Try our new research platform with insights from 80,000+ expert users

Check Point Anti-Spam and Email Security Software Blade vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Email Security
20th
Average Rating
8.8
Reviews Sentiment
6.7
Number of Reviews
22
Ranking in other categories
Secure Web Gateways (SWG) (15th), Data Loss Prevention (DLP) (21st), Cloud Access Security Brokers (CASB) (11th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (13th), Access Management (12th), Bot Management (3rd), ZTNA as a Service (8th), ZTNA (3rd), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Check Point Anti-Spam and E...
Ranking in Email Security
9th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
48
Ranking in other categories
No ranking in other categories
Trellix Collaboration Security
Ranking in Email Security
11th
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
19
Ranking in other categories
Instant Communications Security and Compliance (2nd), Secure Email Gateway (SEG) (6th), AI Security (9th)
 

Mindshare comparison

As of March 2026, in the Email Security category, the mindshare of Cloudflare One is 1.5%, down from 1.8% compared to the previous year. The mindshare of Check Point Anti-Spam and Email Security Software Blade is 0.7%, down from 0.8% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.3%, up from 2.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Mindshare Distribution
ProductMindshare (%)
Check Point Anti-Spam and Email Security Software Blade0.7%
Trellix Collaboration Security2.3%
Cloudflare One1.5%
Other95.5%
Email Security
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
AimanSayyed - PeerSpot reviewer
Program Lead at DigitalTrack Solutions Pvt Ltd
Has significantly reduced phishing threats through proactive monitoring and centralized visibility
A specific example of how Check Point Anti-Spam and Email Security Software Blade helps protect my organization from spam or phishing is when I log in to my management console of the Check Point tool and I open the email security blade logs, and I see all the overnight status of spam, what was the spam message volume, how many phishing attempts were made, and what kind of attachments were quarantined. This gives a real-time threat intelligence and advanced detection of phishing attacks. Check Point Anti-Spam and Email Security Software Blade offers a very easy-to-use dashboard and a proactive approach. Whatever trends are observed will directly inform us. The dashboard is very easy to understand. It gives a spam detection summary where it provides a visual representation through pie or bar graphs for spam suspected or clean mails. I also really appreciate the quarantine summary as it is very descriptive and gives a quick insight into the user complaints, compliance, and backlog. The system health, such as the CPU and update types of status of signatures, is also very well represented, so it does not cause any overload. Integration with SIEM or SOC dashboards, such as QRadar which we use in the organization, is very easy via Syslog exports. This gives centralized visibility, so you do not need to check with all the other devices as one device will give you a centralized overview. Smart events are also very configurable and will give us notifications or mitigation actions, which is beneficial.
Felipe Antoniazzi - PeerSpot reviewer
Cybersecurity Engineer Lead at Johnson & Johnson
Real-time threat response has boosted detection accuracy and reduces manual investigation work
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating systems, it was necessary to create different plans and different actions to implement the product.One thing I really do not prefer in Trellix Collaboration Security is not related to the console. I am a McAfee fan since the McAfee tool, and I find the console of Trellix Collaboration Security to be very user-friendly and easy to use. However, I do not know if it is related to the architecture of the product. Of course, we have modern threats based on behaviors and zero days. We have today CrowdStrike and SentinelOne, where we have better results based on threats and behavior, where it is possible to create a simulation environment based on the file detected and based on it, confirm if it really is malicious or not. In general, I believe Trellix Collaboration Security improved the console based on the last console of McAfee, but I think it is possible to improve more. It really is a good product, but in my view, it needs to improve detection based on behaviors. Regarding automations, I have implemented Trellix Collaboration Security here at Johnson & Johnson, and I implemented it in the same situation at Santander Bank and BNP Paribas Bank, where I created automations to export data for different metrics, including malicious detections, compliance, baselines, scans, last scans based on the seven days, and checking of patterns. I export everything to CSV files. Based on that, I create Power BI dashboards, and in these Power BI dashboards, I have a more executive view for different metrics to provide to myself, my manager, or director to create an executive view based on it. Another important point we use here at Johnson & Johnson and other companies is a data hub or a SIEM solution, such as Elastic or ArcSight, where we select some logs to be sent and use it to build reports and metrics.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is a stable solution."
"This solution is easy to understand and easy to configure."
"Cloudflare, in my opinion, was easy to implement."
"The best feature is rate limiting. If I'm expecting 500 visits per hour, Cloudflare will limit the requests if I suddenly get 50,000."
"What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection."
"Cloudflare DDoS mitigates DDoS attacks."
"Using Cloudflare One makes my work quite easy because for DDoS protection, all I need to do is understand the OSI model and click; it makes it easier than trying to write a command line or use a Linux command."
"The simplicity of the solution is its valuable features as almost no effort was needed to learn the configurations. It is also one of the cheapest firewalls available in this category."
"It does a better job of recognizing spammers."
"We now have better security and fewer false positives."
"The best features of Check Point Anti-Spam and Email Security Software Blade are its security features, which help the team perform their daily tasks without having to concern for potential security breaches."
"Check Point Anti-Spam and Email Security Software Blade has impacted our organization positively by preventing threats early and provides visibility and reporting features, offering logs and dashboards so admins can see spam volumes, blocked items, and trends, including outbreaks."
"One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."
"Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization by causing a very steep drop in spam and phishing mail after implementing this, with the risk of ransomware entry now very low and around 80% of spam mails prevented."
"Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization because after deploying, we are not receiving spam mails, users are unable to send malicious files over emails to other colleagues, and it detects files and blocks them in real-time."
"The most valuable feature for me is real-time detection and remediation."
"Before installing, consider potential challenges with system performance, especially when integrating multiple tools, which could slow down performance."
"A specific example of how I have used Trellix Collaboration Security in my consulting work is in my current work environment, where I manage over 130,000 endpoints, allowing me to protect each endpoint with a firewall, which makes a significant difference because the entire network is not protected by a network firewall alone."
"FireEye Email Security is easy to use."
"Trellix Collaboration Security is valued for being a stable and comprehensive solution that fulfills customer needs."
"I rely on Trellix Collaboration Security because the sensors are highly reliable and high-performance sensors that can handle traffic efficiently."
"One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment."
"The initial setup is simple."
"Trellix Collaboration Security has positively impacted my organization by improving security, making teamwork more effective, and ensuring collaboration has become smoother."
 

Cons

"There are premium tier live service and lower tier live service, so we opted for the lower tier. But there is no medium tier where we pay a little extra and get a bit more service. So if that can be improved."
"The onboarding process can be improved a little bit."
"Lacks a VPN feature to provide a secure connection to the data center."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"The initial onboarding was causing us some confusion."
"Our customers no longer use Cloudflare because its service is subpar."
"Operating and tuning the product is difficult."
"The technical team could improve services by ensuring when there are changes they inform enterprise users of effective upgrades."
"Check Point Anti-Spam and Email Security Software Blade is not user-friendly the first time you use it."
"There's definitely room for improvement when it comes to adapting to different languages in one environment."
"The anti-spam features could be upgraded to be able to detect unnoticeable spam."
"The user should be able to perform a real-time search of the objects and see the messages."
"It does not provide for standalone configuration on the security gateway. Instead, you need to have a management server/smart console for managing it."
"While we often take advantage of Check Point's cloud part, including Infinity or Harmony, I would like to see products that directly deal with mobile or native environments or other operating systems that we have within the organization."
"User experience can be improved."
"Sometimes, integration can be challenging, impacting its stability, which is why I rate it a five out of ten."
"It really is a good product, but in my view, it needs to improve detection based on behaviors."
"The solution needs better support."
"The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"The reporting aspect of the solution needs improvement."
"In general, our company should make the tool more robust to protect our systems."
"The custom tailoring is limited."
 

Pricing and Cost Advice

"The solution is not that expensive."
"The prices are slightly expensive."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The solution's pricing lacks transparency."
"Cloudflare Zero Trust Platform's pricing is good."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
"The cost is competitive with other security products on the market."
"For licensing, my company makes yearly payments, which is expensive."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"Reasonably priced solution."
"I rate the product pricing a seven out of ten."
"This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
"The licensing is on a yearly basis."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The solution requires a license to be purchased for every user."
"The cost is very high."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
883,896 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
10%
Computer Software Company
10%
Financial Services Firm
8%
Manufacturing Company
8%
Outsourcing Company
14%
Manufacturing Company
10%
Computer Software Company
9%
Marketing Services Firm
7%
Manufacturing Company
15%
Healthcare Company
11%
Comms Service Provider
11%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise10
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise13
Large Enterprise18
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise4
Large Enterprise11
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What needs improvement with Check Point Anti-Spam and Email Security Software Blade?
At this time, I do not see anything lacking in Check Point Anti-Spam and Email Security Software Blade. It is working...
What is your primary use case for Check Point Anti-Spam and Email Security Software Blade?
My main use case for Check Point Anti-Spam and Email Security Software Blade is to protect document or file links att...
What advice do you have for others considering Check Point Anti-Spam and Email Security Software Blade?
Any organization looking for the best email security solution should consider Check Point Anti-Spam and Email Securit...
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to...
What is your primary use case for FireEye Email Security?
In my field, I have been in the information security area for 17 years, and I am currently working in my position for...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
No data available
FireEye Email Security
 

Overview

 

Sample Customers

23andMe
SF Police Credit Union (SFPCU)
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Check Point Anti-Spam and Email Security Software Blade vs. Trellix Collaboration Security and other solutions. Updated: March 2026.
883,896 professionals have used our research since 2012.