2020-05-14T10:16:20Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 3

What is your primary use case for Check Point Anti-Spam and Email Security Software Blade?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

13
PeerSpot user
13 Answers
Shyam Lal Navatiya - PeerSpot reviewer
Senior Consultant at EY India
User
Top 10
2022-10-26T12:24:00Z
Oct 26, 2022

Check Point Anti-Spam and Email Security Software Blade helps us to gain great email security. It is one of the most secure and affordable solutions for mail server security systems and helps with compliance and security management to ensure no data loss or no data theft from the email server under any circumstance. It is one of the most high-demand security solutions in the market, with high-level accuracy and a quality assurance system. Their security software is sone of the best in the market, with numerous features for high-end usability.

Search for a product comparison
Hazel Zuñiga Rojas - PeerSpot reviewer
Administrative Assistant at Tecapro
Real User
Top 5Leaderboard
2022-10-25T15:58:00Z
Oct 25, 2022

Our organization had the need for an efficient way to solve problems surrounding mail, as there are constant places or niches for attackers to strike. We were looking for a solution that could collaborate and integrate in a stealthy and minimally invasive way to protect each of our collaborators and work groups. We had the opportunity to use this solution to assist us with security.

Fabian Miranda - PeerSpot reviewer
Subject Matter Expert - Helthcare and Corporate Verticals Development at Lenovo
Real User
Top 5Leaderboard
2022-10-04T05:51:00Z
Oct 4, 2022

At our company, we have a large number of workers that rely mainly on email to go about their daily duties, there are thousands of emails going back and forth, both inside and outside the organization. This solution helps us add an additional layer of protection to our Outlook email servers. Hence, they prevent us from being victims of spam and other email threats such as phishing, malicious attachments, links, etc. Check Point Anti-Spam and Email Security Software Blade has one of the highest spam protection rates - and it shows.

DH
Support at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
2022-09-18T05:25:00Z
Sep 18, 2022

Our need was to be able to provide greater security to business e-mail, avoid possible threats and completely reduce vulnerabilities within our perimeter, realizing that we could use our checkpoint gateway and security management to, through the anti-spam and email security blade, provide business users an additional layer of security do not hesitate to purchase this modern security tool, part of the family of checkpoint tools. In this way, checkpoint has improved perimeter security by avoiding spam emails within our infrastructure.

SHRINKHALA SINGH - PeerSpot reviewer
Senior Manager at Agriculture Skill Council of India
User
Top 5
2022-08-22T06:20:00Z
Aug 22, 2022

The Check Point Anti Spam and Email Security software blade is a one-stop solution for the restriction and blocking of endpoints and other software threats and completely blocks their entry into the system. It is the most widely used and has numerous functionalities and utilities. It permanently blocks the potential threat source and multiple kinds of spam mail and messages. It is integrated into our IT system throughout and blocks over 90% of potential spam, malware attacks, and phishing attempts.

Adriamcam - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
2022-05-23T18:47:00Z
May 23, 2022

Our company works on the implementation of services in the cloud. We have a large number of employees inside and outside the country. The work from home modality was also added recently, and, for this reason, a solution was needed that would provide security in all aspects of electronic communication. That is why Checkpoint Anti-Spam and Email Security was implemented throughout the company. We wanted to be able to block spam and malware at the connection level and also be able to integrate it with cloud services with Azure and thus be able to have excellent data management.

Learn what your peers think about Check Point Anti-Spam and Email Security Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
655,711 professionals have used our research since 2012.
alvarado - PeerSpot reviewer
Cloud Support Leader at a tech company with 51-200 employees
User
Top 5Leaderboard
2022-05-20T05:07:00Z
May 20, 2022

We have been improving our perimeter security over time. Previously, we had a Check Point gateway and management to handle all our policies. Later, we found out that by means of blades in our environment and adding more licenses, we could use the anti-spam and email Check Point utility security, for which we chose to verify its operation in the accounts that are in use for some departments to see its operation when blocking certain domains and generate rules to avoid vulnerabilities, for which we began to carry out tests with our environments.

Chitharanjan K - PeerSpot reviewer
Executive IT Operations at Indian Immunologicals Limited
Real User
Top 5
2021-12-21T10:07:00Z
Dec 21, 2021

We are using 5400, 6700 and 6900 versions of the hardware in our company. We have approximately 1,600 users.

reviewer1661955 - PeerSpot reviewer
Cybersecurity specialist at a maritime company with 10,001+ employees
User
Top 20
2021-10-03T11:56:00Z
Oct 3, 2021

The primary use case is to protect the organization from any attacks generated via email. As most of the attacks in recent days are via email, the organization has to be equipped and ready to mitigate this type of attack at the perimeter level, before it has been delivered to the user's mailbox or an endpoint. Basic anti-spam filters are not capable of protecting against the latest generation of attacks. Therefore, for protecting the organization against this sophisticated or targeted attack, we concluded that the next generation of email security solutions is a must. Ultimately, it should be able to protect against any attack that is sent via email.

VN
System and Network Administrator at Auriga - The banking e-volution
Real User
Top 5Leaderboard
2021-05-08T11:58:00Z
May 8, 2021

Like any company, we needed an antispam product so we implemented this solution. Buying this blade was convenient from an economic point of view and we took advantage of it to have a product that is both well-integrated and easy to manage.

Basil Dange - PeerSpot reviewer
Senior Manager at a financial services firm with 10,001+ employees
Real User
Top 5Leaderboard
2021-03-27T07:29:00Z
Mar 27, 2021

The primary use case is to protect the organization from any attack generated via email. As most of the attacks in recent days are via email, the organization has to be equipped and ready to mitigate this type of attack at the perimeter level, before it has been delivered to the user mailbox or endpoint. Basic anti-spam filters are not capable of protecting against the latest generation of attacks. So, for protecting the organization against this sophisticated or targeted attack, we concluded that the next generation of Email Security solutions is a must. Ultimately, it should be able to protect against any attack that is sent via email.

Oleg Pekar - PeerSpot reviewer
Senior Network/Security Engineer at Skywind Group
Real User
Top 5
2020-08-22T14:29:00Z
Aug 22, 2020

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our DataCenter environment, located in Asia (Taiwan). The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix. The Check Point Anti-Spam and Email Security Software Blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of email filtration and anti-spam protection.

Gaurav Amar - PeerSpot reviewer
GM IT Infra at PVR Ltd
Real User
Top 10
2020-05-14T10:16:20Z
May 14, 2020

Check Point makes up part of our security solution in all of our locations across India. We are in the eCommerce industry and one of the things that we do is set up tickets for moviegoers. We have categorized our requirements as per the online penetration of our booking agents. As an example, in one of our locations, we have a penetration of filling online tickets that is reaching up to 85%. It is important that this system is safeguarded to ensure that we are not exploited on the ticketing platform using the OCR codes that we are generating and sending to our customers. As the tickets are emailed to the patrons in advance of the show, it is important that this email is secure. This is one of our use cases.

Related Questions
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
May 8, 2021
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 3 answers
Oleg Pekar - PeerSpot reviewer
Senior Network/Security Engineer at Skywind Group
Aug 22, 2020
Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.
Basil Dange - PeerSpot reviewer
Senior Manager at a financial services firm with 10,001+ employees
Mar 27, 2021
The setup is complex, as it is dependent on the number of files that need to be processed via the email security appliance. The cost is competitive with other security products on the market.
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Oct 17, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 9 answers
Oleg Pekar - PeerSpot reviewer
Senior Network/Security Engineer at Skywind Group
Aug 22, 2020
Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.
Basil Dange - PeerSpot reviewer
Senior Manager at a financial services firm with 10,001+ employees
Mar 27, 2021
The setup is complex, as it is dependent on the number of files that need to be processed via the email security appliance. The cost is competitive with other security products on the market.
Download Free Report
Download our free Check Point Anti-Spam and Email Security Software Blade Report and get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
DOWNLOAD NOW
655,711 professionals have used our research since 2012.