We use it to provide security to our environment from the outside world. We are using it to provide security against vulnerabilities using threat prevention, Antivirus, and IPS.
IT Specialist at a tech services company with 10,001+ employees
Protects our environment with security checks against vulnerabilities
Pros and Cons
- "We like the centralized management for configuring multiple firewalls. It also gives us the Antivirus, threat prevention, and vulnerability tests. These four features protect the environment with security checks. Vulnerability tests allow us to configure changes that can protect the environment."
- "The Antivirus feature is something that could be improved. We don't get much from the Antivirus update in comparison to their competitor's firewalls. It needs to be more advanced because Check Point is nowadays sent all over the world. Therefore, the Antivirus feature should be of very good quality and cover all virus checks. I would also like the Antivirus updates to be more frequent."
What is our primary use case?
How has it helped my organization?
In advance, we get security vulnerabilities. So, we can configure new security policies, update our antivirus, or check the configuration to protect the environment.
What is most valuable?
We like the centralized management for configuring multiple firewalls. It also gives us the Antivirus, threat prevention, and vulnerability tests. These four features protect the environment with security checks. Vulnerability tests allow us to configure changes that can protect the environment.
What needs improvement?
The Antivirus feature is something that could be improved. We don't get much from the Antivirus update in comparison to their competitor's firewalls. It needs to be more advanced because Check Point is nowadays sent all over the world. Therefore, the Antivirus feature should be of very good quality and cover all virus checks. I would also like the Antivirus updates to be more frequent.
Buyer's Guide
Check Point NGFW
February 2025

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,737 professionals have used our research since 2012.
For how long have I used the solution?
I have been working with it for the last seven years.
What do I think about the stability of the solution?
It is a very stable firewall. The updates that we get from this Check Point Firewall are also very stable.
What do I think about the scalability of the solution?
The scalability is good.
There are more than 10,000 users. The Check Point Firewall is deployed through the company.
How are customer service and support?
All their technical people are very solid in their knowledge.
Which solution did I use previously and why did I switch?
I have used Cisco ASA and FTD. We switched from Cisco ASA to Check Point because there were no antivirus, vulnerabilities, or security prevention features. Check Point has more advance features, which are easier to use, than Cisco.
We also had to install IPS devices with Cisco.
How was the initial setup?
The initial setup was straightforward. It was not too difficult to deploy the Check Point firewall. Deployment takes between 12 to 15 months.
We have done a cloud-based deployment throughout our network.
What about the implementation team?
We did the deployment ourselves. We have onsite specialists who have done many deployments.
20 people take care of the deployment and troubleshooting of this firewall.
What was our ROI?
There is a money saving because we no longer require other devices, like an IPS, a separate antivirus, or vulnerability tests. We get all the devices within a single tool. Before, we would have different teams taking care of different devices. Now, we take care of only one device, which is another source of savings. We have saved a lot of money with this solution.
What's my experience with pricing, setup cost, and licensing?
The prices are good for its features. The benefit of its license is we get timely security prevention updates. The price is good for the technology that we get.
What other advice do I have?
This is a good solution. I would recommend to take advantage of as many features as you can. It has many features, and to protect security, you should use all the best features that you can.
As soon as the company will grow, we will definitely increase our usage of the firewall. We have already increased our usage due to employees working from home.
The biggest lesson that I learned is we can use the features of a firewall security to protect our environment. Also, rather than deploying multiple firewalls, we can configure a centralized management system, and this saves time.
I would rate this solution an eight out of 10.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Offer robust protection for networks and data
Pros and Cons
- "Check Point NGFW provides essential security, featuring no-obligation access for secure connections, strong intrusion prevention, and comprehensive antivirus protection."
- "One area for improvement in Check Point NGFW is the support process."
What is our primary use case?
In our logistics setup, we employ Check Point NGFW across various critical areas. For instance, we use it to secure different database applications within our systems, ensuring robust protection for our operations. Whether it is managing updates, maintaining standby reliability, or enhancing system performance, Check Point NGFW plays a vital role in safeguarding our logistics infrastructure.
How has it helped my organization?
Using Check Point in our system has provided several benefits. Firstly, it ensures secure access for authorized users while preventing unauthorized access from public users. Secondly, it enables us to monitor application usage closely, identifying any suspicious activity such as repeated failed login attempts.
What is most valuable?
Check Point NGFW provides essential security, featuring no-obligation access for secure connections, strong intrusion prevention, and comprehensive antivirus protection.
What needs improvement?
One area for improvement in Check Point NGFW is the support process. It can be challenging to open a technical support case through the customer portal, often requiring additional steps to open the case.
For how long have I used the solution?
I have been working with Check Point NGFW since 2015.
What do I think about the stability of the solution?
We have not experienced any major stability issues with Check Point NGFW.
What do I think about the scalability of the solution?
Check Point NGFW is fairly scalable.
How are customer service and support?
The technical support is decent. I would rate them as an eight out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
Setting up a new Check Point NGFW is generally straightforward for us. With our experience and familiarity with the process, we can handle it without encountering any significant issues. We are used to creating simulations and implementing improvements, which facilitates the setup process, even at an intermediary level. We usually require two engineers for the deployment process, along with additional resources like network switches, PCs, and testing equipment.
What's my experience with pricing, setup cost, and licensing?
The pricing for Check Point NGFW tends to be higher compared to other options in the market, especially for high-end models. In comparison with enterprise-grade firewalls like Palo Alto, Check Point is among the more expensive choices.
What other advice do I have?
My recommendation for organizations considering implementing Check Point NGFW is to prioritize selecting high-end models for optimal performance and security. Check Point NGFW offers robust protection for networks and data, allowing businesses to maintain their operations with confidence. Overall, I would rate Check Point NGFW as an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Buyer's Guide
Check Point NGFW
February 2025

Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
838,737 professionals have used our research since 2012.
Junior Cyber Security Analyst | CCSE | CCSA | CC at Security4IT
Good support, threat extraction, and analysis
Pros and Cons
- "I haven't had any data leaks or vulnerability situations."
- "It could be easier to manage the licenses on blades and contracts."
What is our primary use case?
I usually apply Check Point to protect my customer's environment as a main solution boundary gateway, DMZ gateway, LAN gateway, or VPN site-to-site with other Check Point appliances and other vendors. I do a Harmony Endpoint full integration. I use other tools such as threat prevention blades (like IPS and IDS), anti-virus, anti-bot, anti-malware, and the Sandblast solution.
How has it helped my organization?
I haven't had any data leaks or vulnerability situations. The NGFW has been working as it should! It's performing well and offers great security for me and my customers by protecting the environment. Administrators can easily follow and monitor security events, or the health status of the environment or appliance using Smarteview, SmartEvent, and the monitoring blade. We can look at CPU usage, disk space, and traffic and can see user history in real-time.
What is most valuable?
The threat extraction is the most valuable aspect. It protects the final user and prevents them from falling into the trap of infected files. When a file needs to be downloaded by a machine user, this solution analyzes the file at the same time to send to the user a clean version of this file. If not infected, the real version is available. The threat emulation can scan the computer applications searching for malicious activities and block them according to policy.
What needs improvement?
It could be easier to manage the licenses on blades and contracts. If you have a large environment it will take too much time for your team to verify if all the licenses and contracts are correct and work well. Although it is possible to manage licenses using SmartUpate and SmartConsole, if there are issues, you can only fix them using an expert shell. Simplifying the process would help simplify the daily tasks of administrators.
For how long have I used the solution?
I've been using the solution for two years.
How are customer service and support?
Technical support works well.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
NGFW is not a cheap solution, however, it does guarantee security. If the goal is to protect assets, using NGFW by Check Point helps immensely.
Which other solutions did I evaluate?
I use this in my company environment. I did not evaluate other options.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: I am security analyst and support my company environment and customer environment. I work with this solution daily.
Modern threats, and is constantly updated, easy implement
Pros and Cons
- "There are several ways to implement it."
- "The tool is somewhat more expensive than its competitors."
What is our primary use case?
Check Point NGFW is a solid, up-to-date solution that helps protect the network infrastructure, resolving unauthorized access, attacks, and access to the infrastructure by cyber attackers.
We've been pleased to use Check Point's security tool.
To shield our perimeter, we decided to acquire a security manufacturer that would provide its gateway security applications both on-premise and in Microsoft Azure, for which Check Point, with its GW tool, fulfilled what was required to improve perimeter security.
How has it helped my organization?
Check Point NGFW gives us granular security with its intuitive policies, application control, monitoring, logs, and a wide range of blades that can be purchased and included in this tool, providing a more integrated and centralized security to improve infrastructure protection.
With this, we can use S2S VPNs to communicate with other sites. We can monitor and protect with Check Point.
There are several ways to implement it. In our case, we use an HA solution, a Check Point cluster that safely provides us with work continuity.
What is most valuable?
The characteristic that has caught our attention the most is its easy implementation in Microsoft Azure. Under a template, the tool can be provisioned with the best practices. Its licensing can be BYOL or PAYG through Microsoft Azure where it can be licensed on a monthly basis.
The different implementation options create wide variability for users.
This security tool is also up-to-date against the most modern threats, constantly being updated globally to provide intelligence accumulated by other devices worldwide to combat computer insecurity.
What needs improvement?
The tool is somewhat more expensive than its competitors. It could equalize the costs a little to be able to be more competitive.
On the other hand, Check Point documentation does not always help easy implementation for new users or amateurs in the security field.
Finally, the support must be improved. They need to improve times and schedules and solve both in local applications and in the cloud. Sometimes a solution is extended in the newest tools. Sometimes it is better to investigate one on your own than to wait for a Check Point solution.
For how long have I used the solution?
We have used this Check Point NGFW for about three consecutive years. We have improved the technical capacity of the staff to use it. It's an excellent tool.
Which solution did I use previously and why did I switch?
We used Cisco and Fortinet as tests. Check Point seems more robust.
What's my experience with pricing, setup cost, and licensing?
A Check Point vendor is necessary to be able to address licensing properly.
I'd recommend carefully validating the documentation and carrying out test environments before implementing NGFW solutions in production to see the pros and cons that are generated in your infrastructure.
Which other solutions did I evaluate?
We evaluated various options, including security upgrades, performance, and Gartner ratings, to make the decision.
What other advice do I have?
It is an expensive tool. It's very good and effective. If you have the option or facility to acquire it, I recommend you try it first and you will love it.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Application Developer at Capegemini Consulting India Private Limited
Great for data and system security management and provides end-to-end resolution
Pros and Cons
- "It's scalable and provides end-to-end resolution."
- "Check Point NGFW Firewall requires frequent updates to build more user-friendly dashboards."
What is our primary use case?
Check Point NGFW proved to be highly scalable, secure, and stable, among other alternatives of multiple firewalls present in the market.
At an organizational level, the integration and implementation of Check Point NGFW took place on a priority basis due to data and system security concerns against malware and phishing attacks.
Check Point NGFW bifurcates, channels, and segregates the internal network and builds a secure VLAN, and separates it for every department.
Check Point NGFW is highly scalable and provides end-to-end resolution and customized productive service making Check Point NGFW more promising and user-friendly than its alternatives and services like navigation, control, and filtering ensure that all users stay connected to business applications and restrict traffic.
How has it helped my organization?
At the organizational level, the integration and implementation of Check Point NGFW took place on a priority basis based on our data and system security concerns about malware and phishing attacks.
What is most valuable?
Check Point NGFW bifurcates, channels, and segregates internal networks. It builds a secure VLAN and separates it for every department.
It's scalable and provides end-to-end resolution. It offers services like navigation, control, and filtering and ensures that all users stay connected to business applications while restricting traffic.
Check Point NGFW is great for data and system security management against malware and phishing attacks.
What needs improvement?
Check Point NGFW Firewall requires frequent updates to build more user-friendly dashboards. They need to begin the implementation of more active VPN support.
A few services of Check Point NGFW require immediate improvements, like the customer support portal and the ads management on the platform. These services need to be improved to help ensure mass adoption of Check Point NGFW.
Check Point NGFW Protects from all types of internal and external attacks, and it is easy to use.
For how long have I used the solution?
The integration of Check Point NGFW in my organization has taken about 1.5 years or so, and it's still going smoothly.
Which solution did I use previously and why did I switch?
I haven't gone through any other platforms or solutions. However, these platforms have become a key part of our organization & work management.
What's my experience with pricing, setup cost, and licensing?
Check Point NGFW is a highly scalable and secure solution that is user-friendly. It is up to the mark in terms of data and system security management. Potential users should just go for it.
Which other solutions did I evaluate?
I haven't personally evaluated other solutions via reviews from some software review websites.
What other advice do I have?
Go for Check Point NGFW. It's the best among market alternatives and is a must-have solution for professionals.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
President at NGA Consulting, Inc.
Easy to set up with great technical support and offers helpful reporting features
Pros and Cons
- "The event logs are relatively informative and can provide information on why traffic was accepted or rejected."
- "Geo-blocking would be very useful. There are too many attempts to infiltrate by non-country users. I can block access by IP address or IP network, however, a country-level blocking would be more useful and much quicker to implement."
What is our primary use case?
We use it as a firewall solution with built-in VPN capabilities, anti-virus, and malware detection. It has good blocking abilities and is easy to set up and maintain.
They allow VOIP traffic to pass through the firewall as well to onsite PBXes. The firewalls themselves are for SMB environments, with between five and 25 users at different sites and in different states.
Employees regularly work from home, so a VPN solution is a necessity to allow for remote file shares and or/remote desktop through a encrypted VPN tunnel.
How has it helped my organization?
With the added ability to have multiple VPN methods to connect, the solution has worked well for remote workers who are either utilizing the Check Point VPN client or the SSL VPN web client.
The throughput with full threat detection is adequate for the Internet circuit installed at most of the client locations and is in fact better than the previous firewall solution.
The support has been great whenever Check Point has been contacted. They help resolve an issue or explain how to perform some necessary action.
For the most part, the NGFW is easy to understand and set up and there are, of course, advanced options if a non-standard problem arises.
What is most valuable?
The reporting feature has been helpful to get a quick understanding of network traffic and threats identified. Even if a false positive is identified, it's been helpful to perform more of a deep dive into what triggered the detection and to certify that there is a problem or that there isn't a problem.
Anti-virus and anti-malware on the NGFW device have been pretty solid and have caught many threats before they entered the network.
The event logs are relatively informative and can provide information on why traffic was accepted or rejected.
What needs improvement?
Geo-blocking would be very useful. There are too many attempts to infiltrate by non-country users. I can block access by IP address or IP network, however, a country-level blocking would be more useful and much quicker to implement.
It would also be nice to have a smaller home user device that could automatically contact the main firewall and establish a VPN connection. This would be great for remote users to secure their work PC at home.
On the front page of the appliance, it lists current threats identified. It would be helpful if clicking on the threat took you to the exact logs instead of showing all host logs as you still have to scroll through the host logs to find the information you are looking for.
For how long have I used the solution?
I have been using Check Point since 2016. It's been a little over five years.
What do I think about the stability of the solution?
We've had very few issues; the builds themselves haven't had any issues.
What do I think about the scalability of the solution?
The solution is very scalable; Check Point has a variety of NGSW devices that can scale with the user base.
How are customer service and support?
Support is excellent, quick to respond, and quick to provide a resolution to any problem.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used Watchguard. We switched due to the threat protection and we felt that Check Point did a better job of providing protection.
How was the initial setup?
The initial setup is straightforward and plug and play for a basic configuration to get you started. You can then begin building the NAT and policy rules, which are easy enough to do.
What about the implementation team?
We implemented the solution in-house.
What was our ROI?
The malware blocking capabilities more than paid for the cost of the device and license.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to size their appliance correctly before purchasing it.
Which other solutions did I evaluate?
We did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Engineer at a manufacturing company with 10,001+ employees
Easy to troubleshoot with great log analytics and good security
Pros and Cons
- "The most valuable feature is the highly integrated NGFW features such as the IPS or Check Point Identity Awareness, which makes Check Point the best choice on the market."
- "For the next release, we would like to have better ruleset cleanup tools that are already included."
What is our primary use case?
Our network security is based heavily on Check Point products. We secure our Internet gateway with Check Point. We also secure our production and other very important systems and solution that are mission-critical with Check Point NGFW. For an extra layer of security, we heavily use Check Point Identity Awareness to make Client IP-based rules obsolete. We control the access via dedicated Active Directory Security to groups. These user groups are used instead of IP Client Subnet ranges, increasing our security.
How has it helped my organization?
The Check Point Management makes troubleshooting and log analytics very comfortable. Our Engineers only need a few seconds to see if a connection is dropped or allowed, et cetera. This makes fulfilling these standard tasks easy for the operation team. The easy ruleset management helps us not lose the overview over the Check Point Firewall (NGFW) rulesets in daily operation. Good security should always be simple and clean and this product helps to make our environment more secure against any attacks from the outside.
What is most valuable?
We are using the classic firewalling, the Intrusion Preventions System (IPS) and we also use Check Point Identity Awareness. The most useful feature is for sure the classic firewalling, however, we could get this feature also from other vendors. The most valuable feature is the highly integrated NGFW features such as the IPS or Check Point Identity Awareness, which makes Check Point the best choice on the market. They have been leading the market for 20 years. This is deserved, in our opinion.
What needs improvement?
Check Point, of course, has flaws. As a Check Point Engineer, you must also be a Junior Linux Engineer as many things are happening on the command line in daily operation and almost all the time during troubleshooting. This makes learning Check Point a little bit harder than other firewall brands. The licensing was always a pain and is still a pain to deal with.
For the next release, we would like to have better ruleset cleanup tools that are already included. It would make security management tools obsolete.
For how long have I used the solution?
We've used Check Point for almost ten years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr. Network Engineer at a tech services company with 51-200 employees
Saves a lot of manpower with its centralized management feature
Pros and Cons
- "It has various features, like Threat Prevention and Antivirus. It is easier to use and have knowledge of a single device rather than multiple devices/technologies when doing an installation. It is also easy to use because of having Antivirus and Threat Prevention features within the same firewall."
- "I would like the user interface to be more user-friendly. I want the UI to be easier to use than Check Point's competitors."
What is our primary use case?
We are using this solution for the security enhancement of our internal company network. This is to protect our customers as well as internal users from the untrusted network or outside world.
I am using the physical appliances of Check Point Firewall as well as virtual machines (VMs). We are using the same versions of R80 on our VMs that we are using for our physical appliances.
How has it helped my organization?
It saves a lot of manpower. If we have centralized management, then we do not require as many members on our team. So, this is a cost saving feature. If there wasn't centralized management, we would need 30 members instead of 11 members for our team.
What is most valuable?
The nicest feature is the centralized management of multiple firewalls. With the centralized management, we can easily use and operate multiple firewalls as well as create a diagram of them.
It has various features, like Threat Prevention and Antivirus. It is easier to use and have knowledge of a single device rather than multiple devices/technologies when doing an installation. It is also easy to use because of having Antivirus and Threat Prevention features within the same firewall.
What needs improvement?
I would like the user interface to be more user-friendly. I want the UI to be easier to use than Check Point's competitors.
For how long have I used the solution?
We have been using this technology for the last four years.
What do I think about the stability of the solution?
Check Point is the one of the most trusted vendors in the market. All the Checkpoint Firewall updates are very nice. We get the updates every months, and they are very stable updates.
What do I think about the scalability of the solution?
The solution is very scalable. It is easy to expand it, if required. and doesn't take too much time. It also doesn't require too much manpower.
There are 2000 to 4000 people who are indirectly using Check Point Firewall.
How are customer service and technical support?
It is always a good experience to work with their technical support. They are knowledgeable, always finding a solution. If we send them a bug, they fix it as soon as they can.
Which solution did I use previously and why did I switch?
I previously used Cisco ASA Firewalls for network security.
Check Point is more advanced in comparison to Cisco Firewall. It has many good features, like central management, Threat Prevention, and Antivirus included in one device. With Cisco, we didn't have that.
How was the initial setup?
The setup is straightforward, not complex; it was a simple setup. For the physical firewall, we just required a physical appliance, then we set it up according to our requirements. We had the complete setup guidelines. We used the three-tier hierarchy, which is standard and recommended for Check Point. We could also purchase service from Check Point to assist with the setup process. So, it was a good experience.
Our deployment took six to eight months.
What about the implementation team?
We didn't require Check Point's help during deployment. After deployment, we did require their help for critical cases.
What was our ROI?
This product provides a complete return on investment. It gives us the level of security that we expect and should have.
What's my experience with pricing, setup cost, and licensing?
The pricing and licensing part is something that could be improved. Check Point license and pricing are a bit higher compared to competing firewalls. I think they can work on that.
Which other solutions did I evaluate?
We didn't require an evaluation process. We knew that we had to go for Check Point.
What other advice do I have?
I would rate the solution an eight out of 10.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
OPNsense
Sophos XG
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Fortinet FortiGate-VM
SonicWall NSa
Untangle NG Firewall
Sophos XGS
KerioControl
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?