What is our primary use case?
We use this product for providing perimeter security, as well as advanced threat protection capabilities to critical infrastructure. The solution is expected to deliver high-performance throughput for voluminous traffic continuously.
We are using these gateways for multiple functionalities such as:
- Perimeter Gateways
- Anti - APT (Advanced Persistent Threat)
- Anti Malware / Anti Virus
- SSL Inspection
- Network Intrusion Prevention System
- Private Threat Cloud
All of our solutions are expected to run in high availability and have good resiliency.
How has it helped my organization?
Check Point NGFW is the first perimeter security solution used in our environment and it is able to deliver the expected results. Specifically, it supports high-performance throughput for voluminous traffic.
The vendor has proven capability of identifying known threats, which can be seen while managing the firewall. The OEM has identified a roadmap in line with the emerging threat landscape and evolves the product to counter these threats.
The central management console has helped with segregation, where planned interventions with management consoles do not have any impact on production or critical business traffic.
What is most valuable?
Next-Generation Threat Prevention capabilities provide security in a high-traffic load, ensuring detection and prevention of known threats by AME, AV, and Sandblast technologies.
We are also using the system to create VPN gateways for our multiple partners and we haven't faced any issues with them.
Check Point gateways are a stable product that can run without any issues until a major upgrade or vulnerability mitigation is required.
The support has been reasonable and they were able to minimize the impact during critical incidents.
What needs improvement?
There is a scope of improvement in detecting zero-day threats using the SandBlast technology, by introducing emulation of Linux-based operating systems. We have also observed issues while using the products with SSL decryption.
There is room for improvement in application-based filtering, as with other firewalls available in the market today. Check Point has improved its application filtering capabilities in the recent past and their latest version, R80, is more capable but still, creating an application-based filter policy is a little cumbersome.
For how long have I used the solution?
We have been using the Check Point NGFW for the past four years.
What do I think about the stability of the solution?
This solution is very much stable and does not require frequent changes in architecture. The patch frequency is limited, which reduces the downtime requirements.
What do I think about the scalability of the solution?
This NGFW is very much scalable; however, I am not sure about other components such as PTC, etc.
How are customer service and technical support?
Technical support is a mixed experience. Most of the time, issues are handled well in a timely manner but some issues have lingered for a very long time, causing multiple iterations.
Which solution did I use previously and why did I switch?
We did not use another similar solution prior to this one.
How was the initial setup?
As we use a lot of components from Check Point, the setup was a little complex in terms of deployment and traffic handling.
What about the implementation team?
We had assistance from the vendor's professional services team to ensure smooth deployment. It was a green field project so the deployment was easy. The team deployed on implementation had expertise with the solution.
What was our ROI?
The ROI for security is the confidence that the solution is able to deliver the expected outcome. This includes stability, Threat Prevention capabilities, Granular policies, etc.
What's my experience with pricing, setup cost, and licensing?
Licensing is pretty straightforward and is based on the blades available, such as NGFW, NGTP, and NGTX. Generally speaking, the pricing is in line with other players in the industry.
Which other solutions did I evaluate?
We evaluated products by Fortinet and Palo Alto.
What other advice do I have?
In summary, this is a good solution that is stable, and I recommend it.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.