What is our primary use case?
Check Point Antivirus is used with integrations in all the software of our company and also with connections to all the computers that we use in our employees. All operational areas have Check Point Antivirus implemented.
Check Point Antivirus has the ability to monitor the status of the network and know if there is any threat in our network and thus clean it immediately and maintain security.
In our organization, all departments of the company are protected and secure since the implementation and something important can be monitored in real-time from the application of Check Point Antivirus.
How has it helped my organization?
It was necessary to implement a tool to detect data leaks and protect the services in our business. The most sensitive software service was where Check Point began to be implemented, seeing how well it worked, it expanded to different areas of the business
With the implementation of Check Point, our computers have been safe within our network and have prevented the entry of threats thanks to the EDR system. We also needed a tool that had system recovery and this tool satisfactorily meets all our requirements.
What is most valuable?
All the features that Check Point antivirus presents are very important for the implementation of network security and the most valuable part of this tool is the easy and interactive way of its configuration through SmartConsole in Check Point.
It can scan the files that our users have downloaded to check if they have a virus, which is the most important thing. IPS and Antivirus work together, which provides more flexibility and security throughout our work environment and thus be able to have a well-secured infrastructure
What needs improvement?
One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously. However, once the update is done, it does not present any problem and works very well. The solution has high CPU and memory consumption on the firewall. It should work on the consumption of resources since we have also detected that the same thing happens with the performance of the users' machines.
The graphical interface of the solution should also improve a little since it is a little complicated to find certain objects to be able to make a configuration, in addition the guides are outdated and sometimes they do not match the interface which is sometimes complicated to implement.
Buyer's Guide
Check Point Antivirus
December 2024
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
For how long have I used the solution?
Check Point Antivirus was implemented 4 years ago.
What do I think about the stability of the solution?
It is a very stable product. However, we've had some problems with the updates.
What do I think about the scalability of the solution?
It has excellent scalability. The same profile can be used with the same exceptions in the management firewalls
How are customer service and support?
The technical support is regular. There are well-prepared technicians. There are others who are still lacking since some problems have arisen and it has cost them to solve them.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We used Check Point as our first option.
How was the initial setup?
The initial configuration is simple since it presents a very intuitive graphical interface for the user. The configuration of blocking and allowing rules is easy since the panel was designed to make it as user-friendly as possible.
What about the implementation team?
The implementation was done together with the provider and was quite profitable. The provider was qualified to do this type of installation.
What was our ROI?
Our ROI is that we keep all our network and equipment safe and updated.
What's my experience with pricing, setup cost, and licensing?
I'd recommend you to try it. It is a good tool that allows and gives users the confidence to manage the network and keep it safe.
Which other solutions did I evaluate?
As we have already been working with different Check Point products, it was the first option to maintain a consistent line of technology.
What other advice do I have?
Before making the implementation, I'd advise users to verify the performance of the machines where it will be used.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: I am a real user, and this review is based on my own experience and opinions.