Find out what your peers are saying about Microsoft, Abnormal AI, Proofpoint and others in Email Security.
Since deploying Check Point Anti-Spam and Email Security Software Blade, we are blocking around 70 to 80% of spam and phishing attempts at the gateway.
I have seen a return on investment with Check Point Anti-Spam and Email Security Software Blade, as I have saved money and time.
Initially, we spent two to three days on the investigation process, but now we are able to investigate alerts in only half a day, which has really boosted our performance and shown a return on investment.
The product is affordable and provides excellent coverage and protection across multiple platforms.
I have seen a return on investment with Check Point Harmony Endpoint, as it has saved money and time due to the minimum disruption of production hours, which allows users to focus on their main tasks and desired targets, avoiding downtime and contributing to business growth.
Sometimes the Check Point support has issues as they do not respond immediately when I log a ticket and sometimes they lag.
The customer support for Check Point Harmony Endpoint deserves a rating of 10.
We use premium support, and it is beneficial as 24/7 support is available.
I have opened several cases and they were handled very efficiently and quickly.
The scalability is excellent because it provides real-time licenses for the mailboxes I want to scan.
The scalability of Check Point Anti-Spam and Email Security Software Blade is superb, deserving 10 out of 10.
As our traffic has grown, the solution scales smoothly by simply adjusting the gateway resources and license.
We initially purchased only 100 licenses and as we grew, we acquired many more licenses without encountering any issues.
Proactive features help guard against data breaches and vulnerabilities.
Allowing us to add more users or endpoints for protection as our organization grows without any issues.
Check Point Anti-Spam and Email Security Software Blade is very stable and reliable for me.
The stability of the tool is high, as I have not experienced any downtime.
Occasionally, there are some backend issues where the tenant is down, but apart from that, Check Point Harmony Endpoint is stable and working effectively.
Check Point Harmony Endpoint is stable and we can improve our scalability significantly with it.
The interface is a bit overwhelming with information overload for someone new to it.
More documentation for Check Point Anti-Spam and Email Security Software Blade would be helpful to help new users get started more easily.
A more real-time dashboard would make it easier, and while the detection is strong, false positive tuning is sometimes needed as occasional legitimate emails get flagged as spam and phishing.
Principally regarding the system performance, Check Point Harmony Endpoint impacts us significantly, and addressing this issue would make a substantial difference.
Better technical support would enhance the product's competitiveness.
High resource consumption, requiring high-performance PCs on our endpoint site.
The setup cost is a little expensive.
The setup cost was minimal beyond the gateway itself.
My experience with pricing, setup cost, and licensing for Check Point Anti-Spam and Email Security Software Blade is that it is somewhat costlier, but we are getting the expected output for what we paid.
It is not expensive and provides comprehensive coverage.
Pricing is a bit expensive but justified by the product’s features, capabilities, and scalability.
The pricing for Check Point Antivirus is a bit higher compared to other vendors or standalone antivirus options.
The most valuable feature for me is real-time detection and remediation.
The real-time threat intelligence and advanced phishing detection make a big difference in our day-to-day work because since deploying them, we have seen a noticeable drop in the phishing emails reaching end-user inboxes, which reduces the number of security incidents that we need to investigate and saves time for the SOC team.
This solution helps us stop spams, phishing, malicious attachments, email-based threats, and attacks on mail infrastructure.
Check Point Harmony Endpoint protects our company by warning us against clicking any malicious links and prevents our hosts from becoming vulnerable to cyber attacks.
The anti-ransomware and threat emulation features have significantly helped our organization as they prevent attackers from encrypting files during ransomware attacks, allowing the system to re-decrypt files and restore them to their original forms, effectively stopping ransomware attacks.
Check Point Harmony Endpoint offers top tier security, AI-powered threat prevention, and strong scalability, which stand out as the best features.
Product | Market Share (%) |
---|---|
Check Point Anti-Spam and Email Security Software Blade | 0.8% |
Microsoft Defender for Office 365 | 11.4% |
Proofpoint Email Protection | 8.2% |
Other | 79.6% |
Product | Market Share (%) |
---|---|
Check Point Harmony Endpoint | 2.5% |
Microsoft Defender for Endpoint | 9.9% |
CrowdStrike Falcon | 7.9% |
Other | 79.7% |
Company Size | Count |
---|---|
Small Business | 24 |
Midsize Enterprise | 12 |
Large Enterprise | 18 |
Company Size | Count |
---|---|
Small Business | 113 |
Midsize Enterprise | 68 |
Large Enterprise | 75 |
Check Point Anti-Spam and Email Security Software Blade is a comprehensive solution designed to protect organizations from the growing threat of spam and email-based attacks. With advanced threat prevention capabilities, it ensures that businesses can effectively manage their email security and prevent the infiltration of malicious content.
This software blade offers a multi-layered approach to email security, combining anti-spam, anti-virus, and anti-phishing technologies to provide robust protection against a wide range of threats. It employs advanced machine learning algorithms to continuously analyze and identify new spam and phishing techniques, ensuring that organizations stay one step ahead of cybercriminals.
The Anti-Spam and Email Security Software Blade also includes advanced content filtering capabilities, allowing organizations to define and enforce email policies based on specific criteria. This ensures that sensitive information is protected and that employees are not exposed to potentially harmful content.
Furthermore, this software blade integrates seamlessly with existing email infrastructure, making deployment and management simple and efficient. It supports all major email platforms, including Microsoft Exchange and Office 365, ensuring compatibility with a wide range of environments.
With real-time monitoring and reporting capabilities, organizations can gain valuable insights into their email security posture. This enables them to identify potential vulnerabilities and take proactive measures to mitigate risks.
Check Point Harmony Endpoint provides advanced threat prevention with centralized management and seamless integration, safeguarding networks through robust security features and real-time threat detection. It excels at ransomware prevention, encryption protection, and detailed threat analysis.
Check Point Harmony Endpoint is renowned for its comprehensive security features, including anti-ransomware capabilities and centralized management. It integrates seamlessly with existing systems, enhancing network protection through features like SandBlast Agent and threat emulation. Organizations benefit from significant incident reductions, utilizing its powerful threat detection, forensics, VPN capabilities, and robust encryption measures. Centralized management during remote work setups and enhanced security through URL filtering and rollback mechanisms further solidify its efficiency. Despite its high resource consumption and configuration challenges, it remains a preferred choice among enterprises aiming to enhance cybersecurity measures.
What Key Features Does Check Point Harmony Endpoint Offer?In sectors such as finance and healthcare, Check Point Harmony Endpoint is crucial for maintaining data security and regulatory compliance. Its features cater to endpoint protection requirements across industries, providing reliable solutions for encryption and cybersecurity challenges. The tool's deployment across diverse environments secures endpoint systems effectively, ensuring uninterrupted operations amid evolving threats.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.