The primary objective was to replace the Cisco ASA firewalls with Check Point NGFWs. In addition to their firewall functions, these NGFWs also provide features like Web Application Firewall and Network Data Security. We used this approach to consolidate security measures into a single, comprehensive solution, much like having a master key at the main entrance rather than separate keys for each window and door. This streamlines security management and ensures a more efficient and robust overall security strategy.
Senior Enterprise Security Architect at Cyqurex Systems Ltd
A reliable and robust security solution with a wide range of capabilities
Pros and Cons
- "Its simplified management, enhanced remote support capabilities, and the ability to facilitate secure VPN connectivity for numerous offices and employees are highly beneficial."
- "The current model is predominantly hardware appliance-based, which can incur substantial costs"
What is our primary use case?
What is most valuable?
There are several crucial advantages to using Check Point NGFW including its ease of use, as it provides a unified interface for managing multiple security functions. It offers impressive scalability to meet the demands of a large organization and can handle substantial traffic. Its simplified management, enhanced remote support capabilities, and the ability to facilitate secure VPN connectivity for numerous offices and employees are highly beneficial.
What needs improvement?
The current model is predominantly hardware appliance-based, which can incur substantial costs. These appliances must be purchased separately, contributing to a significant investment.
For how long have I used the solution?
Our most recent engagement with Check Point NGFW was a year ago when we implemented it for one of your financial sector clients.
Buyer's Guide
Check Point NGFW
January 2025
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
What do I think about the stability of the solution?
The stability of the firewall has been exceptional, with very minimal disruptions. There was only one instance of downtime, and it wasn't attributed to any fault in the firewall itself or the hardware, but due to a configuration issue. I would rate it eight out of ten.
What do I think about the scalability of the solution?
The scalability of Check Point firewalls is a notable strength. These firewalls can handle a substantial number of connections. For instance, they can manage up to one million connections on the NDSW server. Regarding its VPN capacity, it can support around 5,000 to 8,000 users per box, which is quite impressive. This scalability makes Check Point firewalls well-suited for organizations with high connection and user requirements. I would rate it eight out of ten.
How are customer service and support?
Their support team has demonstrated an approximately 24-hour turnaround time, which is considered quite good. We have rarely needed to engage with Check Point support because most issues are resolved internally. Typically, we turn to OEM support only when we encounter challenges that are beyond our capabilities.
Which solution did I use previously and why did I switch?
I also have experience with Fortinet and Cisco, both of which have made significant developments recently. They have introduced software-based firewall and system solutions, which have garnered attention from customers. This shift in the competitive landscape has led to changes in customer preferences, with more organizations considering Fortinet as a viable option for their security needs.
How was the initial setup?
This process can be a bit complex at times, mainly because it depends on the specific client architecture and how they want to set it up.
What about the implementation team?
The deployment process can be rated at about six in terms of complexity. Several factors influence this complexity, but getting the infrastructure ready is often the most challenging aspect. To successfully deploy, you need to account for downtime, ensure proper backups are in place, and ideally test it in a sandbox environment before going live. After deployment, thorough checks and adjustments are necessary. It typically requires at least two days of parallel operation, where both the new and old equipment run simultaneously. In an environment with no existing infrastructure to replace, the process is generally smoother. Deployment typically involves a team of 2 or 3 people working full-time for 4 to 5 days, equivalent to nine hours a day. Maintenance is handled by a networking team, which includes a Network Operations Center. The team consists of approximately eleven people managing various network components, including L1, L2, and L3 devices.
What other advice do I have?
When considering a POC for a security solution, it's essential to assess the various use cases and functionalities it offers, such as NDSW which is particularly useful for protecting sensitive data. Check Point NGFW is not solely a firewall; it's a comprehensive security solution with various capabilities. It can address a wide range of security requirements, making it a valuable and versatile asset for organizations looking to enhance their security posture. I would rate it eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Network Engineer II at Baptist Health
Good antivirus protection and URL filtering with very good user identification capabilities
Pros and Cons
- "The scalability is very good."
- "I'd like to see more use of applications and URLs in security policies moving forwards."
What is our primary use case?
The primary use case for these firewalls is to protect our perimeter from unwanted traffic in and out of our network as well as to control the flow of data to comply with our company security policies.
It also plays an integral part in restricting or granting access at a granular level for certain users or vendors allowing us to monitor and protect end-customer data as well as protecting our users and network from malware, bots, ransomware and other bad actors that could disrupt our business operations.
How has it helped my organization?
Check Point NGFW products have improved the operation of our organization by allowing us to secure our perimeter from attacks, probes, malware, DDoS, bots and general bad actors. It also allows us to secure outbound traffic from our users.
It allows us to fine tune how we allow users to access resources both in our DMZ and externally. This helps us to secure customer and user data in order to prevent privacy issues, prevent loss of operations or downtime which we cannot accept.
Being able to use the products in redundant pairs has also allowed us to provide a more stable network.
What is most valuable?
There are several useful features that we utilize that are now valuable assets in terms of protecting the network. These would include user identification (ID Collector), IPS, antibot, antivirus, application, and URL filtering as well as the standard firewall security rules. They all work together to provide layers of security to protect both inbound and outbound traffic in order to minimize loss of private data as well as to ensure our network is free of bad actors attempting to use malware or ransomware against us.
What needs improvement?
Check Point could improve its products by working on stability. Overall, it is a stable platform, however, at times we have issues with 'quirks' and bugs that cause issues for our end users and typically are not straightforward to fix.
Another issue that presents itself is upgrading. Small hot fixes are not problematic. That said, updating to a new version of the OS has been an absolute nightmare and caused significant downtime and a number of issues - not to mention wasted engineering time. Simplify the upgrade process and they may regain confidence in this area!
I'd like to see more use of applications and URLs in security policies moving forwards.
For how long have I used the solution?
I've worked with the solution for seven years across two different companies.
What do I think about the stability of the solution?
The stability is good, yet it could use some improvement.
What do I think about the scalability of the solution?
The scalability is very good.
How are customer service and support?
It has always been slow and difficult to use technical support. It depends on a case-by-case basis, however, you have to chase and manage the case yourself or it will go nowhere. This likely comes down to a lack of experienced agents.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used Cisco ASA. We switched due to the fact that Cisco's product was very hard to manage and lacked any real intelligence.
How was the initial setup?
The initial setup is complex. A very large and multifaceted environment will always be complex to configure.
What about the implementation team?
We used vendor support and account teams and in-house technical engineering.
What's my experience with pricing, setup cost, and licensing?
It's expensive, however, compared to the cost of not protecting the network properly, it's worth the cost.
Which other solutions did I evaluate?
We looked at Palo Alto, Fortinet, and Cisco.
What other advice do I have?
Carefully consider the vendor before making a leap. It's very difficult and costly to change vendors at a later date.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point NGFW
January 2025
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,020 professionals have used our research since 2012.
Sr. Cyber Security and Solutions Architect at a consultancy with 201-500 employees
Robust security and seamless integration enhance classified application management
Pros and Cons
- "One of the most valuable features is the ability to whitelist and blacklist sources to control access to our ecosystem, ensuring secured SaaS application access."
- "I would absolutely recommend this solution to others for its robust security and scalability."
- "The graphical user interface (GUI) could benefit from some updates."
What is our primary use case?
We use the Check Point Next Generation Firewall for whitelisting and blacklisting of addresses. It's part of our identity management solution and is utilized for inbound and outbound traffic services.
Additionally, it is integrated with our DMZ, managing traffic from an IP addressing scheme. We also use it for monitoring different types of classified and nonclassified applications.
How has it helped my organization?
Check Point has improved our organization's ability to manage both classified and nonclassified applications securely, ensuring they pass through multiple layers of security within our firewall infrastructure.
What is most valuable?
One of the most valuable features is the ability to whitelist and blacklist sources to control access to our ecosystem, ensuring secured SaaS application access. It provides robust security across classified and nonclassified applications and integrates well with our existing infrastructure.
What needs improvement?
The graphical user interface (GUI) could benefit from some updates, although it is generally satisfactory in its current form.
What do I think about the stability of the solution?
The solution is stable, and I have the utmost confidence in its software stability.
What do I think about the scalability of the solution?
The application is very scalable, allowing us to manage security across different network layers and support various applications and activities.
How are customer service and support?
Customer support quality depends on the person you interact with. However, the support team we engaged was knowledgeable and well-versed with the application, allowing us to resolve any potential issues effectively.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We switched to Check Point due to cost and maintenance benefits. The previous solutions required significant resources to handle network and communication alignment during upgrades.
How was the initial setup?
The initial setup is straightforward, with no significant issues arising from the box configuration.
What about the implementation team?
Our implementation team comprised about thirty individuals, including supervisors for each stage, to manage testing, validation, staging, and production.
What was our ROI?
We conducted a detailed analysis and determined a high return on investment. Maintenance and stability were key factors contributing to a favorable ROI.
What's my experience with pricing, setup cost, and licensing?
We found the pricing reasonable, ensuring the product was not overpriced. However, I am not familiar with the exact cost details.
What other advice do I have?
I would absolutely recommend this solution to others for its robust security and scalability.
I'd rate the solution ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Nov 17, 2024
Flag as inappropriateStudent at a university with 5,001-10,000 employees
Integrates with with Active Directory, IPS, standard VPN, and the firewall
Pros and Cons
- "Integration with Active Directory, IPS, standard VPN, and the firewall itself are the most valuable features for us. We haven't yet certified or aren't using Application Control, anti-bot, or anti-virus features."
- "Significant improvements have been made in the product. I started working with the R65 code and then upgraded to R74.40. When they transitioned from R77.30 to R80.x, they made major back-end modifications, switching from a flat file system to Solaris and Postgres. This was a big step that neither customers nor their support staff were fully prepared for."
What is our primary use case?
We needed stateful inspection, logging, integration with Active Directory, and the ability to monitor devices using standard SNMP for use cases. Now, with the tool's Skyline product and OpenTelemetry, we can monitor it through Prometheus and Grafana. It has all the features we needed when we certified the solution.
What is most valuable?
Integration with Active Directory, IPS, standard VPN, and the firewall itself are the most valuable features for us. We haven't yet certified or aren't using Application Control, anti-bot, or anti-virus features.
What needs improvement?
Significant improvements have been made in the product. I started working with the R65 code and then upgraded to R74.40. When they transitioned from R77.30 to R80.x, they made major back-end modifications, switching from a flat file system to Solaris and Postgres. This was a big step that neither customers nor their support staff were fully prepared for.
Now, they're adding more features due to the increased flexibility of the new back-end. The main improvement I'd suggest is better preparation when introducing new features. Before releasing, they must train their support staff to troubleshoot these new features. The transition from R77.30 to R80.x was problematic due to a lack of preparation by Check Point, customers, and support.
What do I think about the scalability of the solution?
Sizing is crucial, but we've never had issues with the products we've sized for each environment. The Maestro solution provides a lot of flexibility. On a scale of one to ten, with ten being the highest scalability, I'd rate it a ten.
Which solution did I use previously and why did I switch?
I use Palo Alto firewalls. Check Point NGFW was the first to invent the stateful inspection firewall. They focus more on security and try to keep their motto of "keep security simple". They don't get bogged down in marketing or complicated terminology when using their products.
Even enabling a firewall blade on Palo Alto requires learning about different sync ports, how sync ports differ between chassis, and navigating through multiple GUI tabs for configuration. It's not as straightforward.
On the other hand, Check Point NGFW has kept things very simple for deployment. You set it up once, and then you can repeat the same process repeatedly.
How was the initial setup?
On a scale of one to ten, with ten being the easiest, I'd rate the initial setup as ten. The process is straightforward: you rack and stack, configure the management code, create a standard policy, establish SIC, and push the policy. This process has remained consistent over the years.
For deployment, it took us longer than the typical two weeks because we had to design solutions for different scenarios. Check Point offers various options, such as clustering solutions, Maestro solutions, and standalone solutions. We had different use cases—some required standard clusters with ClusterXL, while others needed scalability solutions like Maestro. We also had to factor in sizing considerations.
The certification process took about the same amount of time as other products. We've been using the Maestro solution for a while now, so when new platforms are released, there isn't much change required beyond certifying the new hardware and ensuring backward compatibility with our certified solution.
Initially, it took a little more than two weeks to certify. However, the actual deployment still follows the same standard process and is actually easier now than it was in the past.
We call the team responsible for deploying certified solutions to the service delivery team. It's made up of two groups: build services and service delivery. The build services team works with our networking team to ensure our network and peering devices are set up right to host the firewall.
The service delivery team focuses more on the firewall itself. We need about three or four extra people from build services for firewall deployment. They act as go-betweens with the network team, ensuring our firewall solution works well with the peering devices when we put it in place. The build services team is important because they ensure everything fits together properly when we set up our firewall.
For maintenance, the solution is pretty stable. We have a global team, but a separate team handles regular firewall changes and daily operations. For support, we have about ten people total - three groups of three people each. This team manages around 1200 firewalls, including Check Point and Palo Alto devices.
What's my experience with pricing, setup cost, and licensing?
Check Point NGFW is much cheaper than other platforms, including Palo Alto. Its scalability, especially with the Maestro solution, is a big advantage. If you're looking for good security at a reasonable price with a good return on investment, I believe Check Point NGFW is the way to go.
What other advice do I have?
I've been dealing with Check Point NGFW for my entire career. I started with their Stateful Inspection feature. The term "Next Generation Firewall" is just marketing. Check Point's UTM product was designed from the ground up with next-generation features. They have a feature called Blaze. Besides stateful inspection firewalls and VPNs, they offer IPS, application control, URL filtering, antivirus, and antibot. You can also integrate it with third-party tools like Active Directory for authentication. This combination of features is what's called a next-generation firewall.
Other vendors use terms like app ID or user ID. They focus less on ports and more on ensuring services match their intended use. For example, if port 22 is enabled, it should be for SSH service, not something else. We use both Check Point NGFW and other products. I think if you commit to one vendor's approach, it can be hard to switch late.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Sep 10, 2024
Flag as inappropriateNetwork Engineer at Upstream
Easy to use and free of bugs with a good Smart Console
Pros and Cons
- "mart Console simplifies the management of current policies and objects, making it effortless to track an object's usage or identify unused objects, thus ensuring a tidy configuration."
- "In the past year, we faced severe downtime that lasted many days due to a misconfiguration."
What is our primary use case?
We use the solution for our data center firewall on-premises. We have deployed a VSX Cluster that currently holds three virtual firewalls. We have several site-to-site VPNs established with our partners and hundreds of policies applied.
We had a custom configuration in our previous policy for which we were passing traffic from one VPN tunnel to another transparently. With Check Point we had to create a new virtual firewall in order to keep it working, so from one firewall we ended up with two rerouting traffic from one firewall to another and changing NAT in order to keep this solution running.
Finally, we created another (third) virtual firewall and configured it to be only a remote access SSL VPN firewall and to be used as a backup if our primary in our HQ fails while the other two firewalls handle production traffic.
How has it helped my organization?
We selected this solution in order to replace the Cisco ASA we used to have.
The features the CP firewall has combined with a very attractive price led us to this decision. The migration was smooth and all the features we needed have been configured easily and worked as expected. Additionally, the SmartConsole and the Log Event viewer made our every day to day tasks easier.
Also, we were provided with a trial license for the compliance blade and the IPS which are truly amazing. I believe that the compliance blade will be used soon by our company in order to assist with the ISO certificate we are trying to get.
Since we have already deployed an AWAF on our premises we didn't use the IPS but the features presented definitely would increase the security level.
Although we use it as our data center firewall, it would be ideal for our HQ Office with all the security features it provides.
What is most valuable?
I appreciate the Smart Console for its ease of use and clarity in managing configurations. It's user-friendly and free of software bugs. Smart Console simplifies the management of current policies and objects, making it effortless to track an object's usage or identify unused objects, thus ensuring a tidy configuration.
Additionally, the hit count feature proves highly valuable, enabling policy prioritization based on usage frequency and facilitating verification of traffic alignment with newly created policies. Furthermore, implementing 2FA for SSL VPN users was a straightforward process, notably without the need for additional costs, unlike the FortiTokens required for our primary SSL VPN.
Additionally, the quick and seamless option to revert to a previous configuration revision is highly valuable. The logs tab serves as a helpful tool for troubleshooting.
It's worth noting that we've experienced no CPU or memory issues, and the system is highly responsive.
What needs improvement?
The only downside is that we are not able to have redundant VPN tunnels with our cloud environments. We tried many guides suggested by the CheckMates community and have not been able to easily capture packets in a PCAP file as we used to do with the ASDM Packet Capture Wizard.
Finally, in the past year, we faced severe downtime that lasted many days due to a misconfiguration. Support wasn't able to detect it. We are allowed to add an automatic NAT in an object and install it in all three virtual firewalls that we have. I cannot imagine a real case that needs this option. This option should be totally removed.
The destination MAC address for this object was flapping between the three virtual MAC addresses of the FW leading to a packet loss in our service up to 30%. Our manager found the root cause at the end.
For how long have I used the solution?
I've used the solution for three to four years.
What do I think about the stability of the solution?
In the past four years that we have had Check Point, we haven't faced any stability issues. It is a stable solution.
What do I think about the scalability of the solution?
Our cluster is oversized for our needs so we haven't reached any system limits in order to face an issue or at least observe its behavior. Our solution covers our current needs and can easily handle any additional load.
How are customer service and support?
Technical support is average. From my last experience, it was my manager who found the root cause of the downtime.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
As noted earlier, our transition to this solution marked a shift from our previous Cisco ASA Cluster setup. Check Point's prominent position in the network industry and the compelling price point offered made it too appealing to overlook.
How was the initial setup?
The initial setup and the configuration migration were done by an integrator who specializes in such migrations. It was complex enough yet very well-planned and organized.
What about the implementation team?
The implementation was done by a very qualified vendor team.
What was our ROI?
Since I am in the engineering department, I can't evaluate the actual income or costs of handling our production traffic with this solution.
What's my experience with pricing, setup cost, and licensing?
I'm not sure what was evaluated. It depends on the company's unique existing infrastructure and needs.
Which other solutions did I evaluate?
We evaluated offers for Cisco, Fortinet, and Palo Alto solutions.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Information Security Specialist at AKBANK TAS
Smart, simple, and user-friendly
Pros and Cons
- "The solution offers a good GUI."
- "The API support is good. However, Check Point needs to focus on more prepared scripts for some tiresome actions."
What is our primary use case?
We are using physical appliances along with some VSX's in our network. We mostly use firewall only (due to high traffic usage). We are using CP NGFW to protect the company from the internet and also provide security while we are connecting to the internet.
We have physical clusters that we manage via our company's external connections through S2S. We are managing our core and client networks with separate clusters. Applying security rules and providing NAT when we need it. We are also using CP in our DRC environment to provide SRC and DST NAT with VSX to provide access to machines that have the same IP addresses.
How has it helped my organization?
Back when we had a different brand of firewalls, we were having trouble managing all of them separately. With Check Point's HA capability, we merged all of our Check Point firewall management. With this, we can apply a viable DRC solution that our company needs and also manage, view logs, and administer all of the components together.
With the capable appliances, we don't experience any CPU and Memory utilization most of the time. With the help of new versions, Check Point is moving forward. We hope the upcoming version will provide hyper flow, and this will solve our elephant flow problem.
What is most valuable?
The solution offers a good GUI. It is easy to use, smart, simple, and user-friendly.
The client VPN and S2S VPN capabilities are great. Check Point's mobile access provides us with flexibility. We don't have a single point of failure regarding the VPN access points anymore.
We can use Check Point NGFW physically, virtually (with Check Point VSX), and on the cloud with CloudGuard. We have most of the features available even within these different environments.
We can apply SAM Rules (without installation needs), and Custom Intelligence Feeds.
It has good API support and provides value when you need it.
What needs improvement?
The API support is good. However, Check Point needs to focus on more prepared scripts for some tiresome actions. Other vendors provide this, including Palo Alto). We are in a big organization now, and we need good tools to maintain stability and get rid of the objects and rules that we don't use.
If you are working within a big organization, you may have some CPU and memory utilization problems. Most of the time, we are encountering these kinds of problems, and due to that, we can't use other features and blades other than the firewall or threat prevention.
I find Check Point's log experience a little tiresome as it does not provide information with limited blades enabled. We'd like to see information around session time, sent and received bytes, etc. Even if you manage to get some data, you may find it not very reliable.
For how long have I used the solution?
I've been using Check Point's NGFW and its features for about five years.
What do I think about the stability of the solution?
I found Check Point's stability a little bit so-so. Not that good, not that bad. Most of the time it is reliable. We had lots of problems before due to the utilization of our firewalls. Most of the time, the hotfixes provided the solution. However, applying hotfixes and getting in touch with the R&D when needed may be tiresome.
What do I think about the scalability of the solution?
It's pretty good. The HA Features provide a good solution so far, and with Maestro it will perform better.
Which solution did I use previously and why did I switch?
I had the chance to work with Fortigate and Palo Alto Firewalls before. Due to the stability and know-how regarding Check Point, we chose this vendor.
What was our ROI?
We always believed and saw that the money we spent on Check Point was not in vain.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Security Consultant at Atos Syntel
Easy to manage, deploy, and upgrade
Pros and Cons
- "It is easy to deploy or upgrade. There is no need to do this manually with commands. This solution can be set up online."
- "In a VPN setup, we have Internet connection via Check Point. The connectivity is not turnkey like competing devices. We have not yet terminated our site-to-site VPN because things are fluctuating right now and Check Point needs to be upgraded. Also, their troubleshooting needs to be improved for this."
What is our primary use case?
We have around 500 firewalls all around the world with a global team to manage them. We are using Check Point NGFW for Internet traffic, IPS, and UTM devices.
Atos provides this solution, including network design and advice.
What is most valuable?
- Antivirus
- IPS
- They got the logs into one site, which is wonderful.
- There is a secure action line code that you can announce your products in.
- If you have a number of sites, like a hundred sites around the world, you can deploy multiple VSX testing.
- All over the world, you can have DMZs in data centers, e.g., in the USA, Dubai, and London.
- It is easy to deploy and upgrade.
- Easy to manage, e.g., if there is a new engineer onsite, they can easily manage it.
What needs improvement?
In a VPN setup, we have Internet connection via Check Point. The connectivity is not turnkey like competing devices. We have not yet terminated our site-to-site VPN because things are fluctuating right now and Check Point needs to be upgraded. Also, their troubleshooting needs to be improved for this.
For how long have I used the solution?
I have been using it for five years.
What do I think about the stability of the solution?
I haven't seen any stability issues, though I have seen some issues with the management of the gateway. Stability-wise, it is good (a nine out of 10).
What do I think about the scalability of the solution?
We have 74 locations. We can have 10,000 users maximum via an Internet gateway. We have four data center across the world: two in USA, one in London, and one in Dubai. Passing through Check Point per location: in the USA - 5000 users, in London - 2000 users, and in Dubai - 10,000 users.
There are 12 network security engineers/consultants managing Check Point and the legacy firewall, SonicWall.
How are customer service and technical support?
Right now, we cannot go directly to Check Point because of vendor dependency. We have to first initiate with our vendor.
Which solution did I use previously and why did I switch?
We migrated SonicWall to Check Point about two years back. That took one year to set up in our organization.
We switched away from SonicWall because it is a legacy firewall at end of life. SonicWall was missing features that Check Point has, like UTM, IDS, IPS, antivirus, etc. Check Point is better for protection and performance-wise.
How was the initial setup?
It is easy to deploy or upgrade. There is no need to do this manually with commands. This solution can be set up online.
We have two devices. Right now, we are deploying and upgrading a new setup, where you can do management, management plus gateway on the device, or virtually you can install your management device on VMware or Hyper-V. With the Hyper-V and the Management Server, you can access all the gateways. For the Management Server and gateways, we have an activation key.
What about the implementation team?
We are an IBM OEM company who received installation support from that vendor. They provided all the network connectivity.
For our implementation, we:
- Started with an initial diagram of the configurations and what we want to see after the installation.
- Segregated the SonicWall and Check Point tools for the migration since we used automation.
- Checked the mode of installation. We went with transparent mode.
- Collected the IPs for the firewall. It required multiple IPs because with we have cluster nodes.
- Assessed the feasibility of Check Point in our environment.
For our strategy, we looked at:
- How many users are in all our offices? For example, is it a small office, mid-size office, or data center?
- Using high-end versus lower-end devices, e.g., lower-end devices means a smaller price tag.
A smaller office of less than 500 people would get a 4000 Series. Whereas, a larger office would get a 5600 or 7000 Series. We have to be focused on the natural topology.
What's my experience with pricing, setup cost, and licensing?
We have had some vulnerabilities when we upgraded the R80.30 Management Server. We have some gateways right now in our R77.30 version, and this means if we go without license in R80.30, then it will prompt a bad connection and terminate. We have had some license difficulties with the connection going from R70 to R80. However, these don't largely impact performance.
Which other solutions did I evaluate?
We looked at Fortinet and Palo Alto. We did not feel FortiGate was capable of what we required. Palo Alto is somehow not as good as Check Point, budget-wise and performance-wise. Palo Alto is more costly than Check Point.
If you need a good support or something that is good budget-wise, then I recommend going with Check Point compared to Cisco or Palo Alto.
What other advice do I have?
It is a good firewall. It has returned good performance. We are happy with the product. I would rate the product as a nine out of 10.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Reseller.
Network Security Engineer at Digitaltrack
Good analysis and integration with an easy deployment
Pros and Cons
- "It gets a regular zero-day signature update."
- "During my initial level implementation of check Point NGFW, I faced issues troubleshooting. The problem was with its command line."
What is our primary use case?
My company is an IT service provider. We suggest customers choose the Check Point next-generation firewall along with other OEMs for their environment. Once they choose (and confirm the product with model capabilities), we migrate the existing firewall to the new firewall.
I have deployed multiple Check Point products. Based on my experience and its effective features, I do suggest customers go with Check Point NGFW. I love its security profiles which effectively secure the organization's LAN, DC, and DMZ network.
How has it helped my organization?
The solution has improved organizations via:
1. Ease of deployment: We can easily implement and deploy the check Point NGFW.
2. Deep Inspection: It inspects traffic beyond just port number and IP address.
3. Threat Prevention: It has multiple security features and we can enable and integrate these features like IPS(Intrusion Prevention System), Anti-Bot Protection, and SandBoxing.
4. Organizations can enable Multi-Factor Authentication (MFA) in their network environment to verify their identity before they access the network. this feature keeps the integrity of the LAN network.
What is most valuable?
My favorite feature of Check Point NGFW is its "deep traffic inspection capability" due to the fact that:
1. It provides deep-level control over the network activity, allowing you to prioritize critical traffic first based on organization requirements.
2. It analyzes application behavior to detect suspicious activity.
3. We integrate with Sandbox technology to safely detonate and analyze zero-day threats.
4. It also blocks the application and prevents them from accessing the organization's LAN network.
5. It gets a regular zero-day signature update.
What needs improvement?
During my initial level implementation of check Point NGFW, I faced issues troubleshooting. The problem was with its command line.
Check Point runs on Linux and its command line is Linux-based. However, at the time, I was not familiar with Linux commands, and I invested lots of time in finding the Linux command and understanding the meaning, then went for troubleshooting.
It would be very helpful if the OEM provided all the Linux commands in a way that we could easily understand and follow the steps to configure or troubleshoot the issue using the command line.
For how long have I used the solution?
For the last year, I have been implementing and deploying Check Point NGFW in multiple client environments.
Its NAT automation and routing intelligence are excellent. We are not required to configure NAT rules separately; we can enable them while creating an object. We are also not required to configure reverse routing for LAN subnets.
What do I think about the stability of the solution?
At this time, Check Point NGFW is more stable than other options.
What do I think about the scalability of the solution?
The scalability is wonderful.
How are customer service and support?
Customer service and support are good. However, they can be enhanced.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We do not choose the solution. Rather, we provide multiple solutions to the customer.
How was the initial setup?
The solution is easy to implement.
What about the implementation team?
We are from the vendor side. We can help implement the solution.
What's my experience with pricing, setup cost, and licensing?
As of now, everything is good as per the market scenario.
Which other solutions did I evaluate?
We did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: My company is an IT service provider. So we implement, deploy, and migrate the NGFW in various customer environments.
Last updated: Jul 30, 2024
Flag as inappropriateBuyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
OPNsense
Cisco Secure Firewall
Sophos XG
Palo Alto Networks NG Firewalls
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Fortinet FortiGate-VM
Untangle NG Firewall
SonicWall NSa
Sophos XGS
KerioControl
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?