I use the solution in my company since the solution serves as a firewall and functions on a DMZ network while also providing public-facing services. I serve my company's customers as a firewall administrator.
RESIDENT ENGINEER at NetAssist (M) Sdn Bhd
A stable tool that offers high performance and requires an easy and straightforward maintenance process
Pros and Cons
- "The most valuable feature of the solution is the Quantum Intrusion Prevention System (IPS). I also like the solution's functionality, like autonomous threat prevention."
- "The complexity involved in the solution's initial setup phase and deployment process is an area of concern where improvement is required."
What is our primary use case?
How has it helped my organization?
My company's customers have benefited from the solution's performance, especially when dealing with a huge amount of traffic. Check Point is a well-known name in the security industry that opts for functionalities like signature-based detection and beyond.
What is most valuable?
The most valuable feature of the solution is the Quantum Intrusion Prevention System (IPS). I also like the solution's functionality, like autonomous threat prevention.
What needs improvement?
The complexity involved in the solution's initial setup phase and deployment process is an area of concern where improvement is required.
Buyer's Guide
Check Point NGFW
November 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Check Point NGFW for two years. I work as the solution's integrator. Speaking about the version, I use Check Point Quantum 6400 Next Generation Firewalls.
What do I think about the stability of the solution?
So far, I haven't faced any issues related to the solution's stability.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution a nine out of ten.
If I take into consideration my company's customers who use the solution, then I would have to say that there are around 300 to 400 users.
How are customer service and support?
I have availed the services provided by the solution's technical support. My company engages with the solution's local partner to avail the services provided by Check Point's technical support team.
Which solution did I use previously and why did I switch?
Compared to Palo Alto and Fortinet, Check Point provides good internal performance, especially for big-scale enterprises and entities, making it a tool that is not just suitable for SMEs or mid-sized companies. Check Point is, however, pricier than other solutions.
How was the initial setup?
The initial setup of Check Point NGFW is quite complex. When it comes to the product's setup phase, the engineer should understand the product, and instead of understanding the firewall, it is important to know how to manage or be an admin.
The solution is deployed on an on-premises model.
The solution's deployment is complex.
What was our ROI?
My company's customers have seen a return on investment from the use of Check Point NGFW.
What's my experience with pricing, setup cost, and licensing?
I rate the pricing of Check Point NGFW a five on a scale of one to ten, where one is high price, and ten is low price.
What other advice do I have?
I take care of the solution's maintenance part, and I feel that it is a straightforward process.
Check Point NGFW is good for big companies.
I rate the overall solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Nice portal, good security, and great dashboards
Pros and Cons
- "The solution is easy to administer thanks to its dashboards. The monitoring is really useful."
- "Currently, some prices are very expensive."
What is our primary use case?
We require local perimeter security in one of our workshops, which is why we require a new-generation firewall solution. The local equipment works for us to be able to provide perimeter security in our workshop.
Thanks to these Check Point Gateway devices and with the integration of many additional security solutions, we have protection against zero-day threats. In addition, we have the possibility of carrying out all the management from the Infinity security portal and can administer all our policies, view logs, and monitor devices, among other tasks.
How has it helped my organization?
Thanks to Check Point, we managed to carry out a better security implementation. By placing one in a workshop, we managed to solve issues with attacks and malware.
The solution is easy to administer thanks to its dashboards. The monitoring is really useful.
What is most valuable?
The most valuable aspects include:
What needs improvement?
The best improvements to be considered are:
- Improvements in the time and attention given to solutions for generated cases.
- Licensing that is more comfortable and affordable. Currently, some prices are very expensive.
- In terms of language in the application, they could better facilitate the handling of others.
For how long have I used the solution?
This is an excellent product of the new generation, administered in the Infinity Portal. We have used the product for at least two years.
Which solution did I use previously and why did I switch?
Previously, we had not carried out verifications of other devices.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Check Point NGFW
November 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
Modern threats, and is constantly updated, easy implement
Pros and Cons
- "There are several ways to implement it."
- "The tool is somewhat more expensive than its competitors."
What is our primary use case?
Check Point NGFW is a solid, up-to-date solution that helps protect the network infrastructure, resolving unauthorized access, attacks, and access to the infrastructure by cyber attackers.
We've been pleased to use Check Point's security tool.
To shield our perimeter, we decided to acquire a security manufacturer that would provide its gateway security applications both on-premise and in Microsoft Azure, for which Check Point, with its GW tool, fulfilled what was required to improve perimeter security.
How has it helped my organization?
Check Point NGFW gives us granular security with its intuitive policies, application control, monitoring, logs, and a wide range of blades that can be purchased and included in this tool, providing a more integrated and centralized security to improve infrastructure protection.
With this, we can use S2S VPNs to communicate with other sites. We can monitor and protect with Check Point.
There are several ways to implement it. In our case, we use an HA solution, a Check Point cluster that safely provides us with work continuity.
What is most valuable?
The characteristic that has caught our attention the most is its easy implementation in Microsoft Azure. Under a template, the tool can be provisioned with the best practices. Its licensing can be BYOL or PAYG through Microsoft Azure where it can be licensed on a monthly basis.
The different implementation options create wide variability for users.
This security tool is also up-to-date against the most modern threats, constantly being updated globally to provide intelligence accumulated by other devices worldwide to combat computer insecurity.
What needs improvement?
The tool is somewhat more expensive than its competitors. It could equalize the costs a little to be able to be more competitive.
On the other hand, Check Point documentation does not always help easy implementation for new users or amateurs in the security field.
Finally, the support must be improved. They need to improve times and schedules and solve both in local applications and in the cloud. Sometimes a solution is extended in the newest tools. Sometimes it is better to investigate one on your own than to wait for a Check Point solution.
For how long have I used the solution?
We have used this Check Point NGFW for about three consecutive years. We have improved the technical capacity of the staff to use it. It's an excellent tool.
Which solution did I use previously and why did I switch?
We used Cisco and Fortinet as tests. Check Point seems more robust.
What's my experience with pricing, setup cost, and licensing?
A Check Point vendor is necessary to be able to address licensing properly.
I'd recommend carefully validating the documentation and carrying out test environments before implementing NGFW solutions in production to see the pros and cons that are generated in your infrastructure.
Which other solutions did I evaluate?
We evaluated various options, including security upgrades, performance, and Gartner ratings, to make the decision.
What other advice do I have?
It is an expensive tool. It's very good and effective. If you have the option or facility to acquire it, I recommend you try it first and you will love it.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Security Officer at a tech services company with 1,001-5,000 employees
Detects malicious signatures, offers good log storage, and improved security posture
Pros and Cons
- "Log storage gives us insights when required."
- "Log queries are slow and take time to load."
What is our primary use case?
We are using Check Point Next-Generation Firewalls to protect and prevent our corporate network and infrastructure from attackers. We are using NGFWs to filter unwanted and malicious traffic from the internet. Check Point NGFWs provide Layer 7 or application layer monitoring and detection.
It is a stateless firewall which examines packets deeply and detects any malware or malicious URLs. It greatly protects our infrastructure by acting as a perimeter for our organization.
Moreover, it has log ingestion and deep packet analysis capabilities.
How has it helped my organization?
Check Point Next-Generation Firewalls improved the security posture of our organization by detecting, analyzing, and blocking unwanted traffic. It blocks any malicious files, processes and URLs due to having deep packet inspection and monitoring.
Check Point firewalls not only detects anything malicious against it's signatures rather it analyses and monitors all processes running on different machines to detect anything wrong and then block those processes or URLs.
Log storage gives us insights when required.
What is most valuable?
Deep packet inspection, Layer 7, and application layer monitoring and detection are the great features of Check Point Next-Generation Firewalls. They greatly improve and protect an organization, its staff, and its resources.
Check Point's SmartConsole is a great tool for admins as all firewalls can be centrally managed and all policies can be pushed as and when required by using SmartConsole. Log ingestion and threat hunting are also great functions in Check Point firewalls that enhances and improves a security posture.
What needs improvement?
The SmartConsole to manage Checkpoint Next Generation Firewalls takes a long time to load and gets stuck sometimes. It could be due to a lot of rules and policies defined on the firewalls. However, SmartConsole software needs to be improved by having some more functions to make an admin's life easier.
Log queries are slow and take time to load.
Query functions need to be improved and should be quick to give the required information.
There should be filters having drop-down options to use and select during log analysis.
For how long have I used the solution?
I have been using Check Point firewalls for more than two years.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Systems Engineer at HarborTech Mobility
Good interface, excellent GUI, and helpful integrations
Pros and Cons
- "Making configuring numerous layers of security policies easy to use was always one of the things I liked most about their firewall solution."
- "There is no email security."
What is our primary use case?
We've been using Check Point Firewalls for about nine years, from the early Nokia boxes to the most recent OpenServer architecture. Next year we're finally going to upgrade to an appliance directly from Check Point.
Check Point Next-Generation Firewall (NGFW) is a very good firewall. It is one of the best firewalls that I have used. I would rate Check Point Next-Generation Firewalls (NGFWs) a nine out of ten.
Also, Check Point has a great architecture, where you can just enable the software blades and deploy a secure service.
Overall, it provides ease of deployment and ease of use.
How has it helped my organization?
All in all, I'm delighted with their security solution. Making configuring numerous layers of security policies easy to use was always one of the things I liked most about their firewall solution.
You have multiple security layers that build upon each other, from the traditional security policy that is IP and port-based to application security, intrusion prevention, and their latest sandblast cloud-based malware detection. Everything is easily managed through their "SmartConsole" dashboard.
What is most valuable?
It's valuable as a next-level network security appliance for your enterprise.
It comes with advanced features like web filtering, app filtering, user-based policies to restrict web and application uses, tunneling, restricting bandwidth uses according to policy, load balancing, etc., and helps to cover almost all network security requirements.
Our IT team has installed a firewall on all of our company's workstations and laptops to keep our own data and our customer's data secure. This program runs in the background and I don't even notice it, but it keeps me secure at work.
What needs improvement?
Configuration using the command line is not that simple and user-friendly.
There is no email security.
It's a bit confusing to configure at first. An example is having to set up separate source and destination NAT rather than a simple static mapping. Some configurations require accessing multiple different sections rather than being consolidated in one area. License subscriptions are a bit confusing as well for additional features.
The CLI is not very useful.
There's no option to import bulk address objects.
The firewall default rule 0 blocks rule matches to allowed traffic, even though allow rule is written.
For how long have I used the solution?
I started using this solution in 2009.
What do I think about the stability of the solution?
I am very satisfied with this product.
What do I think about the scalability of the solution?
I have been using Check Point firewalls for a few years now and I enjoy the interface.
It also integrates great with our other security tools.
The GUI is much more user-friendly than other Firewall vendors.
Which solution did I use previously and why did I switch?
I use Check Point Next-Generation Firewalls since things are automated and updated frequently. I did not use a different solution.
What's my experience with pricing, setup cost, and licensing?
It's not the cheapest solution, however, it's one of the most advanced and competent.
Which other solutions did I evaluate?
I am not responsible for our manager's choice of this product. He said it's the best product to secure our network.
What other advice do I have?
Check Point licenses work very differently compared to other vendors. We need to purchase each blade in order to make it work, however, we can easily obtain a trial (evaluation) license from Check Point to get visibility for the blade. Check Point tries to maintain relationships with customers and they try to match their price with customer expectations.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technology at Partswerx
Very easy to use, setup and configure
Pros and Cons
- "The small business hardware device was powerful and easy to set up."
- "Including some sort of menu or grouping for VOIP would help the small business area that has limited support."
What is our primary use case?
We initially started using the Check Point device for the VPN blade.
After using the VPN blade for several months and using the hardware interface we found it very easy to use.
The small business hardware device was powerful and easy to set up. We started using the firewall and Nat shortly after that.
Having additional features like the threat prevention that has IPS antivirus antibot and threat emulation we're all added bonuses. This also gives us a piece of mind for the safety of our business.
How has it helped my organization?
Securing our organization was our main goal. Check Point, with threat prevention which includes IPS antivirus antibot and threat emulation has better secured our business from the internet.
With the auto-updates made simple and knowledgeable support personnel, it has freed up our time to focus on other IT strategies.
Utilizing the Check Point support team has allowed us to configure and use other money-saving features like VPN tunneling to remote offices, while still remaining secure in our systems.
What is most valuable?
Check Point VPN has been most valuable to our organization. Having a hardware solution that allows our remote users to connect securely to our business is extremely valuable.
The ease of use, setup and configuration backed by the knowledgeable support of Check Point has made this a smooth and easy setup. Our users can get connected securely, anywhere. When connected with our Check Point VPN endpoint, users get the same security and prevention from the threat prevention module as the rest of the devices on our network.
What needs improvement?
As a small business, IT expenditures are always a tough call and hard sell. With every business connected to the internet these days, firewalls and threat prevention are very important for any business of any size. Check Point's small business devices are a great fit for most any business. However, including some sort of menu or grouping for VOIP would help the small business area that has limited support. Check Point support is very knowledgeable and can also help in this area as they've helped our business evolve as well.
For how long have I used the solution?
I've been using the solution for 20 years.
What do I think about the stability of the solution?
The hardware units are solid. It is a stable solution. While you're subscription is active checkpoint fully supports your hardware and will replace if you have any uncorrectable issues. After 20 years, I've only had to do a hardware replacement once. Once setup, they just do what their supposed to do.
What do I think about the scalability of the solution?
The solution is very scalable. Configurations can be imported to other units. Many levels of hardware and software are available.
How are customer service and support?
Customer service has always been very knowledgeable about their products.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used to use Norton VPN. We switched due to the fact that we had issues with the system.
How was the initial setup?
The product offers a simple basic setup.
What about the implementation team?
We handled the implementation in-house.
What's my experience with pricing, setup cost, and licensing?
There are different levels of protection and yearly maintenance on offer.
Which other solutions did I evaluate?
We did not evaluate other options previously.
What other advice do I have?
The support is great.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Business Development Manager - Security at a computer software company with 201-500 employees
Excellent security solution that could be more user-friendly
Pros and Cons
- "Check Point offers excellent security."
- "Check Point is a bit difficult to use and manage so it would be nice to see some improvement in those areas."
What is most valuable?
Check Point offers excellent security.
What needs improvement?
Check Point is a bit difficult to use and manage so it would be nice to see some improvement in those areas.
What do I think about the stability of the solution?
This is a stable solution.
What do I think about the scalability of the solution?
This is a scalable solution. We have about twenty customers that are using the solution currently.
How are customer service and support?
I have not needed to contact support.
How was the initial setup?
The initial setup was a bit complex only because there are no vendors to help with the installation requiring you to need to be trained.
Which other solutions did I evaluate?
Other competitors would be Fortinet and Palo Alto.
Check Point is more complex than Fortinet and less complicated than Palo Alto.
What other advice do I have?
I would recommend this solution to anyone with an eye for security and would rate it a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Infrastructure Manager at trt18
Very good security especially where high bandwidth is needed
Pros and Cons
- "I use it as well as a VM. We use it a lot because we have all fiber optic connections, so we could use almost all of that. The federation is beautiful because I can transfer all traffic to my main site where I can use just one link to the internet, and I can use it as a proxy as well. It is good to keep control and security."
- "In terms of what could be improved, we have a cluster with two nodes and usually we have some problems when process gets really high and it has to choose which services it keeps going. I would like to have a better solution here, like if instead of just one we could use both at the same time. It would be good if it could work together. Then when one has a failure or something like that, the other one is there to transfer, to take all the services and keep working."
What is our primary use case?
I use the solution for VPN mostly, for the IDS and prevention and detection. I use it for security exploits, like HTTPS exploits.
I also use Check Point NGFW as a federation. I use it to connect to my other sites. We have five of them, mostly in cities where we need a high bandwidth.
What is most valuable?
I use it as well as a VM. We use it a lot because we have all fiber optic connections, so we could use almost all of that. The federation is beautiful because I can transfer all traffic to my main site where I can use just one link to the internet, and I can use it as a proxy as well. It is good to keep control and security.
What needs improvement?
In terms of what could be improved, we have a cluster with two nodes and usually we have some problems when process gets really high and it has to choose which services it keeps going. I would like to have a better solution here, like if instead of just one we could use both at the same time. It would be good if it could work together. Then when one has a failure or something like that, the other one is there to transfer, to take all the services and keep working. They have an integration between the nodes but I would like to use both of them working together. In the solution they could both be active, instead of active and passive. I would like them to add backup features to Check Point Firewall.
Many companies are going to the cloud. In future releases, it would be nice to have a cloud integration so we could work in a hybrid form for some years, like some services in the cloud and others on-premises. So it would be nice to have some features in this sense.
For how long have I used the solution?
I've been using Check Point NGFW since 2018. For two years now.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
I couldn't tell you about the scalability. I don't know. I know that we can use a federation, but I think it is scalable because we can buy additional licenses. As I mentioned, right now we have five working together, but we can buy until 50 or a 100, so I guess that it is scalable because you can keep increasing.
How was the initial setup?
The initial setup is hard. We came from another Cisco solution and even then it is hard, especially talking about the traffic. So we had to inspect the traffic and sometimes we had to do a lot of configurations. It would be nice if it was easier.
It took about three months to deploy.
It would be nice if it was easier to set up and to maintain.
What's my experience with pricing, setup cost, and licensing?
Right now we keep a contract with a company in Brazil, so we hardly talk to Check Point itself and we don't like it very much. In most cases we have to search and look into the database to really find the solution, so it could be better.
What other advice do I have?
I'd say that Check Point NGFW is a good product but it's hard to set up and keep it going, so we had to invest in some training and we have to keep at least two employees just to keep it working.
On a scale of one to ten, I would give Check Point NGFW an eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
OPNsense
Cisco Secure Firewall
Sophos XG
Meraki MX
Zscaler Internet Access
Palo Alto Networks NG Firewalls
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Sophos UTM
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?