Try our new research platform with insights from 80,000+ expert users
Nagendra Nekkala - PeerSpot reviewer
Senior Manager ICT & Innovations at Bangalore International Airport Limited
Real User
Top 5Leaderboard
Comes with analytic reports but needs improvement in support
Pros and Cons
  • "The product gives analytic reports."
  • "Check Point CloudGuard Network Security should give productive reports as per business requirements. It needs to improve support since the time-limit extended beyond a day. It should include more seamless API integrations."

What is our primary use case?

Check Point CloudGuard Network Security helps to ensure the security and protection of IT systems. We have many API integrations and want to ensure its protection. 

What is most valuable?

The product gives analytic reports. 

What needs improvement?

Check Point CloudGuard Network Security should give productive reports as per business requirements. It needs to improve support since the time-limit extended beyond a day. It should include more seamless API integrations. 

For how long have I used the solution?

I have been using the product for four years. 

Buyer's Guide
Check Point CloudGuard Network Security
March 2025
Learn what your peers think about Check Point CloudGuard Network Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
845,040 professionals have used our research since 2012.

What do I think about the stability of the solution?

The product's stability is good. 

What do I think about the scalability of the solution?

Check Point CloudGuard Network Security is very much scalable. My company has 1000 users. 

How was the initial setup?

Check Point CloudGuard Network Security's deployment is easy and takes one day to complete. You need four resources to handle it. 

What's my experience with pricing, setup cost, and licensing?

The product's licensing costs are yearly. 

What other advice do I have?

I rate the product an eight out of ten. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1536681 - PeerSpot reviewer
Network, Systems and Security Engineer at SOLTEL Group
Real User
Good dashboard for centralized management, effective protection against zero-day attacks
Pros and Cons
  • "The most valuable feature is the centralized dashboard, which is used for managing all of the Check Point Security Gateways."
  • "In case the device is inaccessible due to some issue such as CPU or memory, there is no separate port or hardware partition provided for troubleshooting purposes."

What is our primary use case?

We had a big problem with how to protect our host services, which are directly accessed via the cloud. We wanted to protect our organization tenant and workload from any next-generation attack. For this protection, we implemented the Check Point solution named CloudGuard Network.

This NGFW is provided by Check Point and has all of the capabilities that are required to protect against next-generation attacks at the perimeter level.

The modules or security features that we use are provided as part of the base license. These include VPN, IPS, Application Control, and Content Awareness. Together, these are strong and help to protect the organization.

How has it helped my organization?

This solution effectively protects us against any next-generation attack.

What is most valuable?

The most valuable feature is the centralized dashboard, which is used for managing all of the Check Point Security Gateways.

Whether it is hosted on-premises or on the cloud with the NGTX license, it provides additional security capabilities such as SandBlast, which is able to extract and emulate file execution in a virtual sandbox. It will identify activity and actions, and the system can be configured accordingly.

It provides hyperscaling capabilities for both on-premises and cloud-based security gateways. An on-premises security gateway can be configured for hyperscaling using the Maestro 140 or Maestro 170. In the cloud, on AWS it can be hyper-scaled using the AWS gateway load balancer.

It's able to protect against advanced threats and prevent zero-day attacks using both SandBlast and IPS signatures.

What needs improvement?

Throughput is impacted drastically once the security modules are enabled on the firewall.

As it is a software-based firewall, there is no dedicated throughput available for each module.

In case the device is inaccessible due to some issue such as CPU or memory, there is no separate port or hardware partition provided for troubleshooting purposes.

Throughput on the virtual firewall is an issue in case the organization wants to migrate a workload to the cloud, and it becomes a bottleneck.

For how long have I used the solution?

We have been using the Check Point CloudGuard Network for between two and five years.

What other advice do I have?

The combination of NGFW + URL Filtering + Antivirus + Anti Bot, with 8 vCore D4 v2, is able to provide a throughput of 4Gbps.

On Azure, the combination of NGFW + URL Filtering + Anit Virus + Anit Bot, with 8vCore c5n 2xlarge, is able to provide a throughput of 4.7Gbps. It is similar to AWS.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point CloudGuard Network Security
March 2025
Learn what your peers think about Check Point CloudGuard Network Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
845,040 professionals have used our research since 2012.
Senior System Engineer at a energy/utilities company with 201-500 employees
Real User
Secures our assets in the cloud while providing access to applications in our vendor hosted data centers via IPSEC tunnels
Pros and Cons
  • "We have found the overall functionality of the product to be exactly similar to the physical product. The one good advantage is that it is cloud-based and can be deployed either as a part of a scale set or one can shut down the virtual machine and adjust the physical parameters of the virtual machine easily and bring it right back up."
  • "I think they have pretty much mastered what can be done. There are some nuances like when you fail over from one cluster member to the other, the external IP address takes about two minutes to fail over."

What is our primary use case?

It secures our assets in the cloud while providing access to applications in our vendor hosted data centers via IPSEC tunnels. We also use it for endpoint vpn for all our users. We have it deployed in our cloud and it forms the gateway for all external connectivity and access to the assets in the cloud. We also have a backup site to site connection with our on premise data center so in case the primary connection to the cloud fails we can quick fail over to this backup connection and business can continue as normal .

How has it helped my organization?

We have it deployed in our cloud and it forms the gateway for all external connectivity and access to the assets in the cloud. CloudGuard IaaS has given us the complete redundancy that we have been designing and planning for over 2 years. CloudGuard provided the Gas South remote users with an alternate and secure connection into our completed IT infrastructure so that our remote users can log into CloudGuard end-user VPN over a secure and encrypted method and work as normal. This has come in very handy during this COVID-19 times.

What is most valuable?

We have found the overall functionality of the product to be exactly similar to the physical product. The one good advantage is that it is cloud-based and can be deployed either as a part of a scale set or one can shut down the virtual machine and adjust the physical parameters of the virtual machine easily and bring it right back up. Also if deployed as a cluster this can be done without any downtime at all since you can take down one virtual machine at a time to upgrade. Overall a very well designed product

What needs improvement?

I think they have pretty much mastered what can be done. There are some nuances like when you fail over from one cluster member to the other, the external IP address takes about two minutes to fail over. During this time there is an outage of service. On digging into this further I found that this is more on the cloud fabric and provider side than the actual Checkpoint CloudGuard side. The Cloud provider is taking that long to actually detach the Virtual IP Address (VIP) from one machine and fail it over to the other

For how long have I used the solution?

Almost two years.

Which solution did I use previously and why did I switch?

We have always been a Check Point customer.

What's my experience with pricing, setup cost, and licensing?

If you are a Microsoft Azure customer the setup is very simple. There is already a great template there ready for deployment. Read the deployment guide fully before attempting it. Licensing is built into the deployment but you will get billed separately as a market place deployment and does not get charged to your subscription. This is a bit frustrating but they are working on fixing this

Which other solutions did I evaluate?

We did look at bring in other alternate vendors before settling on CloudGuard. We did a POC of Fortinet.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user583365 - PeerSpot reviewer
Head of Cyber Security Department at NGT Group
Real User
Completely closes the potential vulnerability channel and has excellent scanning and reporting
Pros and Cons
  • "We find Check Point valuable because they are 100% focused on security. It totally closes the potential vulnerability channel. We can check our mail and our attachments and we can scan everything easily. We get an immediate report about the situation of the attachments. We can discover if the target's security attack was started from phishing, etc. We also enjoy using the additional features that protect our internal customer from targeted attacks."
  • "The stability of the solution could be improved, but this is the problem of all the solutions in the market. This isn't just a problem specific to Check Point."

What is our primary use case?

We are able to use the solution for cloud protection and in parallel with or just for network protection. In our scenario, we use it as a border network firewall, which is based on a virtual environment and we're using it for the border protection of our network. 

What is most valuable?

We find Check Point valuable because they are 100% focused on security. It totally closes the potential vulnerability channel. We can check our mail and our attachments and we can scan everything easily. We get an immediate report about the situation of the attachments. We can discover if the target's security attack was started from phishing, etc. We also enjoy using the additional features that protect our internal customer from targeted attacks.

What needs improvement?

The stability of the solution could be improved, but this is the problem of all the solutions in the market. This isn't just a problem specific to Check Point.

For how long have I used the solution?

I've been using the solution for four years.

What do I think about the stability of the solution?

The stability is good. It's really good compared with Palo Alto, Fortinet, and Cisco, most of all. But it definitely can be better.

What do I think about the scalability of the solution?

The scalability of the solution is good. Right now, the solution protects about 400 customers.

How are customer service and technical support?

The solution's technical support is good. If we have problems, we can speak directly to Check Point, or we can speak to one of their partners or a local partner. The solution has a great community that surrounds it.

How was the initial setup?

The initial setup was complex because we were using a complex networking architecture. It took us about two days to implement the solution. For administration of all of this infrastructure, we need two people. For deployment and maintenance, we need just one person.

What about the implementation team?

We used the implementation guide provided by the company to assist with deployment.

What's my experience with pricing, setup cost, and licensing?

Our licensing is yearly at a fixed cost.

The solution has a very flexible pricing model. It can provide the same level of security and performance, but in parallel, can be subscription-based.

What other advice do I have?

The solution is the on-premises deployment model which we use in our server environment.

We are an integration company, and although we deal with other solutions, we mainly focus on Check Point.

The solution is a great mix of user experience, flexibility, security features, and cost. After five years, I believe the total cost ownership will be much cheaper than any competitor.

The advice I would give to others interested in implementing is that this solution does have security problems. Not Check Point, per se, but in the network environment. The security recommendation from the Check Point and from us is to use the VSX in the internal network. It should not protect your border because there are some issues around bugs, etc. It could cause vulnerabilities if it's used this way. 

I would rate this solution eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2115711 - PeerSpot reviewer
Web Designer at Milestone Technologies, Inc.
User
A secure VPN, good security configuration features, and helpful support
Pros and Cons
  • "The security configuration features have enhanced the reliable coordination of programs and data safety."
  • "The cost is relatively high compared to the cost of other products in the market."

What is our primary use case?

The secure networking infrastructure enables my team to connect enterprise networks with data centers for efficient control of workflows. It has a secure SSL traffic system that monitors data flow with reliable threat prevention systems. 

TLS security inspection protocol tools enhance eligibility in the organization's cloud computing servers. 

The platform promotes automation processes that enhance faster delivery of services and reliable implementation of programs. 

The security firewalls prevent the organization's devices from external attacks.

How has it helped my organization?

The advanced threat prevention services have helped us to scale down security programs and setup achievable objectives. 

It is easy to lay and monitor the subnets that provide comprehensive security. 

It provides performance-measuring metrics that enable each department to set up security goals that can be achieved with the available resources effectively. 

The databases that host the company data are protected by reliable security configurations systems that cannot be compromised easily. 

The cost and setup licensing terms are reliable and can be implemented without challenge.

What is most valuable?

The security configuration features have enhanced the reliable coordination of programs and data safety. 

The secure VPN connects the company with remote clients for efficient collaboration. 

The blueprint promotes automation processes and infrastructure as code practices. 

The process of deployment and configuration with other applications is simple. It is easy to learn how this platform operation under flexible guidelines. 

The central security management server provides consistent security coverage and enforcement in hybrid environments.

What needs improvement?

The set security features have stable performance and have provided reliable services since we first deployed this product. 

The cost is relatively high compared to the cost of other products in the market. 

The customization features can be developed further to enable an organization to design the best tools for serving various demands. 

The security infrastructure has developed positively and contributed to increased return on investment. We have achieved the set goals and increased profit gains from a stable security environment.

For how long have I used the solution?

I've used the solution for ten months.

What do I think about the stability of the solution?

It is stable with faster performance rates.

What do I think about the scalability of the solution?

The performance has been excellent.

How are customer service and support?

The customer support services have been good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have no experience with a similar solution.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The implementation took place through the vendor.

What was our ROI?

There is a positive ROI.

What's my experience with pricing, setup cost, and licensing?

The pricing terms are flexible.

Which other solutions did I evaluate?

I have not evaluated other similar options.

What other advice do I have?

I have no additional comments about the overall performance. It's good.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Improves productivity and high value manual operations and offers great simplicity
Pros and Cons
  • "It improves the availability of engineers to carry out projects."
  • "What I would like for future updates would be faster updates to apply, and perhaps a greater presence in the local language for the regions of Latin America."

What is our primary use case?

Currently, we were counting on a hybrid cloud and we needed to integrate the latest generation of security. We came to lean towards one of the security leaders in the market. These powerful capabilities position it and allow us to increase cloud security elastically while keeping up with the dynamic requirements of our business. 

We use the cloud to integrate it into our hybrid cloud. It dynamically provides us with advanced security and consistent policy enforcement that automatically grows and scales with our cloud environment. With CloudGuard IaaS, we can easily protect workloads and applications.

How has it helped my organization?

Being able to move computing resources and data to public clouds means that security responsibilities are now shared between us and our cloud provider. While the cloud provider provides infrastructure protection, we as customers want to be able to control our own data and protect cloud assets while complying with internal regulations. On the other hand, we required complete traffic visibility and reporting, as well as proactive protection from even the most advanced threats within virtual network environments. CHKP offered us advanced threat protection to prevent the lateral spread of threats within defined data centers.

What is most valuable?

There are many important characteristics that for me are the best of the solution and come to support an emerging market:

  • It improves the productivity of the company.
  • It performs very complex or high value manual operations intellectual in a controlled and neglected way.
  • There's a simplicity when performing tasks.
  • It improves the availability of engineers to carry out projects.
  • To all this we can add the ability to connect via API, and integrate solutions from developers trained for management from any location.

What needs improvement?

The solution from my experience is very good. What I would like for future updates would be faster updates to apply, and perhaps a greater presence in the local language for the regions of Latin America. These are markets that have been growing, however, the teams need a lot of time and training and in that period a specialized technician in the local language is required to support the constant requests. After that, I accept that Check Point surprises me as it has always done with its excellent work in innovation.

For how long have I used the solution?

I've used the solution for around two years.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user1033941 - PeerSpot reviewer
CTO at a healthcare company with 10,001+ employees
Real User
Secure, reliable, and has good technical support
Pros and Cons
  • "The most valuable feature for us is the cluster support."
  • "Our biggest complaint concerns the high resource usage for IDP/IPS, as we cannot turn on all of the features even with new hardware."

What is our primary use case?

We use this solution as our perimeter firewall. 

What is most valuable?

The most valuable feature for us is the cluster support. We have been using this for a long time, so it is not a feature from the latest version.

What needs improvement?

We would like to be able to scale out such that we can increase performance within a cluster with more active nodes.

Our biggest complaint concerns the high resource usage for IDS/IPS, as we cannot turn on all of the features even with a recent hardware upgrade.

A great enhancement for this solution would be an active-active or multi-active scalability.

As we need to fulfill higher bandwidth demands due to increased cloud usage and research-driven data exchange, we might need to look for other vendors with more competitive pricing.

For how long have I used the solution?

I have been using this solution for two years.

What do I think about the stability of the solution?

This is a stable solution.

Six months ago, we updated our version to the most recent one.

What do I think about the scalability of the solution?

The scalability of this solution is limited, which is why we have started looking for alternatives. Currently, we have about twenty-thousand users.

How are customer service and technical support?

Technical support for this solution is good. They have a quick response and the solution was available within a short period.

Which solution did I use previously and why did I switch?

We did not use another solution prior to this one.

How was the initial setup?

This initial setup of this solution is complex.

The preparation for deployment took two days, and the deployment itself took about two hours.

We have three staff who are responsible for maintaining the firewall, although there are more tasks that they handle, in addition to it.

What about the implementation team?

We enlisted the help of a service provider to assist us with the implementation. 

What's my experience with pricing, setup cost, and licensing?

The price of this solution could be improved. We pay approximately ‎€150,000 ($166,000 USD) per year. We receive four days of support every year from our service provider before we have to contact Check Point. 

Which other solutions did I evaluate?

We did not evaluate other options before choosing this solution, although we are currently considering alternative solutions from Forcepoint and Fortinet.

What other advice do I have?

My advice for anybody who is considering this solution is to start by identifying high-bandwidth use cases. If you have any, and you have a high-security requirement, then I suggest considering other options.

This is a secure and reliable solution for us, although we are a bit disappointed with the limited scalability and resource consumption.  

I would rate this solution an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2353203 - PeerSpot reviewer
Network and Security Engineer at a consultancy with 11-50 employees
Real User
Top 20
Makes security operations faster and error-free
Pros and Cons
  • "The product offers an easy and nice way to manage the gateways, similar to on-prem hardware. It has packet filtering features. Our security operations are faster and less prone to errors. We selected CloudGuard Network Security due to its visibility."
  • "The solution needs to improve the interruptions that happen during gateway upgrades."

What is our primary use case?

We use the product for network security and cloud workload protection. 

How has it helped my organization?

It's easy to set up in Azure Cloud. The ease of setup helps us save time.

What is most valuable?

It offers an easy and nice way to manage the gateways, similar to on-prem hardware. It has packet filtering features. Our security operations are faster and less prone to errors. We selected CloudGuard Network Security due to its visibility. 

CloudGuard Network Security more or less provides us with unified security management across hybrid-clouds as well as on-prem. We manage both environments on the same console. It makes our security operations faster and less prone to error. 

What needs improvement?

The solution needs to improve the interruptions that happen during gateway upgrades. 

For how long have I used the solution?

I have been using the product for two years. 

What do I think about the stability of the solution?

There were no major stability issues, although switching gateways could cause some downtime, approximately a minute until the new gateway is fully deployed.

What do I think about the scalability of the solution?

CloudGuard Network Security's scalability is good. 

How are customer service and support?

The tool's support is good. Their responses can get delayed due to time zone differences. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have only used the built-in solutions from Azure. 

CloudGuard is easier to understand. CloudGuard is very easy to translate and easy to incorporate features. CloudGuard has better features like packet filters, EPS, threat prevention, and filtering.

We chose CloudGuard because of the visibility. It's much better.

How was the initial setup?

The setup process saves us time, especially in the Azure cloud, as the system continually improves.

What was our ROI?

We have seen ROI through its visibility and through understanding attacks on the workloads.

What other advice do I have?

For us, the solution was easy to understand. The syncing of the CloudGuard Network Security is like that of the gateway on-prem. Translating in a very easy path to bring the features is very easy. I rate the product a nine out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point CloudGuard Network Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2025
Buyer's Guide
Download our free Check Point CloudGuard Network Security Report and get advice and tips from experienced pros sharing their opinions.