Try our new research platform with insights from 80,000+ expert users
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Good scanning capabilities, excellent network security, and easy to configure
Pros and Cons
  • "It can scan the files that our users have downloaded to check if they have a virus."
  • "One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously."

What is our primary use case?

Check Point Antivirus is used with integrations in all the software of our company and also with connections to all the computers that we use in our employees. All operational areas have Check Point Antivirus implemented.

Check Point Antivirus has the ability to monitor the status of the network and know if there is any threat in our network and thus clean it immediately and maintain security.

In our organization, all departments of the company are protected and secure since the implementation and something important can be monitored in real-time from the application of Check Point Antivirus.

How has it helped my organization?

It was necessary to implement a tool to detect data leaks and protect the services in our business. The most sensitive software service was where Check Point began to be implemented, seeing how well it worked, it expanded to different areas of the business

With the implementation of Check Point, our computers have been safe within our network and have prevented the entry of threats thanks to the EDR system. We also needed a tool that had system recovery and this tool satisfactorily meets all our requirements.

What is most valuable?

All the features that Check Point antivirus presents are very important for the implementation of network security and the most valuable part of this tool is the easy and interactive way of its configuration through SmartConsole in Check Point.

It can scan the files that our users have downloaded to check if they have a virus, which is the most important thing. IPS and Antivirus work together, which provides more flexibility and security throughout our work environment and thus be able to have a well-secured infrastructure

What needs improvement?

One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously. However, once the update is done, it does not present any problem and works very well. The solution has high CPU and memory consumption on the firewall. It should work on the consumption of resources since we have also detected that the same thing happens with the performance of the users' machines.

The graphical interface of the solution should also improve a little since it is a little complicated to find certain objects to be able to make a configuration, in addition the guides are outdated and sometimes they do not match the interface which is sometimes complicated to implement.

Buyer's Guide
Check Point Antivirus
January 2025
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.

For how long have I used the solution?

Check Point Antivirus was implemented 4 years ago.

What do I think about the stability of the solution?

It is a very stable product. However, we've had some problems with the updates.

What do I think about the scalability of the solution?

It has excellent scalability. The same profile can be used with the same exceptions in the management firewalls

How are customer service and support?

The technical support is regular. There are well-prepared technicians. There are others who are still lacking since some problems have arisen and it has cost them to solve them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used Check Point as our first option.

How was the initial setup?

The initial configuration is simple since it presents a very intuitive graphical interface for the user. The configuration of blocking and allowing rules is easy since the panel was designed to make it as user-friendly as possible.

What about the implementation team?

The implementation was done together with the provider and was quite profitable. The provider was qualified to do this type of installation.

What was our ROI?

Our ROI is that we keep all our network and equipment safe and updated.

What's my experience with pricing, setup cost, and licensing?

I'd recommend you to try it. It is a good tool that allows and gives users the confidence to manage the network and keep it safe.

Which other solutions did I evaluate?

As we have already been working with different Check Point products, it was the first option to maintain a consistent line of technology.

What other advice do I have?

Before making the implementation, I'd advise users to verify the performance of the machines where it will be used.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 5Leaderboard
Improves security, defines policies, and helps with compliance
Pros and Cons
  • "Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity."
  • "There needs to be more internally connected systems in order to achieve real-time effectiveness."

What is our primary use case?

In search of a solution that allowed us to analyze, detect, evaluate and, above all, correct at the antivirus level within the network in a perimeter way, we have used the solutions that come in the Check Point appliances, thus giving us the possibility of enabling a lot of its most outstanding features.

How has it helped my organization?

We had been trying to complement the antivirus solution across our computers. We searched and tested different providers, reaching the conclusion that we could get the most out of solutions that we already had as they were already giving us additional protection. We needed, however, additional protection that would allow us to configure from a perimeter device all the conditions, rules, policies, and needs for blocking or security in the organization's network. With this solution, we could generate value and security in each of the actions that users have within the perimeter network. 

What is most valuable?

Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease. 

What needs improvement?

We should be able to generate client applications based on a structure and scheme that uses the power of computation of local devices to generate interaction and remote management. There needs to be more internally connected systems in order to achieve real-time effectiveness. The solution should establish communication in real-time, thereby multiplying those possibilities of interaction in a faster way when it comes to communicating against your central server. 

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Antivirus
January 2025
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle
User
Top 5
Helpful support, good scanning capabilities and has a nice, modern dashboard
Pros and Cons
  • "It has blocked many malware attacks aiming to corrupt and damage company data."
  • "The automatic updates use my internet during downloads before I authorize them."

What is our primary use case?

This antivirus has powerful security features that online threats cannot compromise. It protects all the company's computational devices from ransomware attacks. 

It gives me confidence when browsing the internet with advanced data analytics. 

It has blocked many malware attacks aiming to corrupt and damage company data. 

The solution detects unsafe files and downloads from the internet that are not safe. When doing my research, it gives a warning in advance before I run unsafe links and visit insecure sites.

How has it helped my organization?

I have used this antivirus on both desktop and mobile devices, and it has really helped me from engaging with unsafe content. 

It ensures that we publish excellent articles that meet international policies. 

It is simple to use this software, and we can set it up on any device. It has prevented the company systems from facing interruptions from external viruses that can harm confidential information.

The dashboard is modern and very robust when it comes to data visualization. 

It cleans files that are contaminated before sharing them with my colleagues.

What is most valuable?

Threat detection and response have been a great contribution to our daily programs. 

It provides daily reports on the status of the device and notifications when there are looming data threats. 

It has deployed firewalls that safeguard devices from any cyber attacks that can negatively affect workflows. When working with this antivirus, it does not affect operations in any way. 

Scanning files and data before sharing has reduced the chances of spreading viruses among the members. 

This tool has been stable and has highly improved the security status of the applications.

What needs improvement?

The automatic updates use my internet during downloads before I authorize them. 

This slows down processing power affecting the speed of operations. Integration with outdated systems is impossible. Reporting sometimes is delayed catching the user unaware of virus threats that may affect performance. 

Most features have been working effectively since I deployed this software. I have experienced very few cases of downtime. 

The customer support staff has been working 24/7/365 to ensure the system functions excellently.

For how long have I used the solution?

I've been using the solution for eight months.

What do I think about the stability of the solution?

The performance of this tool is good, and I recommend it to other business enterprises.

What do I think about the scalability of the solution?

Check Point Antivirus has provided comprehensive digital security.

How are customer service and support?

I have been working closely with customer service and their work is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used REVE Antivirus. However, It was very heavy, and it sometimes affected browsing.

How was the initial setup?

The setup was not complex at all.

What about the implementation team?

The implementation was done by the vendor team.

What was our ROI?

The recorded ROI has increased from 20% in the past six months to 50%.

What's my experience with pricing, setup cost, and licensing?

The setup process is simple, and it is easy to learn how it works.

Which other solutions did I evaluate?

I evaluated Powertech's Antivirus. The cost and functionalities were not efficient, however.

What other advice do I have?

This is a great antivirus that has given us a secure space for safe browsing and protection from online theft.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Shrinkhala Jain - PeerSpot reviewer
Project Consultant at a consultancy with 10,001+ employees
User
Top 10
Quick to deploy with a threat catchment rate and good security
Pros and Cons
  • "It is a great, cost-effective, and stable security solution to opt for."
  • "More posting of user feedback is requested across all websites and Google so that more traction can be attained. Seeing reviews helps create more confidence with clients and partners."

What is our primary use case?

This is the best security software for all organizations to have. It restricts 100% entry of all malicious files and prevents any threatening attacks from the system. 

It's one of the best software to have and increases the security checks for various verticals. 

It removes any unwanted and malicious files and folders and ensures round-the-clock protection from any threat sources. 

It came highly recommended by peers in different fields. 

Their business and tech team is highly competent and gives the best solution to users instantly without any challenges. They are highly ethical and quite professional in how they see things.

How has it helped my organization?

Check Point Antivirus is a good security software for businesses to prevent systems and their components from any ransomware and malware threat attempts. 

Also, it is one of the best solutions to counter threat sources and threat attacks through global scanning and cloud integration with third-party secure portals. It ensures complete end-to-end security of information flows throughout. It is quite a customizable solution and meets all kinds of demands in a much more streamlined manner without any hiccups. 

It is a great, cost-effective, and stable security solution to opt for.

What is most valuable?

The solution offers a quick deployment without any issues. 

The threat catchment rate of the software is very high and quite impressive. 

It is easy to integrate with all kinds of other software and hardware and works with cloud integration. We have no more tension around compatibility parameters as the software is quite stable and works efficiently across varied business environments. 

It is quick and agile and, with global scanning, it scans with great speed and works flawlessly in the background of the system without interrupting the front-end work

What needs improvement?

They could improve across many areas, like bringing in more customization and reducing the cost further. The price can be a restraining factor for many to adopt a new solution and leave an old option behind. 

More posting of user feedback is requested across all websites and Google so that more traction can be attained. Seeing reviews helps create more confidence with clients and partners. 

We demand more training orientation and quick upgrades in security parameters and utility features to have better exposure end to end.

For how long have I used the solution?

I've been using the solution for over 1.5 years now.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is completely scalable.

How are customer service and support?

Technical support is good so far.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a localized solution from one of our partners.

How was the initial setup?

The initial setup is easygoing. We've had no pain at all.

What about the implementation team?

We implemented the product using an in-house team.

What was our ROI?

The ROI is great.

What's my experience with pricing, setup cost, and licensing?

Check Point Antivirus is one of the best and fastest virus-scanning software in the market and you will not be disappointed at all. It's easy to deploy and integration is great. The pricing is also quite affordable. They offer easy renewal and signing of SLAs, which are hassle-free.

Which other solutions did I evaluate?

We looked at a lot of different options. We tried ESET, Norton, Kaspersky, etc.

What other advice do I have?

Try this security solution. Millions of like us are choosing this option. It's the best solution.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Assistant Manager at ASCI
User
Great support, good threat detection, and high customization
Pros and Cons
  • "Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users."
  • "Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner."

What is our primary use case?

Check Point Antivirus software is highly reliable and dependable security software that restricts malware entry into our IT system and keeps secure our IT system at its best. It is the most advanced security solution which enables the IT system to scan all the system components effortlessly and do proactive threat detection onto the system to identify any incumbent threats. 

It helps run the scanning on integrated system components and the cloud server with fewer false negative cases to ensure the system's performance at its best. It provides the system with foolproof security and ensures high customer satisfaction always.

How has it helped my organization?

This security solution is one of the best so far. It enables IT professionals and businesses to work carefree with internal and external stakeholders and their IT systems and exchange information securely without any data theft or leakage. It is highly advised to incorporate this solution at all the critical windows and stages of system flow so that no malware attack can come inside the system under any circumstance.

It has improved the turnaround time for our project completion and system integration activities as it's the need of the hour for all the stakeholders in today's world.

It has lead to improved positive performance outcomes with high-end productivity. There are no more system issues, and complaints as IT does not bother us now.

What is most valuable?

Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users. 

The Check Point Partner keeps updating its EDR system and ensures no lapses occurred during the operating time. The entire team of Check Point is quite agile and proactive in terms of their advanced product development and their reaction time to any issue or complexity is just fantastic which ensures no deep damage to the system from threats.

EDR improvement checks system security and a proactive business and tech team improves customer interaction in the greatest manner possible.

What needs improvement?

Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner. This will ensure more credibility and confidence in customers and helps relationships last longer. High-end wonderful experiences for clientele will result in peer recommendations, which will certainly enhance the customer base for Check Point.

Keep improving your business offerings and go for an extension of the trial version for a longer period so that everyone can be benefitted from the same.

For how long have I used the solution?

It's been over six months now since we started using the product. It's one of the best available solutions so far.

What do I think about the stability of the solution?

The product offers high stability and flexibility.

What do I think about the scalability of the solution?

The product is quite scalable and replicable across all kinds of IT environments 

How are customer service and support?

Support is wonderful and we highly recommend them. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We were using a few peer-recommended security solutions earlier.

How was the initial setup?

The setup is not complicated at all. We had smooth onboarding and easy deployment.

What about the implementation team?

We implemented it through a vendor.

What was our ROI?

We've seen over 75% ROI.

What's my experience with pricing, setup cost, and licensing?

It's cheap and quite low presently, and the room for customization is humongous currently. High time to go for these solutions as they are accelerating with great performance and pace.

Which other solutions did I evaluate?

We looked at McAfee and Kaspersky. They were evaluated thoroughly by our business and tech teams.

What other advice do I have?

I strongly recommend this solution to all IT businesses and professionals. This is a one-stop solution for all your security woes. Go for its trial today and experience the new age security utilities on your own.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited
Real User
Filters websites well, has good phishing protection, and is reasonably priced
Pros and Cons
  • "Check Point offers a comprehensive solution that will not only create a firewall but will also protect the traffic of data from an application usage standpoint."
  • "Filtering the websites that can be visited is important also as there's always a chance to come by sites that, just by clicking, will download malicious threats."

What is our primary use case?

I wanted to protect my system from threats as sensitive business information was being stored in it, understanding that keeping the hardware in a secure location won't be enough measure to protect all the data in it. I went over different options in the market as Kaspersky Lab, ESET, Symantec, and Check Point of course, and spoke to a representative and did my own investigations. I came to the realization that this was the best solution for the need and the budget I had available and it hasn't disappointed me since.

How has it helped my organization?

Given the fact that threats are evolving every day, it is really important to have a solution that's ahead of transforming viruses that can leak in multiple forms and channels. Check Point offers a comprehensive solution that will not only create a firewall but will also protect the traffic of data from an application usage standpoint. It also provides email protection and detects threats in the public networks you're trying to connect your device to.

What is most valuable?

Phishing is an issue that is affecting a lot of businesses given the huge email traffic in businesses. Sometimes the server security firewalls won't detect threats from coming into the endpoints, so email protection is definitely one of them that's helpful. 

Filtering the websites that can be visited is important also as there's always a chance to come by sites that, just by clicking, will download malicious threats. Even when you are on secure sites, you will see that, with Check Point, some ads and advertising will be blocked as they could be potential viruses.

What needs improvement?

We've noticed that the management console has some limitations as it's managed through the browser. Despite being user-friendly it could definitely include a wider range of security measurements that can make it more customizable depending on the end-user interests. If the end-user happens to want a Linux OS it can't access the smart console as it's .exe and only supported through Windows. This means they'll have to use a virtual PC to access the .exe which just makes it a bit of a hassle for these end-users.

For how long have I used the solution?

I've been using the solution for over seven years.

Which solution did I use previously and why did I switch?

We did use Kaspersky and switched as there were security concerns around the privacy of the data.

What's my experience with pricing, setup cost, and licensing?

Check Point's price point was right in the middle. It's not the cheapest and not the most expensive and offers a good cost/benefit ratio.

Which other solutions did I evaluate?

We looked at Kaspersky, ESET, Symantec, BitDefender, and McAfee.

What other advice do I have?

Overall I am very satisfied.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IdoSarusi - PeerSpot reviewer
Developer at Shavit-security
Reseller
Top 5
Has an efficient sandboxing feature, but the malware detection capabilities need improvement
Pros and Cons
  • "The initial setup was straightforward."
  • "There is room for improvement in detecting more sophisticated and emerging threats."

What is our primary use case?

We primarily install Check Point Antivirus on company computers and laptops to prevent malware infections, particularly focusing on protecting against phishing attacks and malicious downloads by employees.

How has it helped my organization?

The platform has significantly improved our organization's cybersecurity posture by effectively detecting and containing malware threats. 

What is most valuable?

The product's sandboxing feature is valuable as it runs suspicious files in a virtual environment. It helps us analyze their behavior without risking the main system.

What needs improvement?

The platform's malware detection capabilities could be enhanced. There is room for improvement in detecting more sophisticated and emerging threats.

Additionally, including AI-driven features that can automatically generate and optimize security policies based on the organization's specific needs and threats would be beneficial.

For how long have I used the solution?

I have been using Check Point Antivirus for about two to three years.

What do I think about the stability of the solution?

The platform has proven to be very stable. We have not encountered any major issues or downtime related to its operation.

What do I think about the scalability of the solution?

The product seamlessly scales from small to large deployments without any noticeable performance degradation. I rate the scalability a ten. 

How are customer service and support?

I have heard positive feedback regarding the technical support team's responsiveness and expertise.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup was straightforward. Installing agents and deploying the software on devices was simple, although configuring detailed security policies required some cybersecurity knowledge.

What other advice do I have?

I rate Check Point Antivirus a seven out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Leaderboard
Good security features and excellent protection from malware and ransomware
Pros and Cons
  • "One of the characteristics of this antivirus that is valuable is the detection of ransomware."
  • "We'd like them to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident."

What is our primary use case?

We had an absence of an antivirus utility that would give us protection inside and outside the organization. This tool integrated into several Check Point solutions helped us remedy this need. Starting from there, we have been applying this feature to meet the need and keep our users safe and secure. 

This solution is consistently implemented as part of the organization's endpoint security solution, combining global threat intelligence and next-generation advanced threat prevention engines. 

How has it helped my organization?

The endpoint security features are great. You not only have a solution that manages your computer but also protects you from malware, ransomware, and also from any other virus. You can do so from wherever you are and connect your computer to the internet. This feature learns well and is supported by global threat intelligence and zero-day threat prevention engines and many of the new generation. 

For us, it is important to have solutions that always protect and innovate the security of users and above all security and protection in real time. 

What is most valuable?

One of the characteristics of this antivirus that is valuable is the detection of ransomware. I can detect viruses that have done the most damage in recent years. I can protect users from damages and total or partial loss of information. We're being well protected. This protection feeds on databases that are constantly updated, giving greater security. It is worth using, and having in our organization is one of the products that will make the difference during an attack and will safeguard the security of the equipment.

What needs improvement?

I would like to see, in the future, this virus emulation feature deployed to endpoint security where it sends the virus found in sandboxing and emulates the attack, notifying administrators via a portal so that they can find out and learn from the attack that they are having.  

Another point to consider is the ability to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident.

For how long have I used the solution?

I've used the solution for two years.

What do I think about the scalability of the solution?

It is easy to configure and is not very invasive with users, which makes it very practical to use.

What's my experience with pricing, setup cost, and licensing?

Their service in Spanish is something that we need. We've had a bad taste based on this part of the service. We need more attention to our language. 

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2025
Product Categories
Anti-Malware Tools
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.