What is our primary use case?
Check Point UTM-1 was a firewall solution that unified threats. The use of this tool was as an on-premise device since we needed security in the network to control incoming and outgoing traffic working in conjunction with security policies. It also features additional items, such as the antivirus capabilities that we implement on all devices, as well as intrusion prevention and VPN capabilities. It is an excellent tool that helped us to solve all the vulnerability problems that we presented while reducing security gaps.
How has it helped my organization?
Check Point UTM-1 helped us improve the incoming and outgoing traffic of our company and helped us improve security in order to be able to manage and identify various vulnerabilities.
We are able to help comply with the security policies and regulations that are required of us.
We managed to achieve excellent security in our on-premise environment. Currently, our environment is in the cloud, and we had to make some improvements in the software that was implemented at that time since we now work in a hybrid cloud environment.
What is most valuable?
Check Point UTM-1 has several valuable features that have given prestige to the tool in the field of security, some of which are:
Firewalls help us a lot in controlling traffic on our network and preventing unauthorized access.
Intrusion prevention detects and blocks all vulnerabilities that occur in the company.
The VPN provides an excellent secure way to connect outside the company.
Finally, it offers reports and management, which allows Check Point UTM to manage the entire security environment safely.
What needs improvement?
Some features that could be improved are advanced threat protection, sandboxing, and vulnerability management.
Another point is to improve the technical support provided by Check Point UTM-1. Although the company offers different standards, including basic and premium, by mail and by telephone, they present a very large deficiency in the time it takes to comply with the provisions of the SLA. Coordinating a meeting is complicated by the schedules.
The documentation should also be improved by having it unified.
For how long have I used the solution?
It was implemented approximately five years ago.
What do I think about the stability of the solution?
Its stability is excellent. However, you have to see its initial configuration, this is where all its functionality depends.
What do I think about the scalability of the solution?
It is important to note that an EOL product may not have the latest security and support features. That said, it has very good scalability.
How are customer service and support?
A customer service and support team should be able to provide assistance and guidance throughout the implementation process. We've had trouble will the coordination of meetings, however, premium support has been okay.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Previously we didn't have another solution. This was the first one we implemented.
How was the initial setup?
In the beginning, it can be complex for someone who is new or not quite knowledgeable about the tool. However, once someone is comfortable, it becomes easy to implement and administer.
What about the implementation team?
The implementation was done through a team from the supplier. The engineers at the time had a good working knowledge of the tool.
What was our ROI?
It is necessary to take into account the initial cost of the solution as well as the ongoing cost. All this will be reflected in the accuracy of the data.
What's my experience with pricing, setup cost, and licensing?
It is always important to take into account the initial cost, maintenance, support, and licenses. There is a lot of investment that needs to be made, which is why it is important to create a work plan and think about the characteristics that are needed.
Which other solutions did I evaluate?
Like other solutions, first, we did a review of the security tools offered on the market. That's how we got to know Check Point. Some others we looked into include:Palo Alto Networks, Symantec, and Trend Micro.
What other advice do I have?
You have to make a work plan and know what characteristics the company needs to make an excellent implementation. This ensures that the company will not waste money.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
*Disclosure: I am a real user, and this review is based on my own experience and opinions.