My main use case for Check Point IPS is as an Intrusion Prevention System.
Senior Solution Consultant at a tech services company with 51-200 employees
Network security has improved with reduced security issues and increased efficiency
Pros and Cons
- "Check Point IPS has positively impacted our organization by helping us secure our environment, leading to fewer complaints about security issues."
- "Check Point IPS could be improved as the deployment is complex."
What is our primary use case?
What is most valuable?
Check Point IPS has positively impacted our organization by helping us secure our environment, leading to fewer complaints about security issues. It's efficient.
Since implementing Check Point IPS, we have noticed about 15% fewer security issues.
What needs improvement?
Check Point IPS could be improved as the deployment is complex.
For how long have I used the solution?
I have been using Check Point IPS for almost one year.
Buyer's Guide
Check Point IPS
October 2025
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,029 professionals have used our research since 2012.
What was my experience with deployment of the solution?
The complexity of Check Point IPS deployment is due to integration with other tools.
What do I think about the stability of the solution?
Check Point IPS is stable in my environment, and I have not experienced any downtime or issues with reliability.
What do I think about the scalability of the solution?
The scalability of Check Point IPS is pretty good.
How are customer service and support?
Customer support for Check Point IPS is satisfactory, and I have had a positive experience when reaching out for help.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not previously use a different solution before Check Point IPS.
How was the initial setup?
My experience with pricing, setup cost, and licensing for Check Point IPS has been satisfactory.
What was our ROI?
I have seen a return on investment with money saved and time saved.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for Check Point IPS has been satisfactory.
Which other solutions did I evaluate?
Before choosing Check Point IPS, I evaluated other options such as Palo Alto.
What other advice do I have?
My advice to others looking into using Check Point IPS is that it's important for your network security. I rate Check Point IPS ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jun 30, 2025
Flag as inappropriateTechnical Specialist at VDA Infosolutions Pvt. Ltd.
Has reduced threat events and protects our network with accurate signature updates
Pros and Cons
- "Through its fewer false positives and automatic threat updates, Check Point IPS has impacted our organization positively as it has reduced threat events and requires less time to configure and manage."
- "The IPS inspection throughput goes high in older security gateways that have limited hardware resources, so that can be improved."
What is our primary use case?
We are using Check Point IPS for the security of our private resources and the overall organization network.
With the help of Check Point IPS, our organization network is protected in real time through the threat intelligence database that automatically gets updated from the threat cloud AI of Check Point IPS.
What is most valuable?
The best feature is that Check Point IPS not only prevents threats but also gets automatic signature updates from the Check Point threat cloud. It also has fewer false positives.
Whenever new vulnerabilities or CVEs come in the cybersecurity network, they are fed from the Check Point threat cloud. From their cloud threat center, the signature gets automatically updated into the Check Point Security Gateway where Check Point IPS is present. The signatures are accurate, which helps reduce false positives compared to many other IPS solutions.
Through its fewer false positives and automatic threat updates, Check Point IPS has impacted our organization positively. It has reduced threat events and requires less time to configure and manage.
What needs improvement?
The IPS inspection throughput goes high in older security gateways that have limited hardware resources, so that can be improved.
For how long have I used the solution?
We have been using Check Point IPS for almost two years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
Scalability is good.
How are customer service and support?
The support team is supportive, but sometimes in complex troubleshooting, they take time to resolve issues.
Which solution did I use previously and why did I switch?
We were using Sophos IPS before moving to Check Point IPS.
How was the initial setup?
The solution has reduced threat events and takes less time to configure and manage.
What about the implementation team?
We implemented this as a customer.
What was our ROI?
Time has been saved because the manageability is very easy.
Which other solutions did I evaluate?
We evaluated Fortinet IPS.
What other advice do I have?
I would advise anyone looking for an IPS solution to consider Check Point IPS as a solution. On a scale of one to ten, I rate this solution an eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Oct 24, 2025
Flag as inappropriateBuyer's Guide
Check Point IPS
October 2025
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,029 professionals have used our research since 2012.
Works at National Bank of Canada
Offers protection against malicious inbound Internet traffic to our DMZ network and inspects and blocks outbound Internet traffic to sites that could be a danger to our internal users
Pros and Cons
- "The IPS module offers protection against malicious inbound Internet traffic to our DMZ network and inspects and blocks outbound Internet traffic to sites that could be a danger to our internal users."
- "The firmware upgrade process is quite cumbersome."
What is our primary use case?
Our primary use case is to protect the on-prem infrastructure. The IPS blade is integrated into our Check Point environment. The product is the core of our security infrastructure that we use to filter and block attempts for connection into resources.
Due to the pandemic, the company needed to improve its compliance with traffic risk management since all employees went full WFH.
This has turned into more efficient operational control of internal traffic, where numerous threats have been identified while working in the office as most malware is somehow admitted by someone with access to the company network, either unintentionally or not. This drove revenue growth as fewer resources had to be spent by the IT department to fight cyber threats.
How has it helped my organization?
We've seen how this firewall has operated on real-time threats to infrastructure by detecting, neutralizing, eliminating, and then patching against malware.
We can test these patches post-deployment in less than one day. We generate reports that include the activity for the time we desire and gauge the performance of the software.
The IPS module offers protection against malicious inbound Internet traffic to our DMZ network and inspects and blocks outbound Internet traffic to sites that could be a danger to our internal users.
What is most valuable?
IPS definitions are quick & simple. It is a robust system to fortify the digital perimeter. It can prevent DDOS attacks by analyzing traffic patterns.
Another valuable feature of the solution is that the product's stability has been very good. The product's uptime has been massive, and there has not been any downtime, making it a very good product.
The product has allowed us to proactively mitigate any network access misconfiguration resulting from delegation. It enables us to define our own rules for detection.
What needs improvement?
It has false positives.
There is no option to have automatic exceptions from a rule.
The initial deployment can be a challenge.
The upgrade process or the maintenance of the devices for each firmware upgrade requires one to break the cluster and run a specific moment at a time, a single node concept.
The firmware upgrade process is quite cumbersome.
There is room for improvement in the pricing model. It can be more competitive.
Moreover, another area of improvement is in the maintenance of the solution because it requires a lot of people to maintain the solution. Some tasks can be automated, and I would like to see a feature where we can automate the tasks.
For how long have I used the solution?
I have been using Check Point IPS for more than 15 years.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Security Engineer at Digitaltrack
Has prevented security breaches and reduces malicious activity through automated threat updates
Pros and Cons
- "We have seen a return on investment with Check Point IPS because we have not seen any security events, malicious activities, or any device compromised, so we are secure now, and money has been saved."
- "Check Point IPS can be more reasonably priced for small organizations; apart from this, everything looks perfect."
What is our primary use case?
My main use case for Check Point IPS is to prevent outside threats, malicious activities, and attacks, and for security purposes. With the help of Check Point IPS, our private network is secure.
A specific example of how I use Check Point IPS in my day-to-day work is that for any traffic coming through the LAN to WAN, all traffic is inspected and checked to ensure there is no malicious traffic flowing through. Whenever the end-user is downloading any file, it will also check for any threats inside the signature. All these security features are provided by Check Point IPS.
What is most valuable?
The best feature of Check Point IPS is its automated threat database update.
This feature helps my day-to-day work and overall security because we don't have to manually add or improve the security; whenever any threat signature comes worldwide, it is synced in real-time.
Check Point IPS has positively impacted my organization because after deploying it, we are seeing a lower number of security events happening and our users are very secure. Until now, no user has had a PC compromised from any threats or malicious activities.
What needs improvement?
Check Point IPS can be more reasonably priced for small organizations; apart from this, everything looks perfect.
For how long have I used the solution?
I have been using Check Point IPS for more than three years.
What do I think about the stability of the solution?
In my experience, Check Point IPS is stable.
What do I think about the scalability of the solution?
Check Point IPS's scalability is outstanding, so we don't have to worry about it.
How are customer service and support?
The customer support for Check Point IPS is supportive.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I did not previously use a different solution before Check Point IPS; we are using the same solution.
What about the implementation team?
I was not part of the pricing, setup cost, or licensing experience.
What was our ROI?
We have seen a return on investment with Check Point IPS because we have not seen any security events, malicious activities, or any device compromised, so we are secure now, and money has been saved.
Which other solutions did I evaluate?
Before choosing Check Point IPS, we have evaluated other options.
What other advice do I have?
Regarding the decrease in security events, previously there were some incidents that happened, but after implementing the solution, we have not reported any single compromised device, so we are very secure now.
My advice for others looking into using Check Point IPS is that anyone looking for a solution that can prevent security events effectively can consider Check Point IPS as the best solution.
My company has a business relationship with this vendor other than being a customer, as we are partners.
I rate Check Point IPS nine out of ten because apart from the pricing, everything looks perfect.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 25, 2025
Flag as inappropriateTechnique at Digitaltrack
Has strengthened network security through signature-based prevention and centralized policy management
Pros and Cons
- "Check Point IPS is a good feature that provides excellent signature-based threat prevention and helps us protect our private network from outside threats."
- "For a smaller organization or smaller environment, the cost for Check Point IPS is a little bit high, so that can be made more budgetary for small organizations."
What is our primary use case?
We are using Check Point IPS for threat prevention. With Check Point IPS, our organization is protected. We are using this IPS solution to protect our private network with the help of IPS signatures that are continuously updated from ThreatCloud.
Check Point IPS works based on zero-day protection. It is integrated with SandBlast. Whenever any suspicious file is detected, the IPS creates a threat signature, and with the help of the creation of the signature, it blocks the threat across the entire network if any malicious file is found.
After implementing Check Point IPS, users are secured from malicious files, malicious activities, or any threat from the outside. Whenever they are downloading anything from the internet, that file first goes to SandBlast, and it checks whether there are any malicious signatures or malicious activities detected. If it is detected, then it is blocked by Check Point IPS.
What is most valuable?
The best feature is its management. The configuration part is easy. As this feature is built into the Check Point Quantum firewall, with a single console we can configure it, create a firewall policy, and apply this security feature. The manageability and visibility are outstanding. It also provides a threat prevention feature.
As the configuration steps are very easy, any L1 engineer can easily configure it and manage those policies and configurations. Check Point IPS is a good feature that provides excellent signature-based threat prevention. It helps us protect our private network from outside threats.
The security incidents have been reduced. Manageability is the main concern for engineers, so after implementing it, time is really saved.
What needs improvement?
For a smaller organization or smaller environment, the cost for Check Point IPS is a little bit high, so that can be made more budgetary for small organizations.
For how long have I used the solution?
We are using Check Point IPS for more than three years.
What do I think about the stability of the solution?
Check Point IPS is very stable.
What do I think about the scalability of the solution?
We are using Check Point IPS from the beginning.
How are customer service and support?
They are very supportive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have evaluated Fortinet IPS.
How was the initial setup?
It is easy to set up.
What about the implementation team?
The implementation has resulted in time saved.
What other advice do I have?
I can advise other organizations, anyone looking for Check Point IPS or threat prevention capabilities, that they can consider Check Point IPS. It's an outstanding product that really helps them keep their private network resources secure from malicious activities or any malicious signatures. That can be prevented with the help of Check Point IPS. I rate Check Point IPS a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 24, 2025
Flag as inappropriateSecurity Engineer at a tech vendor with 51-200 employees
Real-time updates and monitoring have enhanced threat prevention
Pros and Cons
- "The best features Check Point IPS offers are how easy and how reliable it is; it can prevent a lot of signatures, which is very nice, and it's actually essential in this year."
- "The scalability of Check Point IPS is on point, while the customer support is sometimes a bit slow."
What is our primary use case?
My main use case for Check Point IPS is to monitor and update various rules and prevent any possible attack.
In a situation where Check Point IPS helped me prevent a specific attack, prevention is key; we monitor and update the rules once a week for our client, and keeping everything monitored and updated prevents any problem.
I do not have anything else to add about my use case or how I rely on Check Point IPS.
What is most valuable?
The best features Check Point IPS offers are how easy and how reliable it is; it can prevent a lot of signatures, which is very nice, and it's actually essential in this year.
The real-time protection for our client is what makes my day-to-day work easier.
Check Point IPS has positively impacted my organization by making the infrastructure actually more protected now.
I measure that increased protection by seeing fewer incidents because we update every week, so there is no time to wait and create a breach.
What needs improvement?
For the product itself, there is nothing that I wish worked better or was easier, but it can become complex to manage all the rules if the infrastructure is very big.
I do not want to add more about the needed improvements.
For how long have I used the solution?
I have been using Check Point IPS for two years.
What do I think about the stability of the solution?
Check Point IPS is very much stable.
What do I think about the scalability of the solution?
The scalability of Check Point IPS is on point, while the customer support is sometimes a bit slow.
How are customer service and support?
I would rate the customer support an eight.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not previously use a different solution before Check Point IPS.
What was our ROI?
I have seen a return on investment since using Check Point IPS, as evidenced by fewer incidents.
What's my experience with pricing, setup cost, and licensing?
I am not in charge of pricing, setup cost, and licensing.
Which other solutions did I evaluate?
Before choosing Check Point IPS, I did not evaluate other options.
What other advice do I have?
The advice I would give to others looking into using Check Point IPS is that it's not for not-advanced users; a new administrator can be overwhelmed.
My company has a business relationship with this vendor as a partner.
I was offered a gift card or incentive for this review.
I do not have any additional thoughts about Check Point IPS before we wrap up.
On a scale of one to ten, I rate Check Point IPS a nine.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Aug 22, 2025
Flag as inappropriateTechnical Architect and consultant at VirginAustralia
Useful to detect malware and has an easy setup phase
Pros and Cons
- "It is a stable solution. Stability-wise, I rate the solution a ten out of ten."
- "Signature tuning should be more user-friendly in the tool because, as per my experience, signature tuning is tough in Check Point IPS."
What is our primary use case?
Check Point IPS is a signature-based protection tool. As such, it is better than a cloud database. Check Point IPS is useful for anomaly detection and user behavior monitoring. In our company, we check our daily logs in Check Point IPS. My company has customized the settings of Check Point IPS as per our requirements.
What needs improvement?
To overcome the tool's shortcomings, the signature-based protection that the product offers needs to be more effective and regularly updated. Some of the configurations and management should be easy in the product. Signature tuning should be more user-friendly in the tool because, as per my experience, signature tuning is tough in Check Point IPS.
For how long have I used the solution?
I have been using Check Point IPS for seven to eight years. I am a user of the solution.
What do I think about the stability of the solution?
It is a stable solution. Stability-wise, I rate the solution a ten out of ten.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution a nine out of ten.
Around 6,000 people in my company use the tool.
How are customer service and support?
The solution's technical support is very effective. I rate the technical support a ten out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
I rate the product's initial setup phase a ten on a scale of one to ten, where ten means it was a very easy process.
The solution is deployed on a hybrid cloud model.
If any of the products from Check Point, like any of the firewall or any other components are already deployed in our company, then we can basically integrate Check Point IPS with such existing components, a process which may take upto a week to be completed. If a new deployment process has to be carried out for Check Point IPS, then it will take a longer time period to be completed.
Rack mounting will be used during the deployment process. The deployment phase will consist of two scenarios, one of which consists of software deployment and the other one is hardware deployment. During hardware deployment, one needs to find the rack and mount the devices, as well as perform many other physical activities. Once the product is up and running, one needs to go for the software deployment part, which will definitely take some time because of the configurations needed.
What was our ROI?
The security offered by Check Point IPS is a very crucial and important part of any organization. Whatever investment is needed, has to be made to secure the assets.
My company is willing to invest in the product for returns, especially so that we can reap the benefits from its cost-saving and time-saving capabilities.
What's my experience with pricing, setup cost, and licensing?
It is a reasonably priced product.
What other advice do I have?
Check Point IPS is useful for our company's cybersecurity framework since the product acts as a threat prevention system. My company uses the product's prevention mode over its detection mode.
There is a different IT security team in my company, which is basically like an information security team, who actually analyze reports on a day-to-day basis while checking for any middleware attacks or DDoS attacks. The tool is very useful, and the IT security team can prevent attacks with the help of Check Point IPS. Check Point IPS can also be used to detect malware.
I don't have any idea whether the product has improved the security part. The internal response time to any attacks is something that depends on how critical the situation is in our company. If any attacks are at the beginning stage, then it acts very quickly, and otherwise, it takes time depending on the severity of the incident or task. If there are any urgent requirements, then my company can make a call and reach out to Check Point IPS.
In terms of the product's integration capabilities with our company's existing infrastructure, I would say that my company has been using the tool since 2017 and has not faced any challenges. My company needs to upgrade our devices.
I definitely recommend that others use the product because it is easy to configure, offers proven IT security services, and is very effective against zero-day attacks or middleware attacks.
I rate the solution a ten out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Operations Manager at Network International
Offers great features like tunneling, hashing, and SSL
Pros and Cons
- "The most valuable feature of the solution is called tunneling. Tunneling is one of the major security features that hackers cannot penetrate through."
- "The area with certain shortcomings where improvements are required consist of support availability."
What is our primary use case?
I use it on a perimeter with the internet-facing services, so the traffic will pass through Check Point IPS, which will secure connectivity and communication.
What is most valuable?
The most valuable feature of the solution is called tunneling. Tunneling is one of the major security features that hackers cannot penetrate through. The hashing and SSL are also some of the valuable features of the solution.
What needs improvement?
The area with certain shortcomings where improvements are required consist of support availability. The tool's complete operating system architecture is being designed in such a way that it looks a little complicated compared to the tool offered by its competitors. The tool's complete operating system architecture needs to be simplified for the users, especially from an administrative and troubleshooting perspective, so that it can be used quickly or with speed whenever there is a crisis. If the aforementioned areas are considered, the product will be much stronger. The tool's support is a major issue because it has not been quick in certain areas compared to the ones offered by Check Point's competitors.
The product's scalability has certain shortcomings where improvements are required. The product should be able to handle and compete with competitors and their services as well as updates, which are much faster than Check Point.
For how long have I used the solution?
Check Point IPS has been used in my organization for two decades. My company has a partnership with Check Point. My company also has customers at Check Point. My company can be described as a direct consumer, and we even deal with Check Point directly.
What do I think about the stability of the solution?
Stability-wise, I rate the solution a nine out of ten.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution a seven out of ten.
How are customer service and support?
I rate the technical support a six out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Mainly, in my company's branches, I have Check Point. For my core data center, I use Cisco and some other solutions. Palo Alto is also a product I use in my company. The aforementioned area consists of the IPS tools I use internally in my organization.
How was the initial setup?
The product's initial setup phase was okay.
What was our ROI?
In terms of ROI, I would say that Check Point IPS is able to meet the purpose for which my company purchased it. I rate the product's ROI a nine out of ten.
What's my experience with pricing, setup cost, and licensing?
I rate the product price an eight on a scale of one to ten, where one means it is very cheap and ten means it is very expensive. The product is expensive.
What other advice do I have?
A few integrations with Check Point IPS are a bit complicated, especially the cloud-based ones. The product's integration part is complicated because its users need a lot of support and HA so that it can work in a high-level architecture while also being integrated mainly with cloud platforms and considered a reliable source.
If I speak about objects in Check Point IPS, specifically in terms of the screening, sometimes it will go into the deepest screening which one may not be able to see the logs and for that we need to enable search specific logs, and it needs to be validated. For the aforementioned process, it should be simplified, and similar to other products. There should not be areas that are invisible and it should be transparent.
I rate the tool an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2025
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Fortinet FortiGate
Darktrace
Vectra AI
KerioControl
Trend Micro Deep Discovery
Palo Alto Networks Advanced Threat Prevention
Trend Micro TippingPoint Threat Protection System
Cisco Secure IPS (NGIPS)
Cisco IOS Security
Palo Alto Networks URL Filtering with PAN-DB
Cisco Sourcefire SNORT
Trellix Intrusion Prevention System
Zscaler Cloud IPS
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?













