I highly recommend the product.

What is most valuable?

There are highly productive features, including threat detection, spam, email blocking, and security.

It's great against organized email phishing attacks and offers advanced 2FA authentication.

There is third-party integration possible. There are many other customized tools that can act as a booster to some already great services. 

It creates a healthy environment for mass adoption of Check Point Anti-Spam & Email Security.

What needs improvement?

Check Point Anti-Spam & Email Security is a highly organized tool with many benefits. However, they should upgrade support services and make a more user-friendly database. That would help with higher integration and adoption.

Check Point Anti-Spam & Email Security software as a platform will catch the eyes of large organizations and MNCs as security concerns have risen significantly in recent years.

Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
December 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.

For how long have I used the solution?

I have been integrating with this software since last year.

Which solution did I use previously and why did I switch?

I haven't dealt with any other software.

What's my experience with pricing, setup cost, and licensing?

The pricing is in the mid to high range. It's affordable and the setup is smooth.

Which other solutions did I evaluate?

I haven't evaluated any other solution. Some other colleagues already recommended it.

What other advice do I have?

Just go for it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at a tech services company with 51-200 employees
Real User
Top 20
Sep 5, 2022
Good anti-spam capabilities with easy management and regional blacklisting
Pros and Cons
  • "This solution helped us lock down and have our infrastructure easier to manage."
  • "I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal."

What is our primary use case?

Check Point Anti-Spam and Email Security Software Blade is one of the valuable features that we have available in quantum equipment. It gave us that layer of protection and event solutions to safeguard the security of events and activities. In our network, it's analyzing everything that enters our network or leaves it.

Among the attacks that we had to avoid events by SMTP, POP, or DDoS, and additionally, protect ourselves from image or language attacks. We've been able to block regions by IP addresses or locations.

How has it helped my organization?

We currently have several regions blocked by blacklisted IP addresses or insecure domain senders, thus raising the level of protection that the institution has. We use this feature frequently due to our mail service, which is a hybrid service.

This solution helped us lock down and have our infrastructure easier to manage.

We've solved protection against buffer overflow that has caused our server to freeze or be slower when receiving or sending emails.

What is most valuable?

The anti-spam feature helps to verify the reputation of the databases in a reputational way. It manages to compare each request with a complete base of IP addresses. This layer eliminates around 70 percent of the attacks that enter through and are part of the most common attacks that our less expert users receive. We are now capable of differentiating this type of incident. This database is constantly updated to protect the equipment and thus validate if these addresses.

What needs improvement?

I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal, thus being even more cloud-based in its management. Among the things that I would also like would be an application for cell phones where you can manage this type of event, if required, be it Android or iOS. It would thus be more disruptive by taking advantage of market demands and ensuring protection.

For how long have I used the solution?

I've used the solution for two years.

How was the initial setup?

The solution is easy to install and enable.

What's my experience with pricing, setup cost, and licensing?

Its cost is quite high and its package is sold as an additional license.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
December 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,371 professionals have used our research since 2012.
Executive IT Operations at a pharma/biotech company with 1,001-5,000 employees
Real User
Jan 20, 2022
Next Gen and SandBlast technology are good for stopping attacks
Pros and Cons
  • "A scalable, stable solution with good technical support."
  • "The pattern used to filter emails could be improved"

What is our primary use case?

We are using 5400, 6700 and 6900 versions of the hardware in our company. We have approximately 1,600 users.

What is most valuable?

I find the Next-Gen firewall with SandBlast technology the most valuable feature. It is good for stopping attacks.

What needs improvement?

In terms of anti-spam and email, the pattern that they use to filter the emails could be improved. There are too many normal emails being considered spam. There should be an option to learn the different patterns specific to the organization where it is being deployed.

For how long have I used the solution?

I have been working with this product for more than three years.

What do I think about the stability of the solution?

The product is stable.

What do I think about the scalability of the solution?

The product is scalable.

How are customer service and support?

Technical support by Check Point is good.

Which solution did I use previously and why did I switch?

We previously used a third-party product that was hosted in the cloud.

How was the initial setup?

The initial setup is a bit complex. Training the IT admins how to use, understand, and configure Check Point Anti-Spam and Email is a bit complex.

What about the implementation team?

We have four people in-house for maintenance of the solution.

What's my experience with pricing, setup cost, and licensing?

The pricing of Check Point Anti-Spam and Email Security is reasonable.

What other advice do I have?

Check Point Anti-Spam and Email Security is a good product. For a bigger organization, they should consider that the pattern for determining spam does need to be more developed or enhanced.

I would rate this product a 7 out of 10.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Chief Information Security Officer at a financial services firm with 10,001+ employees
Real User
Top 10
Apr 2, 2021
Good support and reporting, but the multi-appliance setup process is complex
Pros and Cons
  • "The solution can be monitored on a single dashboard with actionable insights and reporting."
  • "It does not provide for standalone configuration on the security gateway. Instead, you need to have a management server/smart console for managing it."

What is our primary use case?

The primary use case is to protect the organization from any attack generated via email. As most of the attacks in recent days are via email, the organization has to be equipped and ready to mitigate this type of attack at the perimeter level, before it has been delivered to the user mailbox or endpoint.

Basic anti-spam filters are not capable of protecting against the latest generation of attacks. So, for protecting the organization against this sophisticated or targeted attack, we concluded that the next generation of Email Security solutions is a must. Ultimately, it should be able to protect against any attack that is sent via email.

How has it helped my organization?

This product prevents sophisticated attacks, such as:

  • Phishing Email attacks such as impersonation, spear-phishing, and business email compromise
  • Account Takeover protection, where the primary aim of an attacker is to steal user credentials
  • Protection against malicious files, malicious attachments, and malware. The primary aim of this kind of email is to infect user machines and steal data, or injecting malicious code on a machine so that they can move laterally and infect other machines within the organization, or perform a ransomware attack 
  • Protection against data leakage that can be caused by an aforementioned attack, which can result in financial loss or reputation damage to the organization 

What is most valuable?

This solution is hosted in an inline mode for the protection of inbound, outbound, and internal email communication. It does not require any change in MX entry on the DNS Server for routing traffic to the service provider for Email Security.

The complete solution can be hosted on-premises for environments where the organization has an on-premises email solution, and it will remain invisible to the attacker.

This solution can be integrated with SandBlast Technology provided by Check Point and its most effective solution is breach prevention. 

It can be extended to the cloud as well, for protecting cloud-hosted email.

The solution can be monitored on a single dashboard with actionable insights and reporting.

What needs improvement?

Our solution required multiple appliances, as a single appliance only supports up to 5,000 files. This means that depending upon the number of files that need to be processed, the number of appliances needs to be increased. Essentially, the number of appliances needs to be sized accordingly for complete protection. The increase in the number of appliances makes it difficult to manage in terms of physical connectivity and configuration.

The product performs only basic anti-spam capabilities, compared to CloudGuard SaaS, which provides more robust anti-spamming functionality than the on-premises solution. 

YARA rules can be added only using the CLI, rather than through the GUI, which makes it difficult for the administrator.

For how long have I used the solution?

We are not using the Check Point Anti-Spam and Email Security Software Blade at this moment. 

What do I think about the stability of the solution?

This solution is stable.

What do I think about the scalability of the solution?

This product is easily scalable and a number of devices can be added whenever it is required.

How are customer service and technical support?

The support and our experience with the OEM were excellent.

Which solution did I use previously and why did I switch?

Previously, we were using the email gateway along with an additional license to protect against email attacks on the same gateway.

How was the initial setup?

Setting up the product is complex. In the case of a single appliance, it is simple. However, it becomes complex with several appliances.

What about the implementation team?

The solution was implemented with our in-house team along with the OEM.

What's my experience with pricing, setup cost, and licensing?

The setup is complex, as it is dependent on the number of files that need to be processed via the email security appliance.

The cost is competitive with other security products on the market. 

Which other solutions did I evaluate?

We evaluated similar solutions by Cisco & Trend Micro.

What other advice do I have?

This solution should be designed to support all functionality, including use as an email gateway in case the functionality is required, as well as having a strong anti-spam module 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Evans Vs - PeerSpot reviewer
Engineer at a consultancy with 201-500 employees
User
Top 5Leaderboard
Jul 31, 2024
Excellent real-time threat detection, good prevention capabilities and helpful sandboxing
Pros and Cons
  • "Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security."
  • "The solution could be improved by reducing false positives."

What is our primary use case?

The primary use cases for Check Point Anti-Spam and Email Security Software Blade are anti-spam, anti-malware, anti-phishing, content filtering and threat prevention. 

How has it helped my organization?

Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security, increasing productivity, improving compliance, reducing IT support costs, and improving threat visibility.

What is most valuable?

Features like real-time threat detection and prevention, advanced threat intelligence, sandboxing, data loss prevention, and its user-friendly management console make it a very good solution.

What needs improvement?

The solution could be improved by reducing false positives, optimizing performance, improving the user interface, and integrating with other security solutions.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Technical support is okay.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, I didn't use any different solution.

How was the initial setup?

The initial setup was good.

What about the implementation team?

Our internal team managed the initial setup process. 

What was our ROI?

The ROI has been okay.

Which other solutions did I evaluate?

I didn't evaluate any other product.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Evans Vs - PeerSpot reviewer
Engineer at a consultancy with 201-500 employees
User
Top 5Leaderboard
Jul 30, 2024
Reduces spam, enhances security, and improves compliance
Pros and Cons
  • "The most valuable features of the solution include advanced threat detection."
  • "User experience can be improved."

What is our primary use case?

The primary use cases of this solution include spam filtering, malware protection, phishing prevention, data loss prevention, email continuity, and threat intelligence.

How has it helped my organization?

This solution helped us reduce spam, enhance security, improve compliance, and increase user satisfaction and cost efficiency.

What is most valuable?

The most valuable features of the solution include advanced threat detection, real-time threat intelligence, data loss prevention, email continuity, a user-friendly interface, detailed reporting and analytics.

What needs improvement?

User experience can be improved. 

Performance can be improved in terms of speed, reliability, and scalability. 

The solution can also be improved in terms of features and customer support.

For how long have I used the solution?

I have been using the solution for the past two years.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Technical support should be improved.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No, I did not use a different solution. 

How was the initial setup?

The initial setup was good.

What about the implementation team?

We implemented the solution via an in-house team.

What was our ROI?

The ROI is good.

What's my experience with pricing, setup cost, and licensing?

The licensing and pricing can be improved.

Which other solutions did I evaluate?

No, I did not evaluate other options.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Saurabh-Pal - PeerSpot reviewer
Sr. Security Specialist at a tech vendor with 11-50 employees
Real User
Apr 25, 2023
Very efficient, stable, with great customer support
Pros and Cons
  • "This solution is very efficient."
  • "If you face any configuration problems, Check Point is the only solution."

What is our primary use case?

Our customers used this product for internet security, anti-virus, and remote browsing. We are system integrators and worked with Check Point as managed service providers up until a few months ago. I'm a senior security specialist.

What is most valuable?

This solution is very efficient. 

What needs improvement?

If you face any configuration problems, you have to involve the Check Point team so they can verify their software.

For how long have I used the solution?

Until recently, we were integrators of this solution for five years. 

What do I think about the stability of the solution?

The stability is generally good if there are no power-related issues. 

What do I think about the scalability of the solution?

The scalability is very good. 

How are customer service and support?

The customer support is excellent - if you're facing any problems, you can write to the Check Point team and you'll receive an immediate reply. 

How was the initial setup?

The setup of this solution is complex because it has the concept of software blade instead of appliance which is something that only CheckPoint can identify. Deployment generally takes about a week and requires an engineer.   

What's my experience with pricing, setup cost, and licensing?

Palo Alto is very expensive compared to other solutions. 

What other advice do I have?

If you're a software company, I recommend this solution and rate it nine out of 10. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5
Feb 20, 2023
Excellent protection with policies and anti-spam capabilities
Pros and Cons
  • "It's a fairly old solution, however, that has been updated over time to become one of the best manufacturers of security solutions."
  • "The cost is high when putting through Check Point Blade in your Gateway."

What is our primary use case?

It has helped us to avoid large amounts of spam, which consumed space in our online exchange. 

With this, we also avoid expenses and also protect our users.

Protection policies were easy to implement to protect us from existing threats.

This tool is very good. It can be included through the anti-spam blade in our Check Point Gateway and is an easy implementation. The product helped us avoid threats from non-permitted domains and control domains with IPs reported as fraudulent or as threats.       

How has it helped my organization?

Check Point solutions are very good. It's a fairly old solution. However, that has been updated over time to become one of the best manufacturers of security solutions.

Check Point Anti Spam is a very interesting and good tool. It has helped us a lot against modern threats, spam, and domains that are marked as threats. In this way, we have improved business security,

The solution has also been modernized in Harmony. However, this solution is included in our Gateway and makes it easier to use.

It's improved against email attacks greatly.

What is most valuable?

This tool provides several quite interesting features:

1- Ease of Implementation through Check Point Security Management makes it so that it can be implemented through your blade.

2- The blocking policies are very effective. You can provide denial policies by IPs or even by reputation.

3- Monitoring what happens in the perimeter helps verify the tool's behavior in the face of threats, in addition to improving some current vulnerabilities to debug better as we spend time with the tool.

It is an easy-to-use, very good tool.

What needs improvement?

The tool is modernized by Check Point Harmony anti-spam. They can also modernize the tool through their blade.

At the Check Point support level, it has a great slope since the support language is only in English. Service hours are sometimes difficult to find an agent in Latin American hours, so a support case may take longer to resolve than expected.

The cost is high when putting through Check Point Blade in your Gateway.

The documentation is not so easy to validate. Some new users in the Check Point environment have a hard time. Therefore, the guides should be more intuitive.

For how long have I used the solution?

We currently have a Check Point Gateway administrator through the Check Point Infinity Portal, with the Smart Cloud, where we were able to easily add the anti-spam blade, used for a while with excellent results.

Which solution did I use previously and why did I switch?

We used email security and anti-spam tools from Microsoft. However, we prefer to have all security solutions centralized.

What's my experience with pricing, setup cost, and licensing?

The cost depends on the license that is acquired. Sometimes adding the license later is somewhat high.

I recommend getting a good  Check Point vendor so they can help you with the requirements and costs as they are not that easy to find.

Which other solutions did I evaluate?

We have tested and validated other solutions such as those of Microsoft. However, it is more suited to what is sought in these solutions with  Check Point.

What other advice do I have?

The tool is very good. However, they must validate if it meets expectations. There are already more modern tools that do the same at the Check Point level.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2025
Product Categories
Email Security
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.