Try our new research platform with insights from 80,000+ expert users
Gaurav Amar - PeerSpot reviewer
Deputy Vice present at PVR Ltd
Real User
Top 20
Good message encryption and validation features, but the console should be more user-friendly
Pros and Cons
  • "Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network."
  • "The user should be able to perform a real-time search of the objects and see the messages."

What is our primary use case?

Check Point makes up part of our security solution in all of our locations across India. We are in the eCommerce industry and one of the things that we do is set up tickets for moviegoers.

We have categorized our requirements as per the online penetration of our booking agents. As an example, in one of our locations, we have a penetration of filling online tickets that is reaching up to 85%. It is important that this system is safeguarded to ensure that we are not exploited on the ticketing platform using the OCR codes that we are generating and sending to our customers. As the tickets are emailed to the patrons in advance of the show, it is important that this email is secure. This is one of our use cases.

How has it helped my organization?

Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network. We are a PCI DSS compliant company in India and we need to ensure that our patrons' data is protected. At the same time, we want the convenience of being able to send tickets to them. Check Point has allowed us to do that.

What is most valuable?

The features that I like the best are message encryption and message validation.

What needs improvement?

The manageability using this console is complex and it should be a little more user-friendly. If you don't have a good understanding of putting the policies in place then sometimes it is tough to manage from the console. A more intuitive GUI would make it easier to manage.

The user should be able to perform a real-time search of the objects and see the messages. As it is now, when we create an object, sometimes you find out at a later stage that the object already exists. If I could simply type an object into the search bar and find out whether it exists by seeing it in a dropdown then it would save me time.

Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
September 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,370 professionals have used our research since 2012.

For how long have I used the solution?

We have been using the Check Point Anti-Spam and Email Security Blade for two years.

What do I think about the stability of the solution?

This solution has been stable and is working very well in our environment.

What do I think about the scalability of the solution?

This is a scalable solution. We have 170 locations across India and all of them have Check Point installed. We had considered scalability from the beginning of this project, with a three to five-year plan. 

How are customer service and support?

We have been in direct contact with technical support and our experience has been that they are both nice and helpful. After the deployment was completed, the partner who assisted us had moved out and completed a knowledge transfer to the entire team. There was a subsequent issue that had to do with the VPN, and the Check Point technical support was very helpful in resolving it.

Which solution did I use previously and why did I switch?

We have used other security products by vendors such as Juniper and Palo Alto, but not for the same use cases.

How was the initial setup?

We began our implementation about two and a half years ago and as part of the process, we divided India into different regions. In total, it took us about 120 days to fully deploy across all of our locations.

What about the implementation team?

We have in-house staff who are very well versed in the Check Point technology, however, given the volume of deployment, we contracted a partner that was recommended by the vendor.

What other advice do I have?

My advice to anybody who is considering this solution is that it is a robust and reliable platform. With respect to messaging and firewall products, all of them are pretty good but it depends on your scenario. I would say that Check Point has the best security, the messaging protocols are pretty good, and the reliability is higher than competing products by Palo Alto and Juniper. When adopting Check Point, your skill is one of the key points to consider.

This is a good solution but there are certain complexities that need to be made more user-friendly. It should be more manageable from an IT perspective. This includes things such as setting up specific policies. A more intuitive GUI, for example, would help.

I would rate this solution a seven out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
ALEXANDER STEPHENS - PeerSpot reviewer
Security Lead at Global New Age Media
Real User
Top 5
Easy to use and fast with a good signature database
Pros and Cons
  • "We now have better security and fewer false positives."
  • "Installation time could be improved as it takes too long to install."

What is our primary use case?

It is improving our company's security posture.

How has it helped my organization?

We now have better security and fewer false positive and less stress .

What is most valuable?

The antivirus is easy to use and fast with a good signature database that is updated in real-time.

What needs improvement?

Installation time could be improved as it takes too long to install. With the software footprint, it should be taking less than the time it took to install. In the future, I hope to see faster installation and easier installation on our platform as time is equal to money.

For how long have I used the solution?

I've used the solution for three months.

Which solution did I use previously and why did I switch?

I did not use a different solution previously.

How was the initial setup?

The initial setup was good.

What's my experience with pricing, setup cost, and licensing?

The product offers a good price.

Which other solutions did I evaluate?

I did not evaluate a different solution. 

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Check Point Anti-Spam and Email Security Software Blade
September 2025
Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
867,370 professionals have used our research since 2012.
reviewer1572915 - PeerSpot reviewer
System and Network Administrator at Auriga - The banking e-volution
Real User
Would benefit from aggregate logging capabilities, and it does not scale to large email volume
Pros and Cons
  • "This product integrates well and is easy to manage."
  • "It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting."

What is our primary use case?

Like any company, we needed an antispam product so we implemented this solution.

Buying this blade was convenient from an economic point of view and we took advantage of it to have a product that is both well-integrated and easy to manage.

How has it helped my organization?

At first, it seemed like a good solution but it wasn't; we have the mail server on site.

After six months, the mail was in fits and starts and the Check Point infrastructure was not responding properly. We realized that we were under a strong spam attack and had to install another antispam product. We were lucky enough to be supported by the Check Point team of specialists, who helped us to identify and solve the problem.

In fact, analyzing the logs was not something that was evident at first sight. 

What is most valuable?

This product integrates well and is easy to manage.

It is certainly very beneficial for a small business and works best in combination with other Check Point blades, such as the Data Protection Blade that protects against data loss via email.

It is useful for having alerts on the e-mail traffic trend.

What needs improvement?

Determining areas for improvement is not a question that can be answered simply. I think we should separate the antispam engine into two parts; the first that breaks down mass spam, and the second for refinement.

It would be good to dedicate a separate core at least for the first phase so that it does not take away resources from the system. The ideal approach would be to enrich the product with more functions but this I imagine would also lead to an increase in cost.

It would be useful to have more logs and in aggregate mode, perhaps through a specific report, that can be more easily used for troubleshooting.

For how long have I used the solution?

We have been using the Check Point Anti-Spam and Email Security Software Blade for six months.

What do I think about the stability of the solution?

For small mail flows, this product is stable.

What do I think about the scalability of the solution?

This solution is ideal for a small business or if you have a mail server in the cloud and most of the spam is blocked by the provider. It is not good for large email flows. If you require or move to large mail flows, the solution needs to be changed.

How are customer service and technical support?

Third-party customer service was excellent and the technical team is highly skilled.

Which solution did I use previously and why did I switch?

Previously, there was no specific solution and we relied on the local antispam engine installed on the clients.

How was the initial setup?

The initial setup is simple and it takes just a few steps.

What was our ROI?

Our ROI is in line with the investment.

What's my experience with pricing, setup cost, and licensing?

This is a simple system with a very low cost and basic functions, which surely is ideal for a small company. 

Which other solutions did I evaluate?

We tried Apache SpamAssassin but it was difficult to integrate it into our environment.

What other advice do I have?

Unfortunately, the product has not proved up to par. Every component has to do its job; it is an excellent advanced firewall solution and we cannot expect it to do everything but the Spam and Email Blade must do its job well as Check Point does.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
IT Professional
Vendor
Without this product, we would get 100,000 pieces of spam daily
Pros and Cons
  • "Mail sanitisation features are second to none."
  • "The UX/UI could be more friendly."

What is most valuable?

Mail sanitisation features are second to none.

How has it helped my organization?

  • Without this product, we would get 100,000 pieces of spam daily.
  • With it, we have greater system performance.

What needs improvement?

The UX/UI could be more friendly.

For how long have I used the solution?

10 years.

What do I think about the stability of the solution?

No.

What do I think about the scalability of the solution?

No.

How are customer service and technical support?

Outside of official channels, we could not find a lot of sources of technical material. However, the tech support and documentation provided were adequate.

Which solution did I use previously and why did I switch?

Yes, I previously used a GFI solution. I switched because the GFI solution worked with the Microsoft ISA firewalls and I moved to a different platform.

How was the initial setup?

It was relatively straightforward.

Which other solutions did I evaluate?

Yes, I looked at a few others. This had a higher spam removal percentage.

What other advice do I have?

Spam percentage of more than 98%. It is one of the best products that I have used.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Product Categories
Email Security
Buyer's Guide
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions.