I do not use them, I just sell them, but customers are using them to protect on the edge and at the core.
Senior Client Executive at a tech vendor with 10,001+ employees
Powerful firewall for advanced security with robust support
Pros and Cons
- "Check Point's support is probably the best of the major players in that space."
- "Check Point's capabilities are limited from a firewall perspective."
What is our primary use case?
What is most valuable?
It brings value to their clients as everybody is concerned with security. Firewalls are the first line of defense. Check Point's support is probably the best of the major players in that space. Check Point is more complex than the other players, but it is also more powerful.
What needs improvement?
A lot of the other players have a more robust best-of-suite offering versus the best-of-breed offering. Check Point's capabilities are limited from a firewall perspective. Other players are acquiring companies and offering add-ons like CASB or VPN-type capabilities.
For how long have I used the solution?
I have had experience with Check Point Next Generation Firewall for seven or eight years.
Buyer's Guide
Check Point NGFW
December 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
What do I think about the stability of the solution?
Their code is a little bit finicky as of late, but that's just because they just released this product line.
What do I think about the scalability of the solution?
It depends on what you're deploying. Maestro is more scalable than standalone firewalls.
How are customer service and support?
The support depends on what support model you buy. Customers that have dedicated support teams get more attention than the traditional support, however, a lot of other companies are offshoring their support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Cisco is not a true security company, but Check Point is where they grew up, so I think they are a little more mature.
How was the initial setup?
The initial setup depends on the environment and can take weeks. It is not different than the rest of the players in terms of maintenance.
What about the implementation team?
It's basic engineers, usually one to two people.
What was our ROI?
It is pretty difficult to determine ROI with firewalls because they are more of an insurance policy. However, it helps with security. The cost of a breach versus having some of these measures in place is the real comparison.
What's my experience with pricing, setup cost, and licensing?
There is a lot of price parity between all the players. Everybody is within plus or minus ten percent. Check Point is probably more expensive than some of the other players out there, but it is incremental.
Which other solutions did I evaluate?
I evaluated Palo Alto and Fortinet.
What other advice do I have?
I would recommend Check Point Next Generation Firewall to others. I would put them in the upper echelon.
I'd rate the solution nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Oct 30, 2024
Flag as inappropriateSystems Engineer at a tech services company with 11-50 employees
Management is handy, easy to implement and good oversight of our rule set
Pros and Cons
- "The management is very handy and intuitive, and it has a lot of features."
- "Check Point could offer a cloud-managed approach similar to that of Cisco Meraki."
What is our primary use case?
It's just enterprise firewalls, firewall clusters for redundancy to secure the company network from the internet, and as well as a data center firewall, for example, if you want to split up subnets to control traffic between them.
What is most valuable?
The management is very handy and intuitive, and it has a lot of features. I think it's one of the products in this market which has the most possibilities.
I saw some other firewall vendors or firewall solutions from other vendors. And maybe I like it because I'm very familiar with Check Point and the management of the Check Point gateways. So, probably, I'm just not aware of how other solutions work and how to use them.
We also see or have a lot of customers with Palo Alto. That's also a solution we see a lot, but we have been a Check Point partner for more than seven or eight years since the beginning of our company. We have done a lot of research on firewall solutions.
In our opinion, it's one of the best because the management is very handy. So it's easy to implement every possible configuration, and you have a good oversight of your rule set.
If I compare it with Cisco Meraki, for example, if the rules grow, then it's very hard to get oversight or to have oversight over the whole rule set. So then it becomes hard to manage.
With Check Point, it's easy because even when you have 200 or more rules, it's still very user-friendly, and you can still quickly manage your whole rule set.
What needs improvement?
What I like about Meraki is the whole cloud-managed feature, where it can configure gateways in the cloud and preconfigure it as well. So I don't need to have access to the device or create a configuration in the cloud.
And as soon as the firewall comes online connected to the internet, then it downloads its configuration from the cloud. I think Check Point does also have such a solution, but I'm not aware that it's as easy as Cisco Meraki. Sometimes it would be nice if they would have the same possibilities.
For how long have I used the solution?
I have been using it for about five years now.
What do I think about the stability of the solution?
I have not yet faced any challenges with performance or stability. Sometimes when we implement core firewalls, there are applications that have longer session timeouts than the Check Point firewalls in the default settings.
Windows has a default session timeout for about two hours, I think, and Check Point's is one hour. So, it's not a performance issue, but the application will not run as well as before the security gateway analyzes and blocks traffic. So, it depends.
What do I think about the scalability of the solution?
Scalability is a very good point of Check Point's solution. They can scale very well and very large.
How are customer service and support?
The technical support is also very well and specific. It's very useful to have technical support from Check Point.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have experience with Nutanix Flow. It's also possible to enable training in Nutanix Flow where you can redirect the traffic to Check Point gateways. I think that's a very useful feature if you need layer seven traffic analysis and blocks. But I don't have any customers, or we don't have any customers, who use chaining. We also don't have any customers who use a micro-segmentation solution from Check Point. So, I'm not aware if they have a comparable solution like Flow.
How was the initial setup?
For the initial setup, you need a good knowledge of the operating system, Gaia OS. It needs some knowledge to get started, but if you've done it once, then it's easygoing.
Normally, we check the customer's requirements. Then we start to deploy the gateway and start with a basic rule set so the customer is able to refine it for their needs. If we are in charge of creating a complete rule set, we will bring all the requirements into a concept and then create a rule set in a more suitable way.
Some customers have very basic requirements. If it's just to deploy the gateways, then it's very easy and quick. You just need maybe a few days and a maintenance window outside of business hours. But there are also customers who have a lot more requirements, like scanning or analyzing the traffic for subnets inside of the network.
For example, a core firewall can be very time-consuming. You need to do a lot more research and concepts or write concepts on how to achieve that. That can take a few months.
For maintenance, you need to know what you do. It can be difficult if you don't know what you want to achieve. If you are not aware of network security, then probably it's not that easy, and you may run into configuration errors or mistakes. It's easy to manage, but you have to know what you do.
What's my experience with pricing, setup cost, and licensing?
Check Point is not the cheapest vendor in the market, but it has everything you need compared to other solutions. So that's probably the main reason for the cost or the prices. I think it's probably on the same level as Palo Alto.
What other advice do I have?
I would recommend Check Point to other users who are looking into implementing it.
I would advise others to compare or write down their requirements and have a look to see if Check Point is able to fulfill all the requirements.
Overall, I would rate it a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Aug 1, 2024
Flag as inappropriateBuyer's Guide
Check Point NGFW
December 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
823,875 professionals have used our research since 2012.
Network Security Engineer at DMS Electronics (Pvt) Ltd
Offers features like WatchTower that helps you manage the device using a mobile and stable product
Pros and Cons
- "The IPS protection is the most useful feature that I found from Check Point."
- "The setup is a little complex compared to its competitors."
What is our primary use case?
Primarily, it's used for customers who want to add their network security.
What is most valuable?
The IPS protection is the most useful feature that I found from Check Point. It has a feature called WatchTower, which helps you manage the device using a mobile. That's the most used feature.
Other than that, it's quite simple. All the other features are what you find in all other firewalls. So the best feature that I find from Check Point is WatchTower.
What needs improvement?
The setup is a little complex compared to its competitors. That's what makes it stand out. Other than that, it could always be done by another product, but they have a lot of IoT products. This is definitely something like a Check Point Quantum device.
For how long have I used the solution?
I have been using it for two years. The version I use is R8x series. I'm not exactly sure, but it's the latest version.
What do I think about the stability of the solution?
It is a stable product.
What do I think about the scalability of the solution?
It is a very scalable solution.
How are customer service and support?
The customer service and support have been good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used Sophos XG. We (my company) still use Sophos, Check Point, and FortiGate. We use all three firewalls in our environment.
Check Point has a really good feature where they give us a subscription for IoT device protection, which other vendors don't have. Sophos, I don't think they have it.
Fortinet charges for it separately, so that's an additional cost, but with Check Point, the feature is built in. It's not an additional license.
Moreover, Check Point has started promoting a lot. It's well known here in our region.
How was the initial setup?
The initial setup is complex. It's pretty easy to maintain.
We deployed it for customers. So maybe if we do a big deployment, it could be difficult.
What's my experience with pricing, setup cost, and licensing?
The pricing is reasonable compared to the features that you get.
What other advice do I have?
I highly recommend it to users who have a lot of IoT devices.
It all comes down to one simple thing:
"If you have IoT devices, I highly recommend Check Point NGFW. If you don't, it's a bit complex compared to Fortinet and Sophos."
But once you get the hang of it, you can quite easily configure the device.
Moreover, Check Point has a certification program if you want, and you can learn with that. They also have a separate certification program that you can take, a paid certification program.
I am satisfied with the documentation by Check Point.
Overall, I would rate the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: May 18, 2024
Flag as inappropriateSenior Technical Consultant at CDW
Improves environments, has helpful support, and offer great compute power
Pros and Cons
- "The Check Point appliances are considered NGFW devices and can process both the ASA and FTD requirements on a single instance, removing the requirement for an expansion SSD module and/or additional hardware."
- "We'd like an option that can convert other vendors' NGFW configurations to supported Check Point NGFW config for ease of migration."
What is our primary use case?
The customer purchased Check Point 6200 Firewalls to replace their aging Cisco ASA firewalls on the perimeter of their sites. The Cisco Firewalls must be replaced due to insufficient capacity.
It is envisioned that the initial migration will be a direct replica of the ASA configuration, with the client expanding the solution post-migration, with Check Point NGFW features.
This project consisted of the following deliverables:
• Rule base is migrated like for like, in which ASA Firewall zone-based rules will be converted to Check Point Parent/Child layered rules.
• Firewall zones to be imported and reviewed post migration by client.
• NAT rules will be migrated “as-is”.
• Geo-location rules from FTD will be honored and mapped into Check Point.
• Client-based blacklisting will be migrated into the solution, using external feeds via URL.
• A single IPS profile consisting of a clone of the vendor's “out-of-box” balanced profile (optimized).
• 1X site-to-site VPN.
• Integration into Client’s Cisco ISE solution for RADIUS-based admin authentication.
• NGFW licensing and blades to be installed on firewall devices, to allow features to be enabled in the future and expand the solution.
How has it helped my organization?
The Client wishes for the ASA firewalls to be replaced with a Check Point systems solution, which consists of 6200 Plus Appliances.
The initial requirement was to migrate the configuration in an “as-is” state, with the necessary licensing purchased and installed to enable expansion of the solution with next-generation feature sets in the future.
The solution was able to meet and exceed the client's requirements thereby improving the client's environment.
The management server is software-based.
Firewalls and licensing include:
• FW
• IPS
The solution provides a single pane of glass management of rules/logging.
The solution supports IPsec tunnels FOR 1X IPsec VPNs.
The solution integrates with the client’s Cisco ISE RADIUS solution for administrative access.
What is most valuable?
The compute power of the appliance is great. The Check Point appliances are considered NGFW devices and can process both the ASA and FTD requirements on a single instance, removing the requirement for an expansion SSD module and/or additional hardware.
What needs improvement?
We'd like an option that can convert other vendors' NGFW configurations to supported Check Point NGFW config for ease of migration.
Check Point configuration options can be very enormous and overwhelming.
Check Point comes with a very lean learning curve even though they offer a robust knowledge base.
A lot of configuration cannot be accomplished via the web interface or the smart dashboard software and must be done manually via the command line interface.
I'd like to see some built-in automation for the firewall alerts/events to trigger an automated response or recovery.
For how long have I used the solution?
I've used the solution for three years.
What do I think about the stability of the solution?
The solution is stable with frequent version and management updates.
What do I think about the scalability of the solution?
The solution is highly scalable and expandable.
How are customer service and support?
The solution offers great customer support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used a different solution and needed more processing power and functionality which this had compared to industry competitors.
How was the initial setup?
The setup was straightforward yet third-party device migration contained a lot of manual configuration conversions.
What about the implementation team?
I implemented this myself.
What's my experience with pricing, setup cost, and licensing?
Pricing can be relatively more expensive when compared to industry peers, however, the functionality makes up for the price difference.
Which other solutions did I evaluate?
We also evaluated:
- Cisco NGFW
- Fortigate NGFW
- Palo Alto NGFW
What other advice do I have?
This is a great overall solution.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Check point Partner
Director, IT Infrastructure Management Department at Enat Bank S.C.
Robust control and security that enables a comprehensive application management
Pros and Cons
- "We can precisely determine who has access rights and who is granted permission, regardless of their connection point."
- "Improvement regarding the expansion of the SMS's compatibility to include various virtualization environments would be beneficial."
What is our primary use case?
We use Check Point Next-Generation Firewall as a perimeter firewall. This means that all incoming and outgoing traffic from our premises is routed through the Check Point firewall. Within our configuration, we have activated several security features and licenses, including the firewall itself, site-to-site VPN functionality, application and URL filtering, Identity Awareness, threat simulation, and anti-bot protection. Additionally, we possess the license for the NGpX version, which includes extraction capabilities.
How has it helped my organization?
With our previous firewall solution from a different vendor, we were limited to basic firewall functionality without features like IPS and content filtering. With the implementation of Check Point firewall, we got a comprehensive set of features that enables us to gain clear visibility into how our applications behave and which areas we have control over. It allows us to monitor and manage application usage effectively while allowing us to filter and enforce rules in accordance with our organization's security policies.
What is most valuable?
The most invaluable features we have are content filtering and application control. These features operate seamlessly, thanks to the integration of Identity Awareness. Through Identity Awareness, we established a connection with our internal LDAP server, which enables us to exercise complete control over user access. We can precisely determine who has access rights and who is granted permission, regardless of their connection point.
What needs improvement?
We implemented our firewall in a clustered configuration with two gateways. We faced some limitations with the Security Management Server (SMS) application. The SMS functionality is restricted as it only supports specific deployment modes on virtualization environments like Microsoft Hyper-V and VMware ESX and Open Server mode. Our organization utilizes a different virtualization setup, and we couldn't obtain assurance from the vendor that they would provide support if we deviated from their recommended deployment methods. That is why we had to deploy the SMS on a separate server, which introduced additional complexity. Improvement regarding the expansion of the SMS's compatibility to include various virtualization environments would be beneficial. Also, when attempting to enable SSL offloading mode, we faced functionality issues. This feature should be enhanced to ensure seamless SSL offloading, without negatively impacting the core functionalities such as HTTPS and content filtering.
For how long have I used the solution?
I have been working with it for more than three years.
What do I think about the stability of the solution?
Its stability capabilities are impressive. We have not encountered any issues. I would rate it nine out of ten.
What do I think about the scalability of the solution?
The scalability is relatively good, especially when considering its database capabilities. Our physical gateway hardware can comfortably handle up to nine units. When it comes to the monitoring appliance, such as the Check Point SMS (Security Management Server), it requires substantial resources. Due to limitations with supported virtual environments, we encountered challenges in expanding its capacity. I would rate its scalability 6 out of 10 since there is room for improvement in this area.
How are customer service and support?
We chose the Pro Support option, which has allowed us to automate many of the Security as a Service (SaaS) functions. This means that whenever there's an error in the gateways' flow, an SR (Service Request) is automatically generated and promptly communicated. The support provided has been exceptionally efficient, with quick and responsive assistance. I would rate it nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used the Cisco ASA 5525X version, but we found that its management and performance capabilities were distinct. Cisco retired some of its features, and the replacement version offered came at a higher cost for the features it provided. Consequently, we decided to transition to Check Point, which offered us a more favorable price point without compromising on functionality.
How was the initial setup?
The initial setup was easy. I would rate it eight out of ten.
What about the implementation team?
The deployment process took approximately a week and a half, and about half of the challenges we faced were related to the physical connectivity issues on our end. Despite those hurdles, the deployment timeline remained relatively swift. One critical aspect for anyone planning to deploy this solution is to thoroughly understand where it fits within the network architecture and how it should be physically connected. This is especially important when implementing clustering, as the physical connectivity can become intricate. It's essential to consider high availability and compatibility with other devices it will connect to, such as core switches or perimeter routers. Ensuring that these devices support the desired failover and reliability modes is key to avoiding complications. The duration of the deployment also depends on the expertise of the person responsible for it. In our case, we opted for professional services, which included on-site configuration support. If the person handling the deployment is familiar with the surrounding devices and network environment, one individual may suffice. If there are connections to devices from different vendors, and the configuring expert lacks expertise in those areas, I would advise involving additional personnel with the relevant expertise to ensure a smooth deployment process.
What's my experience with pricing, setup cost, and licensing?
It may be considered relatively expensive, but the investment is justified when compared to other competitors. Check Point's functionality and capabilities are notably strong. The cost of licensing can vary based on the prevailing exchange rates. In our case, we paid for the renewal in our local currency, but on average, it amounts to approximately $32,000 USD annually. I would rate it eight out of ten.
What other advice do I have?
It is highly commendable for its stability and performance. When deciding on the appropriate licensing option, it's important to carefully consider your needs. Opting for two-year or five-year licenses can provide cost savings through discounts. After it is deployed, those with experience using other next-generation firewalls will find it relatively straightforward to manage. It doesn't require significant additional effort, and users with a basic understanding of next-generation firewall features can navigate through the management and rule settings easily. I would rate it eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Technical Specialist at NTT Security
Stable with flexible licensing and good centralized management
Pros and Cons
- "It improves user productivity and frees up system resources."
- "The firewall should be easily deployable and scalable in any major cloud environment and enable an organization’s security team to manage all of its security settings from a single console."
What is our primary use case?
Check Point Security Gateway GAIA R80.30 is used as our secure gateway firewall. We have configured two gateways as active-passive in cluster mode.
We also use R80.30 as our security management server to configure the policies on the firewall. We use it primarily to control traffic and secure our network perimeter against unknown attacks. The rules and policies for the SSL VPN connections are configured on the mobile access blade. We use the policies to segregate and filter the traffic flow.
This is for a bank environment.
How has it helped my organization?
A traditional firewall provides a stable inspection of network traffic. It allows or blocks traffic based on state, port, and protocol, and filters traffic based on administrator-defined rules.
A next-generation firewall (NGFW) does this, and so much more. In addition to access control, NGFWs can block modern threats such as advanced malware and application-layer attacks. According to Gartner's definition, a next-generation firewall must include:
- Standard firewall capabilities like stateful inspection
- Integrated intrusion prevention
- Application awareness and control to see and block risky apps
- Threat intelligence sources
- Techniques to address evolving security threats
What is most valuable?
Check Point Endpoint anti-malware benefits include:
- Improves user productivity and frees up system resources
- The industry’s fastest malware and anti-virus scan and boot time
- The smallest memory and disk footprints
- A single-console centralized management
- Prevention of malware from accessing endpoints with a single scan
- Malware identified using signatures, behavior blockers, heuristic analysis
- Protection automatically updated with optional Program Advisor Service
- A knowledge base of more than one million trusted or suspicious programs
- Integrated into Check Point Software Blade Architecture
- Flexible licensing options—annual or perpetual
- Centrally managed and deployed
- Activate anti-malware and application control on any Check Point security gateway
What needs improvement?
Almost all organizations are using cloud computing, and the vast majority are using a hybrid cloud deployment. Private and public cloud deployments have different security requirements, and it is necessary for an organization to be able to enforce consistent security policies across cloud-based environments hosted by multiple vendors.
The firewall should be easily deployable and scalable in any major cloud environment and enable an organization’s security team to manage all of its security settings from a single console.
For how long have I used the solution?
I've used the solution for five years.
What do I think about the stability of the solution?
Check Point is a very stable solution.
What do I think about the scalability of the solution?
It is good in terms of scalability.
Which solution did I use previously and why did I switch?
From the start, we have been using Check Point.
What's my experience with pricing, setup cost, and licensing?
We would adivse users to install Check Point NGFW. The setup cost is simple and it is not too much. The license fits most budgets.
Which other solutions did I evaluate?
We also evaluated Cisco and Fortinet.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
Network Security Engineer at NTT Security
Issue-free with excellent support and training
Pros and Cons
- "I came across the Check Point Infinity AI feature in one of the Check Point webinars, which I believe is unique and will be very useful in the future."
- "The upgrade process of Check Point could be simplified to match other products."
What is our primary use case?
Currently, we utilize Check Point firewalls, IPS, site-to-site VPN, and remote access VPN features for our various client operations.
We have implemented a cloud firewall for one of our customers and primarily handle perimeter security using Check Point firewalls for multiple customers.
We also handle POCs, implementation, upgrades, and daily security operations as part of our services.
We are distributor partners who also distribute Check Point products to our customers. We recently convinced our clients to use Check Point firewall services and signed a contract with them.
How has it helped my organization?
We have not received any issues from any clients using Check Point services so far. It is really great to use and up-to-date. In Check Point, we have never seen it hit any vulnerabilities like other products.
Also, the TAC support from Check Point is excellent. I really appreciate it when dealing with complex issues. It allows us to easily obtain vendor support without many issues compared to other products.
Certifications and training from Check Point are valuable. I recently attended a boot camp and found it both knowledgeable and enjoyable.
What is most valuable?
Recently, I came across the Check Point Infinity AI feature in one of the Check Point webinars, which I believe is unique and will be very useful in the future.
Also, Check Point Harmony and Quantum deliver uncompromising performance with advanced threat prevention, policy management, remote access VPN IoT security, SD-WAN, and more.
Infinity Threat Prevention is an innovative management model. It provides zero-maintenance protection from zero-day threats and continuously and autonomously ensures that your protection is up-to-date with the latest cyber threats and prevention technologies.
What needs improvement?
The upgrade process of Check Point could be simplified to match other products.
For some of the MSSP partners, Check Point should personally go and give demos to them. This way, the MSSP can show their clients what Check Point is capable of and what kind of new technologies and features Check Point is coming up with.
Adding automation for upgrades and hotfix installation would be a beneficial new feature for administrators from an operations standpoint. Additionally, Check Point should pay more attention to endpoint security; they are currently lacking in that area compared to other competitors.
For how long have I used the solution?
I've been using Check Point products for more than eight years.
What do I think about the stability of the solution?
The solution is 100% stable.
What do I think about the scalability of the solution?
The solution offers 100% scalability.
How are customer service and support?
Technical support is very good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
No; we have multiple clients, so we use multiple products.
How was the initial setup?
The setup is fine; I've only faced issues during upgrades.
What about the implementation team?
The expertise of the vendor is excellent. I'd rate them ten out of ten.
What was our ROI?
The ROI is really good.
What's my experience with pricing, setup cost, and licensing?
In terms of cost, pricing, and licensing, Check Point is not very expensive or complex.
Which other solutions did I evaluate?
We did not evaluate other options.
What other advice do I have?
My overall experience is really good. I am enjoying working with Check Point products, especially on the firewall. It's much easier compared to other firewalls.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Jun 3, 2024
Flag as inappropriateTechnical Consultant at PT. Nusantara Compnet Integrator
Ful threat prevention, good price-to-benefit ratio, and helpful support
Pros and Cons
- "Check Point has an awesome price-to-benefit ratio, netting you an awesome throughput of IDS/IPS capability compared to Palo Alto, Cisco, and so on."
- "The distributor support capability is quite lacking as the problem/incident is rarely solved on the distributor level and instead escalated to the principal."
What is our primary use case?
We use it as NGWF for the DMZ area on our data center.
We deployed HA configuration of Check Point Quantum 6200 to protect our user connection to the internet and to protect the server farm in our data center.
In our first year, we got free access to the full capability of SandBlast, the Check Point solution for sandboxing features. We tested, yet felt the sandbox is not quite needed in our environment and thus changed the subscription for the second year and forward to the standard feature.
Check Point can also be integrated with third-party solutions like SIEM and so on.
How has it helped my organization?
Check Point has an awesome price-to-benefit ratio, netting you an awesome throughput of IDS/IPS capability compared to Palo Alto, Cisco, and so on.
The first year also comes with a free SandBlast tier license, so you can test the full capability of Check Point to see if your companies might benefit from it or not.
We also integrate our Check Point with SIEM Splunk and it integrates flawlessly without a hassle. If you are looking for a one-stop solution for cybersecurity, you should check out Check Point's portfolio!
What is most valuable?
The features we find valuable for our companies are:
- remote access VPN
- L4 and L7 firewall rules
- unified management platform provided by Smart-1
- management platform can be deployed on-premise or on the cloud
- full threat prevention by SandBlast
- support integration with 3rd party security vendors like Splunk, Qradar, etc
- high throughput for IDS/ IPS and NGFW only
- easy to scale up using Maestro
- built-in email security solution, endpoint protection, sandboxing, alert to administrator
What needs improvement?
The distributor support capability is quite lacking as the problem/incident is rarely solved on the distributor level and instead escalated to the principal. This makes the troubleshooting process too long and the people involved are too many.
Socialization of new licensing or new features can be improved also. Principals and distributors need to work together closely to inform their customers so that we can stay updated about the latest trends and or threats/bugs that might happen in our Check Point gear.
For how long have I used the solution?
We've been using Check Point for around two to three years. We use it primarily as NGFW and as sandboxing for zero-day threats.
What do I think about the stability of the solution?
Check Point is quite stable with new releases periodically throughout the year.
What do I think about the scalability of the solution?
It is very easy to scale up or scale out and Maestro can improve the scalability a lot.
How are customer service and support?
The response is quick and technical support gives clear answers.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used Cisco Firepower and we felt that Check Point is more mature.
How was the initial setup?
The initial setup is straightforward. The firewall and management setup is quite similar to other brands.
What about the implementation team?
We implemented the solution through our in-house engineer.
What was our ROI?
We have witnessed ROI within four years.
What's my experience with pricing, setup cost, and licensing?
Check Point provides quite reasonable pricing and licensing schemes.
Which other solutions did I evaluate?
We also evaluated Palo Alto and Fortinet.
What other advice do I have?
Check Point is great for comprehensive security solutions.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
OPNsense
Cisco Secure Firewall
Sophos XG
Palo Alto Networks NG Firewalls
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
SonicWall NSa
Sophos XGS
KerioControl
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?