We are using it for network security.
The whole reason we got it was to expand and make an extension to the Azure Cloud so that we could establish services that would make a link between the on-prem and the cloud. That was the goal.
We are using it for network security.
The whole reason we got it was to expand and make an extension to the Azure Cloud so that we could establish services that would make a link between the on-prem and the cloud. That was the goal.
We have unified management. It is one of the advantages of this product.
In terms of protection, we have not yet done any kind of penetration tests. We will check them later. In the future, we would also want to use all kinds of features such as IPS, IPSec, etc.
Its advantage is its layout. You do not need to get any unique devices and install them. The installation is easy. The assimilation is less easy because you have to work with a manager in Azure and upload and define all kinds of addresses.
In essence, you do exactly what you do with on-prem. It is the same operation. You can manage it in the same way as on-prem, which is an advantage. You can manage the firewall in the cloud from on-prem, and you do not need any more interventions.
There is a limitation with the version upgrade. We are using version 81.10 and from what I understand, it is problematic to upgrade this version. I do not know if that is true. I am trying to figure it out. If I want to upgrade to a newer version, I have to make new machines. If this is true, it will negatively impact my thoughts regarding the solution.
It is always running. Its availability is high because it is located in two different data centers. This is the purpose of the cloud. It is located in two data centers in two different countries. We have placed one in Frankfurt, and the other one is in Amsterdam or London. That is the advantage. Because it is not the same country or city, the availability is great.
I mainly receive support from an integrator. Check Point did not accompany me as a vendor from the beginning. I am satisfied with the integrator at the moment. He gives me the answers.
We had a few inquiries recently, and he gave me the answers. They were also very helpful during the installation. So, I have had less communication with the manufacturer. For more complex issues, I can communicate with Check Point's support.
I would rate the integrator's support a nine out of ten because sometimes, it takes a long time for the integrator to find the solution to the malfunctions. The glitch related to the deleted machines was very critical for our organization. Things were working normally on the network, but the entire project was simply blocked for a few days. I expected the integrator to open a ticket in a faster way, but he did not open any ticket at all. He resolved it all by himself, but he did not share with us what the solution was. Deleting things and opening them again is not good enough because there is no reassurance that the glitch will not happen again.
We did not use any other solution before this.
The installation is simple. We just had to put it in two centers and deploy it. It was easy.
During the process, we had to wipe a machine. Microsoft gave us some addresses to work with. We used those addresses because we needed public addresses to work with. At first, we were not able to do something properly, so we deleted the machine. When we came back to set up the machine, we had to take new addresses from Microsoft all over again. I do not know whether it was because of Azure or whether it was Check Point´s fault.
I do not know if I have seen a return on investment because we are at the beginning of establishing the cloud. It is not entirely working yet. At the moment, it is not in production, but I assume that there will be an ROI.
It is not expensive.
I wanted to try Palo Alto at first, but because my entire setup was already in Check Point, I did not go in that direction. I wanted unified management. I also consulted my team, and they said that they do not want to come and manage another firewall because of the management and knowledge it requires. The advantage of this solution was unified management.
My recommendation for those who are thinking of installing the product is to check its survivability at the level of downloading a machine and uploading it. Do not upload all the applications straight away to run tests. Research first.
Based on my experience, I would rate it a seven out of ten. There were some malfunctions. There were also issues at the beginning due to the lack of a dependency needed for it to function. The experience is not yet perfect, but like any product, it will improve over time. In the end, I need stability in the cloud, but right now, that feeling is not there. I do not have the feeling of stability where I can say that the production and the service will not drop again. That is the concern. I want to start uploading some kind of application to production soon.
Many traditional on-premise customers transitioning to the cloud often prioritize solutions like CloudGuard, especially when dealing with scale sets and clusters. These customers are accustomed to constructing their own network infrastructure and are drawn to CloudGuard for its compatibility with these setups. This primary use case highlights the appeal of CloudGuard for organizations seeking to maintain control over their network security while migrating to cloud environments.
The unified security management significantly impacts security operations and management positively. It's undeniably beneficial, offering streamlined processes and enhanced control. With the rise of infrastructure as code and tools like Terraform, there's a shift towards a separate manager pushing policies to gateways, which can introduce complexity. However, advancements like dynamic resets, enabled directly on the gateway without manager intervention, represent a significant leap forward, simplifying operations and propelling the company towards more efficient security management.
The most significant benefit for our customers lies in the familiarity and comfort of transitioning from on-premise Check Point solutions to CloudGuard's unified management system. This seamless continuity offers reassurance and confidence in navigating the cloud security landscape, making the transition smoother and more intuitive for them.
When compared to other migration solutions in terms of identity-centric security threats, Check Point stands out for its efficacy rates, particularly evident in its threat cloud and AI capabilities. The integration of various security features, along with the collaborative aspect where information from all Check Point Gateways feeds into a collective pool, underscores the robust security aspect of the platform. This is where Check Point consistently sets itself apart in the security landscape.
We maintain a high level of confidence in our security posture, provided everything is configured correctly. Check Point offers additional solutions to address gaps beyond the firewall's capabilities, especially in scenarios where threats may circumvent it or exploit other entry points. Network security alone may not suffice, but Check Point's supplementary solutions, such as Network Calabrio, complement our defenses effectively, serving as a solid foundation for our overall security strategy.
Our clients appreciate the familiar look and feel of Check Point's interface, which maintains the security standards they've come to trust. While there are numerous reports comparing efficacy rates of cloud-native solutions, they often fall short in comparison to third-party vendors like Check Point.
The auto-scaling feature is undoubtedly one of the most valuable aspects of having Check Point security in the cloud. It provides excellent protection by dynamically adjusting resources based on demand. Additionally, the centralized reporting and management, accessible through a single pane of glass, offer consistency and efficiency across multi-cloud environments. This unified approach ensures seamless security management regardless of the cloud platform, making it a highly advantageous feature of Check Point's cloud security solutions.
Check Point's primary competitor, Palo Alto Networks, offers a SaaS firewall solution that can be deployed in both traditional virtual networks (VNETs) and virtual wide area networks (VWANs). This firewall solution features auto-scaling and consumption-based pricing, allowing users to scale according to their needs seamlessly. While Check Point does offer some VWAN offerings, they appear to be more static and less tailored to cloud-native environments compared to Palo Alto's dynamic and flexible approach.
I have been working with it for approximately five years.
In terms of stability, I've never encountered any issues where a gateway went down or experienced faults. My experience across various environments has been consistently positive, without any instances of gateway crashes or failures for any specific reasons.
The scalability aspect functions seamlessly, although there's a significant process involved, particularly with the CME and management components recognizing new gateways and pushing necessary files. Despite the complexity, the CME serves as an effective tool for deploying scripts and managing tasks. However, the requirement for management to push configurations to the firewall adds an additional layer of intricacy beyond simply pushing to the gateway.
The technical support provided by Check Point is commendable. Once a case reaches the right hands, resolutions are often swift. However, there can be challenges in initially getting the case directed to the appropriate personnel, which is not uncommon for organizations of our size. I would rate it seven out of ten.
Neutral
I've implemented various deployments, with one of the most extensive being a multi-tier architecture utilizing different scale sets for handling ingress, egress, and east-west traffic internally. This particular deployment spanned across two regions, with a total of twelve instances distributed among the scale sets, each serving a distinct function. Essentially, it aimed to replicate a traditional data center environment in the cloud, catering to the specific needs of the organization.
Lately, I've been engaged in numerous discussions surrounding cloud-native firewall solutions like AWS Firewall or Azure Firewall, as well as offerings such as Palo Alto's SaaS firewall and CloudGuard NGFW.
CloudGuard compares favorably, offering a familiar and user-friendly experience akin to Check Point's traditional products. The trend towards cloud-native solutions is evident, particularly among non-security-focused individuals. The flexibility to assist in migrating customers who are embracing cloud-native approaches, integrating seamlessly with platforms like Azure WolfStack and AWS real stack, is a significant advantage. This ease of migration is a notable strength of competitors like Palo Alto.
It functions well, especially the auto-scaling feature, despite the complexity involved, particularly with integrating Azure load balancers. Consolidating these components would be beneficial, but without a SaaS offering, reliance on Azure's resources or cloud-native resources remains a factor. Overall, I would rate it eight out of ten.
We were providing infrastructure security. Our corporate headquarters at the time was overseas, so we had GDPR compliance regulations. It was helping us to keep in line with our compliance.
It saved us resources. We were a lean IT department, so I was able to reassign some staff to other projects because it didn't require so much hands-on manpower.
The notifications, the visibility, and the deployment are the most valuable. It could be packaged in such a way that it took a lot of time and resources off our hands, so it was more efficient. I don't know how to quantify the time saved. It would have saved us at least two to three hours a day just because the traditional IT department has a lot of other tasks and duties. It didn't require a lot for us to become experts on the product. It was seamless. It didn't require too much learning. It was easy to use.
With the incorporation of a lot of AI and machine learning, they can build some sort of a matrix for low-level threats or low-level things that require attention. There can be automation of those tasks so that we don't have to take more time and effort. There should be machine learning to eliminate level-one types of tasks.
I used this solution for six years. I'm a Cybersecurity Instructor. I used it in my previous role. I'm not using it in my current role.
I thought it was extremely stable. I didn't see any downtime. Any of the maintenance windows were either on weekends or in time frames that didn't affect our organization. It was very good.
It would be able to scale up even bigger and beyond what our local site needed. There were about a hundred and fifty employees. It was a manufacturing organization in San Antonio, Texas, but we were just one of twenty sites all throughout the US and Europe.
They were helpful in total. I'd rate them an eight out of ten.
Positive
I believe we had a WatchGuard firewall with other services coupled around it. It didn't necessarily do all of the protection that we needed, but that's what we had at the time.
I was involved in its deployment. It wasn't too challenging. It was easy to medium. Configuration with the compliance side was what took time and effort and was challenging, but it didn't have anything to do with the way the software is built. It was about getting our settings and configurations to be in alignment with the compliance.
I believe headquarters had Check Point support.
The return on the investment was probably more beneficial to the headquarters or the mother corporation because we were just one of the remote sites that had the checkpoint infrastructure sent to us to build up our site. The bigger benefit was for the headquarters because they could manage all these individual sites from one platform. The consolidation and the standardization would have made their lives easier, but I didn't sit in a seat, so I don't know what that looked like.
We have seen time to value with this solution. It provided us with great benefits across the entire organization. We could see its value within about a month. That was probably enough time to let all of the initial shakeout and other things take place. We created a baseline after those thirty days, and we could see where we no longer needed to spend time. We could also see things where we had to take some action but were not apparent to us.
They're a little high in price. The price could be lower.
I wasn't that high in the chain to be able to make that decision. Corporate pushed it down to our site, and that's what we had to go with.
Attending an RSA Conference provides the ability to connect with others in the industry. It allows me to have a line of communication where I can reach out to them in person rather than just a digital introduction.
In terms of the impact of attending an RSA Conference on the cybersecurity purchases made throughout the year afterward, I don't necessarily think about our purchases, but considering I'm a Cybersecurity Instructor, the people that attend our classes are going to be able to benefit because I can provide them more solutions and answers to the questions that they have.
I enjoyed it as a product. It works well. Overall, I'd rate it an eight out of ten.
We have been using Scale Set with Check Point. We use it to scale up and down in Azure depending on the workload. It is scalable, and it is easy to scale up and down depending on the usage. If we have a lot of traffic, it automatically adds a new firewall, and if the traffic slows down, it just removes the firewall. I do not need to worry about the load because it would not be an issue when scaling.
The management server provides unified management. We save a lot of time by not having to log in to different platforms. It is good to have everything in the same place. It saves maybe half an hour a day.
We get good insights into security, and we are more secure because we have more insights than we would get from other products.
We are having issues with updatable objects in the Scale Set solution. It needs to be fixed by Check Point.
The setup instructions are not correct. They should be corrected. We sent the product feedback last week. Several things were misspelled and incorrect in the documentation, and it got updated.
We have been using Scale Set with Check Point for about four years.
We do not have any issues with the product. Usually, the issues are with the Azure platform, such as an Azure host going down. It is not a Check Point issue.
I have been working with Azure Firewall for five years. It is a lot smoother to work with Check Point. When it comes to rule sets and IPS, Azure Firewall does not have too many functions. It does not look nice, and it is not easy to make rules. It is a lot of a headache to work with Azure Firewall. It also costs a lot more.
We cannot get any fancy reports from Azure Firewall the way we can from Check Point. We do not have any insights with Azure Firewall. We get a lot better insights with Check Point.
It is easy if you know what to do. If you follow Check Point instructions, it is hard because the instructions are not correct.
I do not have too much to compare to, but if I compare it with Azure Firewall, Scale Set is quite good. It has quite a good price.
I can only speak for Scale Set. I would rate it an eight out of ten because it is a good solution. I like it.
We are using CloudGuard Network Security to protect North-South traffic or VPCs. We are using the CloudGuard firewall between the Internet and VPCs. All the traffic needs to pass through the firewall.
CloudGuard Network Security provides features, such as threat emulation, that native cloud solutions do not offer. AWS, Azure, and GCP have a lot of features, but you sometimes need to pay charges for specific features. With Check Point products, you have all these features in one license. You pay once and you can use everything.
CloudGuard Network Security improves our security against advanced threats. Others do not offer features like threat emulation out of the box. CloudGuard Network Security protects very well against advanced threats.
We have a high level of confidence in our cloud network security by using CloudGuard Network Security. The product is similar to what we use in traditional data centers. The infrastructure is almost the same. The way to manage the policies is the same. It is very easy to implement and manage CloudGuard networks. There is some difference when you are using auto-provision, but in the end, it is the same technology. It is easy for a traditional network engineer to work with CloudGuard.
We did not go for the cloud vendor's cloud firewall because we wanted to be able to manage all the firewalls, policies, and other things from a single point.
The most valuable feature for me is that you have just one license. You can test and implement everything you need with one license. You do not need to pay for separate module licenses when you want IPS or other features. The license includes everything that you need.
The version upgrades need improvement. We faced issues while upgrading our CloudGuard Network Gateway. When we tried to use the template that Check Point offers on their site, it was not available for the second to the latest version, so I was forced to upgrade my management server. That was very challenging for us.
I have been working with Check Point CloudGuard Network Security for 8 years.
I cannot remember the last time I had an issue. It is stable, but every product has a few bugs. If you maintain the configuration and the versions, everything is fine.
We do not have any problems because we can use the auto-provision templates. If I need to scale up or scale down, I can do this. If there is any issue, it is very transparent. For example, if I lose my gateway, the manager will automatically create a gateway and bring everything up.
Their support is very good. Their response is fast. You can contact an engineer in a few minutes, but it depends on the severity of the issue. In the case of a high-severity issue, you can talk to an engineer to assist you with an issue.
Compared to other vendors our company has been working with, Check Point has better support. They have the best technical staff.
Positive
We only use Check Point products. In our data center, we are only using CloudGuard.
It is very easy. With a few clicks, you can implement your firewall.
It is fair. Its license covers all the features. There is a cost-benefit. The licensing for the cloud is better than on-premises because, with on-premises, you have to pay separately for different things.
Overall, I would rate CloudGuard Network Security a nine out of ten.
When we began our digital transformation, we had already invested in on-premises Check Point firewalls. We desired the same level of security in the cloud along with the elasticity that the cloud demands.
We have a standard security policy across the organization. Our layered security, including North-South and East-West firewalls, is fantastic.
Compared to the other solutions for identity-based threat detection, the malware and threat prevention capabilities are key features that we have enabled – we actually use all the available features.
On several occasions, we've benefited from zero-day protection. It acts immediately when something is discovered, while other solutions might take much longer to react.
I'm confident that as long as we keep up with the advancements that Check Point continues to make, our security posture is in good hands.
The virtual machine scale sets were crucial, offering the ability to scale up and down.
It was very easy to install the solution, and the architecture meant we didn't have to worry about exceeding the solution's capacity.
CloudGuard Network Security provides unified security management across our cloud and on-premises environments.
We integrate our management servers with the Check Point Multi-Domain Security Management server. This allows it to interact with Check Point CASB and our SIEM. As alerts arise, we're able to triage them effectively.
In future releases, I would like to see the data loss prevention (DLP) feature could scale along with the virtual machine scale sets.
I've been using CloudGuard Network Security since approximately 2019.
The overall stability is there. Our firewalls monitor our most crucial systems. If those firewalls went down, it would take out almost our entire cloud network.
The scalability is great.
We have Check Point's Diamond support, and they have been fantastic. It's a true partnership, and we always work together to find solutions for anything that's needed.
We have weekly meetings with our sales team, our architecture team, and their team. They are truly integrated as part of our organization.
Positive
We had our native cloud firewall. Our native cloud firewalls lacked intrusion prevention and advanced malware protection.
They offered basic stateful firewalling, and we wanted a more robust solution for our security needs.
When we designed our cloud architecture, Check Point was the primary solution we chose.
It's simple to set up and easy to tear down or upgrade. This provides us with a lot of flexibility in testing.
We did evaluate other solutions. We evaluated other web application firewalls (WAFs).
The ease of use is great. Creating firewalls within templates is straightforward.
The overall depth of features within the solution is one of the key reasons why we chose Check Point as a long-term partner.
Overall, I would rate the solution a ten out of ten.
We are using it for in and out of our cloud from on-premises. Security from our SD-WAN and express route connectivity is our main use case.
We also have vendor integrations. SAP RISE was the big one that we recently had where we were using dedicated CloudGuard network gateways for straight vendor implementations.
The ease of deployment has been a benefit. Having Check Point on-premises definitely helped with moving to the cloud. It feels very similar after you migrate. It was not as cumbersome as on-premises, and it was a little less scary for others. It enabled others within our company to adopt.
We have unified security management across hybrid clouds as well as on-prem. We are using just gateways to the cloud, and we have the same management server and the same console as on-prem gateways. It definitely allows you to have unified policies across the board. This seamless integration is a huge plus. Smart-1 Cloud is the next portion to go up to, so we can remove the complexity of management, such as login and whatnot, from our responsibilities.
By using CloudGuard Network Security, we have a good foundation. The history of Check Point has a reliability that I trust. Most of the improvements we do are more internal. There are actions that we, as customers, need to do. It helps to have vendors like Check Point who will go out of their way to help you make their product seamless. It is only as good as how you use it. That has been a big positive, and we have had a good accounts team that has been able to bring proper resources to us, and we encourage those additional resources they provide to us to help us be successful.
For identifying security threats, our company uses a portfolio of different kinds of vector spots and inspection spots. Some of that is handled by another team, and I do not have direct insight into that. However, it has definitely added some automatic reaction with our on-premise setup, which has helped us integrate cross-platform. That portion has been great because no one wants to be too vendor-dependent. You want to be vendor-agnostic. The fact that we can utilize it across multiple vendors has been a positive for us.
We are using gateways, and I appreciate the high-availability gateways they have. They stand out more than the competitors.
The Check Point architecture team adapting fluently to the architecture that each cloud has is valuable. They are adaptive to customer solutions, which is a big advantage.
Some more built-in marketplace templates would be nice. It would be nice to see more vendor assistance in deployments and backup of recoveries versus having customers rely upon that themselves. That would make it a lot more seamless and aligned with the standard on-premise model that is there. Check Point can extend the same posture that they have to CloudGuard and make that transition very seamless.
Check Point does not have as big a footprint in engineering teams as Cisco or Palo Alto has, especially in the US market. Therefore, finding someone who understands Check Point is a lot harder. If Check Point can make it easier for seamless transitions, it will build the confidence of engineers and help with the adoption of a new vendor for those engineers. Anything they can do to help with that is a competitive advantage, and it works for any company looking into it.
I have been using CloudGuard Network Security for about three years.
It is very stable, but in any virtualized environment, you are still dependent on your cloud provider. If Amazon, Microsoft, Google, or any other cloud provider reboots the gateway because they are doing some maintenance and did not tell you about it, it is not Check Point's fault. It is something where you have to correlate whether you had an outage or lost a node. You still have to report that. It still looks like that your Check Point firewall went down, so guilty until proven innocent type of deal comes into play. That has been a little bit more challenging than when it is your hardware on-premises. Outside of a power issue or an upstream switch, if something goes wrong in the box, it is not on Check Point. At that point, you can hammer down to the cloud. Having shared resources makes it a little bit difficult to delineate. You have to go case by case.
I have not directly experienced the need for scaling, particularly horizontally. Based on studies, presentations, documentation, and architecture, scalability is definitely there, so I have confidence that if my business needs to shift to high throughput and high sessions, Check Point will have a solution for me to do that seamlessly.
I have always had challenges with TAC. There still seems to be a difference in the type or level of tech support you get based on the region you call into. That has been a little bit more challenging. We have had issues with getting the same candid answers where they were regurgitating without looking through. At the support level, we have had some challenges back and forth, but when we talk to our account team or our sales engineer and say that we have a problem, their reaction is very quick. Their escalation internals take care of that. They get us the right people.
For additional deployments from the cloud perspective, we have always had great contacts to get to. I have been very happy with the level of support Check Point has given us for new deployments' design ideas and problems. The feature roadmap they chose has been excellent.
Overall, I would rate their customer service and support an eight out of ten. I am dropping points because of the TAC issues that I have had.
We do use another vendor that does a similar function. The vendor is Fortinet. Both vendors have their own pros and cons. The big difference between the two from a cloud network security perspective is that the high availability model that Check Point has is not what the competitor has. So, you are still relying upon load balancers, and you are still relying upon cloud failover, which adds a little bit of complexity. This high availability has been a huge plus. We have not seen our current vendors or other vendors be able to do so.
We, as such, have not switched. We have a different vendor we use, and we have not made the decision to switch. We are still at that deciding factor because we are seeing where things fit with both platforms. From an ROI perspective, switching would not be advantageous to us at this point based on what we are getting, but it is definitely something that is looked upon as we look at life cycles. We can then make a decision one way or the other to meet our business needs.
The decision to go for CloudGuard instead of our cloud vendor's cloud firewall was predated. There were some implementations that were already there. We have made additional investments where we did go between vendor A and vendor B and made a decision. I made the decision and chose Check Point, not just for the single pane of glass and ease of management but also for the high availability. For the high availability that we were deploying, there was no other solution that could give us the seamlessness we were looking for. We could not get that from other vendors, so it became evident that going for Check Point was the right decision to make.
We are a Microsoft Azure Shop, and the deployment model would be high-availability gateways. We are not using gateway low balancers. We are just using the high-availability deployments.
In terms of ease of deployment, I cannot speak for the earlier years, but I did hear that there were some pain points. That was more of a combination of cloud maturity in Microsoft and Check Point integrations. There were other challenges related to intermixing and the knowledge base. This was when Check Point was new to our company, and we probably did not have the right MSP support. A lot of those gaps and failures were due to the support and not having that strong knowledge base and operating support afterward. Recent deployments, from 2020 to 2024, are different. There is a night and day kind of difference. We had instant Check Point support. They walked us through and sat on the call while we deployed in real-time with our CloudOps teams. It was seamless. We ran into a gap, and we were easily able to fix it right then and there. They were very collaborative. It has just been a night-and-day type of scenario.
For the first implementation, we used an MSP consultant in collaboration with Check Point. We did the recent deployment in-house directly with Check Point.
We are yet to figure that part out. There is a lot of tuning on our side, and we have definitely seen its remediation and prevention capabilities help us in very critical situations. Knowing that we could be proactive instead of constantly being reactive has definitely put me at much more ease at night. There are some improvements to that.
Investment-wise, this is where you look at the consolidation and realize that you might have different vendor technologies that might be doing the same thing. This is something we will have to look at. It is not necessarily a Check Point problem. It is something that we, as an enterprise, have to look into.
My experience has been extremely positive. It was not a concern because I had an account team that fought for pricing for our company. They were not pushing me to professional services for certain help. I was instantly getting a CloudGuard architect to help us out. They understood our environment and bridged the gap where we needed that help with our public cloud provider and with Check Point, in this case. That is what made the experience. They allowed us to scale it well, and that is where Check Point has done very well.
They realize that customers need to be adaptive in their cloud deployments, and they are much quicker than on-prem. They know that in the end, their product speaks for itself, so pricing has always been very competitive compared to other vendors. I have always had account teams no matter what company I have worked for, and they have always done a good job of meeting that gap. So, its pricing was not the reason we made the decision.
I would rate CloudGuard Network Security a nine out of ten. The ease of template deployment would have been nice. There was also a little bit of weirdness with the licensing models for our on-premise management. That is pretty much it. Otherwise, I am extremely happy with it. They are not negatives. It is still great.
We use it to secure our network. We use it to manage our firewalls and some of the other services that we have with them.
By implementing CloudGuard Network Security, we mainly wanted visibility.
CloudGuard Network Security saves time from having to go to multiple places to look for different things. It gives us the ability to see it all in one place. We could realize its benefits in less than 90 days.
CloudGuard Network Security provides unified security management across hybrid-clouds as well as on-prem. We are able to combine different aspects into one place.
I am confident in our cloud network security. Check Point is a great company. They stay up to date on everything that is happening, and they keep us informed about anything that needs to be done to maintain that security posture.
The visibility is most valuable. It allows us to see all of our devices from one place, and it gives us the ability to manage push updates and things like that from one place.
Its price is fair, but it can be more favorable.
We have been using CloudGuard Network Security for about two years.
It feels very stable to me.
Its scalability is good. It is being used across multiple departments. There are 300 users and a lot of endpoints.
We do not have any plans to increase its usage this year. We might do that in 2025.
Their support is great. I would rate them a nine out of ten.
Positive
We did not use any similar solution previously.
I was not too much involved in its deployment. My role is not as technical as it used to be.
We worked with partners to help us with the deployment who had expertise in this, so it was pretty straightforward. Our implementation strategy was to work with a partner.
We had a Check Point partner for implementation. Our experience with them was good.
We have seen an ROI in terms of time and labor costs. People do not have to spend as much time on different things. They have one interface to manage different things.
It is fairly priced, but it can be a little expensive from time to time.
I am not aware of any solutions that we have evaluated. Check Point is our firewall vendor, so we went with them. We were able to have just one partner and one point of contact for any issues. Having a bunch of different products creates problems of its own. You do not know whom to call and whom not to call for an issue. Having one single contact to oversee all that is beneficial to us.
I would advise taking your time. Be patient, and you will see results. It does not take much time, but some people want to see a return right away. It took us about 90 days to see the return. It is more based on you getting in it and doing things with it, but be patient.
I would rate CloudGuard Network Security a nine out of ten.
