What is our primary use case?
We brought all of our cloud platforms to Microsoft Azure. We needed a tool that would give us the security of regulating access control so that we could monitor our environment in case something was penetrating our internal network.
This was the primary movement for which the Check Point NGFW tool was acquired since we needed our collaborators to have secure access to the company's resources and applications since this tool provides us with the alerts and corrections that must be made when finding a security breach in our environment.
Check Point NGFW also provides a great capacity of features that help us apply them to the organization. It has web filtering limited to third parties, SSL encryption, and the application's administration is very simple and centralized since it helps us a lot in reporting and generating alerts.
How has it helped my organization?
The organization needed a tool that would provide various security functionalities in the organization, and so far, Check Point NGFW has helped us a lot. It has helped us by applying access control policies and limiting access to third parties and only those who must enter the organization to use resources and applications.
The application behaved very well with the Azure resources in the cloud; it helped us to prevent several security holes found with web filtering and internal DDoS attack.
Check Point NGFW can quickly identify where the attacks are coming from, provides detailed and complete information on the attacks, and provides zero-day attacks in real-time.
What is most valuable?
One of the valuable characteristics of Check Point NGFW is that it presents very centralized management. Due to this, it's improved our security throughout the organization and outside of it. Many collaborators work from their homes or different places and help us filter, limit of access to packet inspection with flexibility and speed that was not previously possible.
Other characteristics are the records that it shows us and generates depending on its configuration and they are very visible to be able to attack and correct in time, or when superiors ask us for administrative information in that part it provides great value.
What needs improvement?
As such, the tool provides what is expected in its security functionality. However, some points must be improved, such as the latency in the GUI entry. It takes a while to register and allow access to the administrative panel.
Another point where customer service should be improved, both in the administrative and technical fields. Support cases have been generated several times, and it takes time for the case to be resolved. In addition to that, the solutions need to attend to us. It takes a long time to coordinate a call since they do not handle a comprehensive schedule.
For how long have I used the solution?
This solution has been used for approximately one year in the company.
What do I think about the stability of the solution?
The stability of the tool is good. We have not presented any problem even when an update is made.
What do I think about the scalability of the solution?
The scalability presented by the tool is very good and flexible.
How are customer service and support?
The experience has not been very good. That is one of the points that must be improved.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
There was no type of tool that would supply these qualities.
How was the initial setup?
The configuration of the tool is very simple and quick to install.
What about the implementation team?
The installation was done jointly with an engineer provided by the supplier, and his capacity was good.
What was our ROI?
The prices are competitive. However, it is worth making an investment since, in the future, the profit will be seen against any environmental attack.
What's my experience with pricing, setup cost, and licensing?
Check Point manages a good cost in its products and it is worth making the investment since this can prevent a collapse in the organization.
Which other solutions did I evaluate?
Check Point was always our first option. With this type of solution, many security teams are from Check Point.
What other advice do I have?
The tool behaves well. The only improvement that I have seen that is necessary is to improve the latency when entering the application and they must improve the support.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.