We use the solution for antivirus, device encryption, file encryption, and URL filtering.
A cloud solution for antivirus, device encryption and URL filtering
Pros and Cons
- "The solution offers multiple features in one solution, along with data detection."
- "Check Point should provide some technical sessions on antivirus solutions."
What is our primary use case?
What is most valuable?
The solution offers multiple features in one solution, along with data detection.
What needs improvement?
The agent side should be less. It impacts customers' asset performance because it will be more complex for the customers.
For how long have I used the solution?
I have been using Check Point Antivirus for 6-8 months.
Buyer's Guide
Check Point Antivirus
December 2024
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
What do I think about the stability of the solution?
Check Point should provide some technical sessions on antivirus solutions. Then, it would be helpful to reach more customers in India.
I rate the solution’s stability a seven out of ten.
What do I think about the scalability of the solution?
The solution is scalable. We have a few customers using this solution.
How are customer service and support?
It is quite difficult to get a response from OEM. We are facing issues with all products except for email security, with the support team of the Check Point.
How was the initial setup?
The initial setup is complex, depending on the number of assets. It takes less than half an hour for a single asset. We should set up everything after deploying and testing it. Symantec takes five to ten minutes after deploying to test everything. We use manual deployment.
What was our ROI?
The solution is helpful for a particular budget. We are getting the best solution that will cover all your parameters.
What's my experience with pricing, setup cost, and licensing?
The product’s pricing is moderate.
What other advice do I have?
Every feature provided by the antivirus software is good compared to other solutions. Sandboxing is helpful for customers while downloading and detecting malicious software.
1-2 persons are required for deployment, whereas the maintenance and monitoring need a team of three to five members.
I will recommend the solution. It's a very good solution compared to other antivirus capability servers. The sandboxing technology is helpful.
We have not integrated it with any other tool set. We integrated a Check Point to get the logs or connect the data.
Overall, I rate the solution an 8 out of 10.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Apr 15, 2024
Flag as inappropriatePerimeter Security Administrator at a security firm with 51-200 employees
Improves security, defines policies, and helps with compliance
Pros and Cons
- "Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity."
- "There needs to be more internally connected systems in order to achieve real-time effectiveness."
What is our primary use case?
In search of a solution that allowed us to analyze, detect, evaluate and, above all, correct at the antivirus level within the network in a perimeter way, we have used the solutions that come in the Check Point appliances, thus giving us the possibility of enabling a lot of its most outstanding features.
How has it helped my organization?
We had been trying to complement the antivirus solution across our computers. We searched and tested different providers, reaching the conclusion that we could get the most out of solutions that we already had as they were already giving us additional protection. We needed, however, additional protection that would allow us to configure from a perimeter device all the conditions, rules, policies, and needs for blocking or security in the organization's network. With this solution, we could generate value and security in each of the actions that users have within the perimeter network.
What is most valuable?
Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease.
What needs improvement?
We should be able to generate client applications based on a structure and scheme that uses the power of computation of local devices to generate interaction and remote management. There needs to be more internally connected systems in order to achieve real-time effectiveness. The solution should establish communication in real-time, thereby multiplying those possibilities of interaction in a faster way when it comes to communicating against your central server.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Antivirus
December 2024
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
Project Consultant at a consultancy with 10,001+ employees
Quick to deploy with a threat catchment rate and good security
Pros and Cons
- "It is a great, cost-effective, and stable security solution to opt for."
- "More posting of user feedback is requested across all websites and Google so that more traction can be attained. Seeing reviews helps create more confidence with clients and partners."
What is our primary use case?
This is the best security software for all organizations to have. It restricts 100% entry of all malicious files and prevents any threatening attacks from the system.
It's one of the best software to have and increases the security checks for various verticals.
It removes any unwanted and malicious files and folders and ensures round-the-clock protection from any threat sources.
It came highly recommended by peers in different fields.
Their business and tech team is highly competent and gives the best solution to users instantly without any challenges. They are highly ethical and quite professional in how they see things.
How has it helped my organization?
Check Point Antivirus is a good security software for businesses to prevent systems and their components from any ransomware and malware threat attempts.
Also, it is one of the best solutions to counter threat sources and threat attacks through global scanning and cloud integration with third-party secure portals. It ensures complete end-to-end security of information flows throughout. It is quite a customizable solution and meets all kinds of demands in a much more streamlined manner without any hiccups.
It is a great, cost-effective, and stable security solution to opt for.
What is most valuable?
The solution offers a quick deployment without any issues.
The threat catchment rate of the software is very high and quite impressive.
It is easy to integrate with all kinds of other software and hardware and works with cloud integration. We have no more tension around compatibility parameters as the software is quite stable and works efficiently across varied business environments.
It is quick and agile and, with global scanning, it scans with great speed and works flawlessly in the background of the system without interrupting the front-end work
What needs improvement?
They could improve across many areas, like bringing in more customization and reducing the cost further. The price can be a restraining factor for many to adopt a new solution and leave an old option behind.
More posting of user feedback is requested across all websites and Google so that more traction can be attained. Seeing reviews helps create more confidence with clients and partners.
We demand more training orientation and quick upgrades in security parameters and utility features to have better exposure end to end.
For how long have I used the solution?
I've been using the solution for over 1.5 years now.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is completely scalable.
How are customer service and support?
Technical support is good so far.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were using a localized solution from one of our partners.
How was the initial setup?
The initial setup is easygoing. We've had no pain at all.
What about the implementation team?
We implemented the product using an in-house team.
What was our ROI?
The ROI is great.
What's my experience with pricing, setup cost, and licensing?
Check Point Antivirus is one of the best and fastest virus-scanning software in the market and you will not be disappointed at all. It's easy to deploy and integration is great. The pricing is also quite affordable. They offer easy renewal and signing of SLAs, which are hassle-free.
Which other solutions did I evaluate?
We looked at a lot of different options. We tried ESET, Norton, Kaspersky, etc.
What other advice do I have?
Try this security solution. Millions of like us are choosing this option. It's the best solution.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Human Resources Manager at Beat
Good virus detection with helpful performance metrics and a simple deployment
Pros and Cons
- "The application runs very fast and does not affect the performance speed of the device where it is installed."
- "When there are many devices, it is more costly since each device requires unique login credentials."
What is our primary use case?
The antivirus helps the organization in securing desktops and mobile devices from external data threats. It detects the entry of viruses to devices that can destroy data and quickly takes necessary action.
Once the software is installed, there is no additional cost that is required to run it. It troubleshoots any errors that may slow down workflows across applications. Check Point Antivirus integrates with multiple operating systems, including Windows and Linux.
Since I installed it on my desktop, the browsing speed has improved, and I can visit several sites without fear.
How has it helped my organization?
The software has improved the digital experience of employees who have deployed it.
I can comfortably open links attached to my emails and share documents with my colleagues without fear of cyber attacks.
Departments that used to lose data to virus attacks can work from any site and focus more on productive business engagements.
The antivirus provides advanced security data analytics that helps the user to work from safe sites that can affect tasks in progress.
The software screens applications to ensure they perform effectively.
What is most valuable?
Virus detection helps teams to be aware of any threats that can harm data and take precautions in advance.
It provides networking reports on the data security situation, which enables users to make decisions.
Performance metrics provided regularly help the IT team plan to curb any threats to company data.
It is easy to deploy the antivirus and learn how it works.
The application runs very fast and does not affect the performance speed of the device where it is installed.
Daily security analysis indicators help team members to engage any abnormality with real-time insights.
What needs improvement?
The current features are doing extremely well. That said, the system coding can be simplified to enable any user to interpret the security situation of the used device.
I am happy with the set data models since they monitor the security situation of new sites before browsing.
I have not observed most failures since I started using this software.
The company can embark on timely updates to ensure the application is compatible with devices.
Customer support comes in on time when we contact them via online chats and phone calls.
When there are many devices, it is more costly since each device requires unique login credentials.
The product is heavy, and it requires more space for effective operation. New users can find it difficult to set up and install due to the lack of a robust user manual.
For how long have I used the solution?
I've used the solution for eight months.
What do I think about the stability of the solution?
It works for a long time without failing and does not misbehave.
What do I think about the scalability of the solution?
The antivirus performance has been excellent.
How are customer service and support?
The customer service team has never failed us.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used Kaspersky Antivirus, however, it used to fail most of the time.
How was the initial setup?
The installation process of the application is easy and straightforward.
What about the implementation team?
I deployed it through a vendor, and they are doing well.
What was our ROI?
A secure work environment has contributed to increased ROI.
What's my experience with pricing, setup cost, and licensing?
The pricing is suitable, and the setup process is simple.
Which other solutions did I evaluate?
I evaluated most free online antiviruses, however, they were not effective.
What other advice do I have?
Check Point Antivirus is a sure bet for the detection of any virus.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Operations Engineer at SFR
Scalable, easy to configure, and simple to manage
Pros and Cons
- "It is very easy to manage the Antivirus blade, even for newcomers in our technical support team, which is a key area of interest for us."
- "It may be interesting to improve this solution against zero-day attacks, as they happen very frequently and are clearly a severe threat."
What is our primary use case?
We are using the Antivirus blade to protect our organization against threats such as viruses/malware that could propagate in our information system and harm it in various ways.
Thanks to the important database maintained by Check Point that relies on this blade, we can enforce a strong security policy on our devices and be compliant with the latest best practices regarding internet threats.
We operate several firewalls in our organization and we especially need this kind of efficiency on the internet-facing ones.
How has it helped my organization?
The Antivirus blade has improved our organization in several ways, including having better global security against viruses and malware, having better visibility and protection regarding files that go in and out of our company, offering better scaling and integration with other security products, and probably offering better threat management.
It globally helps us in having centralized management of all internet content, which is efficient in terms of managing exploitation and helps our technical support teams to fulfill their daily missions.
What is most valuable?
One of the features that we find most valuable is the simplicity of the configuration through the Smart Console interface.
It is very easy to manage the Antivirus blade, even for newcomers in our technical support team, which is a key area of interest for us.
Also, the sandbox feature is very interesting as it can automatically isolate an infected machine from the network, which is valuable.
We could also talk about the real-time detection scan feature that can monitor files as they are being accessed, which allows for a quicker response time.
What needs improvement?
It may be interesting to improve this solution against zero-day attacks, as they happen very frequently and are clearly a severe threat.
On a more practical level, the complaint opening process through technical support could be better, as it must be done through the portal only for now.
On a financial level, prices for CP products could be improved. We know for sure that they are all high-quality products, however, sometimes it doesn't justify high prices on some products.
For how long have I used the solution?
We have been Check Point Antivirus for two years now.
What do I think about the scalability of the solution?
The solution is easily scalable among CP devices.
Which solution did I use previously and why did I switch?
We used the Stormshield solution and we switched to have a better integration with other security devices.
What's my experience with pricing, setup cost, and licensing?
The setup can be painful, and pricing/licensing can be high. That said, the quality is there.
Which other solutions did I evaluate?
Yes, we also evaluated Fortinet.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Network/Security Engineer at Skywind Group
Regularly updated and has good event visibility and logging
Pros and Cons
- "There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives."
- "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
What is our primary use case?
Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment, located in Asia (Taiwan).
The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.
The Check Point Antivirus software blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of scanning files that are traversing the network for the presence of viruses or other malicious software.
How has it helped my organization?
The Check Point HA Clusters are used to protect our company's datacenter, located in Asia (Taiwan). This software blade, the Check Point Antivirus, is activated in conjunction with the others and serves to scan the files traversing via the network. They may be in the form of email attachments or via HTTP/S.
Such files are scanned for the presence of known viruses and malware with the help of the built-in database. The database is updated as per schedule, which for us is four times per day.
The software is quite simple to use, yet still efficient. The antivirus scans are the basic security mechanism, which should be implemented on all the levels. In my opinion, the Check Point Antivirus does its job just right.
What is most valuable?
- The Antivirus software blade is part of the Next Generation Threat Prevention license bundle.
- The Antivirus is able to scan files downloaded from the internet or traversing the network via Check Point Gateways/Clusters.
- The Antivirus software blade is configured via the Unified Threat Prevention policy in the Smart Console (at least for R80.10, the version we use).
- There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives.
- The updates for the blade are downloaded every two hours.
- As with the other Check Point blades, the visibility and logging of events are outstanding.
What needs improvement?
I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.
Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.
We also had several support cases opened for software issues, but none of them were connected with the Check Point Antivirus software blade.
For how long have I used the solution?
We have been using this product for about three years, starting in late 2017.
What do I think about the stability of the solution?
The Check Point Antivirus software blade is stable and we haven't faced any issues with it.
What do I think about the scalability of the solution?
The Check Point Antivirus software blade scales well with the gateways we use, since it doesn't affect the overall performance much after activation.
How are customer service and technical support?
We have had several support cases opened, but none of them were connected with the Check Point Mobile Access Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.
The longest issue took about one month to be resolved, which we consider too long.
Which solution did I use previously and why did I switch?
No, we didn't previously use another network antivirus solution.
How was the initial setup?
The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.
What about the implementation team?
Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.
What's my experience with pricing, setup cost, and licensing?
Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.
Which other solutions did I evaluate?
No, since we had Check Point NGFWs implemented, we just enabled the new software blade.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Software Engineer at Doddle
Helpful support, good scanning capabilities and has a nice, modern dashboard
Pros and Cons
- "It has blocked many malware attacks aiming to corrupt and damage company data."
- "The automatic updates use my internet during downloads before I authorize them."
What is our primary use case?
This antivirus has powerful security features that online threats cannot compromise. It protects all the company's computational devices from ransomware attacks.
It gives me confidence when browsing the internet with advanced data analytics.
It has blocked many malware attacks aiming to corrupt and damage company data.
The solution detects unsafe files and downloads from the internet that are not safe. When doing my research, it gives a warning in advance before I run unsafe links and visit insecure sites.
How has it helped my organization?
I have used this antivirus on both desktop and mobile devices, and it has really helped me from engaging with unsafe content.
It ensures that we publish excellent articles that meet international policies.
It is simple to use this software, and we can set it up on any device. It has prevented the company systems from facing interruptions from external viruses that can harm confidential information.
The dashboard is modern and very robust when it comes to data visualization.
It cleans files that are contaminated before sharing them with my colleagues.
What is most valuable?
Threat detection and response have been a great contribution to our daily programs.
It provides daily reports on the status of the device and notifications when there are looming data threats.
It has deployed firewalls that safeguard devices from any cyber attacks that can negatively affect workflows. When working with this antivirus, it does not affect operations in any way.
Scanning files and data before sharing has reduced the chances of spreading viruses among the members.
This tool has been stable and has highly improved the security status of the applications.
What needs improvement?
The automatic updates use my internet during downloads before I authorize them.
This slows down processing power affecting the speed of operations. Integration with outdated systems is impossible. Reporting sometimes is delayed catching the user unaware of virus threats that may affect performance.
Most features have been working effectively since I deployed this software. I have experienced very few cases of downtime.
The customer support staff has been working 24/7/365 to ensure the system functions excellently.
For how long have I used the solution?
I've been using the solution for eight months.
What do I think about the stability of the solution?
The performance of this tool is good, and I recommend it to other business enterprises.
What do I think about the scalability of the solution?
Check Point Antivirus has provided comprehensive digital security.
How are customer service and support?
I have been working closely with customer service and their work is great.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used REVE Antivirus. However, It was very heavy, and it sometimes affected browsing.
How was the initial setup?
The setup was not complex at all.
What about the implementation team?
The implementation was done by the vendor team.
What was our ROI?
The recorded ROI has increased from 20% in the past six months to 50%.
What's my experience with pricing, setup cost, and licensing?
The setup process is simple, and it is easy to learn how it works.
Which other solutions did I evaluate?
I evaluated Powertech's Antivirus. The cost and functionalities were not efficient, however.
What other advice do I have?
This is a great antivirus that has given us a secure space for safe browsing and protection from online theft.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Engineer at Digitaltrack
Has good threat cloud integration, sandboxing, and behavioral analysis features
Pros and Cons
- "Performance and resource consumption should be reduced."
What is our primary use case?
Check Point Antivirus has a great design for network, security gateway deployment, threat detection, and prevention.
How has it helped my organization?
Check Point Antivirus is a valuable tool for organizations because it helps them secure the network and data.
What is most valuable?
The most valuable features of Check Point are threat cloud integration, sandboxing, and behavioral analysis.
What needs improvement?
Performance and resource consumption should be reduced.
Additional features should be EDR, Advanced sandboxing technology, deeper cloud integration, etc.
For how long have I used the solution?
I have been using it for the past four years.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
Scalability is good.
How are customer service and support?
The support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is excellent.
What about the implementation team?
We did the implementation in-house.
What was our ROI?
We have seen good ROI.
Which other solutions did I evaluate?
We also evaluated CrowdStike Falcon and Sophos Intercept X.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Jul 24, 2024
Flag as inappropriateBuyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Product Categories
Anti-Malware ToolsPopular Comparisons
Microsoft Defender for Endpoint
ESET Endpoint Protection Platform
Microsoft Exchange Online Protection (EOP)
VirusTotal
Cuckoo Sandbox
ZoneAlarm
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Do we need to use both EDR and Antivirus (AV) solutions for better protection of IT assets?
- Looking for alternatives to Symantec Cloud Protection Engine
- Who provides a better antivirus solution: Bitdefender or Sophos?
- Which antivirus is best for isolated work PCs?
- How do you identify malware?
- Why are Anti-Malware Tools important for companies?