Try our new research platform with insights from 80,000+ expert users

Check Point Anti-Spam and Email Security Software Blade vs Trellix Collaboration Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Anti-Spam and E...
Ranking in Email Security
11th
Average Rating
8.4
Reviews Sentiment
7.2
Number of Reviews
45
Ranking in other categories
No ranking in other categories
Trellix Collaboration Security
Ranking in Email Security
18th
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Instant Communications Security and Compliance (4th), Secure Email Gateway (SEG) (8th)
 

Mindshare comparison

As of October 2025, in the Email Security category, the mindshare of Check Point Anti-Spam and Email Security Software Blade is 0.8%, up from 0.7% compared to the previous year. The mindshare of Trellix Collaboration Security is 1.8%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Market Share Distribution
ProductMarket Share (%)
Check Point Anti-Spam and Email Security Software Blade0.8%
Trellix Collaboration Security1.8%
Other97.4%
Email Security
 

Featured Reviews

Abnet Tsegaye Belay - PeerSpot reviewer
Has reduced phishing threats and provided better visibility through detailed dashboards and logging
One thing I noticed with Check Point Anti-Spam and Email Security Software Blade is that without configuring the MTA or transfer agent, it cannot work fully. The MTA feature has significant resource needs, and without it, we cannot use the full-fledged features of Anti-Spam and Email Security Blades. Its dependency on MTA is substantial. I chose 8 out of 10 for Check Point Anti-Spam and Email Security Software Blade because of the MTA dependency feature. Disabling MTA is problematic as it is very important for deploying this solution. If you want full content scanning or threat extraction and emulation, you have to enable MTA to work effectively.
BernardLugalia - PeerSpot reviewer
Provides strong data protection with virtual patching and vulnerability assessments
I primarily use it to monitor database access, particularly in banking and similar environments. It ensures that IT personnel and others do not create unauthorized accounts or users. Collaboration security assists in tracking database access and alerts in case of suspicious activity One of the…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"A scalable, stable solution with good technical support."
"Overall, the product rating is nine out of ten."
"It is easy to install, and the deployment is super easy as well."
"One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."
"Check Point Anti-Spam and Email Security Software Blade helps my organization by enhancing email security."
"Check Point Anti-Spam and Email Security Software Blade has positively impacted my organization because unlike my previous dashboard, it shows pop-ups for bot activity or whenever malware or ransomware attacks occur in any system."
"This product integrates well and is easy to manage."
"Mail sanitisation features are second to none."
"The initial setup is simple."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use."
"One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment."
"FireEye Email Security is easy to use."
"The auto-remediation feature is valuable."
"The product helps reduce the number of malicious emails reaching the user's inbox."
"FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks."
"Trellix Collaboration Security is valued for being a stable and comprehensive solution that fulfills customer needs."
 

Cons

"The pattern used to filter emails could be improved"
"The user should be able to perform a real-time search of the objects and see the messages."
"Check Point Anti-Spam and Email Security Software Blade could improve by focusing more on promoting and marketing its products. Despite having a great solution, it hasn't captured a larger market share, possibly due to insufficient promotion. It should also incorporate a module to monitor client identities, similar to CrowdStrike. It could also improve by systemizing and simplifying their documentation to make it easier to find needed information."
"One area where Check Point Anti-Spam and Email Security Software Blade can be improved is the knowledge base configuration."
"Improvements could be made to the user interface and reporting because the management console can feel a bit outdated, so a more real-time dashboard would make it easier, and while the detection is strong, false positive tuning is sometimes needed as occasional legitimate emails get flagged as spam and phishing."
"User experience can be improved."
"Many would love to have this solution and be able to manage it from any device, including native applications or applications that can be installed on devices such as Android or iOS."
"Without configuring the MTA or transfer agent, it cannot work fully."
"I would like to see this solution become more flexible."
"There is a need for improved integration with totally different products, such as a rapid server."
"The solution needs better support."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"I would rate them as a 1.5. The new hub created in India is not good."
"The solution must provide features to scan QR codes for threats."
"The reporting aspect of the solution needs improvement."
"Sometimes, integration can be challenging, impacting its stability, which is why I rate it a five out of ten."
 

Pricing and Cost Advice

"Reasonably priced solution."
"The cost is competitive with other security products on the market."
"I rate the product pricing a seven out of ten."
"I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
"For licensing, my company makes yearly payments, which is expensive."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The solution requires a license to be purchased for every user."
"The cost is very high."
"The licensing is on a yearly basis."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
872,098 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
17%
Computer Software Company
12%
Manufacturing Company
10%
Educational Organization
5%
Manufacturing Company
19%
Comms Service Provider
11%
Computer Software Company
10%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business28
Midsize Enterprise11
Large Enterprise18
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise4
Large Enterprise5
 

Questions from the Community

What needs improvement with Check Point Anti-Spam and Email Security Software Blade?
One thing I noticed with Check Point Anti-Spam and Email Security Software Blade is that without configuring the MTA or transfer agent, it cannot work fully. The MTA feature has significant resourc...
What is your primary use case for Check Point Anti-Spam and Email Security Software Blade?
My main use case for Check Point Anti-Spam and Email Security Software Blade is to block and allow some malicious domains based on the IP reputation, based on the content that it holds, or based on...
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment.
What needs improvement with FireEye Email Security?
I would like to see the addition of email digital protection features, such as anti-spam and antivirus, not just sandboxing, in the on-premises solution.
What is your primary use case for FireEye Email Security?
I have worked on Email Security ( /categories/email-security ) both on-premises and in the cloud, Web Security, and also on MDR, which is called HX endpoint security for Trellix Collaboration Secur...
 

Also Known As

No data available
FireEye Email Security
 

Overview

 

Sample Customers

SF Police Credit Union (SFPCU)
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Check Point Anti-Spam and Email Security Software Blade vs. Trellix Collaboration Security and other solutions. Updated: September 2025.
872,098 professionals have used our research since 2012.