What is our primary use case?
We use Check Point Antivirus to protect our company's perimeter. Specifically, we implement antivirus measures solely on the perimeter firewall. This strategy safeguards the company, especially considering the files accessed by employees. Check Point Antivirus shields us from malware and viruses.
How has it helped my organization?
Check Point detects files containing malware, which some users are trying to download or access. Additionally, it can consolidate multiple emails into one.
What is most valuable?
Check Point is easy to configure, and it detects many threats.
What needs improvement?
The antivirus could be improved in terms of the resources it consumes, particularly regarding CPU and memory usage. We've encountered issues with some of our firewalls, leading us to turn off the antivirus feature due to its heavy resource consumption. Enhancing its performance would allow us to run it on smaller models without overburdening the CPU.
While it is a valuable security feature, Check Point should ensure that the hardware is properly dimensioned to support the antivirus feature, providing some margin for potential resource demands. The values provided in the specifications should be realistic and adequate to support the feature effectively on the Check Point firewall.
For how long have I used the solution?
I have been using Check Point Antivirus for ten years.
What do I think about the stability of the solution?
Sometimes, Check Point Antivirus raises connection issues even when the license is valid. Consequently, we encounter difficulties installing the antivirus on various devices. Moreover, the solution isn't always stable. Occasionally, update failures occur without apparent reason, necessitating the need to open a support case.
What do I think about the scalability of the solution?
One thousand users, including the financial, IT, and HR teams, are utilizing this solution, essentially encompassing all departments in their company, as everyone uses the internet. From our experience, it's very resource-intensive and not one of our most scalable features. As I mentioned, sometimes we encounter CPU logs on some firewalls, often related to the antivirus. Therefore, sometimes, we need to turn it off or adjust its settings.
I rate the solution's scalability as seven out of ten.
How are customer service and support?
The solution should have better support from more knowledgeable engineers when opening a case rather than starting with junior engineers and escalating after one or two weeks.
How would you rate customer service and support?
How was the initial setup?
Once the security gateway is up and running, you simply navigate to the features section, ensure you have the appropriate license, and enable the antivirus feature. Then, you can select one of the recommended profiles. Once you've chosen the profile, you're all set.
It takes one day to deploy if you have already added the firewall.
I rate the initial setup a nine out of ten, where one is difficult, and ten is easy.
What's my experience with pricing, setup cost, and licensing?
We have the license for all the other FortiGate, which comes with the IPS and antivirus. However, you need to pay for the antivirus separately. In terms of cost, it is slightly more expensive than Fortinet.
What other advice do I have?
Check Point Antivirus has helped us protect our company's security exposure. It has already detected some files that, if successfully downloaded, could pose a significant problem.
However, it consumes a lot of resources. Enabling antivirus on the Check Point firewall is one of the most resource-intensive processes you can allow, even more so than the IPS.
We requested that antivirus be enabled on three of our firewalls because the CPU usage was consistently 90%. Testing this feature has shown that some improvements in performance should reduce resource consumption.
We enable Check Point's default recommended profile. Preset profiles are already available; we choose one to help without configuring our own.
I would recommend improving the performance to reduce resource consumption and enhance stability.
In terms of security, Check Point Antivirus is practical and improves our company's security posture.
Overall, I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.