Try our new research platform with insights from 80,000+ expert users
Check Point UTM-1 [EOL] Logo

Check Point UTM-1 [EOL] Reviews

4.1 out of 5
2,335 followers
Start review

What is Check Point UTM-1 [EOL]?

Featured Check Point UTM-1 [EOL] reviews

PeerAnalyst reports based on Check Point UTM-1 [EOL] reviews

TypeTitleDate
CategoryFirewallsMar 7, 2025Download
ProductReviews, tips, and advice from real usersMar 7, 2025Download
 
 
Key learnings from peers

Valuable Features

Room for Improvement

Pricing

 

Check Point UTM-1 [EOL] reviews

Sort by:
Adrian Cambronero - PeerSpot user
Consultant at ITQS
Verified user of Check Point UTM-1 [EOL]
    Dec 21, 2023
    Great firewalls, VPN, and Intrusion prevention capabilities

    Pros

    "Firewalls help us a lot in controlling traffic on our network and preventing unauthorized access."

    Cons

    "Some features that could be improved are advanced threat protection, sandboxing, and vulnerability management."
    Adriano-Simao - PeerSpot user
    Chief Technology Officer at Triana Business Solutions Lda
    Verified user of Check Point UTM-1 [EOL]
    Jul 3, 2019
    Product version discussed: R80
    We can create a domain to separate and segregate functions and services

    Pros

    "We can create a domain to separate and segregate some functions, some services."

    Cons

    "As we don't have a representative of Check Point in Mozambique, this makes it very difficult when we have some issues to resolve."
    Find out what your peers are saying about Check Point UTM-1 [EOL]. Updated March 2025
    841,099 professionals have used our research since 2012.
    Jonathan Ramos G. - PeerSpot user
    Cloud Engineer at ITQS
    Verified user of Check Point UTM-1 [EOL]
    Nov 17, 2022
    Has centralization capabilities and reduces costs but needs more consolidation of security features

    Pros

    "The most outstanding feature is being able to centralize each of the functions in a single device."

    Cons

    "What has been the issue of firewalls is they ask me for policies and content filtering application control and all these features that are now part of Harmony. "
    Dcenterops677 - PeerSpot user
    IT Group Supervisor at a tech services company with 201-500 employees
    Verified user of Check Point UTM-1 [EOL]
    Jul 23, 2019
    Product version discussed: R740
    Good filtering features but has terrible technical support

    Pros

    "The filtering was very good."

    Cons

    "Technical support was very bad because the supplier who sold it to us, wasn't very supportive, and he wouldn't giving us direct links to the OEM."
    PeerSpot user
    IT Security Assistant Manager at a insurance company with 5,001-10,000 employees
    Verified user of Check Point UTM-1 [EOL]
    Nov 21, 2016
    Product version discussed: R77
    I can create a central database for objects, and browse logs for all of the gateways from a single screen.
    GF
    Security Engineer at SOCITECH S.A.
    Verified user of Check Point UTM-1 [EOL]
    Jul 11, 2019
    Product version discussed: 8
    Ease to manage and connect to other solutions

    Pros

    "The solution is very robust."

    Cons

    "The solution should be more user-friendly. "
    PeerSpot user
    RSSI at a legal firm with 501-1,000 employees
    Verified user of Check Point UTM-1 [EOL]
    Jul 4, 2019
    Enables us to log all details and troubleshoot when a problem occurs

    Pros

    "The most valuable feature for us was to implement negligent functionality, to direct functionality to viewer control and application control so we could disconnect, and at the same time, we installed checkpoints. We disconnected our proxy."

    Cons

    "The solution could be improved if there was a better way to report. The reporting functionality is not really good. Even though it's not the major function. Maybe adding a way to make a custom report."
    PeerSpot user
    IT Director with 501-1,000 employees
    Verified user of Check Point UTM-1 [EOL]
    Jul 20, 2015
    It performs reliably and you can watch it block hacks, but it needs more customization options for network threat management.