I use the NGFW as a Firewalling device, for VPN tunneling, and for virtual patching. My environment is a two-tier network environment. I also use the Check Point NGFW as an IPS.
Highly scalable and responsive with great VPN functionality
Pros and Cons
- "The firewalling feature and the VPN functionality are excellent."
- "The quality of the console should be improved in terms of aesthetics."
What is our primary use case?
How has it helped my organization?
It really has improved my organization in terms of protecting my network against intrusion and zero days. I have been able to explicitly configure the blocking of certain attack vectors using Check Point NGFW.
What is most valuable?
The firewalling feature and the VPN functionality are excellent. With the firewalling functionality, I have been able to ward off intrusion from outside the network. With the VPN functionality, I have been able to allow secure remote connections from external customers and staff.
What needs improvement?
CheckPoint would do good to add new features such as UEBA(User and Entity Behavior Analytics).
They should also improve on the effectiveness of their antivirus. It should be more effective than competitors.
Buyer's Guide
Check Point NGFW
December 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Check Point NGFW for five years.
What do I think about the stability of the solution?
The product is very stable with no crashing or configuration corruption.
What do I think about the scalability of the solution?
The solution is highly scalable and responsive.
How are customer service and support?
The vendor is very professional and has the know-how.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used to use the Cisco ASA 5500 series firewalling device.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
The product was implemented through a third-party vendor.
What was our ROI?
We saw an ROI within one year.
What's my experience with pricing, setup cost, and licensing?
It is very competitive relative to others on the market.
Which other solutions did I evaluate?
I was shown the POC and I fell in love with the fact that the Check Point NGFW has a GUI that allows for easy configuration. It also does firewalls very well. Therefore, I did not look at other options.
What other advice do I have?
It is an awesome product!
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
President at NGA Consulting, Inc.
Easy to set up with great technical support and offers helpful reporting features
Pros and Cons
- "The event logs are relatively informative and can provide information on why traffic was accepted or rejected."
- "Geo-blocking would be very useful. There are too many attempts to infiltrate by non-country users. I can block access by IP address or IP network, however, a country-level blocking would be more useful and much quicker to implement."
What is our primary use case?
We use it as a firewall solution with built-in VPN capabilities, anti-virus, and malware detection. It has good blocking abilities and is easy to set up and maintain.
They allow VOIP traffic to pass through the firewall as well to onsite PBXes. The firewalls themselves are for SMB environments, with between five and 25 users at different sites and in different states.
Employees regularly work from home, so a VPN solution is a necessity to allow for remote file shares and or/remote desktop through a encrypted VPN tunnel.
How has it helped my organization?
With the added ability to have multiple VPN methods to connect, the solution has worked well for remote workers who are either utilizing the Check Point VPN client or the SSL VPN web client.
The throughput with full threat detection is adequate for the Internet circuit installed at most of the client locations and is in fact better than the previous firewall solution.
The support has been great whenever Check Point has been contacted. They help resolve an issue or explain how to perform some necessary action.
For the most part, the NGFW is easy to understand and set up and there are, of course, advanced options if a non-standard problem arises.
What is most valuable?
The reporting feature has been helpful to get a quick understanding of network traffic and threats identified. Even if a false positive is identified, it's been helpful to perform more of a deep dive into what triggered the detection and to certify that there is a problem or that there isn't a problem.
Anti-virus and anti-malware on the NGFW device have been pretty solid and have caught many threats before they entered the network.
The event logs are relatively informative and can provide information on why traffic was accepted or rejected.
What needs improvement?
Geo-blocking would be very useful. There are too many attempts to infiltrate by non-country users. I can block access by IP address or IP network, however, a country-level blocking would be more useful and much quicker to implement.
It would also be nice to have a smaller home user device that could automatically contact the main firewall and establish a VPN connection. This would be great for remote users to secure their work PC at home.
On the front page of the appliance, it lists current threats identified. It would be helpful if clicking on the threat took you to the exact logs instead of showing all host logs as you still have to scroll through the host logs to find the information you are looking for.
For how long have I used the solution?
I have been using Check Point since 2016. It's been a little over five years.
What do I think about the stability of the solution?
We've had very few issues; the builds themselves haven't had any issues.
What do I think about the scalability of the solution?
The solution is very scalable; Check Point has a variety of NGSW devices that can scale with the user base.
How are customer service and support?
Support is excellent, quick to respond, and quick to provide a resolution to any problem.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used Watchguard. We switched due to the threat protection and we felt that Check Point did a better job of providing protection.
How was the initial setup?
The initial setup is straightforward and plug and play for a basic configuration to get you started. You can then begin building the NAT and policy rules, which are easy enough to do.
What about the implementation team?
We implemented the solution in-house.
What was our ROI?
The malware blocking capabilities more than paid for the cost of the device and license.
What's my experience with pricing, setup cost, and licensing?
I'd advise users to size their appliance correctly before purchasing it.
Which other solutions did I evaluate?
We did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point NGFW
December 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
Engineer at a manufacturing company with 10,001+ employees
Easy to troubleshoot with great log analytics and good security
Pros and Cons
- "The most valuable feature is the highly integrated NGFW features such as the IPS or Check Point Identity Awareness, which makes Check Point the best choice on the market."
- "For the next release, we would like to have better ruleset cleanup tools that are already included."
What is our primary use case?
Our network security is based heavily on Check Point products. We secure our Internet gateway with Check Point. We also secure our production and other very important systems and solution that are mission-critical with Check Point NGFW. For an extra layer of security, we heavily use Check Point Identity Awareness to make Client IP-based rules obsolete. We control the access via dedicated Active Directory Security to groups. These user groups are used instead of IP Client Subnet ranges, increasing our security.
How has it helped my organization?
The Check Point Management makes troubleshooting and log analytics very comfortable. Our Engineers only need a few seconds to see if a connection is dropped or allowed, et cetera. This makes fulfilling these standard tasks easy for the operation team. The easy ruleset management helps us not lose the overview over the Check Point Firewall (NGFW) rulesets in daily operation. Good security should always be simple and clean and this product helps to make our environment more secure against any attacks from the outside.
What is most valuable?
We are using the classic firewalling, the Intrusion Preventions System (IPS) and we also use Check Point Identity Awareness. The most useful feature is for sure the classic firewalling, however, we could get this feature also from other vendors. The most valuable feature is the highly integrated NGFW features such as the IPS or Check Point Identity Awareness, which makes Check Point the best choice on the market. They have been leading the market for 20 years. This is deserved, in our opinion.
What needs improvement?
Check Point, of course, has flaws. As a Check Point Engineer, you must also be a Junior Linux Engineer as many things are happening on the command line in daily operation and almost all the time during troubleshooting. This makes learning Check Point a little bit harder than other firewall brands. The licensing was always a pain and is still a pain to deal with.
For the next release, we would like to have better ruleset cleanup tools that are already included. It would make security management tools obsolete.
For how long have I used the solution?
We've used Check Point for almost ten years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Linux Administrator at Cartrack
Simple to scale with a nice management interface and good technical support
Pros and Cons
- "Many problems have been solved with these firewalls and we've largely been very satisfied."
- "The predefined reports are few and it would be nice to increase them since the logs are excellent."
What is our primary use case?
Check Point's Next Generation Firewall has definitely improved our organization as we previously used a Linux firewall and we have had to manually configure internet control measures. When it comes to configuring firewall policies it was time-consuming. This has been taken care of by Check Point's Next Generation firewall. Even the integration to the Active Directory has been made to be seamless and requires a minimum effort from our security and network administrators. The technologies that are in place are amazing. For example, the Threat Extraction and Threat Emulation technologies. The Sandbox technology, or Threat Cloud, is world-class.
How has it helped my organization?
The remote access blade functionality is really valuable as we now need to just install the client on the user's machines and the client can be preconfigured with the site details. This makes our lives very simple. The logging of the firewall is also phenomenal as it is very granular and very easy to filter.
The Application control blade is another valuable feature as we now only need to create a rule to be applied and to specify the applicable application which is categorized. The ability to configure dynamic objects, for example, Microsoft Office 365, is also a valuable feature.
The reports are very detailed and the variety is amazing. It caters to everything and is even more that what we had bargained for. They are also customizable, which makes them extremely valuable to us.
Another great feature is the ability to publish corporate applications in a secure web environment.
What is most valuable?
Many problems have been solved with these firewalls and we've largely been very satisfied. Thanks to this infrastructure that we have managed, in this pandemic time, to quickly and effectively offer the potential to remotely work for everyone has been good.
Also important is the separate management interface that has made it possible to carry out even the most operations while comfortably seated at the desk. It provides multiple profiles that you can apply depending on the scenario that presents itself.
What needs improvement?
It takes a while to install the rules so that if you make a mistake you can only fix it after a few minutes. There's no problem with traffic processing.
Sometimes you are forced to interact on several levels: on the one hand, you put in the rules, and on the other, you put in the route. The predefined reports are few and it would be nice to increase them since the logs are excellent.
In my work experience, I have been able to use multiple firewall platforms. There are only two valid ones for me and one of them is definitely Check Point. The others charge less but there is a reason for that. It is a good idea to think carefully before rather than after you suffer from a serious attack.
For how long have I used the solution?
We have been using the solution for three years now.
What do I think about the stability of the solution?
For me, the solution has been stable. Perhaps running it on a small scale helps.
What do I think about the scalability of the solution?
I like the fact that it's so simple to scale.
How are customer service and technical support?
I find the support to be very prompt. They go the extra mile to assist and are thorough in their troubleshooting.
Which solution did I use previously and why did I switch?
I did not use a different solution, however, I came to know about this product while I was working for a company called Syrex.
How was the initial setup?
It was set up for us by a company I used to work for.
What about the implementation team?
It was through a vendor, and they were very good and did it on time as they promised.
What was our ROI?
A stable and fully functioning solution has enabled us to focus on other aspects of growing the business.
Which other solutions did I evaluate?
I looked at Fortigate, and it was not as clearly defined, and easy to follow as Check Point is.
What other advice do I have?
Check Point does cost a lot, but for me, it's worth the money I paid.
Some of the products are easier to deploy. For example, the Harmony products are simpler as they have a per user/per device pricing model.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Firewall Engineer at a logistics company with 1,001-5,000 employees
Scalable, stable, and configurable
Pros and Cons
- "Check Point helps a lot with automatization which definitely reduces the effort to maintain the environment."
- "The policy installation length is still too long. It was promised that the time would be severely reduced in newer versions, but it is still too long."
What is our primary use case?
We use Check Point Gateways for securing our data centers including DMZ networks as well as gateways for our branch offices around the world. They are connected via MPLS, internet, or site-to-site VPNs depending on the branch connectivity.
A minimum standard for the whole environment is the NGFW. Firewall rules according to our security policy. VPN for site-to-site tunnels to our own gateways or to partners and customers. IPS is set primarily to prevent, and for some signatures to detect.
Application Control is still in the early stages.
How has it helped my organization?
Firewalling is one of Check Point's core business attributes, and it just works.
Creating site-to-site VPNs between Check Point Gateways that are within the same management is unbelievably easy. If you create VPNs for 3rd parties and there are mismatches or issues, you will see logs that help pinpoint issues or misconfiguration.
Application control help with identifying applications and therefore makes firewall rules easier since changing ports don't have to be adapted every time an application changes or updates.
What is most valuable?
Generally speaking, all features are well documented and the two platforms help with configuration. Documentation and knowledgebase articles in the user center as well as user recommendation within the forums are great. The Admin Guides are really well documented, but it's a lot to read.
Check Point helps a lot with automatization which definitely reduces the effort to maintain the environment. The best example would be the CDT tool which helps with decreasing the amount of time for upgrading whole environments.
What needs improvement?
The policy installation length is still too long. It was promised that the time would be severely reduced in newer versions, but it is still too long. R81 promises at least parallel policy installations, which help in larger environments.
Check Point's advantage (to be able to configure everything) is also a disadvantage. The environment is quite complex. Troubleshooting is not always easy as there are a lot of possible debugs that can be taken, and the support will not always send the right or necessary debugs. Some debugs also can cause a heavy load, so you have to keep an eye on what you troubleshoot.
For how long have I used the solution?
Our company has used Check Point for well over 10 years.
What do I think about the stability of the solution?
If it's running, it's stable. New setups have to be tested though.
What do I think about the scalability of the solution?
The solution can be scaled from very small branch offices to huge data centers or even cloud data centers.
How are customer service and technical support?
Support depends on how well you describe the issue and send information. Sometimes escalation is necessary.
How was the initial setup?
The more features (blades) are turned on, the more complex the environment becomes. If something goes wrong, you have to rule out several issues (hardware, blades, et cetera).
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Subgerente de Tecnologías de la Información at ETAPA EP
Good VPN and access control features, and it's stable,
Pros and Cons
- "The configuration is one of the best features of this product."
- "The only reasons we are looking at other solutions are price and integration."
What is our primary use case?
We use Check Point for VPN access for all employees, as a rule. We also used it as a filter, a firewall, and it's the front line of our access to the Internet.
It has VPN access for our employees and it controls access, barring intrusion for non-authorized access.
What is most valuable?
The URL filter is activated to filter access to our employees. We use filtering for VPN access.
The configuration is one of the best features of this product.
When this product was purchased approximately 12 years ago it was the top of the line.
The product has been working very well.
I don't have any issues with the software of this solution. It works as is expected.
What needs improvement?
I would like to see more integration with other infrastructures. We are considering Cisco because it is more integrated, and the network limits of the solution are better.
Recently, we experience a problem with the hardware because it was too old, it was blocked. The hardware failed, but the software did not. With older hardware, it is a problem because our network is growing every year. The solution is not at maximum performance.
It does not have the performance that we require. The network is not the same as it was 12 years ago. There are several logs.
We are looking for a cheaper product that is more integrated than our Cisco Network appliance.
It may also need to support other types of architecture.
The only reasons we are looking at other solutions are price and integration.
For how long have I used the solution?
Check Point was installed in the company approximately 12 years ago.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
We are a company with 1,200 employees, and approximately 700 are using this solution.
How was the initial setup?
We have five HP Servers, and we have a cluster in different geographic locations.
Check Point has been installed in an HP-certified server. It is not an appliance, it is an HP Server.
We have one or two professionals who work on the platform.
What's my experience with pricing, setup cost, and licensing?
It is not a cheap solution, which is why we are looking for another one.
Which other solutions did I evaluate?
We are currently evaluating new firewall solutions because the Check Point that we have was installed approximately 12 years ago, and wanted to change to a next-generation firewall.
What other advice do I have?
The HP Server works fine without any maintenance, but it needs to be taken care of. We did not, which caused a disk to fail. We have one or maybe two that are working. I don't have any complaints about the HP Server. It was sized for that network load at that time.
I would rate Check Point a ten out of ten. It works as expected.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Security Engineer at R Systems
Supports dynamic objects and provides effective antivirus
Pros and Cons
- "The Next Generation Firewalls, the 64000 and 44000 series, provide us with support for large data centers and telco environments. They're quite reliable and provide great performance."
- "The area where Check Point can improve is the antivirus, as it only provides a small number of updates for it. Updates should be more frequent."
What is our primary use case?
The Next Generation Firewalls, the 64000 and 44000 series, provide us with support for large data centers and telco environments. They're quite reliable and provide great performance.
How has it helped my organization?
There are a lot of features which help us in providing a more secure environment for our organization, such as when we have Active-Active.
What is most valuable?
The most valuable feature is that the scalable 64000 Next Generation Firewalls are designed to excel in large data centers and the telco environment as well. We have a lot of these types of customers, and these Check Point firewalls support them.
In addition
- it supports dynamic objects, which we use for security purposes
- the antivirus is quite effective
- the logging and tracking are quite easy
- overall, it is easy to use.
What needs improvement?
The area where Check Point can improve is the antivirus, as it only provides a small number of updates for it. Updates should be more frequent.
In addition, the certification process is quite expensive. It should be a little cheaper so that everyone can be trained and certified and have better knowledge of Check Point's products.
For how long have I used the solution?
I have been using Check Point's firewalls for more than a year. My responsibilities include implementing changes on the firewalls and troubleshooting.
What do I think about the stability of the solution?
They're quite stable and quite good. Management is simple because we can implement a lot of changes on the firewalls through the central manager.
What do I think about the scalability of the solution?
They're quite scalable because they support large data centers, while offering reliability and performances as well.
How was the initial setup?
The initial setup is quite easy. You don't need much training for it. Deployment takes around one week.
We have different stages in the setup process and we follow all the stages. We have to give structure to the plan, outline what we need to do. That goes to our manager, our senior experts, for approval. Then we implement the changes after their approval. Once the changes are implemented, we have our team leaders who validate whether everything is good and as expected or not. Then we close it. This is the basic strategy we follow in our organization.
About 500 to 600 employees work on Check Point firewalls in our organization and they have different roles. For example, I handle network and security admin. There are also security associates, consultants, and analysts.
What's my experience with pricing, setup cost, and licensing?
The pricing of Check Point's firewalls is good. It is not that expensive.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
System Architekt at a insurance company with 1,001-5,000 employees
Prevents users from accessing things on the Internet that they are not supposed to access
Pros and Cons
- "The firewall feature and DDoS Protector, when turned on, keep away attacks from the outside. They also prevent users from accessing things on the Internet that they are not supposed to access."
- "It depends whether the problem is known to Check Point. If they are aware there is a problem, quite often it will then depend on which tech you finally land on if it's easier or harder to get to the root cause. The last issue was in India so that was pretty bad. It's easier if you get directly through to Tel Aviv or Ottawa, but you can't choose. Once they know what the issue is, it's pretty good. It pretty much depends on the engineer that you get. There are pretty good engineers and there are many engineers who are at just the starter level at Check Point who are not really into the stuff. Sometimes it's hard, sometimes it's easy, depending on the problem and the tech engineer you get."
What is our primary use case?
We use it as a normal firewall for perimeter security, using some of the Next Generation features, like Anti-Bot and Antivirus.
We have two ISPs. We have a different firewall system in front of the Check Point Firewall. We also have normal Cisco switches combined with the Check Point solution. Then, our internal network is with Cisco, which is about 300 servers and 1,500 clients.
How has it helped my organization?
Since we are an insurance company, the solution is a necessity.
Two-thirds of our employees are working at home at the moment, so we use the VPN feature more than we used to. Of those two-thirds, only 100 or 200 are using the remote client from Check Point. The other employees are using other technologies, like NetScaler from Citrix.
What is most valuable?
We use the basic firewall functionality, plus the VPN functionality, a lot.
We have about 100 remote sites, which is where we use the VPN functionality. For private lines, we prefer to do further private encryption on the line. It is very convenient to do it with Check Point, if you have Check Point on both sides. It is convenient and easy to monitor.
The firewall feature and DDoS Protector, when turned on, keep away attacks from the outside. They also prevent users from accessing things on the Internet that they are not supposed to access.
What needs improvement?
The Threat Emulation definitely needs improvement. A couple of years ago, we did a comparison with other companies, e.g., Lastline, offering threat emulation and threat detection functionalities, and Check Point was lacking.
For how long have I used the solution?
I have been using Check Point for 22 to 23 years. I have been using Check Point NGFW for 15 years, since 2005.
What do I think about the stability of the solution?
We used to have more problems. For the past five years, unless we have had a bug, which happens like once a year, it has been pretty stable. We did have a bug for the last three months, which has just been fixed. Before that we had another two or three major bugs. However, when there is a bug and it's not known to Check Point, they need quite a while to get it fixed. If they have a fix already, then there is a pretty quick turnaround to get it fixed.
There are three people working on firewalls, but not at 100 percent. We have the equivalent of one person doing firewalls 100 percent of the time using three people.
What do I think about the scalability of the solution?
For our requirements, it's scalable enough. We have a 1 gig uplink to the Internet, which is easily doable with open servers.
We used to have some problems with the performance, then we upgraded the license and the scalability has worked well since.
There are 1,200 to 1,500 users.
How are customer service and technical support?
It depends whether the problem is known to Check Point. If they are aware there is a problem, quite often it will then depend on which tech you finally land on if it's easier or harder to get to the root cause. The last issue was in India so that was pretty bad. It's easier if you get directly through to Tel Aviv or Ottawa, but you can't choose. Once they know what the issue is, it's pretty good. It pretty much depends on the engineer that you get. There are pretty good engineers and there are many engineers who are at just the starter level at Check Point who are not really into the stuff. Sometimes it's hard, sometimes it's easy, depending on the problem and the tech engineer you get.
To the next manager, it's pretty easy to escalate an issue, if needed. Though, it depends on the manager.
Our current sales staff isn't too good. Though, the one before was pretty good. So, you can escalate on that process well. As an escalation path, it works most of the time.
How was the initial setup?
Once you do it for over 20 years, it is straightforward. If you have done it a couple of times, then you know what to do. However, even if you are a beginner, Check Point is more straightforward than Palo Alto or something like that. Once you get the idea of how a firewall works, Check Point does it that way.
There is a central location where we deploy upgrades, which normally take one business day since we have several clusters there.
When deploying the solution to remote locations, we have several models to choose from.
What about the implementation team?
When we tried Threat Emulation, we have received professional services from Check Point. However, for the normal setup, we don't involve any professional services.
What was our ROI?
It is like insurance for us.
What's my experience with pricing, setup cost, and licensing?
The pricing and licensing are pretty steep. They know that they are good, so they are pricey.
Which other solutions did I evaluate?
We are also using Forcepoint, which is a little bit different on the OS and focused more on IPS/IDS. It is a good practice to combine two different firewall vendors in case one of them gets hacked.
We also evaluated Palo Alto, like five years ago, but that doesn't make much sense for us.
What other advice do I have?
Since we are trying to get our customers to do more self-service, we should see more inbound traffic. So, the usage will increase in the next two years.
We get more attacks from the outside these days, so it has become more important to use systems like Check Point. When I started with security 25 years ago, it was still something not everybody was aware they needed. Today, it's common sense that everybody needs to protect their perimeter.
Plan first, implement last. You should first be aware of what assets you want to protect and what are your traffic patterns. You should plan your policy and network topology ahead of time, then start to implement a firewall. If you just place it there without any plan of what it's supposed to do, it doesn't make too much sense. I think planning is 80 percent of the implementation.
I would rate this solution as an eight out of 10. It would be better if the support was quicker in the cases we had. Apart from that, we are happy with the functionality.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
OPNsense
Cisco Secure Firewall
Sophos XG
Palo Alto Networks NG Firewalls
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
SonicWall NSa
Sophos XGS
KerioControl
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?