Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Senior Network/Security Engineer at Skywind Group
Real User
Regularly updated and has good event visibility and logging
Pros and Cons
  • "There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives."
  • "I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."

What is our primary use case?

Our company works in the area of developing and delivering online gambling platforms. The Check Point Next-Generation Firewalls are the core security solution we use for the protection of our datacenter environment, located in Asia (Taiwan).

The environment has about 50 physical servers as virtualization hosts, and we have two HA Clusters that consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.

The Check Point Antivirus software blade is one of the numerous blades activated on the NGFWs and serves for security improvement in the area of scanning files that are traversing the network for the presence of viruses or other malicious software.

How has it helped my organization?

The Check Point HA Clusters are used to protect our company's datacenter, located in Asia (Taiwan). This software blade, the Check Point Antivirus, is activated in conjunction with the others and serves to scan the files traversing via the network. They may be in the form of email attachments or via HTTP/S.

Such files are scanned for the presence of known viruses and malware with the help of the built-in database. The database is updated as per schedule, which for us is four times per day.

The software is quite simple to use, yet still efficient. The antivirus scans are the basic security mechanism, which should be implemented on all the levels. In my opinion, the Check Point Antivirus does its job just right.

What is most valuable?

  1. The Antivirus software blade is part of the Next Generation Threat Prevention license bundle.
  2. The Antivirus is able to scan files downloaded from the internet or traversing the network via Check Point Gateways/Clusters.
  3. The Antivirus software blade is configured via the Unified Threat Prevention policy in the Smart Console (at least for R80.10, the version we use).
  4. There is almost no impact on the security Gateway/Cluster performance after the activation of the blade, especially if you don't scan nested archives.
  5. The updates for the blade are downloaded every two hours.
  6. As with the other Check Point blades, the visibility and logging of events are outstanding.

What needs improvement?

I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain. Maintenance requires that the licenses and the support services be prolonged regularly.

Alternatively, they should create some additional bundles of the software blades with significant discounts in addition to the current Next Generation Threat Prevention & SandBlast (NGTX) and Next Generation Threat Prevention (NGTP) offers.

We also had several support cases opened for software issues, but none of them were connected with the Check Point Antivirus software blade.

Buyer's Guide
Check Point Antivirus
November 2024
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.

For how long have I used the solution?

We have been using this product for about three years, starting in late 2017.

What do I think about the stability of the solution?

The Check Point Antivirus software blade is stable and we haven't faced any issues with it.

What do I think about the scalability of the solution?

The Check Point Antivirus software blade scales well with the gateways we use, since it doesn't affect the overall performance much after activation.

How are customer service and support?

We have had several support cases opened, but none of them were connected with the Check Point Mobile Access Software Blade. Some of the issues were resolved by installing the latest recommended JumoHotfix, whereas some required additional configuration at the OS kernel level.

The longest issue took about one month to be resolved, which we consider too long.

Which solution did I use previously and why did I switch?

No, we didn't previously use another network antivirus solution.

How was the initial setup?

The setup was straightforward. The configuration was easy and understandable, and we relied heavily on built-in objects and groups.

What about the implementation team?

Our deployment was completed by our in-house team. We have a Check Point Certified engineer working in the engineering team.

What's my experience with pricing, setup cost, and licensing?

Choosing the correct set of licenses is essential because, without the additional software blade licenses, the Check Point gateways are just a stateful firewall.

Which other solutions did I evaluate?

No, since we had Check Point NGFWs implemented, we just enabled the new software blade.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2008410 - PeerSpot reviewer
Software Engineer at Doddle
User
Top 5
Helpful support, good scanning capabilities and has a nice, modern dashboard
Pros and Cons
  • "It has blocked many malware attacks aiming to corrupt and damage company data."
  • "The automatic updates use my internet during downloads before I authorize them."

What is our primary use case?

This antivirus has powerful security features that online threats cannot compromise. It protects all the company's computational devices from ransomware attacks. 

It gives me confidence when browsing the internet with advanced data analytics. 

It has blocked many malware attacks aiming to corrupt and damage company data. 

The solution detects unsafe files and downloads from the internet that are not safe. When doing my research, it gives a warning in advance before I run unsafe links and visit insecure sites.

How has it helped my organization?

I have used this antivirus on both desktop and mobile devices, and it has really helped me from engaging with unsafe content. 

It ensures that we publish excellent articles that meet international policies. 

It is simple to use this software, and we can set it up on any device. It has prevented the company systems from facing interruptions from external viruses that can harm confidential information.

The dashboard is modern and very robust when it comes to data visualization. 

It cleans files that are contaminated before sharing them with my colleagues.

What is most valuable?

Threat detection and response have been a great contribution to our daily programs. 

It provides daily reports on the status of the device and notifications when there are looming data threats. 

It has deployed firewalls that safeguard devices from any cyber attacks that can negatively affect workflows. When working with this antivirus, it does not affect operations in any way. 

Scanning files and data before sharing has reduced the chances of spreading viruses among the members. 

This tool has been stable and has highly improved the security status of the applications.

What needs improvement?

The automatic updates use my internet during downloads before I authorize them. 

This slows down processing power affecting the speed of operations. Integration with outdated systems is impossible. Reporting sometimes is delayed catching the user unaware of virus threats that may affect performance. 

Most features have been working effectively since I deployed this software. I have experienced very few cases of downtime. 

The customer support staff has been working 24/7/365 to ensure the system functions excellently.

For how long have I used the solution?

I've been using the solution for eight months.

What do I think about the stability of the solution?

The performance of this tool is good, and I recommend it to other business enterprises.

What do I think about the scalability of the solution?

Check Point Antivirus has provided comprehensive digital security.

How are customer service and support?

I have been working closely with customer service and their work is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used REVE Antivirus. However, It was very heavy, and it sometimes affected browsing.

How was the initial setup?

The setup was not complex at all.

What about the implementation team?

The implementation was done by the vendor team.

What was our ROI?

The recorded ROI has increased from 20% in the past six months to 50%.

What's my experience with pricing, setup cost, and licensing?

The setup process is simple, and it is easy to learn how it works.

Which other solutions did I evaluate?

I evaluated Powertech's Antivirus. The cost and functionalities were not efficient, however.

What other advice do I have?

This is a great antivirus that has given us a secure space for safe browsing and protection from online theft.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Antivirus
November 2024
Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
Evans Vs - PeerSpot reviewer
Engineer at Digitaltrack
User
Top 5Leaderboard
Has good threat cloud integration, sandboxing, and behavioral analysis features
Pros and Cons
    • "Performance and resource consumption should be reduced."

    What is our primary use case?

    Check Point Antivirus has a great design for network, security gateway deployment, threat detection, and prevention.                                              

    How has it helped my organization?

    Check Point Antivirus is a valuable tool for organizations because it helps them secure the network and data.                                                                              

    What is most valuable?

    The most valuable features of Check Point are threat cloud integration, sandboxing, and behavioral analysis.

    What needs improvement?

    Performance and resource consumption should be reduced. 

    Additional features should be EDR, Advanced sandboxing technology, deeper cloud integration, etc.                                                                                         

    For how long have I used the solution?

    I have been using it for the past four years.

    What do I think about the stability of the solution?

    The stability is good.

    What do I think about the scalability of the solution?

    Scalability is good.

    How are customer service and support?

    The support is good.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The initial setup is excellent.

    What about the implementation team?

    We did the implementation in-house.

    What was our ROI?

    We have seen good ROI.

    Which other solutions did I evaluate?

    We also evaluated CrowdStike Falcon and Sophos Intercept X.

    Which deployment model are you using for this solution?

    Private Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Adrian Cambronero - PeerSpot reviewer
    Consultant at ITQS
    Reseller
    Top 5Leaderboard
    Good scanning capabilities, excellent network security, and easy to configure
    Pros and Cons
    • "It can scan the files that our users have downloaded to check if they have a virus."
    • "One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously."

    What is our primary use case?

    Check Point Antivirus is used with integrations in all the software of our company and also with connections to all the computers that we use in our employees. All operational areas have Check Point Antivirus implemented.

    Check Point Antivirus has the ability to monitor the status of the network and know if there is any threat in our network and thus clean it immediately and maintain security.

    In our organization, all departments of the company are protected and secure since the implementation and something important can be monitored in real-time from the application of Check Point Antivirus.

    How has it helped my organization?

    It was necessary to implement a tool to detect data leaks and protect the services in our business. The most sensitive software service was where Check Point began to be implemented, seeing how well it worked, it expanded to different areas of the business

    With the implementation of Check Point, our computers have been safe within our network and have prevented the entry of threats thanks to the EDR system. We also needed a tool that had system recovery and this tool satisfactorily meets all our requirements.

    What is most valuable?

    All the features that Check Point antivirus presents are very important for the implementation of network security and the most valuable part of this tool is the easy and interactive way of its configuration through SmartConsole in Check Point.

    It can scan the files that our users have downloaded to check if they have a virus, which is the most important thing. IPS and Antivirus work together, which provides more flexibility and security throughout our work environment and thus be able to have a well-secured infrastructure

    What needs improvement?

    One of the most frequent problems that Check Point Antivirus presents is that some antivirus updates fail continuously. However, once the update is done, it does not present any problem and works very well. The solution has high CPU and memory consumption on the firewall. It should work on the consumption of resources since we have also detected that the same thing happens with the performance of the users' machines.

    The graphical interface of the solution should also improve a little since it is a little complicated to find certain objects to be able to make a configuration, in addition the guides are outdated and sometimes they do not match the interface which is sometimes complicated to implement.

    For how long have I used the solution?

    Check Point Antivirus was implemented 4 years ago.

    What do I think about the stability of the solution?

    It is a very stable product. However, we've had some problems with the updates.

    What do I think about the scalability of the solution?

    It has excellent scalability. The same profile can be used with the same exceptions in the management firewalls

    How are customer service and support?

    The technical support is regular. There are well-prepared technicians. There are others who are still lacking since some problems have arisen and it has cost them to solve them.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We used Check Point as our first option.

    How was the initial setup?

    The initial configuration is simple since it presents a very intuitive graphical interface for the user. The configuration of blocking and allowing rules is easy since the panel was designed to make it as user-friendly as possible.

    What about the implementation team?

    The implementation was done together with the provider and was quite profitable. The provider was qualified to do this type of installation.

    What was our ROI?

    Our ROI is that we keep all our network and equipment safe and updated.

    What's my experience with pricing, setup cost, and licensing?

    I'd recommend you to try it. It is a good tool that allows and gives users the confidence to manage the network and keep it safe.

    Which other solutions did I evaluate?

    As we have already been working with different Check Point products, it was the first option to maintain a consistent line of technology.

    What other advice do I have?

    Before making the implementation, I'd advise users to verify the performance of the machines where it will be used.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Assistant Manager at ASCI
    User
    Great support, good threat detection, and high customization
    Pros and Cons
    • "Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users."
    • "Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner."

    What is our primary use case?

    Check Point Antivirus software is highly reliable and dependable security software that restricts malware entry into our IT system and keeps secure our IT system at its best. It is the most advanced security solution which enables the IT system to scan all the system components effortlessly and do proactive threat detection onto the system to identify any incumbent threats. 

    It helps run the scanning on integrated system components and the cloud server with fewer false negative cases to ensure the system's performance at its best. It provides the system with foolproof security and ensures high customer satisfaction always.

    How has it helped my organization?

    This security solution is one of the best so far. It enables IT professionals and businesses to work carefree with internal and external stakeholders and their IT systems and exchange information securely without any data theft or leakage. It is highly advised to incorporate this solution at all the critical windows and stages of system flow so that no malware attack can come inside the system under any circumstance.

    It has improved the turnaround time for our project completion and system integration activities as it's the need of the hour for all the stakeholders in today's world.

    It has lead to improved positive performance outcomes with high-end productivity. There are no more system issues, and complaints as IT does not bother us now.

    What is most valuable?

    Threat detection intelligence and high customization facilitation is the most popular aspect for customers and users. 

    The Check Point Partner keeps updating its EDR system and ensures no lapses occurred during the operating time. The entire team of Check Point is quite agile and proactive in terms of their advanced product development and their reaction time to any issue or complexity is just fantastic which ensures no deep damage to the system from threats.

    EDR improvement checks system security and a proactive business and tech team improves customer interaction in the greatest manner possible.

    What needs improvement?

    Check Point should always focus on emerging business requirements and should always be working proactively in meeting the requirements of clientele and users in a timely manner. This will ensure more credibility and confidence in customers and helps relationships last longer. High-end wonderful experiences for clientele will result in peer recommendations, which will certainly enhance the customer base for Check Point.

    Keep improving your business offerings and go for an extension of the trial version for a longer period so that everyone can be benefitted from the same.

    For how long have I used the solution?

    It's been over six months now since we started using the product. It's one of the best available solutions so far.

    What do I think about the stability of the solution?

    The product offers high stability and flexibility.

    What do I think about the scalability of the solution?

    The product is quite scalable and replicable across all kinds of IT environments 

    How are customer service and support?

    Support is wonderful and we highly recommend them. 

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We were using a few peer-recommended security solutions earlier.

    How was the initial setup?

    The setup is not complicated at all. We had smooth onboarding and easy deployment.

    What about the implementation team?

    We implemented it through a vendor.

    What was our ROI?

    We've seen over 75% ROI.

    What's my experience with pricing, setup cost, and licensing?

    It's cheap and quite low presently, and the room for customization is humongous currently. High time to go for these solutions as they are accelerating with great performance and pace.

    Which other solutions did I evaluate?

    We looked at McAfee and Kaspersky. They were evaluated thoroughly by our business and tech teams.

    What other advice do I have?

    I strongly recommend this solution to all IT businesses and professionals. This is a one-stop solution for all your security woes. Go for its trial today and experience the new age security utilities on your own.

    Which deployment model are you using for this solution?

    Private Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Jonathan Ramos G. - PeerSpot reviewer
    Cloud Engineer at ITQS
    Real User
    Top 5Leaderboard
    Good security features and excellent protection from malware and ransomware
    Pros and Cons
    • "One of the characteristics of this antivirus that is valuable is the detection of ransomware."
    • "We'd like them to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident."

    What is our primary use case?

    We had an absence of an antivirus utility that would give us protection inside and outside the organization. This tool integrated into several Check Point solutions helped us remedy this need. Starting from there, we have been applying this feature to meet the need and keep our users safe and secure. 

    This solution is consistently implemented as part of the organization's endpoint security solution, combining global threat intelligence and next-generation advanced threat prevention engines. 

    How has it helped my organization?

    The endpoint security features are great. You not only have a solution that manages your computer but also protects you from malware, ransomware, and also from any other virus. You can do so from wherever you are and connect your computer to the internet. This feature learns well and is supported by global threat intelligence and zero-day threat prevention engines and many of the new generation. 

    For us, it is important to have solutions that always protect and innovate the security of users and above all security and protection in real time. 

    What is most valuable?

    One of the characteristics of this antivirus that is valuable is the detection of ransomware. I can detect viruses that have done the most damage in recent years. I can protect users from damages and total or partial loss of information. We're being well protected. This protection feeds on databases that are constantly updated, giving greater security. It is worth using, and having in our organization is one of the products that will make the difference during an attack and will safeguard the security of the equipment.

    What needs improvement?

    I would like to see, in the future, this virus emulation feature deployed to endpoint security where it sends the virus found in sandboxing and emulates the attack, notifying administrators via a portal so that they can find out and learn from the attack that they are having.  

    Another point to consider is the ability to include more learning-type notifications to users when detecting any eventuality or attack on their computers in order to educate them and teach them about this type of incident.

    For how long have I used the solution?

    I've used the solution for two years.

    What do I think about the scalability of the solution?

    It is easy to configure and is not very invasive with users, which makes it very practical to use.

    What's my experience with pricing, setup cost, and licensing?

    Their service in Spanish is something that we need. We've had a bad taste based on this part of the service. We need more attention to our language. 

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    JamesYa - PeerSpot reviewer
    Senior Solutions Architect at Cloud4C Services
    Vendor
    Easy to set up with good performance but needs a better user interface
    Pros and Cons
    • "The initial setup is easy."
    • "We'd like to see a friendlier user interface."

    What is our primary use case?

    We primarily use the solution as antivirus, antimalware, et cetera. It's standard antivirus software. Every PC must have an antivirus on it in our organization.

    What is most valuable?

    It just has standard antivirus. It does what it needs to.

    The solution offers good performance. 

    Its stability has been good.

    The initial setup is easy.

    What needs improvement?

    There is no real scalability.

    We'd like to see a friendlier user interface.

    For how long have I used the solution?

    I've been using the solution for one year.

    What do I think about the stability of the solution?

    The stability is decent and the performance is good. There are no bugs or glitches and it doesn't crash or freeze. It's reliable. 

    What do I think about the scalability of the solution?

    This solution does not scale. It's only installed on your PC and it has nothing to do with scale.

    We have 2,000 users right now. We do plan to increase usage within a year.

    How are customer service and support?

    We have never reached out to technical support. I can't speak to how helpful or responsive they are. 

    Which solution did I use previously and why did I switch?

    I've also used Microsoft Defender.

    I'm not sure if the company used a different solution previously. I just joined this company one year and they had already started using Check Point.

    How was the initial setup?

    The installation process is very simple and straightforward. The deployment is quick. It only takes a few minutes. 

    We have individuals in our department that can handle deployment and maintenance tasks. It only takes about 3% of our personnel.

    What about the implementation team?

    I handled the initial setup myself. I did not need the assistance of any consultants or integrators. 

    What's my experience with pricing, setup cost, and licensing?

    Users need to pay a yearly licensing fee.

    What other advice do I have?

    We are using the latest version of the solution. 

    I'm much more likely to suggest Microsoft Defender to other users. 

    I'd rate the solution at a seven out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    reviewer1805079 - PeerSpot reviewer
    Network Engineer at Fujairah Port
    User
    Good signature-based protection, great sandbox feature, and offers continuous scanning
    Pros and Cons
    • "Regular email alerts are beneficial."
    • "The technical support could be improved."

    What is our primary use case?

    We use the solution for an additional layer of protection for our servers and internal network traffic to the internet. We deployed Check Point firewalls on our perimeter.

    We have two security gateway and one security management server which is running R81 gaia OS.

    We turned on the antivirus blade on the firewall to protect our network from malware threats. In order to be able to block threats before they reach our network, we also activated HTTPS inspection.

    Check Point Antivirus continuously scans each and every file before reaching the destination.

    How has it helped my organization?

    Check Point Antivirus has continuously scan each and every file before reaching our network. This feature gives full security confidence to feel safe from malware and ransomware attacks. The activation of the antivirus is easy.

    Check Point antivirus is performs very well. To track out data leaks and safeguard our company's services implementing this Check Point service is essential.

    Regular email alerts are beneficial. It gives us a complete picture of virus/malware, etc, where it is blocked when the user tries to access things.

    What is most valuable?

    Our environment is well-protected by Check Point Antivirus in many ways. We use web filtering to restrict and defend when users access the internet

    The sandbox feature is good. Any contaminated computer would be immediately disconnected from the network. The smart event gives the administrator a high-level security view of the enterprise.

    It also helps us to block malicious file downloads and access to infected sites from our network. Moreover, the signature-based detection works well.

     Overall, this system performs a superb job of safeguarding us.

    What needs improvement?

    The next-generation firewall receives an additional layer of security. I don't currently dislike the product in any way. By restricting files based on hash or signature at the perimeter level, any antivirus solution placed on an endpoint works with less effort.

    The technical support could be improved.

    Check Point should launch a free online training portal to assist many people in becoming skilled in Check Point services. Also, they should offer some sort of certificate discount promotion.

    For how long have I used the solution?

    I've used the solution for more than two years.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.
    Updated: November 2024
    Product Categories
    Anti-Malware Tools
    Buyer's Guide
    Download our free Check Point Antivirus Report and get advice and tips from experienced pros sharing their opinions.