Try our new research platform with insights from 80,000+ expert users

Check Point Anti-Spam and Email Security Software Blade vs Trellix Collaboration Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Anti-Spam and E...
Ranking in Email Security
11th
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
43
Ranking in other categories
No ranking in other categories
Trellix Collaboration Security
Ranking in Email Security
18th
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Instant Communications Security and Compliance (4th), Secure Email Gateway (SEG) (8th)
 

Mindshare comparison

As of October 2025, in the Email Security category, the mindshare of Check Point Anti-Spam and Email Security Software Blade is 0.8%, up from 0.7% compared to the previous year. The mindshare of Trellix Collaboration Security is 1.8%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Market Share Distribution
ProductMarket Share (%)
Check Point Anti-Spam and Email Security Software Blade0.8%
Trellix Collaboration Security1.8%
Other97.4%
Email Security
 

Featured Reviews

Abnet Tsegaye Belay - PeerSpot reviewer
Has reduced phishing threats and provided better visibility through detailed dashboards and logging
One thing I noticed with Check Point Anti-Spam and Email Security Software Blade is that without configuring the MTA or transfer agent, it cannot work fully. The MTA feature has significant resource needs, and without it, we cannot use the full-fledged features of Anti-Spam and Email Security Blades. Its dependency on MTA is substantial. I chose 8 out of 10 for Check Point Anti-Spam and Email Security Software Blade because of the MTA dependency feature. Disabling MTA is problematic as it is very important for deploying this solution. If you want full content scanning or threat extraction and emulation, you have to enable MTA to work effectively.
BernardLugalia - PeerSpot reviewer
Provides strong data protection with virtual patching and vulnerability assessments
I primarily use it to monitor database access, particularly in banking and similar environments. It ensures that IT personnel and others do not create unauthorized accounts or users. Collaboration security assists in tracking database access and alerts in case of suspicious activity One of the…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"By drastically reducing the volume of spam and unwanted emails, employees can focus more on their work rather than sorting through cluttered inboxes. This leads to improved productivity and efficiency within the organization."
"Check Point Anti-Spam & Email Security software is a modern-day solution for security management and data scrutiny."
"The functionality is better."
"This solution is very efficient."
"A scalable, stable solution with good technical support."
"I like the flexible configuration set, e.g. both the content-based and the IP reputation anti-spam are supported, but you may choose to disable the mechanism you don't like."
"It's a fairly old solution, however, that has been updated over time to become one of the best manufacturers of security solutions."
"DLP features can help prevent sensitive information from being leaked via email."
"We can control this solution from the cloud and are able to access it from wherever we are."
"The product helps reduce the number of malicious emails reaching the user's inbox."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use."
"Before installing, consider potential challenges with system performance, especially when integrating multiple tools, which could slow down performance."
"We have had very good results from the use of FireEye Email Security. We are very comfortable with this technology, but I don't know if it's necessary to move into the cloud, we will check other technologies and study them. Additionally, the solution has good integration."
"The initial setup is simple."
"One of the most valuable features is the protection against vulnerabilities, particularly through virtual patching."
"The product protects my email."
 

Cons

"I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal."
"The cost is high when putting through Check Point Blade in your Gateway."
"The support language is only English."
"Check Point Anti-Spam and Email Security Software Blade is not user-friendly the first time you use it."
"Without configuring the MTA or transfer agent, it cannot work fully."
"The technical team could improve services by ensuring when there are changes they inform enterprise users of effective upgrades."
"It does not provide for standalone configuration on the security gateway. Instead, you need to have a management server/smart console for managing it."
"Improvements could be made to the user interface and reporting because the management console can feel a bit outdated, so a more real-time dashboard would make it easier, and while the detection is strong, false positive tuning is sometimes needed as occasional legitimate emails get flagged as spam and phishing."
"In general, our company should make the tool more robust to protect our systems."
"The reporting aspect of the solution needs improvement."
"The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier."
"Sometimes, integration can be challenging, impacting its stability, which is why I rate it a five out of ten."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"The solution must provide features to scan QR codes for threats."
"FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA."
"I would rate them as a 1.5. The new hub created in India is not good."
 

Pricing and Cost Advice

"Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall."
"For licensing, my company makes yearly payments, which is expensive."
"This is a simple system with a very low cost and basic functions, which surely is ideal for a small company."
"The cost is competitive with other security products on the market."
"I rate the pricing as an eight on a scale of one to ten, where one is cheap and ten is expensive."
"Reasonably priced solution."
"I rate the product pricing a seven out of ten."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The solution requires a license to be purchased for every user."
"The cost is very high."
"The licensing is on a yearly basis."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
869,513 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
23%
Computer Software Company
11%
Manufacturing Company
9%
Educational Organization
5%
Manufacturing Company
18%
Comms Service Provider
11%
Computer Software Company
10%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business24
Midsize Enterprise12
Large Enterprise18
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise4
Large Enterprise5
 

Questions from the Community

What needs improvement with Check Point Anti-Spam and Email Security Software Blade?
There is room for improvement with Check Point Anti-Spam and Email Security Software Blade, particularly with the interface, which is not new people friendly; however, users will learn it, and it's...
What is your primary use case for Check Point Anti-Spam and Email Security Software Blade?
My main use case for Check Point Anti-Spam and Email Security Software Blade includes phishing protection, ransomware protection, and spam protection. The solution helps with compliance and integra...
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment.
What needs improvement with FireEye Email Security?
I would like to see the addition of email digital protection features, such as anti-spam and antivirus, not just sandboxing, in the on-premises solution.
What is your primary use case for FireEye Email Security?
I have worked on Email Security ( /categories/email-security ) both on-premises and in the cloud, Web Security, and also on MDR, which is called HX endpoint security for Trellix Collaboration Secur...
 

Also Known As

No data available
FireEye Email Security
 

Overview

 

Sample Customers

SF Police Credit Union (SFPCU)
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Check Point Anti-Spam and Email Security Software Blade vs. Trellix Collaboration Security and other solutions. Updated: September 2025.
869,513 professionals have used our research since 2012.