We use Check Point Antivirus for cyber security purposes.
Cyber Security Engineer at AFRICAN CYBERSECURITY MARKET
Easy to set up, allows you to manage all the endpoints, works against every attack, and has helpful technical support
Pros and Cons
- "What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security. You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution."
- "An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher."
What is our primary use case?
What is most valuable?
What I like best about Check Point Antivirus is that it's a good solution against phishing, malware, etc. It can do a lot in terms of security.
You can also manage all the endpoints or users from the Check Point Antivirus platform, which is another feature I found valuable in the solution.
What needs improvement?
An area for improvement in Check Point Antivirus is its price because it's expensive. It would depend on the clients, but sometimes, you'll have clients who don't have many endpoints, so in that case, clients would find the price for Check Point Antivirus to be higher.
For how long have I used the solution?
I've been using Check Point Antivirus for six months.
Buyer's Guide
Check Point Antivirus
February 2025

Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
What do I think about the stability of the solution?
Check Point Antivirus is a stable solution. It's a very good solution.
What do I think about the scalability of the solution?
Check Point Antivirus is a scalable solution.
How are customer service and support?
The technical support for Check Point Antivirus is helpful, but sometimes, it isn't easy to reach the support team.
On a scale of one to five, my rating for Check Point Antivirus support is four.
How was the initial setup?
Setting up Check Point Antivirus wasn't difficult because it just required downloading the software, then installing it where you want to install it. There wasn't any issue with the initial setup of Check Point Antivirus.
How long the deployment of Check Point Antivirus takes would depend on the number of client endpoints, but the process could take just five or six minutes maximum. If your internet connection is slow, then deploying Check Point Antivirus would take longer.
What about the implementation team?
I implemented Check Point Antivirus myself.
What's my experience with pricing, setup cost, and licensing?
Check Point Antivirus is an expensive solution, especially for clients that don't have as many endpoints.
Check Point Antivirus has a free trial for one month, and within the trial period, there's no limit to the number of endpoints it can support, but when the trial expires, you'll have to buy the license, which covers one year.
You can't buy a license for the solution without being a Check Point partner first.
What other advice do I have?
I'm using the latest version of Check Point Antivirus.
I deploy Check Point Antivirus for the customer. I'm a network and cyber security engineer, so I provide Check Point Antivirus to clients. I'm an integrator, and currently, my clients have a total of one hundred fifty endpoints on Check Point Antivirus. I also manage the solution for clients, which includes reporting, looking into the traffic and attacks, then I explain whatever's going on to the clients.
Maintenance can be done on Check Point Antivirus, and you just have to select the user that's very vulnerable to attacks, then that would trigger maintenance, and Check Point Antivirus would update automatically. It isn't difficult as long as your internet is good.
I would recommend Check Point Antivirus to others because it's very good software, and it works against every attack. Check Point Antivirus is an important solution.
On a scale of one to ten, my rating for the solution is eight because there's still room for improvement.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Network Engineer at Fujairah Port
Good signature-based protection, great sandbox feature, and offers continuous scanning
Pros and Cons
- "Regular email alerts are beneficial."
- "The technical support could be improved."
What is our primary use case?
We use the solution for an additional layer of protection for our servers and internal network traffic to the internet. We deployed Check Point firewalls on our perimeter.
We have two security gateway and one security management server which is running R81 gaia OS.
We turned on the antivirus blade on the firewall to protect our network from malware threats. In order to be able to block threats before they reach our network, we also activated HTTPS inspection.
Check Point Antivirus continuously scans each and every file before reaching the destination.
How has it helped my organization?
Check Point Antivirus has continuously scan each and every file before reaching our network. This feature gives full security confidence to feel safe from malware and ransomware attacks. The activation of the antivirus is easy.
Check Point antivirus is performs very well. To track out data leaks and safeguard our company's services implementing this Check Point service is essential.
Regular email alerts are beneficial. It gives us a complete picture of virus/malware, etc, where it is blocked when the user tries to access things.
What is most valuable?
Our environment is well-protected by Check Point Antivirus in many ways. We use web filtering to restrict and defend when users access the internet
The sandbox feature is good. Any contaminated computer would be immediately disconnected from the network. The smart event gives the administrator a high-level security view of the enterprise.
It also helps us to block malicious file downloads and access to infected sites from our network. Moreover, the signature-based detection works well.
Overall, this system performs a superb job of safeguarding us.
What needs improvement?
The next-generation firewall receives an additional layer of security. I don't currently dislike the product in any way. By restricting files based on hash or signature at the perimeter level, any antivirus solution placed on an endpoint works with less effort.
The technical support could be improved.
Check Point should launch a free online training portal to assist many people in becoming skilled in Check Point services. Also, they should offer some sort of certificate discount promotion.
For how long have I used the solution?
I've used the solution for more than two years.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point Antivirus
February 2025

Learn what your peers think about Check Point Antivirus. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,713 professionals have used our research since 2012.
Systems Engineer at HarborTech Mobility
Good file scanning, stops malicious files, and detects/blocks malware
Pros and Cons
- "Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters."
- "I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics."
What is our primary use case?
The Check Point Antivirus offers our company a high level of security. It helps us to filter outgoing URLs with possible malevolent threats. Also, this great solution secures endpoints efficiently so that connections, applications, websites, and software.
The Check Point Antivirus uses real-time anti-virus protection and protection based on Threat Cloud anomalies. It's very useful.
I like that the antivirus hardly affects the performance of our security gateways, thus offering additional security almost without penalty.
How has it helped my organization?
Check Point Antivirus really is a great solution. It helps us to improve our company. First, it offers a high-security level. It helps me filter out outgoing URLs with potential malicious threats. Second, Check Point Antivirus is very easy to configure and enables me to take measurements under any threat quickly. Thanks to its constant updates in real-time, it is always up to date with possible new threats, so it is very effective at detecting all kinds of instructions, malware, or viruses.
Also, Check Point Antivirus allows me to keep all my computers protected against any potential cyber threat. It gives me the capability to detect and block malware threats by using virus signatures in real-time.
What is most valuable?
If you need a good antivirus, Check Point Antivirus is more than great.
Check Point Anti-Virus has many positive characteristics. First, Check Point Antivirus is capable of scanning files uploaded from the internet or running through the network via Check Point gateways/clusters. Second, Like the other Check Point blades, the visibility and logging of events are remarkable.
One of the features that I love the most about this large software is that It allows me to stop incoming malicious files, and stop users from accessing malicious software-infested sites. Also, it gives me the opportunity to get very comprehensive reports where we can collect summaries of infections and trends to provide greater visibility of threats, which is absolutely fantastic.
What needs improvement?
Until now, I've found no negative features sufficiently important to complain about. In general terms, the software works perfectly. One time, I had a little issue, however, the technical support staff resolved it almost immediately.
I would prefer it if this solution was cheaper for everybody to buy it and enjoy these wonderful and distinguished characteristics.
I like that activating Check Point antivirus hardly affects the performance of our security gateways, thus providing additional security almost without penalty.
For how long have I used the solution?
We are started using Check Point Antivirus in 2016. This great solution allows us to avoid malware traffic before reaching end users.
Check Point Antivirus is also really easy to set up. In just one click in the Smart Console, you can set up the policy and you're ready to go. Check Point Antivirus has a number of positive features that make it stand out through other means such as software.
Which solution did I use previously and why did I switch?
We use just Check Point Antivirus. We found everything we want in this great solution. It helps us to improve and secure our network. Also, Checkpoint Antivirus does excellent environmental protection work in many ways.
What's my experience with pricing, setup cost, and licensing?
I have just one piece of advice: if you can lower the price for this solution so that more companies can use this great solution and protect their environment, that would be ideal.
Which other solutions did I evaluate?
We just work with Check Point Antivirus until now and we found that this solution is the best.
What other advice do I have?
If you are looking for a good antivirus, Check Point Antivirus is more than good, you will be surprised how excellent it is in all its aspects.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Ease of installation with fair pricing and good product documentation
Pros and Cons
- "It offers a really simple and minimally invasive installation for users."
- "The SLA is slow."
What is our primary use case?
We required a product recognized for its brand visibility and achievements in cybersecurity at a global level.
Check Point was perfectly suited and we decided to use it effectively for our endpoint devices that are corporate property. In this way, we have avoided daily threats on devices with a great degree of acceptance seen by users.
How has it helped my organization?
Check Point Antivirus has helped us a lot with the personal protection of users' computers and protection against current threats and ransomware, among others. It is an excellent product that generates much business confidence when dealing with any cyber threat that can compromise computers.
It offers a really simple and minimally invasive installation for users. In this way, it does not generate performance problems.
What is most valuable?
It is a good tool. The price is accessible. It protects against modern threats in a great way; there is a lot of confidence in Check Point.
There is quite a lot of product documentation to assist with a correct implementation.
The ease of installation is great.
What needs improvement?
The Check Point language for opening and solving cases is English. They could expand languages for Latin America, and it would be easier to solve problems in these areas.
Costs are only available through a Check Point partner.
The SLA is slow. The solutions provided to address problems and breakdowns are slow.
For how long have I used the solution?
As a product from the Check Point security family, we have been using it for one year or more.
Which solution did I use previously and why did I switch?
Previously, we used ESET, however, we were inclined to switch to Check Point.
Which other solutions did I evaluate?
Our company always evaluates the tools before buying them and before putting them into production.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Perimeter Security Administrator at a security firm with 51-200 employees
Improves security, defines policies, and helps with compliance
Pros and Cons
- "Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity."
- "There needs to be more internally connected systems in order to achieve real-time effectiveness."
What is our primary use case?
In search of a solution that allowed us to analyze, detect, evaluate and, above all, correct at the antivirus level within the network in a perimeter way, we have used the solutions that come in the Check Point appliances, thus giving us the possibility of enabling a lot of its most outstanding features.
How has it helped my organization?
We had been trying to complement the antivirus solution across our computers. We searched and tested different providers, reaching the conclusion that we could get the most out of solutions that we already had as they were already giving us additional protection. We needed, however, additional protection that would allow us to configure from a perimeter device all the conditions, rules, policies, and needs for blocking or security in the organization's network. With this solution, we could generate value and security in each of the actions that users have within the perimeter network.
What is most valuable?
Its most outstanding characteristic is its ability to achieve and define a line of security based on policies and identity. Based on users, devices, and objects, it is generating a correlation of activities. We have login management in case there is suspicious activity. With the solution, we are managing to establish a correlation between malicious events outside normal behavior. We have sought and succeeded in enabling the features based on a legal framework and government security framework. It is possible to engage with international suppliers and regulators with relative ease.
What needs improvement?
We should be able to generate client applications based on a structure and scheme that uses the power of computation of local devices to generate interaction and remote management. There needs to be more internally connected systems in order to achieve real-time effectiveness. The solution should establish communication in real-time, thereby multiplying those possibilities of interaction in a faster way when it comes to communicating against your central server.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Operations Engineer at SFR
Scalable, easy to configure, and simple to manage
Pros and Cons
- "It is very easy to manage the Antivirus blade, even for newcomers in our technical support team, which is a key area of interest for us."
- "It may be interesting to improve this solution against zero-day attacks, as they happen very frequently and are clearly a severe threat."
What is our primary use case?
We are using the Antivirus blade to protect our organization against threats such as viruses/malware that could propagate in our information system and harm it in various ways.
Thanks to the important database maintained by Check Point that relies on this blade, we can enforce a strong security policy on our devices and be compliant with the latest best practices regarding internet threats.
We operate several firewalls in our organization and we especially need this kind of efficiency on the internet-facing ones.
How has it helped my organization?
The Antivirus blade has improved our organization in several ways, including having better global security against viruses and malware, having better visibility and protection regarding files that go in and out of our company, offering better scaling and integration with other security products, and probably offering better threat management.
It globally helps us in having centralized management of all internet content, which is efficient in terms of managing exploitation and helps our technical support teams to fulfill their daily missions.
What is most valuable?
One of the features that we find most valuable is the simplicity of the configuration through the Smart Console interface.
It is very easy to manage the Antivirus blade, even for newcomers in our technical support team, which is a key area of interest for us.
Also, the sandbox feature is very interesting as it can automatically isolate an infected machine from the network, which is valuable.
We could also talk about the real-time detection scan feature that can monitor files as they are being accessed, which allows for a quicker response time.
What needs improvement?
It may be interesting to improve this solution against zero-day attacks, as they happen very frequently and are clearly a severe threat.
On a more practical level, the complaint opening process through technical support could be better, as it must be done through the portal only for now.
On a financial level, prices for CP products could be improved. We know for sure that they are all high-quality products, however, sometimes it doesn't justify high prices on some products.
For how long have I used the solution?
We have been Check Point Antivirus for two years now.
What do I think about the scalability of the solution?
The solution is easily scalable among CP devices.
Which solution did I use previously and why did I switch?
We used the Stormshield solution and we switched to have a better integration with other security devices.
What's my experience with pricing, setup cost, and licensing?
The setup can be painful, and pricing/licensing can be high. That said, the quality is there.
Which other solutions did I evaluate?
Yes, we also evaluated Fortinet.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network, Systems and Security Engineer at SOLTEL Group
Easy to scale, heuristic scanning protects against previously unknown threats, and the support is good
Pros and Cons
- "Heuristic detection scans for suspicious characteristics that can be found in unknown, new viruses and modified versions of known viruses."
- "It is very difficult to get ahead of what's coming in terms of new threats, however, I think that Check Point Antivirus must improve against zero-day attacks."
What is our primary use case?
We use this solution to protect our computers and remove all malicious software or code designed to damage our computers or data that belongs to our clients. We are notified of these actions.
It is very important to protect all endpoints in our networks because these devices are entry points and every time, it is more difficult for our users to detect what object is malware and what object is legitimate software.
Malware is evolving so rapidly that some estimate a new malware instance is created nearly every second.
How has it helped my organization?
We decided to implement Check Point Antivirus because they are an avant-garde company and they design the latest technology. In this case, their solution implements:
- Signature-based detection identifies malware by comparing code in a program to the code of known virus types that have already been encountered, analyzed, and recorded in a database.
- Heuristic detection scans for suspicious characteristics that can be found in unknown, new viruses and modified versions of known viruses.
- Rootkit detection scans and blocks malicious code designed to gain administrative access to a machine.
- Real-time detection scans and monitors files as they are accessed.
What is most valuable?
For us, the most valuable feature of Check Point Antivirus is the real-time detection scan that monitors files as they are accessed. It is important because we can react quickly.
Today, malicious coders and hackers are experts at evasive tactics that shield their activities. Therefore, in today’s cybersecurity landscape, antivirus is just one of the many tools in an organization’s cybersecurity arsenal to keep the business safe.
The antivirus solution should be implemented as part of the organization’s endpoint security solution that combines global threat intelligence and advanced threat prevention engines that address zero-day and other next-generation threats.
What needs improvement?
It is very difficult to get ahead of what's coming in terms of new threats, however, I think that Check Point Antivirus must improve against zero-day attacks.
Today, next-gen approaches extend signature-based detection with behavioral detection, machine learning, sandboxing, and other techniques that are optimized to address threats such as malicious URLs, browser hijackers, advanced persistent threats, and phishing exploits. However, zero-day attacks keep happening quite frequently.
For how long have I used the solution?
We have been using Check Point Antivirus for 11 months.
What do I think about the stability of the solution?
In 11 months, we haven't had any problems. Our system is very stable and works fine.
What do I think about the scalability of the solution?
This solution is easily scalable.
We deployed this solution once, and we have only needed to add new devices/servers/endpoints to our infrastructure to expand it.
How are customer service and technical support?
Check Point Service Support is very good. Normally, they contact you shortly after you open the ticket, and in all cases, they have given us a good solution.
Which solution did I use previously and why did I switch?
We use only this solution as a centralized solution. At other times, we used free software products.
How was the initial setup?
Before the initial setup, we used a training pack. For this, we can set up the entire system in a short time and we only use a small number of support hours.
What about the implementation team?
We implemented it through the best vendor team in Spain. They are 100% recommendable.
Which other solutions did I evaluate?
My team and I evaluated other products and vendors based on price, experience, technology, ease of configuration, integration time, licensing, etc. Finally, we opted for this Check Point solution.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
RSSI at SDIS49
Provides good security and integrates well with other products
Pros and Cons
- "Check Point integrates well with other security products."
- "The initial setup and configuration should be simplified."
What is our primary use case?
We use this antivirus as part of our overall security solution. It handles the centralized investigation of internet content.
What is most valuable?
The most valuable feature is security.
Check Point integrates well with other security products.
What needs improvement?
The pricing can be improved.
The interface could be more user-friendly.
The initial setup and configuration should be simplified.
For how long have I used the solution?
We have been using Check Point Antivirus for four years.
What do I think about the stability of the solution?
This is a very stable product.
What do I think about the scalability of the solution?
We have not had the need to scale. We have about 3,000 people who are protected by Check Point, and three of them are administrators.
How are customer service and technical support?
I would say that the technical support is okay. There are two levels; there is our installer, who we have known for several years, and there is the engineer, who we do not have much contact with.
Which solution did I use previously and why did I switch?
We use Windows Defender for our endpoint antivirus solution. For email protection, we use the FireEye Email Security solution. Our Check Point handles our central filtering and we also use some Infinity products. All of these work in combination with each other for our security.
How was the initial setup?
The initial setup is complex. For the complete installation, our deployment took a few days.
What about the implementation team?
We had the help of a Check Point specialist for our deployment.
What other advice do I have?
This is a good product and one that I recommend.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Product Categories
Anti-Malware ToolsPopular Comparisons
Microsoft Defender for Endpoint
ESET Endpoint Protection Platform
Microsoft Exchange Online Protection (EOP)
VirusTotal
Cuckoo Sandbox
ZoneAlarm
Buyer's Guide
Download our free Check Point Antivirus Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which antivirus is best for isolated work PCs?
- Is Check Point's software compatible with other products?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Do we need to use both EDR and Antivirus (AV) solutions for better protection of IT assets?
- Looking for alternatives to Symantec Cloud Protection Engine
- Who provides a better antivirus solution: Bitdefender or Sophos?
- Which antivirus is best for isolated work PCs?
- How do you identify malware?
- Why are Anti-Malware Tools important for companies?