What is our primary use case?
In today's world, we can't completely rely on traditional signature-based devices, as technology involving cyberattacks is becoming more sophisticated. We require an all-in-one solution that can defend against newly-created attacks, necessitating the usage of NGFW firewalls. This is where Check Point comes into the picture.
Our environment contains multiple roaming users, where we have to extend trust beyond the organizational network. Not only is there east-west traffic to deal with, but a large volume of north-south traffic, as well. We are required to monitor all of the traffic, which includes many branch offices connected centrally.
Monitoring Data via DLP in such a scenario, we require a single solution, which is nothing but Checkpoint.
How has it helped my organization?
It has not only improved our environment but the entire organization. Adopting it brings better functionality.
Starting from the basic firewall blade to sandbox threat emulation and threat extraction, it works seamlessly to protect against both known and unknown malware.
After the version 80.xx migration, Check Point stability and security have improved tremendously.
Through the management server, it has become very easy to manage the configuration for each of the blades, as well as the day-to-day operations. With central management, it has become possible to manage endpoint devices as well.
What is most valuable?
Check Point has the best technical support, which I feel if we consider other firewall vendors in the market, is an important distinguishing point.
Stateful inspection is one of the strongest points in this product, which is applicable while creating policies for application and URL filtering.
Check Point provides dedicated blades to monitor network traffic, which helps while troubleshooting network and packet-related issues.
It is easy to filter traffic based on source-destination services, time, etc, which is an enhancement over other firewalls in the market.
What needs improvement?
Check Point fulfills our requirements but it is important that they stay on top of competitors by addressing certain points.
There are issues with stability while upgrading devices with hotfixes. For example, many times, a device will stop giving responses after an upgrade (observed in 80.10 release).
The rule database needs to be improved because when we apply rules for the destination, based on service and application and URL filtering Layer, the parallel lookup fails.
For how long have I used the solution?
I have more than three years of experience with Check Point NGFW.
What do I think about the stability of the solution?
Stability can be improved further.
What do I think about the scalability of the solution?
Scalability is excellent.
How are customer service and technical support?
Technical support is very good and provides the right solutions every time. They are highly skilled.
Which solution did I use previously and why did I switch?
We have seen many customers migrating their firewall from Sophos to Check Point, or from Cisco to Check Point. The main reason has been that they were not getting NGFW functionality and the security feature sets that Check Point provides.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
I implemented it with the help of a vendor.
What was our ROI?
We are definitely getting most of the things that we expect from this product.
What's my experience with pricing, setup cost, and licensing?
Check Point is a vendor that listens to customers and determines what they want. Based on the requirements and the solutions offered by other vendors, Check Point will negotiate to try and give the customer the best price.
Check Point offers options and operates differently from other vendors with respect to licensing. Each blade requires that you have a license.
Which other solutions did I evaluate?
We also evaluated Palo alto.
What other advice do I have?
I think people like me love Check Point because in my experience over the years, I have not heard of a comprise where Check Point was protecting the network. As long as the devices are configured properly, this is a very small chance of being compromised.
In general, the NGFW features in Check Point fulfill our requirements, which is expected from a Cybersecurity firm that has been involved in the field for a long time.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: I'm working in company where we provide services to other customer.