We performed a comparison between Check Point Anti-Spam and Email Security Software Blade and Sophos Email based on real PeerSpot user reviews.
Find out in this report how the two Email Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The benefit that stands out to me is the ability for multiple individuals to collaborate simultaneously within the same document. Additionally, there is the option to save the document directly in the integrated OneDrive or SharePoint."
"The deployment capability is a great feature."
"Our customers are satisfied with Defender for 365 because Microsoft products are easy to use and customize to meet the client's needs. Everything is in one place, so we can adjust policies as needed for phishing, DLP, ATP, or any other security features that our clients want to apply."
"The basic features are okay and I'm satisfied with the Defender."
"Defender for Office 365 has helped eliminate having to look at multiple dashboards and that is the aspect I like most about it. It is simpler, effective, and convenient. The users like the process efficiency."
"The two main features that prove most beneficial for us are URL scanning and attachment scanning."
"The most valuable feature of Microsoft Defender for Office 365 is the ease of use."
"Microsoft Defender has a feature to protect each and every attachment. Even if it's an encrypted attachment, it will check for any potential threats."
"Check Point offers us flexibility when it comes to customizing the configurations that we want to manage, thus allowing us to meet the specific needs of our company."
"One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."
"Check Point Anti-Spam & Email Security software is a modern-day solution for security management and data scrutiny."
"We now have better security and fewer false positives."
"DLP features can help prevent sensitive information from being leaked via email."
"Using Check Point has helped us to safeguard our environment and help to protect against spam, as well as other types of attacks against our network."
"One of the standout features of the product is a significant reduction in false positives, achieved through the implementation of artificial intelligence for detecting malware, phishing attempts, and spam emails."
"Since the engine is made to block by IP, domains, and reputation, we minimized the spam threats that end up in the user's mailbox."
More Check Point Anti-Spam and Email Security Software Blade Pros →
"When you say email security, it's about everything, incoming email, outgoing email, spam, phishing emails, unwanted marketing emails. You can set rules, but the main feature of Sophos Email is to make sure you don't get hacked. 95% of people who are hacked do not get hacked by typing the router password. They are hacked from the inside out, which means they send you a document that is a zero-day attack, you open it, nothing happens, but technically the attack is running in the background of your computer. This is how they gain access to your PC."
"I found the user interface friendly."
"Sophos Email is in the cloud and integrated with its firewall."
"The platform is scalable when installed on server-based systems."
"Our client recently received many emails, and their employees didn't realize these emails were phishing attempts. Consequently, they clicked on them and fell victim to the attack. Therefore, it is important to secure their system with Sophos Email Security."
"The anti-malware, risk scanning has been pretty spot on."
"The solution's identity proxy feature is very good and reliable."
"It's easy to use and the configuration is straightforward."
"Several simulation options are available within 365, and the phishing simulation could be better."
"Too many false positives and lacks an accurate capability to detect malicious SharePoint sites."
"You should be able to deploy Defender for every subscription without the need to add servers."
"There's room for improvement regarding the time frame for retrieving emails."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"We need to be able to whitelist data at the backend."
"Microsoft Defender for Office 365 should improve the troubleshooting tools. It's unclear whether the device is blocked at the firewall level or at the device itself. The granularity needed for troubleshooting is currently lacking. From my perspective, Microsoft should address this issue to benefit many users who likely share the same sentiment."
"One area for improvement is support, in terms of being able to reach them and, especially, technical support for configuration."
"Installation time could be improved as it takes too long to install."
"The cost is high when putting through Check Point Blade in your Gateway."
"The anti-spam features could be upgraded to be able to detect unnoticeable spam."
"While we often take advantage of Check Point's cloud part, including Infinity or Harmony, I would like to see products that directly deal with mobile or native environments or other operating systems that we have within the organization."
"I would like this solution to be more integrated into other applications that Check Point has so that it could be managed quickly and safely from the Infinity Portal."
"The ease of use with the user interface could be better as it is very static."
"A major area for improvement is within some of the heavily discounted software blade add-ons on top of the current Next Generation Threat Prevention and SandBlast and Next Generation Threat Prevention offerings."
"I can say that the solution's price level is a problematic area that needs to be considered for improvement."
More Check Point Anti-Spam and Email Security Software Blade Cons →
"The security of the solution could improve."
"The solution's sandboxing and spam control features could be improved."
"Sophos Email can improve mail security."
"The solution's technical support is slow and unresponsive. You need to book time in order to get support."
"The product could include all the essential features and capabilities, similar to the on-premise, server-based version."
"Sophos Email needs to increase the number of promos."
"The tool’s stability should be improved."
"Enhancing rule creation and customization features would provide users with greater control over their email security settings."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
More Check Point Anti-Spam and Email Security Software Blade Pricing and Cost Advice →
Check Point Anti-Spam and Email Security Software Blade is ranked 9th in Email Security with 33 reviews while Sophos Email is ranked 11th in Email Security with 28 reviews. Check Point Anti-Spam and Email Security Software Blade is rated 8.2, while Sophos Email is rated 8.0. The top reviewer of Check Point Anti-Spam and Email Security Software Blade writes "Effectively secures data centers against various threats, including spam emails and provides policy-based control". On the other hand, the top reviewer of Sophos Email writes "Provides good identity proxy features, but sandboxing and spam control features could be improved". Check Point Anti-Spam and Email Security Software Blade is most compared with Abnormal Security, Barracuda Email Security Gateway, Cisco Secure Email and Fortinet FortiMail, whereas Sophos Email is most compared with Microsoft Exchange Online Protection (EOP), Fortinet FortiMail, Barracuda Email Security Gateway, Perception Point Advanced Email Security and Proofpoint Email Protection. See our Check Point Anti-Spam and Email Security Software Blade vs. Sophos Email report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.