Try our new research platform with insights from 80,000+ expert users
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Good functionality, real-time protection and reduction in costs
Pros and Cons
  • "Protection in real-time is very good. It helps us detect things on time and make decisions to improve perimeter security."
  • "Sometimes Check Point documentation is not always updated, which is why when some implementations change, it generates confusion about details."

What is our primary use case?

We first saw that this blade was available to use in our Check Point gateway. Later, we understood that there are advanced threats that are in charge of exposing weaknesses. We did not have our perimeter completely covered, which is why we decided to use this technology.

This technology helps us to detect and prevent attempts at exploiting vulnerabilities. It also helps a lot as the tool poses very few false positives, giving the tool good credibility.

How has it helped my organization?

Check Point IPS has helped us to have greater perimeter security through our Check Point Gateway. It offers us an easy implementation and has great protection across our infrastructure.

By means of Smart Events, we can carry out very advanced monitoring of the threats that have tried to enter our infrastructure.

It is a great tool. It is totally recommended by us. It really covers many areas of security, such as anti-malware, data loss, improper use of protocols, and preventing known exploits.                             

What is most valuable?

One of the characteristics that we liked the most is the functionality and easy implementation via the Check Point Gateway.

The cost is reduced to being a blade. That is a good detail of the product in terms of licensing.

Protection in real-time is very good. It helps us detect things on time and make decisions to improve perimeter security.

Also, a very good feature is the optional mode of putting it only in detection mode. They are ensuring in that sense that they are not so intrusive at the beginning of the implementation in production environments.

What needs improvement?

Sometimes Check Point documentation is not always updated, which is why when some implementations change, it generates confusion about details. In addition to extending some implementations, it would be good for Check Point to keep its documentation public and updated.

This product, as a blade, does not include the license with the Check Point gateway.

Some errors are generated in the implementation of the Smart Cloud in the Infinity Check Point Portal. When that happens, cases of withdrawal must be carried out without embargo for a long time in response.

Buyer's Guide
Check Point IPS
November 2024
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.

For how long have I used the solution?

We have been using this solution for about two years and have received the expected results. We are satisfied with the product.

Which solution did I use previously and why did I switch?

Previously we did not use another brand or tool. This is our primary solution now.

Which other solutions did I evaluate?

We did evaluate other options. It is always important to evaluate various options to see how they adapt to the client's system and infrastructure.

What other advice do I have?

We recommend the product. It is highly safe and easy to use.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Network Security Engineer at I Dream networks pvt ltd
Real User
Top 5
It prevents attacks and has a log feature; stable and has a straightforward setup
Pros and Cons
  • "What I like best about Check Point IPS is that it can prevent attacks. I also like that it has a log feature."
  • "The hardware-based version of Check Point IPS could be more scalable. Right now, it's not scalable."

What is our primary use case?

I use Check Point IPS to prevent attacks, such as malware, spyware, and any other malicious activity.

What is most valuable?

What I like best about Check Point IPS is that it can prevent attacks. I also like that it has a log feature.

What needs improvement?

The hardware-based version of Check Point IPS could be more scalable. Right now, it's not scalable.

For how long have I used the solution?

I've been working with Check Point IPS for two to three years.

What do I think about the stability of the solution?

Stability-wise, Check Point IPS is eight out of ten.

What do I think about the scalability of the solution?

Check Point IPS is a scalable solution if it's cloud-based, but if it's hardware-based, it isn't scalable. Scalability-wise, it's a six out of ten.

How are customer service and support?

The Check Point IPS technical support is excellent portal-wise and callback-wise, so it's a nine out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

Setting up Check Point IPS is straightforward.

Before I deploy Check Point IPS, I'll put it on IDS mode, and then I'll see the current user activity, any malicious activity, and the logs. I then switch to the IPS mode.

What's my experience with pricing, setup cost, and licensing?

You can pay for Check Point IPS yearly, or you can go with a three-year license. There's no extra cost apart from the standard licensing fee.

What other advice do I have?

My company has two hundred users of Check Point IPS.

I recommend Check Point IPS to others because it's scalable, reliable, and easily managed by all users.

My rating for Check Point IPS is eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Check Point IPS
November 2024
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
reviewer1670154 - PeerSpot reviewer
Firewall Engineer at a logistics company with 1,001-5,000 employees
User
Scalable with convenient pre-defined profiles and an easy setup
Pros and Cons
  • "IPS signatures can be set quite granularly depending on your environment. You can filter on performance impact, severity, and confidence which makes sizing and adapting easier."
  • "Threat Prevention policies are not very easily manageable as there are several profiles/policies/etc. Therefore, there are several ways to add exceptions and check the configuration."

What is our primary use case?

We have a hybrid infrastructure with an on-premise data center, cloud data center, and multiple branch offices. All of these firewalls are managed via Check Point Multi Domain Management as well as Smart Event to see security events across our environment.

IPS is set primarily to prevent and only some signatures are set to detect (only after some false positives) so we still see them and get notifications via the Smart Event reports.

IPS is updated automatically and pushed to all gateways every two hours. 

How has it helped my organization?

Check Point's IPS simply works and is continuously kept up-to-date on all gateways. Via the management, it's possible to let the gateway update the IPS signatures itself, instead of letting the management update itself and then push the updates to the gateways.

If there's a new data center or branch office and everything is still in the test phase, it's possible to set the IPS policy to detect only so you can gather data and create a baseline without completely disabling IPS. That way, you can still see log entries.

What is most valuable?

Automatic updates can be done either via management or the Gateway itself, without any user interaction. The gateway is up-to-date with the newest signatures.

If you're unsure which profile to use, Check Point has some pre-defined profiles according to its best practices. Each one adds a different load to the relevant gateway, so you have to first check the current load and then decide on the right profile.

IPS signatures can be set quite granularly depending on your environment. You can filter on performance impact, severity, and confidence which makes sizing and adapting easier.

What needs improvement?

You can't turn off IPS completely as there are some signatures that are set even without activated IPS. If you know that, you can act accordingly. But sometimes you have to do a general exception instead of a granular one.

There are always some false positives with non-RFC traffic. This is good for security, however, it will cause some effort in day-to-day business as there will have to be exceptions for certain applications.

Threat Prevention policies are not very easily manageable as there are several profiles/policies/etc. Therefore, there are several ways to add exceptions and check the configuration.

For how long have I used the solution?

I've used the solution for over ten years.

What do I think about the stability of the solution?

The solution is very stable.

What do I think about the scalability of the solution?

The scalability is quite good, depending on which IPS profile you're using.

How was the initial setup?

The solution is easy to set up.

Disclosure: My company has a business relationship with this vendor other than being a customer: We're a Check Point partner and use their products as well for our own environment.
PeerSpot user
Jeroen Devroede - PeerSpot reviewer
IT Network Administrator at DHL
Real User
Top 5
Good IPS functionality and firewall functionality but overall detection is lacking
Pros and Cons
  • "The solution's IPS functionality and firewall functionality are the solution's most valuable features."
  • "The solution needs enhanced reporting. The reporting on Cisco Stealthwatch and Darktrace is much bigger. The visibility that they grant for the filtering capabilities over large infrastructures are far superior."

What is most valuable?

The solution's IPS functionality and firewall functionality are the solution's most valuable features.

What needs improvement?

The detection needs improvement. We fear that it doesn't detect everything that we want to see.

The solution needs enhanced reporting. The reporting on Cisco Stealthwatch and Darktrace is much bigger. The visibility that they grant for the filtering capabilities over large infrastructures are far superior.

For how long have I used the solution?

I've been using the solution for one year.

What do I think about the stability of the solution?

The stability of the solution is good. We've never had any issues.

What do I think about the scalability of the solution?

Scalability is very good. 

We run a very large network. It was really easy to cover the full traffic flow. We just don't know about the reporting aspect - on whether it sees all the traffic that we want to capture. I'm unsure if we will increase usage in the near future as we're currently moving away from the product.

How are customer service and technical support?

Technical support is okay. I'd rate it seven out of ten. Our biggest complaint is that they are rather slow.

Which solution did I use previously and why did I switch?

We weren't previously using a different product.

How was the initial setup?

I wasn't involved in the initial setup.

What other advice do I have?

We use the on-premises deployment model.

We're still in the process of evaluating options. We're doing a POC with Cisco and Darktrace and are moving away from Check Point.

I'd rate the solution seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
Great IPS blade, I use it satisfactorily in our GW and MGMT
Pros and Cons
  • "Check Point is one of the best security brands worldwide."
  • "It would be good to update the public documentation of Check Point so that we can generate improvements and best practices based on the documentation."

What is our primary use case?

The opportunity to use this tool was provided due to its ease of implementation within our NGFW security environment. The solution has been very good and the tool has a low rate of false positives, which makes it safer and more accurate.                                                                                                                                                                                                                                                                                               

How has it helped my organization?

                                                                                                  

This IPS tool is integrated with our gateways and is managed from our management environment. It has been very useful. It has given us protection to find any vulnerability, detect it, and improve it. It also validates threats reliably through its monitoring panel. The reports and logs help us to deal with decision-making to improve security conditions.

The option of security patches has been better protected to manage the servers' updates in a reliable way.

What is most valuable?

Its monitoring and reports generate extra help to be able to fight against
vulnerabilities.

We have really liked practically all the product's features - from the easy implementation through Check Point's gateway to its reduction in licensing costs. That especially really positively impacts the company's finances.

The low number of false positives for vulnerabilities builds additional confidence in the brand.

The constant updating of vulnerability signatures gives the tool protection against new and old threats.

What needs improvement?

Generally, a point that should be improved at the manufacturer level is the help it provides with its support staff. It is somewhat slow in its resolution of problems, even if the problem is with one of its new tools. 

 However, sometimes it is not so easy to implement.

It would be good to update the public documentation of Check Point so that we can generate improvements and best practices based on the documentation.

For how long have I used the solution?

This is a great security application. We've used it in our Check Point gateways and management environment for more than three years. We've enjoyed excellent performance.

Which solution did I use previously and why did I switch?

Previously we did not have a tool that would solve our security problems.

What's my experience with pricing, setup cost, and licensing?

It is essential to validate the costs before implementation and also to test before setting up the environment in production.

Which other solutions did I evaluate?

We value some tools. However, nevertheless, Check Point met the conditions to implement it correctly and comply with what was necessary.

What other advice do I have?

its a excellent solution by my company

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Head of IT Department at AS Attīstības finanšu institūcija Altum
Real User
Top 5
User-friendly, stable, and scalable
Pros and Cons
  • "The solution is user-friendly and the interface is easy to configure."
  • "The price has room for improvement."

What is our primary use case?

Check Point IPS is an IT security solution that offers insight into potential attacks and helps to prevent them from occurring. This solution gathers various signatures and receives new updates when a new vulnerability is identified, thus safeguarding us from potential threats.

How has it helped my organization?

The solution has helped improve our security by blocking threats.

What is most valuable?

The solution is user-friendly and the interface is easy to configure.

What needs improvement?

The price has room for improvement. The solution's firewalls are quite expensive.

For how long have I used the solution?

I have been using the solution for five years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The scaling of our system depends on the type of hardware we are using. If we are using a virtual environment, it is easier to scale as we can just add more virtual machines. However, if we are using a hardware appliance, we will need to purchase additional hardware to scale it.

Which solution did I use previously and why did I switch?

Previously we used an IBM solution but it was expensive and hard to configure compared to Check Point IPS which was a common sense model, and easy to implement with our firewall.

How was the initial setup?

The initial setup is straightforward. I give the ease of setup an eight out of ten.

We first deployed the license and configured the rules in test mode. After making sure there were no false positives, we switched the rules to prevent mode to block any incoming attacks. The last part of the process was to configure a certificate for HTTPS inspection.

The deployment took one month to complete.

What about the implementation team?

The implementation was completed with the help of consultants. Two people were required to complete the work.

What was our ROI?

Calculating a return on investment for cybersecurity products can be difficult. However, we have not experienced any concerning cyber incidents in the past five years; this is likely due to our strong firewall and comprehensive production system. All in all, this is a positive outcome.

What's my experience with pricing, setup cost, and licensing?

We pay for a bundle subscription that includes additional solutions.

I give the price of the solution a five out of ten.

What other advice do I have?

I give the solution a nine out of ten.

For maintenance, we need to review the log, identify any new signatures, and configure them accordingly.

The solution is used to protect 250 users.

We could potentially cause disruptions to our infrastructure if we do not use a good consultant to guide us through the implementation process.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Easy to configure and setup with good scalability
Pros and Cons
  • "Check Point Intrusion Prevention System has great profiles, and we can continuously create, modify, activate, deactivate or configure any specific setting to allow the profile to focus on just one thing or for certain attacks."
  • "The cost is a bit high but it is worth it."

What is our primary use case?

The Check Point Intrusion Prevention System can block traffic from any source workstation inside our local network and facilitates the analysis of outbound traffic to check if there is any risk in the internal network in order to protect our clients and servers. With this product, we're creating a secure zone. We currently are using this blade in our hybrid environment and it's integrated with our secure gateway. Most of the time, our NOC team continuously monitors traffic in order to find any suspicious activity.

How has it helped my organization?

Now that the Check Point Intrusion Prevention System has improved our environment, we feel that we are more protected in our network. By implementing the recommendations that Check Point has given us, we have an optimal security environment now that provides almost real-time detection and prevention. We are protected by the Intrusion Prevention System and can go back and select any period or severity in order to display the latest statistics.

What is most valuable?

Check Point Intrusion Prevention System has great profiles, and we can continuously create, modify, activate, deactivate or configure any specific setting to allow the profile to focus on just one thing or for certain attacks. I also like that profiles can be applied to groups of workstations that need to be more protected from possible attacks. Each profile that we create has activated protections and some instructions of what the IPS should do with the traffic.

What needs improvement?

At the moment, I do not see what else can be added to this service. In my experience, I've seen that it has what we need without something additional being required. 

It is easy to use, easy to configure, and practically updates itself without the need to intervene as an administrator of the appliance. We are happy with this platform since it allows us to have security and control over the connections almost in real-time. There are many different services that Check Point Intrusion Prevention System has that are quite useful.

For how long have I used the solution?

I've been using the solution for about four years.

What do I think about the stability of the solution?

I've found the stability to be good.

What do I think about the scalability of the solution?

The scalability is great.

How are customer service and support?

Technical support has been great,

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

How was the initial setup?

The initial setup was not complex. 

What about the implementation team?

We handled the implementation process in-house.

What was our ROI?

I've witnessed a 40% ROI.

What's my experience with pricing, setup cost, and licensing?

The cost is a bit high but it is worth it.

Which other solutions did I evaluate?

I did evaluate other options before choosing Check Point.

What other advice do I have?

So far, I have no regrets about choosing this solution.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Geraldo Freitas - PeerSpot reviewer
Analista de TI - suporte a redes e segurança at Tribunal de Contas da União
Real User
Top 5
Helps to detect attacks and prevent them
Pros and Cons
  • "The product's initial setup is easy."
  • "I would like the product to provide us with intelligence to understand what we really have in our environment."

What needs improvement?

I would like the product to provide us with intelligence to understand what we really have in our environment. 

For how long have I used the solution?

The solution helps us to detect attacks and prevent them. 

What do I think about the scalability of the solution?

The solution does not scale well. 

How are customer service and support?

We have had problems with the management. 

How would you rate customer service and support?

Neutral

How was the initial setup?

The product's initial setup is easy. 

What other advice do I have?

I would rate the product an eight out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros sharing their opinions.