Try our new research platform with insights from 80,000+ expert users
Thao Vo - PeerSpot reviewer
Cloud Solutions Architect at Practice Management of America
Real User
Top 20
Ensure user's machine is protected and securely connected to the network and easy to set up
Pros and Cons
  • "With Check Point Antivirus, we can ensure our user's machine is protected and securely connected to the network."
  • "Need more documentation."

What is our primary use case?

Our company is a global software product company with a lot of users all around the world. With Check Point Antivirus, we can protect our users' machines and securely connect to a network.

We also automate the installation of antivirus software to all our client machines by using Check Point. It is very good.

The customer support feedback from the Check Point engineer
is very good and makes us feel more confident in the cybersecurity world.

How has it helped my organization?

With Check Point Antivirus, we can ensure our user's machine is protected and securely connected to the network. This will improve the security of the internal and external network.

It has prevented ransomware. 

I like the key logging and keyboard detection features.

What is most valuable?

The following is a list of the valuable features:

  • Good price
  • Best virus database
  • It isolates the infected machine.                                                                 

What needs improvement?

Improvements it should make: 

  • Need more document
  • Need faster customer support
  • The price can be better                                                                                  
Buyer's Guide
Check Point Antivirus
November 2024
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.

For how long have I used the solution?

I have used this software for more than five years.

What do I think about the stability of the solution?

The stability is really good.

What do I think about the scalability of the solution?

The scalability is good.

How was the initial setup?

The initial setup was easy.

What was our ROI?

We have seen good ROI.

What's my experience with pricing, setup cost, and licensing?

It would be better if we could get a better price. 

Which other solutions did I evaluate?

We also looked at Avast Antivirus.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Ankita  Singh - PeerSpot reviewer
Application Developer at Capegemini Consulting India Private Limited
Real User
Top 5
Highly productive, compatible, and easy-to-use
Pros and Cons
  • "Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background."
  • "Overall I didn't personally face any issues while implementing Check Point Antivirus."

What is our primary use case?

After implementing Check Point Antivirus, we've had a few compatibility issues with my devices.

Check Point Antivirus proved to be highly productive for my work and has helped with data security via its features. It offers VPN capabilities and provides multiple device protection. It is very easy to monitor results across all covered devices.

Check Point Antivirus is highly compatible with other solutions and is scalable while offering extremely low pricing.

How has it helped my organization?

Check Point Antivirus proved to be highly productive and scalable for my work. The data security features, including malware detection and escalation, operated quickly. There are multiple devices protected by the software. It is now very easy to carry out and monitor results from the same task across all devices.

Check Point Antivirus automatically fixes pop-up ads and effortlessly detects all kinds of malware and threats while syncing systems in the background.

What is most valuable?

Check Point Antivirus automatically fixes pop-up ads and can effortlessly detect all kinds of threats while working in the background.

Along with Check Point Antivirus, the support provides multiple updates and upgrades in quick succession. It's quick to restore the management of the database and has scheduled security system and network upgrades for risk-free work management.

Overall, Check Point Antivirus is highly productive, scalable, compatible, and easy-to-use software for data security and system management. I highly recommend this platform.

What needs improvement?

There are no areas that Check Point Antivirus needs to work on.

Overall I didn't personally face any issues while implementing Check Point Antivirus. In comparison to alternatives present in the market Check Point Antivirus has high efficiency and a better ability to protect our devices both online and offline.

Personally, I highly recommend this platform to professionals for data security and management.

For how long have I used the solution?

I've used Check Point Antivirus integration for approximately one year or so.

Which solution did I use previously and why did I switch?

I haven't used any other such platform for data security and system management.

What's my experience with pricing, setup cost, and licensing?

Overall, Check Point Antivirus is highly productive, scalable, compatible, and very easy to use. It's good software for data security and systems management and I highly recommend it.

Which other solutions did I evaluate?

I did look into other options. For a simple comparison, I visited certain websites for product reviews. In the end, I found Check Point Antivirus to be the best option.

What other advice do I have?

Go for it. First, implement it and see the change in your levels of security.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Antivirus
November 2024
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
EmmaRichardson - PeerSpot reviewer
Database Administrator at Hildes Technologies
Real User
Top 20
Easy to configure with good virus and malware protection
Pros and Cons
  • "The simplicity of management and remote assistance for the users make it a smooth experience, and administrators can easily handle tasks remotely."
  • "There could be more additions to the compatible systems and applications for integration purposes."

What is our primary use case?

The primary use case of Check Point Antivirus is to protect our machines and data from viruses and to clean our systems from all malware to ensure the security of our data and servers from external threats and invasions. 

We have configured Check Point antivirus with all our machines, servers, and databases as a security solution against real-time virus threats that may harm our systems. 

It has been easy to configure and provides up-to-date advanced-level protection. Remote management is also being used to remove any potential viruses from users' machines if found. 

How has it helped my organization?

It has improved the overall security of our machines and data with multi-layered antivirus solutions. Real-time threat protection is a wonderful aspect of Check Point Antivirus and can provide 24/7 security to configured machines.

It makes us feel more secure and helps us to react proactively against any online invasion and data protection. The simplicity of management and remote assistance for the users make it a smooth experience, and administrators can easily handle tasks remotely. 

What is most valuable?

The most important and useful feature is the regular updates against modern-day viruses. We have seen that new viruses and malware are introduced by hackers every day, and we need to keep ourselves a step ahead for protection against those threats. 

Check Point Antivirus, with its up-to-date features, ensures that we are always ahead of the new versions of viruses and provides real-time protection. The overall features and data loss prevention makes it a valuable product in every way.

What needs improvement?

There could be more additions to the compatible systems and applications for integration purposes. It doesn't cover some of the applications and operating systems like macOS and SAP cloud products. 

Another issue I can recall is the fake threat calls and removal of safe applications (assuming them to be viruses and malware), which is sometimes annoying. The overall product features and functions are reliable and have everything covered otherwise and I consider it to be the best antivirus solution. 

For how long have I used the solution?

I've used the solution for more than two years.

What do I think about the stability of the solution?

We find it to be an almost 99% stable solution.

What do I think about the scalability of the solution?

This is an excellent, scalable solution.

How are customer service and support?

Technical support is very effective and knowledgeable. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

What's my experience with pricing, setup cost, and licensing?

This is a good solution that comes at a reasonable price.

Which other solutions did I evaluate?

I did not evaluate other options. 

What other advice do I have?

It is a very effective antivirus and I would recommend it. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1858884 - PeerSpot reviewer
Network Administrator at a computer software company with 1,001-5,000 employees
User
Top 5
Moderately priced, easy to configure, and good support
Pros and Cons
  • "Check Point Antivirus is easy to configure."
  • "Check Point Antivirus could be improved by having the gateway automatically run a packet capture on the traffic so that it can be easily uploaded to TAC in the event that there is a false positive or if the traffic is required for further investigation."

What is our primary use case?

Check Point Antivirus Blade is enabled on all of our HA clusters throughout the world. The primary use case for this product is to protect our end-users while working physically in the office or remotely. It monitors all traffic in and out of the organization to detect known threats such as malware. Functionality is limited without HTTPS inspection as the blade will just look at SRC/DST traffic rather than be able to do packet inspections on actual traffic. It is great that it is included in the base FW license.

How has it helped my organization?

Check Point Antivirus has improved our organization by being able to identify known threats and actively drop connections to ensure our users remain secure. It leverages the Bogus DNS endpoint from Check Point to redirect traffic destined for known threats and doesn't require a lot of admin overhead to configure or tune based on the organization's needs. An added bonus is Check Points "Threat Cloud" which all of its gateways talk to so that attacks that are detected in one customer's environment are updated and would be blocked automatically within another environment. 

What is most valuable?

Check Point Antivirus is easy to configure. We enable the blade in the SMS for the gateway and that's pretty much it. You can get into the nitty gritty and fine-tune some of the settings to fit your organization better than the default settings, however, personally, I have yet to do this and it is working as expected in my organization. It is also great that this is not an add-on license and is included with the low-tier licensing which helps to reduce the overall cost to the organization while increasing the value of the product.

What needs improvement?

Check Point Antivirus could be improved by having the gateway automatically run a packet capture on the traffic so that it can be easily uploaded to TAC in the event that there is a false positive or if the traffic is required for further investigation. I have had a few times where something was detected as being a false positive and TAC requested so much information that in all honesty, was not worth my time to collect as the URL being blocked was a simple webpage that, based on my analysis, the IP was previously being used for malicious intent and was now a legitimate business however was still being blocked by the blade.

For how long have I used the solution?

I've used the solution for five years. 

What do I think about the stability of the solution?

We have not had any performance issues.

What do I think about the scalability of the solution?

It is easy to scale and enable on SGs as long as they are managed by the same SMS.

How are customer service and support?

Support has improved over the years.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

No previous solution was utilized. This solution has been in place on the SGs since they were installed.

How was the initial setup?

The setup is straightforward. It is enabled from the SMS and it works.

What about the implementation team?

We managed the setup of the solution in-house.

What was our ROI?

The ROI is revealed by the fact that it protects end-users.

What's my experience with pricing, setup cost, and licensing?

Check Point in general is moderately priced compared to competitors.

Which other solutions did I evaluate?

We evaluated Palo Alto and Fortigate.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Edson  Duarte - PeerSpot reviewer
Information Technology at Banco Nacional de Investimento S.A.
Real User
Top 10
Effective endpoint protection and includes both antivirus and firewall features
Pros and Cons
  • "The initial setup is very easy."
  • "I'm not very happy with the support, even in terms of the website. They don't offer much."

What is our primary use case?

Our primary use case is to protect endpoints.

What is most valuable?

The most valuable is encryption. 

What needs improvement?

We have some issues with encryption. The main issue is the red screen of death. Basically, it happened in previous versions of Check Point with encryption. When you install updates, not a specific update, but some Windows updates, the computer gets stuck. And it doesn't start. We were able to contact Check Point, and as a solution, they always say to use the latest version, but we are not happy with that solution. For us, it's not like a solution. 

Mostly, we work with the latest version. But that doesn't guarantee reliability.

It has another issue that we have at Check Point. Check Point has an antivirus with a Sandbox function. When you try to download some files, the sandbox gets confused with the sandblast. And sometimes you have to wait. 

So, there is room for improvement in terms of updates and with Sandbox and Sandblast. 

Another area of improvement is support. We faced some issues because of the language barrier. 

In future releases, I would like to see a nice feature in terms of encryption. When you want to decrypt a drive, it should be a little bit more user-friendly.

For how long have I used the solution?

I have been using this solution for three years. 

What do I think about the stability of the solution?

There is room for improvement in stability. The solution could be more stable. 

What do I think about the scalability of the solution?

It is a scalable solution. We have around 150 end users using this solution in our organization. 

How are customer service and support?

The customer service and support are really good. For basic support, it's good. But when you want expert support, it's not that good.

For basic support, you can talk to a person and understand the basics. I don't know if it's a language or a barrier issue or not. For example, you have an issue with your computer. When you call a call center, the first thing they would say is, "Turn it off and turn it on," or something like that. So, in that sense, they don't have problems. But when you want a more expert solution, like, "I'm having a problem with this specific update, and this happens. So, this sandbox issue, and this happens." They don't put you right away in contact with the experts. You have to insist a lot; at least, that was my experience.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have worked with WatchGuard Gateway AntiVirus. 

How was the initial setup?

The initial setup is very easy. It was very quick; it took around five minutes. 

What about the implementation team?

We deployed the solution ourselves. It is on the cloud, but the installations are made on-premises.

What's my experience with pricing, setup cost, and licensing?

The solution was a little bit expensive at the beginning, but that's not Check Point's fault. It's an issue with the taxes. When you buy a product, they have a lot of taxes. So, it becomes expensive. But they actually made very good pricing. WatchGuard also gives good prices.

We have a yearly base license. The support is included in the license costs. 

What other advice do I have?

First of all, be aware of the issues like the technical support. The solution is good. The product is good, but I'm not very happy with the support, even in terms of the website. They don't offer much.

Overall, I would rate the solution an eight out of ten. It is not a ten because of the support. But if it weren't for that, it's a very, very good solution.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ajenthan Aiyathurai - PeerSpot reviewer
Manager - IT at NVCL Group
Real User
Top 5Leaderboard
An easy-to-use and stable solution
Pros and Cons
  • "The solution does a pretty good job and is easy to use. I am the person maintaining the tool and only one person is required to maintain it. Their configuration portal is user-friendly and anyone can crack it with a little bit of knowledge."
  • "I would like to see them implement a system that would enable us to do certain things from our mobile like applying policies, opening up and blocking ports, and restricting connection. It is because IT personnel are not always around on the premises. We can instantly do these things from our mobile. They should also consider the price so that many people will go for the solution."

What needs improvement?

The solution has a mobile monitoring system called WatchTower that you can link to a mobile. It would be great if they could add an antivirus feature so that we can monitor individual TCS activities too. Anyone willing to use this solution can certainly do so. The tool is very easy to use and the approach to security and updates is very good. Implementing policies and rules on-premises is also very user-friendly with the solution. Moreover, we can direct three to four billings together. If one ISP goes down, the second one automatically picks up. People wouldn’t even know that their internet has dropped. This kind of technology with low latency is very advantageous.

I would like to see them implement a system that would enable us to do certain things from our mobile like applying policies, opening up and blocking ports, and restricting connection. It is because IT personnel are not always around on the premises. We can instantly do these things from our mobile. 

They should also consider reducing the price so that more people will go for the solution.

For how long have I used the solution?

I have been using the tool for almost two years.

What do I think about the stability of the solution?

The tool is stable.

What do I think about the scalability of the solution?

The tool is scalable. There are roughly 60 users for the solution in our company.

How are customer service and support?

I have not contacted the tech support team directly. I contacted them through the Check Point dealers in Sri Lanka. They have technicians who assist us. I contacted them several times to understand some settings during the installation of the tool in the system.

Which solution did I use previously and why did I switch?

I have used Kaspersky and found Check Point to be better. There was an incident with Kaspersky when a person clicked on an email-generated ransomware and it got onto the system. Kaspersky couldn’t protect against the attacks and the ransomware spread. However, when the system was monitored by Check Point, the firewall protected it from downloading any malicious files. Hence, Check Point is doing a better job than Kaspersky. The only advantage that Kaspersky has over Check Point is the price since it is cheaper than Check Point. 

Kaspersky costs below 50,000-40,000 Sri Lankan Rupees.

How was the initial setup?

The deployment of the solution is straightforward.

What's my experience with pricing, setup cost, and licensing?

We are paying 2,50,000 Sri Lankan Rupees annually which is the fixed charge.

What other advice do I have?

I would rate the solution a nine out of ten. The solution does a pretty good job and is easy to use. I am the person maintaining the tool and only one person is required to maintain it. Their configuration portal is user-friendly and anyone can crack it with a little bit of knowledge.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2098998 - PeerSpot reviewer
Software Engineer at Mercado Libre
User
Top 5
Good pricing, easy to deploy, and useful antivirus capabilities
Pros and Cons
  • "The virus detection models orchestrate real-time monitoring of data with reliable reporting information."
  • "The next release can focus more on timely upgrades to enhance computing compatibility."

What is our primary use case?

Check Point Antivirus helps us to detect malware attacks and any phishing attacks that can destroy data and affect programs. 

When installed in any computing device, it provides tracking information that enables members to connect virtually with colleagues in remote areas. It is less costly since it enables members to access company websites from anywhere. 

The endpoint protection services ensure there is data security across the defined network infrastructure. It protects our devices against virus attacks.

How has it helped my organization?

The antivirus has enhanced the secure implementation of most projects and tasks among teams in the enterprise. 

The pricing is good, and it is easy to deploy this software. 

When linking with my colleagues from remote areas, it ensures the communication network is free from cyber attacks. 

The virus detection models orchestrate real-time monitoring of data with reliable reporting information. 

It has reduced the cost of attending events physically and catering accommodations for employees. 

The threat response system has saved teams from engaging with unsafe content and visiting unprotected online sites.

What is most valuable?

It provides automatic scans to most websites to ascertain security situations and alerts the user when there are potential threats that can affect data. 

The webcam protection system prevents unauthorized members from joining virtual meetings organized by employees. 

The phishing protection system prevents teams from spamming across email conversation channels. 

It is easy to install and learn how this platform works. 

It has various location connection that enables the user to select preferred sites that are safe.

What needs improvement?

I am satisfied with the set features due to their competitive performance since we deployed them. 

Integration with some applications was challenging during the deployment process. 

The next release can focus more on timely upgrades to enhance computing compatibility. 

The cost is worth its functionalities and contribution towards the protection of our systems. 

The software services and functions have met the company's requirements and policies. 

There are many notifications that keep streaming in when using the antivirus, and that can be improved.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the stability of the solution?

It is stable in virus prevention.

What do I think about the scalability of the solution?

I am impressed by the reliable services of this platform.

How are customer service and support?

There have been improved customer support services since we deployed them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used any similar antivirus products.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The implementation took place through the vendor.

What was our ROI?

There is increased ROI from a stable performance.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is the best platform for preventing virus penetration.

Which other solutions did I evaluate?

I looked into other options. The cost and performance capability of this version were the best.

What other advice do I have?

This is a great product that I recommend to other organizations.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo
Real User
Top 5Leaderboard
Centrally managed with good visualizations and very good security
Pros and Cons
  • "It offers a centralized administration which allows us to be much more productive."
  • "We need the ability to integrate this solution with the other existing solutions, such as Harmony."

What is our primary use case?

Over the years, with experience using Check Point applications, we have needed to protect ourselves against new attacks and attacks that could involve a significant loss of information. These requirements we took into consideration when preparing for the next need, and we were looking for a solution that we could integrate into our perimeter zone, enabling antivirus and protection functions for our teams and our users. As a result of all our complex needs, we implemented this under the solutions that we already use from Check Point.

How has it helped my organization?

The solution gives us protection and a visualization of security analysis in real-time. Many of its functions and characteristics are of significant value to our institution. It's a strategic ally at the level of perimeter security within our organization and thus protects each one of our assets. 

It offers a centralized administration that allows us to be much more productive and has, within reach, a greater general visualization of everything that happens in our environment.

What is most valuable?

One of the characteristics that has given us the most value when implementing the antivirus solution is being able to have a conglomerate of solutions and to be able to manage and give to the administrators something that can observe what is happening within the network. The dashboards allow us to export this information so it can be delivered to senior managers, who are often the ones in charge of making decisions at the infrastructure level in terms of security and management of our organization. 

What needs improvement?

One of the features that we could use in the future, or would be something additional that we as users and network administrators would want to see, is the ability to integrate this solution with the other existing solutions, such as Harmony. We'd like to be able to manage all this from the same centralized management area that we use today for the perimeter lantern. It would thus provide a 360° integration of the features that we check regularly. 

For how long have I used the solution?

I've used the solution for three years.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Product Categories
Anti-Malware Tools
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.