free case study: an unbiased review of Check Point Security Management

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download this FREE Log Management case study, based on an UNBIASED USER EXPERIENCE with Check Point Security Management:

Where should we email your case study?






Check Point Security Management review

reviewer1853913
Senior cyber security specialist at Optiv
Good network and endpoint security with good connectivity
The application filtering and URL filtering could be better. They need to improve on this kind of technology as the Palo alto is ahead of the application-based and zero-trust-based approach also the cloud-based application control also user identification through the LDAP and other user directory settings to provide the proper solution....

Since 2012, we've had 823,875 professionals use our research.

As seen in