Try our new research platform with insights from 80,000+ expert users
IT Manager at a tech services company with 5,001-10,000 employees
User
Great for threat prevention, offers features on the cloud, and has useful logs
Pros and Cons
  • "Being able to access almost everything in one location manage all your gateways and get all your logs is great."
  • "Sometimes debugging is a hassle."

What is our primary use case?

I planned to block traffic from foreign countries, however, Check Point does not have the intelligence to determine VPN connections from foreign countries coming through the local VPN.

I also wish Check Point could be more effective by collaborating with Microsoft to establish a different connection for Outlook cellphones or devices not on the domain. I wish to hide my devices like cellphones only allowing them to connect via capsule, however, it applies to all devices. It works well.

How has it helped my organization?

It is an excellent, easy-to-acquire system to protect midsize businesses with up to 100+ users that require a security solution that can scale across corporate networks and give us protections against GenV cyberattacks as the business grows. 

What I recommend the most is its central administration. With the smart controller, you can manage all your firewalls from one location. 

Being able to access almost everything in one location manage all your gateways and get all your logs is great. For me, it's the best feature to work with.

What is most valuable?

The solution is great for cyber attack prevention, data bridges, and other threats. You need intelligent and effective solutions to minimize cyber attacks and Check Point gave me peace in December when they had an unidentified log4j vulnerability.

Our main benefit was the elimination of a server/VM from our data center and the usage of a cloud solution.

Having all the features on the cloud was also a benefit since some products when migrated to cloud solutions lose some features  - but not his one.

The setup is a little bit rough and requires some technical expertise, however, this is expected with a solution as complete as a firewall and especially a Check Point one.

What needs improvement?

Sometimes debugging is a hassle. We've had issues with VPN debugging in the past. In the more recent versions, later than R80.10, this seems not to be an issue anymore. 

This year we tried to debug performance issues of the gateways, which was cumbersome. When we finally found the performance bottleneck, it was a licensing issue. 

Check Point uses CPU-based licensing for OpenServer, and buying more licenses helped. However, this is the reason we're upgrading to Check Point appliances next year, as OpenServer becomes pricier every year, and Check Point pushes their customers to use their appliances.

Buyer's Guide
Check Point NGFW
November 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for three years.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Logical Security Deputy Manager - IT at a financial services firm with 1,001-5,000 employees
Real User
Robust and reliable with good fault tolerance
Pros and Cons
  • "The way in which it manages the nodes within a cluster architecture is excellent, offering fault tolerance which is, in my experience, practically imperceptible when one of the nodes fails."
  • "It should allow more than two internet providers in its configuration of "ISP Redundancy"."

What is our primary use case?

We use Check Point firewalls as perimeter firewalls which are restricting the organization's incoming and outgoing traffic and taking advantage of the redundancy capacity of internet providers, which provides fault tolerance when an internet provider has a fault. 

In addition, we use it for the publication of services and with an event viewer that allows us to view alerts about behavior and unusual traffic inside and outside the network. URL filtering and application control are perfect complements to the packet filtering that it offers as a firewall solution.

How has it helped my organization?

Check Point offers a reliable firewall solution with VPN options that have allowed us to establish secure and stable connections with other companies and users in a very simple way.

Simple and centralized administration has allowed us to manage all the firewall nodes from a single console, facilitating the deployment of firewalls through the network, since a large part of the configurations and access rules, as well as the protection controls, are managed from a single console and via centralized maintenance.

What is most valuable?

Check Point is a robust and reliable security solution, whose architecture and design allow centralized administration with a graphical interface that facilitates its management. 

The way in which it manages the nodes within a cluster architecture is excellent, offering fault tolerance which is, in my experience, practically imperceptible when one of the nodes fails. This is thanks to the fact that it maintains a table of shared connections between the nodes and the large number of variables that it takes into consideration to validate the health of the nodes.

What needs improvement?

As a firewall, Check Point is a great solution and in my experience, there is little that I could indicate how to improve.

That said, a point where it could improve is in the redundancy of the ISP. It should allow more than two internet providers in its configuration of "ISP Redundancy". This redundancy could be managed from variables such as the automatic calculation of the load level between internet lines or load distribution between internet lines in periods of pre-established hours, etc. All could be handled from the same graphical interface.

For how long have I used the solution?

I have been using Check Point for more than 11 years.

What do I think about the stability of the solution?

Its stability is one of the selling points. It allows us to have great confidence in Check Point solutions.

What do I think about the scalability of the solution?

The performance is excellent in the new appliances. The solution is very scalable and easy to integrate.

How are customer service and technical support?

They have a good response time and their personnel have a good technical mastery.

Which solution did I use previously and why did I switch?

I was using ASA, however, we switched to Check Point as it offered a centralized interface for managing all nodes in addition to having an excellent graphical interface that facilitates day-to-day operational activities.

How was the initial setup?

The initial configuration is very simple and intuitive. Check Point offers a graphical configuration interface that makes the process simple and it is complete in just a few steps.

What about the implementation team?

The provider we have used has highly qualified staff and offers excellent and professional services.

What's my experience with pricing, setup cost, and licensing?

It has an acceptable cost considering the stability and the benefits that Check Point solutions offer.

Which other solutions did I evaluate?

We did not really look at other options. We are very confident with Check Point solutions and we take the stability it offers very seriously.

What other advice do I have?

You must consider Check Point as your first NGFW option. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point NGFW
November 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
Solutions Architect Infrastructure and Security Manager at Jumbo Electronics Co. Ltd. LLC.
Reseller
Top 5Leaderboard
Stable and secure, but not user-friendly in terms of implementation
Pros and Cons
  • "Check Point is awesome from a security standpoint. Based on our experience and also the experience of the other customers, it is a very stable appliance."
  • "It should be user-friendly from an implementation point of view. Its setup is a little bit difficult."

What is our primary use case?

We use a remote access VPN, and this is a perimeter firewall for our data center to secure our servers and internal applications. We are using model G-6600.

What is most valuable?

Check Point is awesome from a security standpoint. Based on our experience and also the experience of the other customers, it is a very stable appliance.

What needs improvement?

It should be user-friendly from an implementation point of view. Its setup is a little bit difficult.

For how long have I used the solution?

I have been using this solution for four years.

What do I think about the stability of the solution?

From a security standpoint, it is very stable, and I would rate it a nine out of 10. I don't have any issues with it.

What do I think about the scalability of the solution?

At present, we have 30 for our distribution. So, it is pretty scalable.

How are customer service and technical support?

Their support is good. Their L1 and L2 support across the globe is great. L3 support is with the Israel team, and they have the right competency to troubleshoot it. Sometimes, when something needs to be done in the software in detail, we need to wait for people to come online from Israel. I would rate their L3 support a six out of 10 because we need to wait for the team from Israel to come online.

How was the initial setup?

It is a little difficult to set up. We need a really skillful engineer to manage it. After we have onboarded it correctly, it is very easy to manage, and it is very secure. Initially, we had some challenges and issues, and when we got the right resource and support from the vendor, they all got resolved. It took four or five days.

It should be user-friendly from an implementation point of view. I would rate it a six out of 10 in terms of implementation.

What other advice do I have?

I would recommend this solution. From a security standpoint, Check Point is the best product, but a customer should have the right skillsets to onboard and manage this.

I've been working with multiple customers in India, and I don't see any specific features that they need. It has covered pretty much everything.

Overall, I would rate it a seven out of 10.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1633176 - PeerSpot reviewer
Senior Infrastructure Technical Lead at a financial services firm with 10,001+ employees
User
Great management console and operations support but they need to focus on its overall robustness
Pros and Cons
  • "The ability to split single hardware into multiple virtuals along with support for dynamic routing using BGP is very useful for our environment."
  • "I would like less CPU-intensive features to be introduced to replace the existing heavy-duty processes."

What is our primary use case?

We primarily use the solution for perimeter security - including DMZ and as an internet firewall. We use Check Point Firewalls as the first line of defense from the internet and they are also used to segregate the internet, DMZ, and internal networks. Check Point VSX technology is used to split the hardware into multiple virtual firewalls to cater to different environments so they are well segregated. We have BGP running on the firewalls, such as all of our network devices in our environment, to learn and advertise routes. Check Point does a decent job with BGP and does an excellent job as a perimeter firewall.

How has it helped my organization?

Check Point was brought into our environment as a perimeter security device to replace the Juniper NetScreen which was originally used as the perimeter firewall. When Juniper announced the end of life of NetScreen devices, we decided to go with Check Point mainly because of the ease of management and also because Check Point was an Industry leader and Juniper was still in the initial stages of building their own firewalls using JunOS. With the introduction of Check Point with the VSX features, we could use BGP instead of the tedious static routes that we had in place with the old NetScreen.

What is most valuable?

The VSX has been great. The ability to split single hardware into multiple virtuals along with support for dynamic routing using BGP is very useful for our environment.

We like the management console. The Check Point smart dashboard has made things easier for administration and we've been able to manage all the Check Point devices from one place which is very useful.

The operations support is great. There is a smart log system that is very good for troubleshooting and reporting. We also use the CLI for troubleshooting purposes (for the likes of FWMonitor and tcpdump) while the FW rules are managed via the smart console which does wonders for operations support.

What needs improvement?

It is common for any network device to compromise on stability when more and more features are packed into it. It may work for small organizations when they want a single device to do everything for security. However, it is a big issue for us as a large financial institution when even a small outage costs dearly. Check Point, being our perimeter firewall, has failed quite a few times mainly when handling BGP. I would like less CPU-intensive features to be introduced to replace the existing heavy-duty processes. They may already have a lot of features, so the enhancement of existing features could focus on robustness rather than introducing new features.

For how long have I used the solution?

I've been using the solution for three years.

What do I think about the stability of the solution?

With the upgrade to R80, the solution has become more stable. We have had outages because of the gateways failure while running BGP with older versions. After the upgrade, we havent had such outages.

What do I think about the scalability of the solution?

With the latest upgrades of R80, Check Point has bettered its performance, and hence, scalability has improved a lot. Also, there are multiple NG features that can be utilized that makes it more suitable for multiple solutions.

How are customer service and technical support?

They offer very good customer support; they're always available and capable.

Which solution did I use previously and why did I switch?

We previously used NetScreen and they were at their end of life.

How was the initial setup?

Check Point has its own design that is a little complex compared to other products. This has a 3-tier architecture and we need management servers and gateways separate. I would still say its not much of a hassle building it.

What about the implementation team?

We handled everything through Check Point PS. They were very good.

What was our ROI?

I can't really comment, as I do not have much idea about this space.

What's my experience with pricing, setup cost, and licensing?

The solution is priced well in the market in order to compete with the other products.

Which other solutions did I evaluate?

I wasn't in the organization when the evaluation happened. However, I know Juniper SRX was one of the solutions looked at as we are using them for our internal firewalls.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Technology consultant at a tech services company with 501-1,000 employees
Real User
Easy to configure and upgrade, helpful support, and it performs well
Pros and Cons
  • "The software upgrade procedure is very easy; it just needs few clicks & we are done."
  • "One of the most complicated aspects is the VPN Configuration, which should be simplified in future releases."

What is our primary use case?

We deployed a Check Point firewall on the perimeter as well as on the internal network. Both are in HA & we have enabled all threat prevention blades. All devices are 5600 & 4200. We are managing our two firewalls with two different security management servers.

Currently, we are using the R80.20 firmware version and we have a pretty simple design.

Our primary uses are firewall security, VPN, web filtering & monitoring. We have also used the TE-100X appliance for private cloud sandboxing.

How has it helped my organization?

With Check Point, we achieved redundancy but the problem was three public IP addresses that were required to be configured as HA, with two physical IPs & one virtual IP.

Our previous firewall used a single public IP but now, with Check Point using three, it became very difficult for us to make available the same segment of public IP addresses from our ISP. After many support calls, however, we found a solution.

The other option which is helpful is that there are no limits for any objects used in the policy. Our previous firewall does support limited time objects & IP address objects.

What is most valuable?

Check Point's new Smart dashboard has an all-in-one configuration interface. They provide a very easy configuration for NAT and one tick for source & destination NAT is possible.

Policies can be configured in a more organized way using a section & layered approach.

Application control has all of the required application data to introduce it into policy and the URL filtering works great, although creating regular expressions is complicated.

The software upgrade procedure is very easy; it just needs few clicks & we are done.

What needs improvement?

Check Point has both GUI (Graphical Interface) & smart dashboard, but it will be better if it sticks to either one of them. 

A threat prevention policy needs to be created in a different tab but instead, if those policies could be related to access policy then it will be easier to apply the threat prevention to our relevant traffic.

One of the most complicated aspects is the VPN Configuration, which should be simplified in future releases. The monitor tab should have a VPN tab, where we can see the current tunnel status.

For how long have I used the solution?

I have been using Check Point NGFW for more than the last three years.

What do I think about the stability of the solution?

With respect to stability, we always have ongoing support calls. We have faced lots of issues that have led to upgrading with a Hotfix.

What do I think about the scalability of the solution?

When it comes to scalability, our current Check Point is far better than our previous firewall.

How are customer service and technical support?

Technical support is very helpful & always there to help us with issues. Also, the TAC response is quick.

Which solution did I use previously and why did I switch?

Previously, we had a Fortinet firewall, which was pretty slow when it came to operations.

How was the initial setup?

The initial setup was simple.

What about the implementation team?

We implemented the firewalls with our in-house team.

What's my experience with pricing, setup cost, and licensing?

Check Point should provide some basic license for mobile access VPN by default, for at least five to ten users.

Which other solutions did I evaluate?

The only other vendor that we have evaluated is Fortinet.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Head Of Technical Operations at Boylesports
Real User
Easy to manage, eliminates having to remove old hardware, and has multiple capabilities in a single box
Pros and Cons
  • "The best feature is the ability to increase the capacity of the solution by exactly what you add, not losing anything for High Availability."
  • "One of the biggest disappointments is the GUI."

What is our primary use case?

This is a complex high availability solution growing by over 100% per year. The complexity of the business environment made the ability to increase capacity without having to remove previous hardware much easier.

We have a large online presence with users needing realtor access to our environment. 

How has it helped my organization?

The improvements to our business are easy to explain. It is faster, easy to use, and there are multiple capabilities all in one box. The best examples are the endpoint and anti-virus options.

The ability to add more firewalls and increase the capabilities, rather than remove the hardware, is an exceptional step forward. No competitor was able to compete with this. Not having to continually replace hardware year after year was a massive driver in the decision-making process. The throughput going up by 100% with each added device is exceptional.

What is most valuable?

There are many features we have found good.

The best feature is the ability to increase the capacity of the solution by exactly what you add, not losing anything for High Availability. This feature alone will save us as we increase the number of devices in the stack.

Having so many top-end products in one box also assists in managing this device. URL filtering and anti-virus and other services are easy to deploy but assist in getting your company a good name.

The Infinity product seems amazing but we have a long way to go before saying it is successful.

What needs improvement?

One of the biggest disappointments is the GUI. I felt it was a little bit more clunky than some competitors. The screens don't flow as easily as they should. Improving user experience will further elevate this product.

The way the management console operates is not user-friendly, either. It needs to become less intrusive. The user experience is not as high as it should be due to the problems with the user interface. The newer products in the range seem to address my concerns, which I have had for even the older products.

For how long have I used the solution?

I have been using Check Point NGFW for six months.

Which other solutions did I evaluate?

Having leading-class firewalls with massive growth possibilities made the purchasing decision much easier. Having carried out a few PoCs, the obvious decision was the Check Point solution of Maestro and 6500s in a high availability environment.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Mohit Shah - PeerSpot reviewer
Network Security Engineer at Digitaltrack
User
Top 10
Helps prevents phishing, ransomware, and zero-day attacks
Pros and Cons
  • "The thing I like about this product is its capability of auto NAT and auto zone detection."
  • "Service support can be improved."

What is our primary use case?

The primary use case of this solution is to protect the organization's LAN network from cyber threats.

How has it helped my organization?

With the help of Check Point NGFW, we are able to prevent attacks like phishing, ransomware, zero-day attacks, malware, etc.

What is most valuable?

The thing I like about this product is its capability of auto NAT and auto zone detection.

What needs improvement?

Service support can be improved.

For how long have I used the solution?

I've been using the solution for the last year. 

What do I think about the stability of the solution?

The stability is the best.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and support?

Customer service and support can be improved.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

No, I did not use a different solution. 

How was the initial setup?

The initial setup is easy.

What about the implementation team?

We implemented it through our in-house team.

What's my experience with pricing, setup cost, and licensing?

For the current market situation setup cost, pricing, and licensing look fine.

Which other solutions did I evaluate?

No, I did not evaluate other options.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS
Reseller
Top 5Leaderboard
Helps prevent attacks, good central management, and improves visibility
Pros and Cons
  • "One of the valuable characteristics of Check Point NGFW is that it presents very centralized management."
  • "Support cases have been generated several times, and it takes time for the case to be resolved."

What is our primary use case?

We brought all of our cloud platforms to Microsoft Azure. We needed a tool that would give us the security of regulating access control so that we could monitor our environment in case something was penetrating our internal network.

This was the primary movement for which the Check Point NGFW tool was acquired since we needed our collaborators to have secure access to the company's resources and applications since this tool provides us with the alerts and corrections that must be made when finding a security breach in our environment.

Check Point NGFW also provides a great capacity of features that help us apply them to the organization. It has web filtering limited to third parties, SSL encryption, and the application's administration is very simple and centralized since it helps us a lot in reporting and generating alerts.

How has it helped my organization?

The organization needed a tool that would provide various security functionalities in the organization, and so far, Check Point NGFW has helped us a lot. It has helped us by applying access control policies and limiting access to third parties and only those who must enter the organization to use resources and applications.

The application behaved very well with the Azure resources in the cloud; it helped us to prevent several security holes found with web filtering and internal DDoS attack.

Check Point NGFW can quickly identify where the attacks are coming from, provides detailed and complete information on the attacks, and provides zero-day attacks in real-time.

What is most valuable?

One of the valuable characteristics of Check Point NGFW is that it presents very centralized management. Due to this, it's improved our security throughout the organization and outside of it. Many collaborators work from their homes or different places and help us filter, limit of access to packet inspection with flexibility and speed that was not previously possible.

Other characteristics are the records that it shows us and generates depending on its configuration and they are very visible to be able to attack and correct in time, or when superiors ask us for administrative information in that part it provides great value.

What needs improvement?

As such, the tool provides what is expected in its security functionality. However, some points must be improved, such as the latency in the GUI entry. It takes a while to register and allow access to the administrative panel.

Another point where customer service should be improved, both in the administrative and technical fields. Support cases have been generated several times, and it takes time for the case to be resolved. In addition to that, the solutions need to attend to us. It takes a long time to coordinate a call since they do not handle a comprehensive schedule.

For how long have I used the solution?

This solution has been used for approximately one year in the company.

What do I think about the stability of the solution?

The stability of the tool is good. We have not presented any problem even when an update is made.

What do I think about the scalability of the solution?

The scalability presented by the tool is very good and flexible.

How are customer service and support?

The experience has not been very good. That is one of the points that must be improved.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

There was no type of tool that would supply these qualities.

How was the initial setup?

The configuration of the tool is very simple and quick to install.

What about the implementation team?

The installation was done jointly with an engineer provided by the supplier, and his capacity was good.

What was our ROI?

The prices are competitive. However, it is worth making an investment since, in the future, the profit will be seen against any environmental attack.

What's my experience with pricing, setup cost, and licensing?

Check Point manages a good cost in its products and it is worth making the investment since this can prevent a collapse in the organization.

Which other solutions did I evaluate?

Check Point was always our first option. With this type of solution, many security teams are from Check Point.

What other advice do I have?

The tool behaves well. The only improvement that I have seen that is necessary is to improve the latency when entering the application and they must improve the support.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros sharing their opinions.