Try our new research platform with insights from 80,000+ expert users
reviewer1572915 - PeerSpot reviewer
System and Network Administrator at Auriga - The banking e-volution
Real User
Helpful alerts and reporting, granular rule options, and the update schedule is flexible
Pros and Cons
  • "The Check Point IPS module allows me granularity in creating rules."
  • "Having additional reports available would be helpful."

What is our primary use case?

The Check Point IPS module is applied to both internal and external traffic.

Many times, we only think about protecting ourselves from what comes from the Internet but it is also good to analyze what passes inside between one network and another and what goes out to the Internet.

I'll never forget the first backdoor report. We immediately activated email alerts for the most important reports and it was an email that indicated the compromised server. There were three of us and it took two hours to discover that through the image upload form, there had been an attempt to upload a backdoor. This IPS module had blocked this attempt.

How has it helped my organization?

The Check Point IPS module certainly is of great support in ensuring the security of every organization. You cannot say that users only surf the internet and you do not need this type of protection because the danger does not come only from the internet, but also from within. 

We immediately implemented the module on internal traffic and if there is any server or user that does something that should not be done, it is immediately identified. 

Valid support also comes from applying, before their official publication, the protections inherent to server and application updates. In this way, we are not forced to install updates on the servers as soon as they are published. Rather, we can also schedule updates and incorporate a delay. This protects us from the possible publication of incorrect updates that are withdrawn immediately afterward.

What is most valuable?

The Check Point IPS module allows me granularity in creating rules. I can specify which definition to apply and to which scope or network.

I can create multiple profiles, which is helpful. Profiles are the set of rules and I can choose which one to apply. Having more profiles and more options, we have not always moved in a guaranteed way with respect to internal traffic, and rigorously with respect to external traffic.

From the outside, we block directly without waiting to look at the logs. If anything, then we will allow this traffic. From the inside, we allow traffic by default and maybe we will block it after looking at the logs.

These decisions were also supported by the degree of reliability declared by Check Point itself. If we are talking about a high degree of reliability combined with a dangerous vulnerability then you can immediately block traffic with greater confidence in not having false positives

The logs and related functionality are done very well.

What needs improvement?

To use the Check Point IPS module, you need a dedicated team who must know both the business reality and be sensitive to the dangers coming from the Internet. You can't leave everything to the application to run automatically.

If you leave it on automatic then you run two fundamental risks; the first is the blocking of the firewall due to excessive use of resources, and the second is the sudden halt of your services due to the blocking of a malicious application. By optimizing the resources requested by this module and sending more specific alerts regarding blocks, you can certainly obtain an improvement in performance and usability.

Having additional reports available would be helpful.

Buyer's Guide
Check Point IPS
February 2025
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
832,138 professionals have used our research since 2012.

For how long have I used the solution?

I have been using Check Point IPS for twenty years.

What do I think about the stability of the solution?

This has always scared me because it is known that activating this module in an inconsiderate way causes malfunctions of the firewall. However, Check Point tells you to apply only the IPS definitions that are useful in your environment and warns with specific pop-ups when you want to activate a definition that requires a lot of resources.

What do I think about the scalability of the solution?

In case of high volumes of traffic, it is possible to balance the same by adding other nodes to the cluster.

How are customer service and support?

It was certainly a good experience, a daily challenge to overcome oneself and compete with the world.

Which solution did I use previously and why did I switch?

Prior to this product, we did not use a similar solution.

How was the initial setup?

The initial setup is complex and must be done by a team, necessarily also made up of internal staff, who are highly skilled.

In the beginning, it is good to evaluate the single definitions in order to reduce the false positives and to avoid a waste of firewall resources. Subsequently, the new definitions released must be reviewed daily.

What about the implementation team?

We implemented it with the support of an external team that proved to be up to the task entrusted to it.

What's my experience with pricing, setup cost, and licensing?

The module has a considerable cost but you can save by purchasing a package with several modules instead of making a single purchase.

The implementation has a high initial and management cost.

Which other solutions did I evaluate?

We did not evaluate other options.

What other advice do I have?

In summary, this is a well-made product and I don't feel like I would suggest improvements other than having more reports. I recommend its adoption to those who have the availability of a team, internal or external, that has the ability to manage it and the knowledge of the company.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1854018 - PeerSpot reviewer
Implementer at a tech services company with 51-200 employees
Real User
Autonomous threat prevention, APIs, and SmartConsole features work well and are easy to use
Pros and Cons
  • "The autonomous threat prevention is very easy to use. The APIs and SmartConsole tool also work well."
  • "There are a lot of false positives. I would like to see integration with some kind of network detection and response in order to make some automation on IPS configuration."

What is our primary use case?

I implement this solution for customers.

What is most valuable?

The autonomous threat prevention is very easy to use. The APIs and SmartConsole tool also work well.

What needs improvement?

There are a lot of false positives. I would like to see integration with some kind of network detection and response in order to make some automation on IPS configuration.

For how long have I used the solution?

I have been using this solution for about 12 years.

What other advice do I have?

I would rate this solution 10 out of 10.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point IPS
February 2025
Learn what your peers think about Check Point IPS. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
832,138 professionals have used our research since 2012.
reviewer1474608 - PeerSpot reviewer
Consultor at a government with 201-500 employees
Real User
Stable, scales well, and provides good security
Pros and Cons
  • "This is a very stable product."
  • "We have a lot of false positives and the list of IPs are not up to date in terms of their location."

What is most valuable?

The most valuable feature is security.

What needs improvement?

There are several technological points that could use improvement.

We have a lot of false positives and the list of IPs are not up to date in terms of their location. For example, we recently blocked traffic from both North and South Korea because we have no relationship with these countries. The problem is that the list of IPs is not up to date, and we had a problem where regular traffic was blocked but malicious traffic was not.

The proxy should be improved.

The documentation should be easier to read.

When you want to block according to the signature, you have to do them one by one. You cannot create a group.

For how long have I used the solution?

I have been working with Check Point IPS in this role for several months.

In the past, I was an employee of a company that was a Check Point partner for 11 years.

What do I think about the stability of the solution?

This is a very stable product.

What do I think about the scalability of the solution?

The scalability is good, provided your machine is powerful enough. The product works with a variety of equipment from low-powered to high-powered.

What's my experience with pricing, setup cost, and licensing?

The price of this product should be reduced.

What other advice do I have?

For the most part, we don't have any problems with this product.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Buyer's Guide
Download our free Check Point IPS Report and get advice and tips from experienced pros sharing their opinions.