We first saw that this blade was available to use in our Check Point gateway. Later, we understood that there are advanced threats that are in charge of exposing weaknesses. We did not have our perimeter completely covered, which is why we decided to use this technology.
This technology helps us to detect and prevent attempts at exploiting vulnerabilities. It also helps a lot as the tool poses very few false positives, giving the tool good credibility.
Check Point IPS has helped us to have greater perimeter security through our Check Point Gateway. It offers us an easy implementation and has great protection across our infrastructure.
By means of Smart Events, we can carry out very advanced monitoring of the threats that have tried to enter our infrastructure.
It is a great tool. It is totally recommended by us. It really covers many areas of security, such as anti-malware, data loss, improper use of protocols, and preventing known exploits.
One of the characteristics that we liked the most is the functionality and easy implementation via the Check Point Gateway.
The cost is reduced to being a blade. That is a good detail of the product in terms of licensing.
Protection in real-time is very good. It helps us detect things on time and make decisions to improve perimeter security.
Also, a very good feature is the optional mode of putting it only in detection mode. They are ensuring in that sense that they are not so intrusive at the beginning of the implementation in production environments.
Sometimes Check Point documentation is not always updated, which is why when some implementations change, it generates confusion about details. In addition to extending some implementations, it would be good for Check Point to keep its documentation public and updated.
This product, as a blade, does not include the license with the Check Point gateway.
Some errors are generated in the implementation of the Smart Cloud in the Infinity Check Point Portal. When that happens, cases of withdrawal must be carried out without embargo for a long time in response.
We have been using this solution for about two years and have received the expected results. We are satisfied with the product.
Previously we did not use another brand or tool. This is our primary solution now.
We did evaluate other options. It is always important to evaluate various options to see how they adapt to the client's system and infrastructure.
We recommend the product. It is highly safe and easy to use.