We primarily use Check Point IPS for cybersecurity, specifically when there is a need for internal and external connections. We use it to monitor performance and take necessary actions when events occur. We also use it for firewall solutions.
PDE at a non-tech company with 10,001+ employees
Effective cybersecurity enhanced by robust behavior analytics and good support
Pros and Cons
- "Behavior analytics and monitoring capabilities of Check Point IPS are valuable, especially for cybersecurity purposes."
- "Some challenges might exist with integration depending on the environment."
What is our primary use case?
How has it helped my organization?
Check Point IPS has helped us maintain cybersecurity through effective monitoring and behavior analytics.
What is most valuable?
Behavior analytics and monitoring capabilities of Check Point IPS are valuable, especially for cybersecurity purposes.
What needs improvement?
It's hard to specify areas for improvement without a deeper investigation. However, usually, IPS does its job. Some challenges might exist with integration depending on the environment.
Buyer's Guide
Check Point IPS
February 2025
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
832,138 professionals have used our research since 2012.
For how long have I used the solution?
We have been using the solution for five years.
What do I think about the stability of the solution?
The solution is 99.8% stable.
What do I think about the scalability of the solution?
Flexibility and scalability depend on the solution and the requirements. So far, we haven't faced any requirements that couldn't be submitted.
How are customer service and support?
The customer service and support are satisfactory. I would rate them quite high.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup can be complicated if you are not familiar with what you're doing. It usually requires two people for a successful installation.
What about the implementation team?
Check Point IPS usually requires two individuals for installation, depending on their certifications.
What was our ROI?
Our return on investment is usually based on a three-year period.
What's my experience with pricing, setup cost, and licensing?
Pricing is average. Usually, the price listed isn't adhered to, and negotiations occur.
Which other solutions did I evaluate?
We compared with solutions from vendors like Fortinet, Cisco, and Palo Alto. Palo Alto is perceived as better in performance and technical aspects, while Fortinet is seen as less robust.
What other advice do I have?
I'd rate the solution eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Oct 15, 2024
Flag as inappropriateDatabase Administrator at Ordina
Great unified system with impressive protection and helpful support
Pros and Cons
- "Real-time protection has blocked most threats that could affect system operations."
- "The cost is high."
What is our primary use case?
This tool seals any loopholes that could be detected by ransomware attackers and may lead to data loss. It has protected the organization from potential vulnerabilities affecting operations and the slowdown of workflows. It ensures that the applications are performing efficiently based on the set objectives. It delivers many signatures that enable teams to ascertain the security situations in various departments. It saves the organization a lot of costs since it is less costly and more powerful than many versions in the market.
How has it helped my organization?
Digital transformation has been efficient and productive thanks to the operation of this great product. After the implementation of IPS, there is increased production, and teams can easily focus on more productive tasks without fear of being attacked by cybercriminals. We have accelerated operations with the modern data management models that come with this application. It is easy to detect threats in advance and plan effectively how to eliminate them. Our organization has been secure since we deployed this tool without cases of external attacks.
What is most valuable?
Most features in this platform have been of great importance in the organization. The unified system controls the security situation in any system, reducing the total cost of ownership. Real-time protection has blocked most threats that could affect system operations. It can detect and prevent the entry of known and unknown data vulnerabilities.
The customer support services are efficient and have always helped us achieve most goals. The platform provides continuous cyber security reports that enable us to plan and make informed decisions.
What needs improvement?
The set features have played important roles in transforming the organization to meet the basic security standards.
The cost is high. That said, depending on the company's size, there can be a mutual agreement for efficient licensing terms. We are satisfied with the set performance parameters that have enhanced the smooth running of workflows.
The team should focus more on timely updates and configuration processes that sometimes may fail. I like the performance of this product and the achievements we've made so far.
For how long have I used the solution?
I've used the solution for eight months.
What do I think about the stability of the solution?
It is stable, and I recommend it.
What do I think about the scalability of the solution?
I am impressed by the performance.
How are customer service and support?
The customer support staff is always supportive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not used a different solution.
How was the initial setup?
The initial set up was not complex.
What about the implementation team?
Implementation was done through the vendor.
What was our ROI?
There is increased ROI.
What's my experience with pricing, setup cost, and licensing?
The setup cost is good.
Which other solutions did I evaluate?
I have not evaluated other options.
What other advice do I have?
The security measures are effective and I'd recommend the product to companies seeking great performance.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point IPS
February 2025
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
832,138 professionals have used our research since 2012.
ICT Security Consultant at National Treasury of the Republic of South Africa
Robust network security with comprehensive protection, and continuous improvement, offering advanced features like signature-based detection, behavioral analysis, and mobile solutions
Pros and Cons
- "It offers robust protection with features such as Next Generation firewall capabilities, mobile solutions, and proactive threat prevention."
- "Enhancements are necessary for the proficiency of notifications in the event of a Social Security incident, whether through email or alternative channels such as SMS."
What is our primary use case?
The primary use cases include application security control, comprehensive security management, and proactive protection against a wide range of threats. It serves as a crucial component for safeguarding applications and ensuring overall security effectiveness. It contributes to proactive protection and plays a pivotal role in firewall protection strategies.
How has it helped my organization?
The focus is on safeguarding the departmental environment, and it is effectively fulfilling its role in environmental protection.
What is most valuable?
It offers robust protection with features such as Next Generation firewall capabilities, mobile solutions, and proactive threat prevention.
What needs improvement?
Enhancements are necessary for the proficiency of notifications in the event of a Social Security incident, whether through email or alternative channels such as SMS.
For how long have I used the solution?
I have been working with it for ten years.
What do I think about the stability of the solution?
It offers excellent stability. I would rate it ten out of ten.
What do I think about the scalability of the solution?
I would rate its scalability abilities nine out of ten. Currently, 1,800 users within our organization actively use it.
How are customer service and support?
I would rate its customer service and support nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup can be somewhat intricate, involving coordination with the OEM and service provider. I would rate it a six out of ten.
What about the implementation team?
For the deployment, we conducted a refresh last year, which took approximately two to three weeks to complete. It is essential to have at least two individuals involved in the process, with one requiring additional expertise. This team typically consists of a Check Point specialist, an expert, and an administrator.
What's my experience with pricing, setup cost, and licensing?
The pricing is quite reasonable.
What other advice do I have?
It is highly efficient and it provides a mobile solution for various devices, including cell phones and iPads, catering to mobile workflows. The system is not only efficient but continually improving. I would certainly recommend it. Overall, I would rate it eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT security and network analyst at Québec Government
Efficiently protects workstation, but some lacks automation features
Pros and Cons
- "It is easy to configure."
- "It requires a lot of people to maintain the solution."
What is our primary use case?
Our primary use case is to protect the workstation. The IPS blade is integrated into our Check Point environment. We have many blades in Check Point IPS representation, each with a specific function.
What is most valuable?
The most valuable feature is very good and easy to use. Configuration is straightforward, and support is fast, usually within one hour. The IPS blade is integrated into our Check Point environment and is used for intrusion prevention.
What needs improvement?
There is room for improvement in the pricing model, and it can be more competitive.
Moreover, another area of improvement is in the maintenance of the solution because it requires a lot of people to maintain the solution. Some tasks can be automated, and I would like to see a feature where we can automate the tasks.
For how long have I used the solution?
The company has been using Check Point for around 20 years, and I have been with the company for two years. The IPS blade is integrated with Check Point, and we use R81.20.
How was the initial setup?
The initial setup is straightforward. It is easy to configure.
What about the implementation team?
The solution requires proper maintenance because there are several tasks to check for updates and more. We have five people on the maintenance team. Our company has many firewalls since it is big, and the number of endpoints is more than 5000. Moreover, we have various roles like engineers, system administrators, or network administrators.
What other advice do I have?
I would give Check Point IPS a seven out of ten. We started using this product a year ago, and it has worked well for us.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Engineer at LTTS
Helps prevent unwanted and unknown attacks
Pros and Cons
- "IPS can protect our organization with any old vulnerabilities or if any vulnerability detected minutes ago IPS can protect us as per our configured policy."
- "I observed on our management that sometimes IPS does not connect to the threat cloud, we have to check and improve it. Otherwise, all of the features are good."
What is our primary use case?
I work in MNC company and we have 6 GEO locations in India and all of our locations are using Check Point as a perimeter firewall. I sit in our HO Office and I am maintaining all the location firewalls with my team, except for 1 location. We regularly monitor the security alerts on our perimeter and based on that we will align our location IT to check and update us. IPS is our core blade for network security, it is provide the details that some suspicious activities happen on our network as per the IPS signature database, and based on that we will work on that.
As our primary use case with IPS blade we are daily receiving non-compliant IKE alert, and we know if we prevented it then what impact will happen, our all site to site tunnel will stop working which is running with noncompliant IKE and we are not forcing our client to update that noncompliant IKE protocol.
How has it helped my organization?
We have configured the IPS daily report on our Check Point Gateway so we get daily reports with details of IPS related alerts. Based on the report we will check whether it is in prevention or detection mode and based on that we will check with the internal team and work on that. This is a very useful blade to prevent unwanted and unknown attacks. We can also create strict policies in the IPS blade to prevent high and critical severity but in our organization, we follow the same but in some cases, we have created exceptions.
Overall with the IPS blade we can say we are secure with unknown attacks.
What is most valuable?
The default category (Low, Medium, High, Critical) is the most valuable feature because we don't know what type of attack will happen, but with this category, we can create a policy to prevent any high and critical severity behavior. With this, we can protect our organization from weakness exploit of vulnerable systems.
IPS can protect our organization with any old vulnerabilities or if any vulnerability was detected within a few minutes. IPS can protect us as per our configured policy.
What needs improvement?
I strongly agree that with IPS blade we can protect our organization vulnerabilities. I would like to have the ability to virtually patch our application or vulnerable machine that is talking ourside our network. If it is there then we can protect our application and systems to any unknown attack if our system or application has a weakness or vulnerability.
I observed on our management that sometimes IPS does not connect to the threat cloud, we have to check and improve it. Otherwise, all of the features are good.
For how long have I used the solution?
I have been using Check Point IPS for the last four years.
What do I think about the stability of the solution?
Sometimes it will not connect to the threat cloud.
What do I think about the scalability of the solution?
This is a fully salable blade.
How are customer service and technical support?
Overall okay.
How was the initial setup?
Straightforward.
What about the implementation team?
Vendor team
What was our ROI?
Priceless.
What's my experience with pricing, setup cost, and licensing?
Reg. cost and licensing part out procurement team taking care.
What other advice do I have?
The IPS is a very good blade in Check Point NGFW.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Perimeter Security Administrator at a security firm with 51-200 employees
Great protection from cyber attacks and DDoS with reduced downtime
Pros and Cons
- "Check Point helps reduce downtime and costs associated with detected cyberattacks and can block those threats to ensure protection from any significant damage that may be caused within the organization."
- "There is an issue with precision."
What is our primary use case?
It has allowed us to provide protection that we did not have before. We have tested and reviewed different solutions throughout the year to establish the best solution that would allow us to meet internal demands based on the products our organization sells and makes available from third parties. We need to protect information from those catalogs the database users who are willing to purchase services with us and at the same time we need to keep them protected. We need a safeguard from cyber threats to reduce downtime in costs associated with attacks and a potential loss of communication against our services in the data center.
How has it helped my organization?
Check Point helps reduce downtime and costs associated with detected cyberattacks and can block those threats to ensure protection from any significant damage that may be caused within the organization. We get an environment with protected data centers where there is no interruption of services and no significant loss (including reputational loss) to our company.
What is most valuable?
By having a solution that allows us to protect systems and data from cyber attacks or unauthorized instructions (including malware and DDoS attacks), we can protect our system from all kinds of threats. Check Point reduces downtime and costs associated with attacks that cause communication losses and guarantees compliance with security. It also ensures the privacy of all the data that we have stored, which helps us maintain a high level of reputation when it comes to careful administration and data segmentation. Now, there is a formalization of data protection. Check Point is really compatible with the internal needs of our organization, and its features offer us a great advantage.
What needs improvement?
There is an issue with precision. There is room for improvement based on the type of threats that are constantly evolving. They need to ensure they are managing to keep up with threat changes and generate some new approaches.
Another feature that I would like to see as a substantial improvement is the expansion of support in cloud environments. We need to ensure we can have access to public and private clouds and need to be able to include integrations with different popular providers.
They need to offer IoT as device support.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Agente de servicios al cliente at Grupo Purdy
Great predefined visualizations, good integrations, and helpful alert capabilities
Pros and Cons
- "Some of the features for views and visualization are already predefined as default files."
- "The service that we want to see in the future is a capacity to segment the IPS services by equipment."
What is our primary use case?
One of the needs that we had within our organization was the need to solve and support the prevention of zero-day attacks or vulnerability attacks within the network. We needed to be as proactive as possible to focus on solving any incident or gap that could be opened in the future within our organization. With this product, we were able to implement IPS solutions. IPS gives us the ability to detect and be proactive against many attacks - even if they are very new. The solution can detect old and new signatures.
How has it helped my organization?
Check Point IPS services give our organization peace of mind. We know that the solution will be running and constantly updated thanks to the integrated Check Point services. It ensures stability. We have a solution that covers us all the time, day and night. In the configuration process, the solution has provided us with detection regarding what is stable. It is scalable and will allow us to grow according to the demand and the need. The service is well-maintained and functional.
What is most valuable?
The solution with the most organizational value is its 360° view, which has allowed us to integrate it well and speed up the view of records. It is dedicated 24/7 to detecting any attack. Vulnerabilities or incidents be flagged. It has the capability to give us alerts and offers good productivity to ensure that the services and data of our organization are always secured.
Some of the features for views and visualization are already predefined as default files. This helps us to be proactive and not have to define any search or specialty of the services.
What needs improvement?
The service that we want to see in the future is a capacity to segment the IPS services by equipment. We'd like to see the integration of the communication of the services in the next-generation firewall and the other solutions that it has, such as Harmony. It would be great if they could start creating interoperability with both technologies. Integrating these solutions with the lighthouses could generate more complex and complete interoperability. That said, we'd want the solutions to be acquired and administered as one solution.
For how long have I used the solution?
We have been using the service for about two months.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Security at a insurance company with 51-200 employees
High availability, helpful support, and effective management of devices and policies
Pros and Cons
- "The most valuable feature of Check Point IPS is the management of devices and policies."
- "Check Point IPS' main problem is it is mostly software based. The performance is dependent on the CPU power, and the limited number of patterns."
What is our primary use case?
We are using Check Point IPS for the detection and prevention of threats for our PCI firewalls where it's mandatory to use it.
What is most valuable?
The most valuable feature of Check Point IPS is the management of devices and policies.
What needs improvement?
Check Point IPS' main problem is it is mostly software based. The performance is dependent on the CPU power, and the limited number of patterns.
For how long have I used the solution?
I have been using Check Point IPS for over five years.
What do I think about the stability of the solution?
Check Point IPS is stable.
What do I think about the scalability of the solution?
The stability of Check Point IPS depends on too many factors. It always depends on the usage and the traffic. However, we did not have any issues with scalability.
We have approximately 40 to 50 people involved in using Check Point IPS, such as the firewall and IPS managing teams.
How are customer service and support?
We have onsite engineers from the Check Point IPS directly on our site.
I rate the support from Check Point IPS a four out of five.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup of Check Point IPS is straightforward because there are security profiles with default recommended configuration. However, these were beneficial at the time when produced but they are not that helpful anymore.
It can take some time to do verification because there are some protocols where you know that there could be problems. For example, for some of the sharing features, you have to be careful. Those there are the profiles you can use for the setup, you do have to do a lot of manual work to have everything work correctly.
I rate the setup of Check Point IPS a two out of five.
What about the implementation team?
We did the implementation of Check Point IPS in-house.
What's my experience with pricing, setup cost, and licensing?
There is a license needed to use the Check Point IPS which is not expensive. However, the Check Point IPS device is expensive.
What other advice do I have?
We are replacing the IPS from Check Point with a different solution, which is related to the IPS functionality. The reason for the replacement is because Check Point IPS are at their end of life and are not creating or not using the security policy for the traffic, it mostly acts as an IPS.
We are planning on using Trend Micro. It will be better because there will be a dedicated device that is doing only the IPS. The performance will be better and it has a larger number of patterns updated weekly.
I have a very long and extensive experience with the Check Point ISP. It is a good solution, but sometimes it's causing issues, but it's a general problem for all the networks and security devices.
I rate Check Point IPS a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Darktrace
Vectra AI
KerioControl
Palo Alto Networks Advanced Threat Prevention
Trend Micro Deep Discovery
Splunk User Behavior Analytics
Trend Micro TippingPoint Threat Protection System
Fortinet FortiGate IPS
Palo Alto Networks URL Filtering with PAN-DB
Cisco Secure IPS (NGIPS)
Cisco Sourcefire SNORT
Trellix Intrusion Prevention System
Zscaler Cloud IPS
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?