Try our new research platform with insights from 80,000+ expert users
Sitti Ridzma Salahuddin - PeerSpot reviewer
System Engineer at Trends and Technologies, Inc
Reseller
Top 5
Offers good protection
Pros and Cons
  • "Check Point NGFW is popular because of the protection it offers."
  • "The pricing and UI need to be improved."

What is our primary use case?

We use the solution for threat protection in the banking and finance sectors.

What is most valuable?

Check Point NGFW is popular because of the protection it offers. 

What needs improvement?

The pricing and UI need to be improved. 

The enterprise is quite expensive. There are small boxes that are competitive enough.

For how long have I used the solution?

I have been using Check Point NGFW for a year.

Buyer's Guide
Check Point NGFW
December 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,019 professionals have used our research since 2012.

What do I think about the stability of the solution?

The product is stable.

I rate the solution’s stability a nine-point five out of ten.

What do I think about the scalability of the solution?

The solution can scale up to enterprises.

I rate the solution’s scalability a nine-point five out of ten.

How was the initial setup?

The initial setup is easy, but maintenance is very difficult. Deployment and fine-tuning take a day.

What was our ROI?

There were no glitches or issues. We were able to achieve a positive ROI for our business. It saved them a significant amount of money that would otherwise have been spent on dealing with ransomware activities.

What's my experience with pricing, setup cost, and licensing?

The product is expensive and costs around one-point-five million.

I rate the product’s pricing an eight out of ten, where one is cheap, and ten is expensive.

What other advice do I have?

Thorough planning is essential when implementing a Check Point NGFW. You need a checklist outlining what policies to establish. While the installation is straightforward and does not require much effort beyond obtaining a license, creating and configuring policies can be time-consuming. Therefore, allocating sufficient time and resources to policy creation is crucial to ensure effective security management.

Overall, I rate the solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
Flag as inappropriate

PeerSpot user
Rich text editor
    Ajenthan Aiyathurai - PeerSpot reviewer
    Manager - IT at NVCL Group
    Real User
    Top 5Leaderboard
    By optimizing bandwidth management, preventing security breaches, and streamlining administration tasks, we've minimized wastage and improved resource utilization
    Pros and Cons
    • "It enhanced our organization's security posture compared to our previous solution."

      What is our primary use case?

      The primary use case for the Quantum Spark Security Appliance 1570 in our organization is unified threat management, firewall protection, intrusion prevention, anti-virus, and anti-malware defenses to secure our network against external threats. We use its remote access solution, to secure remote access through VPN capabilities and mobile device support, ensuring our employees can connect safely from anywhere. Additionally, the appliance features content filtering, application control, and bandwidth management to optimize network performance and enforce usage policies. 

      How has it helped my organization?

      It enhanced our organization's security posture compared to our previous solution. It offers superior protection with advanced threat management capabilities, including robust firewall defenses, intrusion prevention, and real-time anti-virus and anti-malware protection. 

      This has markedly reduced our vulnerability to cyber threats. Additionally, the appliance's content filtering and application control features have enabled us to manage bandwidth more efficiently, prioritizing critical business applications and preventing unnecessary traffic. This optimization has not only improved network performance but also reduced operational costs by eliminating bandwidth wastage. 

      What is most valuable?

      The WatchTower feature is particularly valuable, providing real-time monitoring of incidents, which enhances our ability to promptly address and mitigate security threats, ultimately leading to reduced overheads and improved overall efficiency. 

      The WatchTower app is accessible from mobile devices, providing administrators with the flexibility to monitor and manage security on the go. This mobility ensures that security management is not confined to the office, allowing for rapid response even when off-site.

      What needs improvement?

      They should improve integration with third-party security tools and software for a more unified security ecosystem. 

      They should enhance compatibility with various network environments and cloud platforms can be valuable. Offer more comprehensive support options, including extended hours and more accessible resources.

      They should provide more extensive training materials and documentation to help users maximize the appliance's capabilities. Integrate user awareness and training modules within the appliance to educate employees on security best practices.

      For how long have I used the solution?

      We have been using it for more than two years. 

      What do I think about the stability of the solution?

      Stability is exceptionally positive. Since its implementation, the appliance has demonstrated remarkable reliability and uptime, consistently maintaining our network's security without disruptions

      What do I think about the scalability of the solution?

      It provides a robust and scalable solution that meets both our current requirements and future growth plans.

      How are customer service and support?

      Customer service is overall good, but we would like it to be more enchnaced. 

      How would you rate customer service and support?

      Positive

      Which solution did I use previously and why did I switch?

      We previously used a different security solution but we switched it because of a phishing attack. Though we had a solution, it had not done its job perfectly. 

      How was the initial setup?

      The setup is straightforward.

      What about the implementation team?

      We implemented it through a vendor. I would rate it an eight out of ten.

      What was our ROI?

      It helped us reduce operational costs associated with network security. By optimizing bandwidth management, preventing security breaches, and streamlining administration tasks, we've minimized wastage and improved resource utilization. 

      What's my experience with pricing, setup cost, and licensing?

      Setup cost is not much, hence pricing and licensing need to be considered. If pricing gets lower that would be great. 

      Which other solutions did I evaluate?

      We previously used a different security solution but switched to the Quantum Spark Security Appliance 1570 due to several issues with the old system. Our previous solution lacked advanced threat management features like real-time anti-virus and anti-malware protection, and had ineffective bandwidth management leading to network performance bottlenecks. 

      What other advice do I have?

      This is a best solution for us so far and we recommend this to anyone. 

      Which deployment model are you using for this solution?

      On-premises

      If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

      Other
      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      Flag as inappropriate

      PeerSpot user
      Rich text editor
        Buyer's Guide
        Check Point NGFW
        December 2024
        Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
        824,019 professionals have used our research since 2012.
        Cyber Security Consultant at Wirespeed
        Reseller
        Top 5
        Good security intelligence, which helps detect threats but room for improvement in stability
        Pros and Cons
        • "I like the GUI."
        • "A lot of things need to be improved in Check Point NGFW. One, their support team isn't very efficient and useful."

        What is our primary use case?

        For Check Point, the main cases are just perimeter security, network security, basically detecting threats on the network, antivirus, application control, visibility, login, and data threat prevention.

        What is most valuable?

        I like the GUI. In terms of functionality, it used to be the detection capability. Check Point has good security intelligence, which helps detect threats. They have the historical background to do that. But now, Fortinet is a bit better. 

        What needs improvement?

        A lot of things need to be improved in Check Point NGFW. One, their support team isn't very efficient and useful. 

        The solution itself isn't easy to learn, making it hard for support to provide solutions. The design makes it so pockets (specific teams) have to work together when there's an issue, which creates a mess.

        Also, Check Point lacks competitive capabilities like SD-WAN and CGM app integration. And visibility needs improvement. For example, Fortinet shows all connected devices with IP addresses, MAC addresses, and sometimes usernames. More granular detail is crucial for security.

        So support efficiency, visibility, and adding competitive capabilities are key areas for improvement.

        For how long have I used the solution?

        I have been with Check Point for a very long time. So, it has been almost six years.

        What do I think about the stability of the solution?

        I would rate the stability a six out of ten. There is room for improvement here. 

        What do I think about the scalability of the solution?

        I would rate the scalability a seven out of ten. My customers are mostly medium-sized businesses, but my clientele also includes enterprises.

        How are customer service and support?

        There is room for improvement in the customer service and support. 

        How would you rate customer service and support?

        Neutral

        Which solution did I use previously and why did I switch?

        I'm heavily biased towards Fortinet. Check Point is a direct competitor, so from my experience, it's a decent firewall. There are strong points and weak points, but Fortinet is superior for various reasons.

        How was the initial setup?

        The initial setup is really straightforward. The GUI is very good. However, the issue I have is with the stability. In terms of simplicity, I don't consider Check Point to be a straightforward solution. Another point to mention is my experience in planning within customer environments. The outcomes are not always as expected. 

        For instance, when setting up Check Point firewall and flat policies, the policies didn't take effect immediately. There was a situation where the policies took effect after about two hours. Such instances were mind-boggling. Regarding VPN issues, when implementing IP protection between Check Point and other vendors, remote access can be challenging.

        In Nigeria, it's predominantly on-premises. Many organizations are moving towards cloud, but many others use a hybrid approach, both on-premises and in the cloud. 

        A few are using Check Point in the cloud, but most test with Fortinet due to easier integration with public cloud providers like Microsoft. Public cloud vendors also have their own firewalls, like Microsoft and AWS. In terms of adoption, Check Point is behind in cloud adoption in Nigeria.

        What about the implementation team?

        Overall, the process is very fast and depends on the type of deployment. For example, replacing a Cisco firewall with Check Point requires converting policies, which can take quite a while, depending on the size of the policy base. In my personal experience, setting up Check Point was very quick.

        What's my experience with pricing, setup cost, and licensing?

        It's reasonably priced, but competitors offer much cheaper options. It's market-related, so the pricing makes sense for what Check Point offers.

        What other advice do I have?

        My recommendation is to consider Fortinet as an alternative. Overall, I'd rate it a seven out of ten. There's room for improvement, especially since Check Point doesn't seem too focused on our region. 

        In Nigeria, procuring the firewall and bundled services like technical account management and professional services can be challenging. The service delivery is not as efficient as one would expect, which wouldn't be the case for a European customer.

        Which deployment model are you using for this solution?

        On-premises
        Disclosure: My company has a business relationship with this vendor other than being a customer:

        PeerSpot user
        Rich text editor
          Robert Bartos - PeerSpot reviewer
          Presales IT solutions at ICCO
          User
          Top 20
          Monitors traffic well, is user-friendly and offers a good dashboard
          Pros and Cons
          • "The dashboard provides a quick overview of the security status, including key metrics, alerts, and recent events."
          • "Timely updates to security databases, firmware, and software are crucial for addressing new threats."

          What is our primary use case?

          We are using the product in a small office to secure our network to configure the firewall settings to control incoming and outgoing traffic. 

          This includes setting up rules for allowing or blocking specific types of traffic.

          We use intrusion prevention features to detect and prevent potential threats and attacks on your network.

          It enables logging and monitoring features to keep track of network activity and identify potential security incidents.

          With the solution, we can implement strong user authentication mechanisms to control access to your network resources.

          How has it helped my organization?

          The use of Check Point NGFW makes our business feel safer.

          NGFWs typically include advanced threat prevention mechanisms, such as intrusion prevention systems (IPS), antivirus, anti-malware, and threat intelligence. These features help protect your network from a wide range of cyber threats.

          NGFWs can integrate with user identity management systems, enabling more granular control over network access based on user identities. This is particularly important for enforcing security policies on a per-user basis.

          What is most valuable?

          The interface is user-friendly, and also they give you small training courses on the Coursera website to explain how to use the products.

          The dashboard provides a quick overview of the security status, including key metrics, alerts, and recent events. This helps administrators get a snapshot of the network's security posture.

          The ability to monitor network traffic and security events in real time is crucial. Check Point's interface often provides real-time visibility into network activity, making it easier to identify potential issues or threats.

          What needs improvement?

          Their products are pretty complete, and the explanations are very well done.

          Check Point offers training and certification programs for administrators and security professionals. These programs help individuals develop the skills needed to effectively manage and secure networks using Check Point products.

          Timely updates to security databases, firmware, and software are crucial for addressing new threats. Check Point's commitment to providing ongoing support ensures that organizations have access to assistance when needed.

          For how long have I used the solution?

          We have been using this solution for the last two years already.

          What do I think about the stability of the solution?

          The solution we use is pretty complete. For the moment, the stability is good enough for us.

          What do I think about the scalability of the solution?

          CkeckPoint has solutions for different sizes of companies. Therefore, the solution is scalable. The client has to choose the right solution for their needs. If you call the contact center, they can advise you on your options.

          How are customer service and support?

          We have not used technical support, up until now we haven't needed them.

          How would you rate customer service and support?

          Positive

          Which solution did I use previously and why did I switch?

          We used a normal antivirus on the endpoints previously. However, after we took a cybersecurity course, we understood that a bigger security solution was needed.

          How was the initial setup?

          The initial setup is easy. You just click through, next, next, next, and take some steps to make an account and do some basic setups. Everything basically works out of the box.

          What about the implementation team?

          We implemented the solution through a vendor team; they had well-trained technicians.

          What was our ROI?

          To feel safer in the online environment is the most important thing these days. Everything is online now. A solution like that makes it easier and safer for you to work and do things online.

          What's my experience with pricing, setup cost, and licensing?

          After researching what's available in the market, choose a product. Read reviews and watch demos to assess the user interface and learn what options the product offers.

          Which other solutions did I evaluate?

          We searched the market for months before we chose Check Point. There are many security solutions on the market, both for on-premises and on the cloud. We chose Check Point for the ease of use.

          What other advice do I have?

          The solution is perfect for us. That said, for each client, the needs are different.

          Which deployment model are you using for this solution?

          On-premises
          Disclosure: I am a real user, and this review is based on my own experience and opinions.

          PeerSpot user
          Rich text editor
            reviewer1777338 - PeerSpot reviewer
            Supervisor Tecnico at Grupo MCoutinho
            User
            Connects seamlessly with Active Directory and offers good application control and web filtering
            Pros and Cons
            • "I have to say that it was Application Control and web filtering are excellent."
            • "It would be nice if there is a mobile-friendly console for our techs."

            What is our primary use case?

            We have deployed this product for the protection of our MPLS connection between 20 geographic distinct sites, two data centers, and an internet connection.

            We are also using the product to establish IPsec tunnels with 5 external entities totally transparent to our users.

            We're a new company that started to invest in cybersecurity and protection products and chose Check Point for their cloud solutions that protect a vast majority of our devices. 

            We are happy with the deployment of the product and the ease of use.

            How has it helped my organization?

            Since the deployment and go-live of the solution, we noted a rise in productivity of some people, we think it has to do with the deployment of the application control and web filtering capabilities of the product.

            We're also happy with the deployment process and the help that the Check Point partner provided in the initial configuration of the product. 

            Our users also noted more speed on the internet connection, as I said probably because of the block rules implemented with the features mentioned above.

            What is most valuable?

            I have to say that it was Application Control and web filtering are excellent. We knew we had users watching videos and using not approved apps yet didn't have a way to centrally block them. With NGFW we do and we can set up profiles/groups of users with different permissions which allow for example IT to have media streaming access and "regular" users don't.

            Also having a VPN concentrator on the same device is a plus since made our user management with Active Directory connection a lot easier and faster.

            What needs improvement?

            We're a new company so regarding additional features we can name only a few, for example, a better API for extracting data so that we can integrate with our monitoring solution, at the moment we use Nagios/Icinga.

            It would be nice if there is a mobile-friendly console for our techs so that they can help users when not at their desks since they do frequent external work.

            Better connection between the legacy console and the new one since we have a company that still uses an on-prem device and we have to use two consoles.

            For how long have I used the solution?

            We've been using this product for one year.

            Which solution did I use previously and why did I switch?

            We didn't use a previous solution. 

            What's my experience with pricing, setup cost, and licensing?

            I'd advise others to read the license differences and features.

            Which other solutions did I evaluate?

            We've evaluated Fortinet and Forscout products.

            Which deployment model are you using for this solution?

            Hybrid Cloud
            Disclosure: I am a real user, and this review is based on my own experience and opinions.

            PeerSpot user
            Rich text editor
              Network and Security Administrator at CNR-ISTP - Consorzio RFX in Padua at Politecnico di Milano
              Real User
              Top 20
              Good interoperability and log analysis but could improve VPN clients
              Pros and Cons
              • "I like the dashboard, redundancy, log analysis, threat prevention and ISP, and VPN."
              • "IoT should be considered in future development."

              What is our primary use case?

              We're an international research laboratory, focused on thermonuclear energy experiments. Due to strong remote collaboration, and to control network communication, we choose the Check Point NG Firewall solution.

              Most of the personnel are researchers. We also have a strong collaboration with a University and take care of a European Ph.D. on thermonuclear fusion, as the future clean energy.

              How has it helped my organization?

              We aim to constantly improve firewall technology, which is a key strategy nowadays. We've chosen Check Point in 2007 and step-by-step upgrade and expand cyber security deployment using their solution. 

              We appreciate the support and escalation when issues are in place. We really appreciate the solidity of the solution, the redundancy, we own a couple of appliances in failover. 

              We use Check Point to grant VPN access both for clients and also in specific site-to-site IPSec remote connections.

              What is most valuable?

              I like the dashboard, redundancy, log analysis, threat prevention and ISP, and VPN.

              The dashboard has clean and focused menus and tabs, that offer immediate access to important information and configuration. 

              Log analysis is really powerful considering the enormous amount of logged data. 

              We use a specific function to control bandwidth occupation based on protocols and IP subnetworks.

              Fundamental is the interoperability with RSA SecurID, Windows AD/Azure.

              We're in the process of moving to the MS O365 cloud, and Check Point helps us with this.

              What needs improvement?

              Maybe the VPN clients could be improved, however, only from a cosmetic point of view. They use a very old GUI and should help remote assistance in case of problems to make it more accessible in terms of getting log/debug information. On this, I suggest an approach like ZOOM US, where is clearly defined the application life cycle, and users warned over time.

              We're in the process of moving to a cloud hybrid solution based on MS Azure, and on that field, quite common nowadays, it seems that more has to be done, moving from on-premise historical deployment. 

              IoT should be considered in future development.

              For how long have I used the solution?

              I've used the solution since 2007.

              What do I think about the stability of the solution?

              It is an absolutely stable solution. It is easy to put maintenance on an appliance without losing any connectivity.

              What do I think about the scalability of the solution?

              The last release, R81, is impressive, at least in these first months, having recently upgraded from R80.

              How are customer service and support?

              My experience is good, both on technical issues, and commercial support during renewal.

              How would you rate customer service and support?

              Positive

              Which solution did I use previously and why did I switch?

              We previously used a Cisco PIX firewall.

              How was the initial setup?

              The setup is somewhat complex, however, technical documents are clear, and the most common solutions are well described.

              What about the implementation team?

              We implemented it with a third party and in-house. The support company that helped in Italy is fantastic.

              What was our ROI?

              We may need more time to measure ROI.

              What's my experience with pricing, setup cost, and licensing?

              Check Point is not a cheap solution, however, on cyber security, we prefer to stay with a key player.

              Which other solutions did I evaluate?

              We constantly verify other vendor solutions, such as Palo Alto, Fortinet, and Sophos.

              Which deployment model are you using for this solution?

              On-premises

              If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

              Microsoft Azure
              Disclosure: I am a real user, and this review is based on my own experience and opinions.

              PeerSpot user
              Rich text editor
                Senior Systems Engineer at Upper Occoquan Service Authority
                Real User
                Provides great protection from threats, comes with good support, and scales very well
                Pros and Cons
                • "The console or the single interface on the blades is most valuable."
                • "The only thing that we've seen is instances where console and administrative interfaces get locked up or freeze, and we have to get the machine rebooted."

                What is our primary use case?

                We are using Firewall Intrusion Prevention and URL Filtering, and we just purchased the Endpoint Protection package for our workstations.

                It is deployed on-premises. We have two Check Point systems in place. We have one that's between our business network and the outside world, and we also have one that's between our business network and our internal SCADA system.

                We haven't updated to version 81, so we're still at version 80.

                How has it helped my organization?

                It has provided us with great protection from threats. I've been here 30 years, and we've had two incidents, and none of them were within the time we've used Check Point.

                What is most valuable?

                The console or the single interface on the blades is most valuable.

                What needs improvement?

                The only thing that we've seen is instances where console and administrative interfaces get locked up or freeze, and we have to get the machine rebooted.

                For how long have I used the solution?

                I have been using this solution for probably 10 years.

                What do I think about the stability of the solution?

                I would rate it a nine out of 10 in terms of stability.

                What do I think about the scalability of the solution?

                Its scalability is very good. Our entire force is about 190 people, and most of them use it at some point just because they are going out to the internet and have that protection for the workstations. 

                It is being used extensively. Everyone is using it, and we do have plans to increase the functionality on the device.

                How are customer service and support?

                They provide really good support. I would rate them a five out of five. 

                Which solution did I use previously and why did I switch?

                I can't remember the product, but what we had initially was an entry-level device. It was a single-purpose firewall. We went up to an enterprise solution that had additional features.

                How was the initial setup?

                It was pretty simple to transfer the old firewall configuration to the new one. So, it was pretty straightforward and easy. I would rate it a four out of five in terms of effortlessness.

                It took over a month. We ran two systems. We built a new system for a couple of weeks before switching over completely.

                What about the implementation team?

                We used a consultant. Our experience with them was very good.

                For deployment and maintenance, we have five people on our staff. We have to do some maintenance on it. It's pretty much scheduled to rotate between us so that we keep our skills fresh.

                What was our ROI?

                We've not done an initial study on any kind of ROI. We rarely do. In positives, we try to perform a yearly risk assessment of our systems, and we find very few vulnerabilities. So, it is doing what it's supposed to. It is keeping us safe.

                What's my experience with pricing, setup cost, and licensing?

                Its cost is a little higher than other products.

                Which other solutions did I evaluate?

                We evaluated other options, but I don't remember their names. We basically went to the consultant we deal with for security-related things and said, "What's out there? What do you recommend?" He gave us three and recommended that the Check Point was probably the lead one.

                What other advice do I have?

                I would advise comparing it to the other products.

                I would rate it a nine out of 10. It has served us very well and given us very few headaches.

                Which deployment model are you using for this solution?

                On-premises
                Disclosure: I am a real user, and this review is based on my own experience and opinions.

                PeerSpot user
                Rich text editor
                  System Administrator at Grant Thornton
                  Real User
                  Reliable with good central management capabilities and useful dynamic definitions
                  Pros and Cons
                  • "The solution offers very good central management, which saves time and is hassle-free."
                  • "There are some GUI features in Check Point's SmartConsole that are still from the old versions and are in separate/duplicated interfaces; it would be most useful if it is integrated and not on different menus."

                  What is our primary use case?

                  We use the product as our main and only Firewall/Gateway/VPN Gateway. we are in the finance sector, and we need a very reliable and robust system. 

                  We rely heavily on the VPN system, as most of our employees are working outside the office at this time. 

                  We also have two appliances to improve reliability, we have internet access through two ISPs configured to work simultaneously. 

                  Our internal LAN is with duplicated network nodes that are double connected to our Check Point cluster. That way, we have full High Availability.

                  How has it helped my organization?

                  Before our purchase of Check Point products, we used an open-source product that lacked good integration between products and setting up to work was very tricky.

                  We use the Check Point mobile VPN, which is very stable and easy to use. It allows our employees to change their internal domain password when it becomes old, even when they are outside of the office for a long time. The VPN client can connect to our internal network even before the user is logged into his laptop. This allows users to receive GPO policy updates. 

                  What is most valuable?

                  The solution offers very good central management, which saves time and is hassle-free.

                  One of the most useful new feature is dynamic definitions. For example, if you need to allow all of the Microsoft Azure IP addresses, you can insert them dynamically and Check Point will update them for you. Without it, to find all IP addresses would be almost impossible.

                  You can create additional layers for the firewall rules. This allows better organization and performance of the product by skipping to the rules that are responsible for this group of protected devices.

                  What needs improvement?

                  There are some GUI features in Check Point's SmartConsole that are still from the old versions and are in separate/duplicated interfaces; it would be most useful if it is integrated and not on different menus.

                  We would like to have a better search engine on the checkpoint.com site. Right now, it is difficult to find, for example, a newer version of the Check Point VPN Mobile client. The search engine shows most visited sites and the newer version won't be the most recently viewed site page. As it is right now, you have to find the general VPN page form, and from there you have to look at what version of the product you need and then go to the page of the latest version.

                  For how long have I used the solution?

                  We have been using this product for five years.

                  What do I think about the stability of the solution?

                  Check Point is very stable.

                  What do I think about the scalability of the solution?

                  We haven't needed to expand our throughput capacity.
                  However, based on the Check Point documentation, it is hyperscale ready  capable of up to 475 Gbps of Threat Prevention.

                  How are customer service and support?

                  It is very good. Our local representatives are very helpful.

                  How would you rate customer service and support?

                  Positive

                  Which solution did I use previously and why did I switch?

                  We moved from a previous solution to Check Point as it is more reliable and easy to manage, and our old solution wasn't able to provide the level of security we desired.

                  How was the initial setup?

                  We have had some problems understanding how to set up HA, however, we managed to do it. This was mainly due to the fact that we didn't have experience with Check Point products in the past.

                  What about the implementation team?

                  We did everything in-house.

                  What's my experience with pricing, setup cost, and licensing?

                  New users should know that the first year of support is included in the equipment. After that, you have to buy it.

                  Which other solutions did I evaluate?

                  We choose between Palo Alto and Checkpoint.

                  What other advice do I have?

                  We like it. It works well.

                  Which deployment model are you using for this solution?

                  On-premises
                  Disclosure: I am a real user, and this review is based on my own experience and opinions.

                  PeerSpot user
                  Rich text editor
                    Buyer's Guide
                    Download our free Check Point NGFW Report and get advice and tips from experienced pros sharing their opinions.
                    Updated: December 2024
                    Buyer's Guide
                    Download our free Check Point NGFW Report and get advice and tips from experienced pros sharing their opinions.
                    ...
                    ...