It has allowed us to provide protection that we did not have before. We have tested and reviewed different solutions throughout the year to establish the best solution that would allow us to meet internal demands based on the products our organization sells and makes available from third parties. We need to protect information from those catalogs the database users who are willing to purchase services with us and at the same time we need to keep them protected. We need a safeguard from cyber threats to reduce downtime in costs associated with attacks and a potential loss of communication against our services in the data center.
Perimeter Security Administrator at a security firm with 51-200 employees
Great protection from cyber attacks and DDoS with reduced downtime
Pros and Cons
- "Check Point helps reduce downtime and costs associated with detected cyberattacks and can block those threats to ensure protection from any significant damage that may be caused within the organization."
- "There is an issue with precision."
What is our primary use case?
How has it helped my organization?
Check Point helps reduce downtime and costs associated with detected cyberattacks and can block those threats to ensure protection from any significant damage that may be caused within the organization. We get an environment with protected data centers where there is no interruption of services and no significant loss (including reputational loss) to our company.
What is most valuable?
By having a solution that allows us to protect systems and data from cyber attacks or unauthorized instructions (including malware and DDoS attacks), we can protect our system from all kinds of threats. Check Point reduces downtime and costs associated with attacks that cause communication losses and guarantees compliance with security. It also ensures the privacy of all the data that we have stored, which helps us maintain a high level of reputation when it comes to careful administration and data segmentation. Now, there is a formalization of data protection. Check Point is really compatible with the internal needs of our organization, and its features offer us a great advantage.
What needs improvement?
There is an issue with precision. There is room for improvement based on the type of threats that are constantly evolving. They need to ensure they are managing to keep up with threat changes and generate some new approaches.
Another feature that I would like to see as a substantial improvement is the expansion of support in cloud environments. We need to ensure we can have access to public and private clouds and need to be able to include integrations with different popular providers.
They need to offer IoT as device support.
Buyer's Guide
Check Point IPS
March 2025

Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
For how long have I used the solution?
I've used the solution for one year.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Senior Network and Security Engineer at a computer software company with 201-500 employees
New protections can be automatically activated in the "Staging mode", which only detect the possible threat and alerts them
Pros and Cons
- "The number of the IPS protections is amazing - after the latest update I see more than 11000 in the SmartConsole."
- "In my opinion, the Check Point software engineers should works on the performance of the blade - when it is activated with the big number of the protections in place, the monitoring shows us the significant increase in the CPU utilization for the gateway appliances - up to 30 percents, even so we are cherry-picking only the profiles that we really needed."
What is our primary use case?
Our company works in developing and delivering online gambling platforms. The Check Point NGFWs are the core security solution we use to protect our DataCenter environment located in Asia (Taiwan). The environment has about ~50 physical servers as virtualization hosts, and we have two HA Clusters consist of 2x5400 hardware appliances, managed by an OpenServer Security Management Server on a Virtual Machine (KVM), all running on R80.10 with the latest JumboHotfix.
The Clusters serve as the firewalls for both inter-VLAN and external traffic. We have the Intrusion Prevention System (IPS) blade activated on both Check Point HA Clusters as the counter-measure against advanced threats and malware. The IPS blade mostly used for ingress traffic from the Internet to the DMZ VLAN.
How has it helped my organization?
I think that the security of our DataCenter has been increased to a large extent by activating of the Check Point Intrusion Prevention System software blade. Before that, we used the Cisco ACLs and Zone-Based firewall configured on switches and routers, which currently not an efficient solution for protecting from advanced threats. Now we have state-of-the-art, true, and efficient Next-Generation firewall, and the IPS blade is the heart of it. The security profiles activated in the IPS blade check the traffic not just by TCP/UDP port of the connection, but by traffic patterns and the application behaviour.
What is most valuable?
The number of IPS protections is amazing - after the latest update, I see more than 11000 in the SmartConsole.
All the protections are tagged and categorized by the vendor/type/product, the severity of the threat, confidence level, and performance impact of the activation, which helps in finding and enabling only he profiles that we really need (e.g. we don't have any Microsoft Windows servers in our environment, so decided to disable such protections by default).
The protections are updated based on the schedule - we used the default once-a-day approach.
I also like that the new protections may be automatically activated in the "Staging mode", which only detect the possible threat and alerts them, but doesn't block the actual traffic, thus minimizing the impact of the false positives.
What needs improvement?
In my opinion, the Check Point software engineers should works on the performance of the blade - when it is activated with the big number of the protections in place, the monitoring shows us the significant increase in the CPU utilization for the gateway appliances - up to 30 percents, even so, we are cherry-picking only the profiles that we really needed.
Due to that fact it is also not so easy to choose the correct hardware appliance when you are planning the infrastructure. It is even more important when you realize that the Check Point hardware is very expensive.
For how long have I used the solution?
We have been using this solution for three years, starting since late 2017.
What do I think about the stability of the solution?
The solution is reliable and stable, we didn't have any software or hardware issue while using it.
What do I think about the scalability of the solution?
The Check Point software blade is activated on the HA Clusters in Active-Standby mode. There's a space to grow with the current setup, but eventually, we may switch to the Active-Active mode and add additional appliances to the clusters.
How are customer service and technical support?
Even so we had a number of the support cases opened with the Check Point team, none of them was connected with the IPS blade. In general, there are professionals in the support team, but some cases took surprisingly long time to be resolved.
Which solution did I use previously and why did I switch?
Before the Check Point IPS, we relied on the simple stateful firewalls configured on Cisco switches and routers and moved to Check Point to get improved security against the modern threats.
How was the initial setup?
The initial setup was easy, as was the configuration. Now the solution almost doesn't require the time for managing it.
What about the implementation team?
The implementation was done by the Certified Check Point Expert we have in the in-house team - the Check Point solutions are popular, so there are such engineer available on the job market.
What's my experience with pricing, setup cost, and licensing?
The overall cost of the solution is really high. You should properly scale the setup you are planning to purchase.
The licensing model is simple, but some of the software blades are not included into the default bundles and should be purchased separately - pay attention to that.
Which other solutions did I evaluate?
We didn't evaluate the other solutions.
What other advice do I have?
The correct performance sizing is essential for this kind of software - use the tools provided by the vendor, and consult the sales if you are still not sure.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point IPS
March 2025

Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
Security IT at a tech services company with 51-200 employees
IPS Blade - excellent tool - CHP
Pros and Cons
- "The reports are useful in helping to verify the threats where we can see the level of severity in order to be able to take action."
- "Despite being a blade, this is expensive."
What is our primary use case?
We needed a security tool with features like:
- Exploit detection
- Vulnerable Protocol Validations
- Malware communication blocking
- Easy administration
We found these features in the Check Point Intrusion Prevention System. It's the exact protection required for our infrastructure.
We managed to increase the level of business security thanks to this blade provisioned within our Check Point gateways.
Thanks to the use of this tool, we could avoid malware that might be installed in our infrastructure. It offers prompt detection.
We also needed to be able to have protection against emerging threats during Microsoft updates on our Windows servers.
How has it helped my organization?
This tool gave us much more protection for areas that are not covered with the use of the gateways.
One of our great concerns is the patching of servers where Internet access is opened and where we may have vulnerabilities. Thanks to Check Point's Intrusion Prevention System (IPS), we could keep our environment safe.
It provides a centralized environment by being unified with the administration of our gateway environments with management through Check Point Security Management. It is easy to use and has large dashboards that help us make decisions that help us continue to improve security.
What is most valuable?
Check Point's Intrusion Prevention System (IPS) provides us with many important features such as:
1- A centralized environment, managed by the security management portal.
2- Real-time protection against threats, generating security so that we can act immediately when we have a threat.
3- Protection backed with thousands of signatures of prevention and malicious behavior.
4- The reports are useful in helping to verify the threats where we can see the level of severity in order to be able to take action.
It really is a complete tool.
What needs improvement?
Check Point's Intrusion Prevention System (IPS) may improve in the following fields:
- They should have a cost improvement. Despite being a blade, this is expensive.
- They do not have a separate console.
- The documentation accessible by the manufacturer is generally for versions R80 or less. Some features or configurations have changed, which makes a more efficient and faster implementation difficult.
- The costs are only visible through a partner who provides you with the details. We would like them to be public so that we do not only have to view the costs through them.
For how long have I used the solution?
We use this blade for a branch in our cloud environment. We have it in order to be able to support against intrusions for at least three years now.
What do I think about the stability of the solution?
We have cluster environments and we have found its stability to be quite good.
What do I think about the scalability of the solution?
In cluster and VSS environments in Azure, the scalability is robust.
Which solution did I use previously and why did I switch?
Previously we did not use an IPS tool. It wasn't until the business need was realized when that we started the validations of which tool to implement.
What's my experience with pricing, setup cost, and licensing?
It is always important to validate the costs and characteristics of the available tools. I recommend finding a partner that can provide that support to correctly deploy what is necessary.
Which other solutions did I evaluate?
It is very important to always look for documentation, and characteristics and be able to compare them to make an informed decision based on security needs. In our case, we already have tools within our GWs environment, so it was easy to add this product.
What other advice do I have?
It is a good tool. However, you must have a GWs environment in use to be able to add it.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Head of IT Department at AS Attīstības finanšu institūcija Altum
User-friendly, stable, and scalable
Pros and Cons
- "The solution is user-friendly and the interface is easy to configure."
- "The price has room for improvement."
What is our primary use case?
Check Point IPS is an IT security solution that offers insight into potential attacks and helps to prevent them from occurring. This solution gathers various signatures and receives new updates when a new vulnerability is identified, thus safeguarding us from potential threats.
How has it helped my organization?
The solution has helped improve our security by blocking threats.
What is most valuable?
The solution is user-friendly and the interface is easy to configure.
What needs improvement?
The price has room for improvement. The solution's firewalls are quite expensive.
For how long have I used the solution?
I have been using the solution for five years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The scaling of our system depends on the type of hardware we are using. If we are using a virtual environment, it is easier to scale as we can just add more virtual machines. However, if we are using a hardware appliance, we will need to purchase additional hardware to scale it.
Which solution did I use previously and why did I switch?
Previously we used an IBM solution but it was expensive and hard to configure compared to Check Point IPS which was a common sense model, and easy to implement with our firewall.
How was the initial setup?
The initial setup is straightforward. I give the ease of setup an eight out of ten.
We first deployed the license and configured the rules in test mode. After making sure there were no false positives, we switched the rules to prevent mode to block any incoming attacks. The last part of the process was to configure a certificate for HTTPS inspection.
The deployment took one month to complete.
What about the implementation team?
The implementation was completed with the help of consultants. Two people were required to complete the work.
What was our ROI?
Calculating a return on investment for cybersecurity products can be difficult. However, we have not experienced any concerning cyber incidents in the past five years; this is likely due to our strong firewall and comprehensive production system. All in all, this is a positive outcome.
What's my experience with pricing, setup cost, and licensing?
We pay for a bundle subscription that includes additional solutions.
I give the price of the solution a five out of ten.
What other advice do I have?
I give the solution a nine out of ten.
For maintenance, we need to review the log, identify any new signatures, and configure them accordingly.
The solution is used to protect 250 users.
We could potentially cause disruptions to our infrastructure if we do not use a good consultant to guide us through the implementation process.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Soporte técnico superior at Acobo
Great visualizations with helpful event analysis and centralization features
Pros and Cons
- "Its event analysis and centralization features are very important for any organization."
- "I would like to have the possibility of adding features to this IPS solution in the future."
What is our primary use case?
This solution allows us to achieve a healthy network and good security within our organization given its functions, management, and control. The level of detection and intelligent algorithms that protect against distributed attacks have helped us to secure ourselves and provide protection in real time. These capacities and needs complement our security based on a scheme that our fund or financial distribution can achieve under annual or quarterly protection measures (or every three years).
How has it helped my organization?
Check Point offers us good protection. It has also allowed us to acquire services and products under a scheme that allows us to put together, as if it were, an offering of different functions or characteristics, giving added value to each one of them when they connect to each other. It is a solution that we can constantly build with each of the blades that we add. This makes it possible for us to have savings based on the security structure that we need for the organization. Thus it is a solution that has saved us significantly in additional investment when dealing with security.
What is most valuable?
Speaking of the IPS solution, it is important to understand that each of these features is based on real-time detection, analysis, and centralization of events. We were able to interpret that the solution is a total complement to each of the needs that any organization may have. Its event analysis and centralization features are very important for any organization. Those allow you to generate a general visualization, making a complete panorama of each of the events that you have inside your security system.
What needs improvement?
I would like to have the possibility of adding features to this IPS solution in the future. It allows us to reach and integrate with other solutions that we have in the same portfolio of this security provider. It has the possibility of achieving and integrating the detection and analysis of this equipment against the integration and analysis that is done in the final devices, generating a correlation and installation of agent propagation from an internal security center.
For how long have I used the solution?
I've used the solution for four years.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Engineer at Fujairah Port
Simple to activate, configure, and implement
Pros and Cons
- "IPS logs enable complete visibility and reporting through the smart console."
- "There is no standalone IPS appliance available."
What is our primary use case?
We deployed the Check Point 6300 series firewall for protection of our internal and external servers, and various in-out traffic as well.
We have Windows-based servers, Linux-based servers, and other appliances which are connected through a Check Point firewall. These devices have many vulnerabilities. To secure our infrastructure we activated the IPS Blade on the Check Point firewall.
The IPS has helped us to block many known and zero-day attacks on our network. IPS is one of the best solutions from Check Point firewall
How has it helped my organization?
Check Point IPS has helped us to prevent attacks on our servers and user traffic as well. We have many Windows-based servers has many vulnerabilities. After Check Point IPS is implemented, we blocked those signature-based attacks on our network. Many times I found logs, and IPS has blocked many windows-based signature attacks.
We scheduled IPS updates as per our IT policy and new signature updates are set to monitor mode until a particular period to avoid conflicts after checking the behavior we set back to prevent mode.
What is most valuable?
The switch IPS prevent and monitor mode is a good feature that helps us to avoid any unnecessary impacts on our network.
It is simple to activate, configure, implement and assign profiles and rules to security gateways.
The Check Point IPS database is huge. Signature updates are satisfied. Every two hours, the database receives an automatic update that keeps it current and protects against zero-day vulnerabilities.
IPS logs enable complete visibility and reporting through the smart console. This was a big help to us.
What needs improvement?
I am pleased with it as it seems to be in order. I don't have much to say, however, there were a few things I noticed about the behavior of the Check Point IPS.
First, sometimes I have issues with scheduled IPS updates.
The impact on performance when opening the IPS blade is challenging while the firewall is operating under severe demand is the second, which is pretty common. I only note it here.
There is no standalone IPS appliance available. Only the IPS blade needs to be enabled on the security gateway that Check Point provides.
For how long have I used the solution?
I've used the solution for more than two years.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
Easy to configure and setup with good scalability
Pros and Cons
- "Check Point Intrusion Prevention System has great profiles, and we can continuously create, modify, activate, deactivate or configure any specific setting to allow the profile to focus on just one thing or for certain attacks."
- "The cost is a bit high but it is worth it."
What is our primary use case?
The Check Point Intrusion Prevention System can block traffic from any source workstation inside our local network and facilitates the analysis of outbound traffic to check if there is any risk in the internal network in order to protect our clients and servers. With this product, we're creating a secure zone. We currently are using this blade in our hybrid environment and it's integrated with our secure gateway. Most of the time, our NOC team continuously monitors traffic in order to find any suspicious activity.
How has it helped my organization?
Now that the Check Point Intrusion Prevention System has improved our environment, we feel that we are more protected in our network. By implementing the recommendations that Check Point has given us, we have an optimal security environment now that provides almost real-time detection and prevention. We are protected by the Intrusion Prevention System and can go back and select any period or severity in order to display the latest statistics.
What is most valuable?
Check Point Intrusion Prevention System has great profiles, and we can continuously create, modify, activate, deactivate or configure any specific setting to allow the profile to focus on just one thing or for certain attacks. I also like that profiles can be applied to groups of workstations that need to be more protected from possible attacks. Each profile that we create has activated protections and some instructions of what the IPS should do with the traffic.
What needs improvement?
At the moment, I do not see what else can be added to this service. In my experience, I've seen that it has what we need without something additional being required.
It is easy to use, easy to configure, and practically updates itself without the need to intervene as an administrator of the appliance. We are happy with this platform since it allows us to have security and control over the connections almost in real-time. There are many different services that Check Point Intrusion Prevention System has that are quite useful.
For how long have I used the solution?
I've been using the solution for about four years.
What do I think about the stability of the solution?
I've found the stability to be good.
What do I think about the scalability of the solution?
The scalability is great.
How are customer service and support?
Technical support has been great,
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
How was the initial setup?
The initial setup was not complex.
What about the implementation team?
We handled the implementation process in-house.
What was our ROI?
I've witnessed a 40% ROI.
What's my experience with pricing, setup cost, and licensing?
The cost is a bit high but it is worth it.
Which other solutions did I evaluate?
I did evaluate other options before choosing Check Point.
What other advice do I have?
So far, I have no regrets about choosing this solution.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
ICT at a manufacturing company with 501-1,000 employees
Customizable with good alerts and controls traffic well
Pros and Cons
- "The possibility of customizing the rules is great."
- "Sometimes we had false positives where packages that were legitimate for us were blocked and we had to unblock them through exceptions."
What is our primary use case?
We use this product to control incoming and outgoing traffic to the company and to control the internal traffic between the various company subnets.
We have many departments and have segregated the traffic via subnets controlled by the Check Point firewall.
We also have some services exposed on the internet for which it is necessary to have control over intrusions.
Our reality is made up of a series of Check Point firewalls in which we have activated the intrusion prevention system functionality.
How has it helped my organization?
With the introduction of this Check Point solution our company has significantly increased the level of perimeter security, once this was done we proceeded to configure the service also for internal networks where there was a need to control traffic.
With the introduction of Check Point, our company has significantly increased the level of perimeter security, once this was done we proceeded to configure the service for internal networks where there was a need to control traffic.
We are quite satisfied with the product.
What is most valuable?
The possibility of customizing the rules is great. Sometimes it appears a bit rigid yet it is still easy to use. There is an easy application of policies once the basic configuration has been done with the possibility of copying profiles to make them better meet all the needs of the companies.
There's also the possibility to set alerts only in order to check whether a signature can cause problems or not before blocking traffic and causing damage to users.
Overall, it seems like a good product even if sometimes a little unintuitive. That said, it is no worse than others.
What needs improvement?
The product could be improved in its configuration interface. I have seen that there are more points where exceptions can be made but it is not always intuitive to find the right point where to make them.
Sometimes we had false positives where packages that were legitimate for us were blocked and we had to unblock them through exceptions.
I don't see any other big problems and I hope not to find others in the future
For how long have I used the solution?
I've used the solution for five years.
Which solution did I use previously and why did I switch?
We did not previously use another solution.
Which other solutions did I evaluate?
We did not evaluate other options.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Darktrace
Vectra AI
KerioControl
Palo Alto Networks Advanced Threat Prevention
Trend Micro Deep Discovery
Trend Micro TippingPoint Threat Protection System
Fortinet FortiGate IPS
Palo Alto Networks URL Filtering with PAN-DB
Cisco Secure IPS (NGIPS)
Cisco Sourcefire SNORT
Cisco IOS Security
Trellix Intrusion Prevention System
Zscaler Cloud IPS
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?