I have been using this solution since the GAIA OS R77 was there. I am using it for my day to day access such as policy creation, policy modification, and also regularly policy disabling and deletion. I have 17K+ users in my organization, 100 + client to site VPN and I have a number of S2S as well. My daily job is health checkup, security log monitoring and incident management, daily IPS checks, threat presentation reports and to analyze the risk and take necessary action on that as well.
Network Engineer at LTTS
Helps with security against upcoming and unknown threats and activities
Pros and Cons
- "It secures my organization. With the application blade, I can make security as application based and the custom application is also very useful. With identity awareness blades we get insights on our local users who are accessing/passing through the respective rule as users. We also use the DLP, IPS, and VPN features."
- "Our SAM rule is also not working to block the IP address which we don't allow in our organization so we have to create a traditional rule base block which is a time-consuming job for me and my team."
What is our primary use case?
How has it helped my organization?
It secures my organization. With the application blade, I can make security as application based and the custom application is also very useful. With identity awareness blades we get insights on our local users who are accessing/passing through the respective rule as users. We also use the DLP, IPS, and VPN features. We have multiple site to sites with our clients and it is very easy to configure and manage.
What is most valuable?
IPS helps with security against upcoming and unknown threats and activities. We regularly check the report and as per daily report we will check the risk and prevent each alert that is critical based on our business requirement and make it secure.
IPSec VPN is also our key feature as our organization having widely customer across globe so it is very good feature to us to connect and run our business with them very smoothly and softly.
What needs improvement?
The unknown category has been a pain point. We cannot understand this category and the Check Point engineers are also stuck with it. If we enable HTTPS inspection then without this category my URL will stop working. This has a huge impact on my business. We are still running without HTTPS inspection even in a monitoring mode.
Our SAM rule is also not working to block the IP address which we don't allow in our organization so we have to create a traditional rule base block which is a time-consuming job for me and my team.
Buyer's Guide
Check Point NGFW
November 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
For how long have I used the solution?
I am using this solution for four years.
What do I think about the scalability of the solution?
This is widely scalable solution.
How are customer service and support?
I would say not much exp and not lower, average technical support. We are struggling in most of the cases.
How was the initial setup?
Very easy.
What about the implementation team?
In-house team and technical support team.
What was our ROI?
I would say it's complete ROI for us.
What's my experience with pricing, setup cost, and licensing?
Setup is easy, in my short tenure I have done multiple migrations and have set up our new organization. For cost and pricing, I don't have an idea.
What other advice do I have?
This is a very good and best solution as a perimeter device for NGFW.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Head of Technology at Techfruits
Streamlined management through dual-interface configuration capabilities with excellent support
Pros and Cons
- "The most valuable feature is the availability of two consoles."
- "The support is excellent."
- "Check Point would benefit from having a single console for both basic and policy configurations."
- "Check Point would benefit from having a single console for both basic and policy configurations."
What is our primary use case?
We use Check Point NGFW for security purposes. Our clients use it for security reasons, as mentioned during the call.
What is most valuable?
The most valuable feature is the availability of two consoles. In the normal GA login, I can create interfaces and configure interface IPs, while in the SmartConsole, I manage the NAT quality and firewall access. This allows me to effectively configure the Check Point firewall.
What needs improvement?
Check Point would benefit from having a single console for both basic and policy configurations. Currently, two different consoles are required, which could be more streamlined.
For how long have I used the solution?
I have experience working with Check Point NGFW as part of the implementation team, working in both production environments and configuring firewalls.
What do I think about the stability of the solution?
I rate the stability of the solution as nine out of ten. While the solution is generally stable, there are complications, such as requiring SmartConsole for deployment and upgrades, which can be time-consuming.
What do I think about the scalability of the solution?
Scalability must be carefully planned for, considering future growth and user base increases. The solution is suggested with a five-year plan in mind to accommodate growth. In cloud environments, scalability is adjusted based on customer requirements.
How are customer service and support?
I rate technical support from Check Point at ten out of ten. The support is excellent.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup can be complex. Proper planning and scope of work are crucial to ensure a smooth setup.
What about the implementation team?
I work as a network engineer in the implementation team. We handle deployments and configurations of Check Point firewalls.
What's my experience with pricing, setup cost, and licensing?
In comparison to Fortinet and other products, the pricing may be considered high. Customers often look for budget-friendly options and may choose based on cost considerations.
What other advice do I have?
As a technical expert, I would recommend Check Point NGFW. However, from a customer's budgetary perspective, they must evaluate their options.
I'd rate the solution nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
Last updated: Nov 14, 2024
Flag as inappropriateBuyer's Guide
Check Point NGFW
November 2024
Learn what your peers think about Check Point NGFW. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
Security Analyst at Cognizant
A robust solution that can handle heavy workloads and user traffic well
Pros and Cons
- "The solution is robust and can handle heavy workloads and user traffic well. The product is good."
- "The tool's support is lacking. We find almost all its features useful, except for some challenges with VPN."
What is our primary use case?
We use Check Point NGFW as our data center and branch location firewalls.
What is most valuable?
The solution is robust and can handle heavy workloads and user traffic well. The product is good.
What needs improvement?
The tool's support is lacking. We find almost all its features useful, except for some challenges with VPN.
For how long have I used the solution?
I have been working with the product for ten years.
What do I think about the stability of the solution?
I rate the product's stability an eight out of ten.
What do I think about the scalability of the solution?
I rate the tool's scalability an eight out of ten. My company has 5000 users.
How was the initial setup?
The initial setup can be complex, especially for BGP configurations. I'd rate it a five out of ten for ease of setup. It's neither too hard nor too easy - it depends on your requirements. We deployed it on-premises. The initial deployment of our enterprise-grade device took about three months. We need about two people for maintenance, mainly for operational changes when needed.
What about the implementation team?
We mostly did the deployment ourselves, with some professional services support from Check Point. Three to four people were involved in the deployment, including one from Check Point to validate our work.
What other advice do I have?
The Harmony bundle is interesting, with many new features, but we're not evaluating it much as we're moving to FortiGate. We're not planning to increase the usage of Check Point NGFW. We're looking into SD-WAN and moving towards FortiGate.
I rate the overall solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Aug 16, 2024
Flag as inappropriateNetwork Security Engineer at Digitaltrack
Good analysis and integration with an easy deployment
Pros and Cons
- "It gets a regular zero-day signature update."
- "During my initial level implementation of check Point NGFW, I faced issues troubleshooting. The problem was with its command line."
What is our primary use case?
My company is an IT service provider. We suggest customers choose the Check Point next-generation firewall along with other OEMs for their environment. Once they choose (and confirm the product with model capabilities), we migrate the existing firewall to the new firewall.
I have deployed multiple Check Point products. Based on my experience and its effective features, I do suggest customers go with Check Point NGFW. I love its security profiles which effectively secure the organization's LAN, DC, and DMZ network.
How has it helped my organization?
The solution has improved organizations via:
1. Ease of deployment: We can easily implement and deploy the check Point NGFW.
2. Deep Inspection: It inspects traffic beyond just port number and IP address.
3. Threat Prevention: It has multiple security features and we can enable and integrate these features like IPS(Intrusion Prevention System), Anti-Bot Protection, and SandBoxing.
4. Organizations can enable Multi-Factor Authentication (MFA) in their network environment to verify their identity before they access the network. this feature keeps the integrity of the LAN network.
What is most valuable?
My favorite feature of Check Point NGFW is its "deep traffic inspection capability" due to the fact that:
1. It provides deep-level control over the network activity, allowing you to prioritize critical traffic first based on organization requirements.
2. It analyzes application behavior to detect suspicious activity.
3. We integrate with Sandbox technology to safely detonate and analyze zero-day threats.
4. It also blocks the application and prevents them from accessing the organization's LAN network.
5. It gets a regular zero-day signature update.
What needs improvement?
During my initial level implementation of check Point NGFW, I faced issues troubleshooting. The problem was with its command line.
Check Point runs on Linux and its command line is Linux-based. However, at the time, I was not familiar with Linux commands, and I invested lots of time in finding the Linux command and understanding the meaning, then went for troubleshooting.
It would be very helpful if the OEM provided all the Linux commands in a way that we could easily understand and follow the steps to configure or troubleshoot the issue using the command line.
For how long have I used the solution?
For the last year, I have been implementing and deploying Check Point NGFW in multiple client environments.
Its NAT automation and routing intelligence are excellent. We are not required to configure NAT rules separately; we can enable them while creating an object. We are also not required to configure reverse routing for LAN subnets.
What do I think about the stability of the solution?
At this time, Check Point NGFW is more stable than other options.
What do I think about the scalability of the solution?
The scalability is wonderful.
How are customer service and support?
Customer service and support are good. However, they can be enhanced.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We do not choose the solution. Rather, we provide multiple solutions to the customer.
How was the initial setup?
The solution is easy to implement.
What about the implementation team?
We are from the vendor side. We can help implement the solution.
What's my experience with pricing, setup cost, and licensing?
As of now, everything is good as per the market scenario.
Which other solutions did I evaluate?
We did not evaluate other options.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: My company is an IT service provider. So we implement, deploy, and migrate the NGFW in various customer environments.
Last updated: Jul 30, 2024
Flag as inappropriateIndependent Information Technology and Services Professional at a non-profit with 1-10 employees
Enhanced firewall management with cost-effective feature integration and competitive pricing
Pros and Cons
- "The price point is good."
- "The operating system and platform could be more tightly integrated."
What is our primary use case?
We use Check Point Next Generation Firewall both as a perimeter firewall and as an internal firewall.
For customers, we recommend using the open platform, which is the software installed on your own server. We usually find that you get a lot more performance out of the software that way. Also, a lot of energy companies use it as well.
How has it helped my organization?
Check Point Next Generation Firewall helps us with routing failover, setting up a web dashboard for better management of the platform, and ensuring the stability and availability of our firewalls with its backup features.
What is most valuable?
The price point is good. You get a lot more features for the cost. How it's bundled and packaged is very simple to order. All the features are bundled with the product, and it's just a matter of checking a box to turn it on or off.
Performance is usually better on OpenServers, where we provide the server on the Check Point platform.
What needs improvement?
The operating system and platform could be more tightly integrated. Some features are better done on the OS side of the platform. Integrating all features into one dashboard should avoid switching between the new and old dashboards.
What do I think about the stability of the solution?
Check Point Next Generation Firewall is quite stable. For features like backup and data, I would rate it highly.
What do I think about the scalability of the solution?
Check Point Next Generation Firewall offers excellent scalability. With OpenServer, it's just a matter of purchasing licenses that enable more CPUs to be used. We can increase the RAM on the box and allow for more network traffic and customers onto our platform.
How are customer service and support?
The support is great. I usually get it online and it meets our needs effectively.
How would you rate customer service and support?
Positive
How was the initial setup?
Setup is easy. I would give it an eight out of ten.
What's my experience with pricing, setup cost, and licensing?
The pricing is fair and more competitive than many competitors. On a scale of one to ten, with ten being the most expensive, I would rate it around a three in its category.
Which other solutions did I evaluate?
Cisco does not support SSL inspection, and its detection capabilities are limited. I would say Check Point is comparable with Palo Alto in terms of features and detection capabilities.
What other advice do I have?
I would recommend Check Point Next Generation Firewall because of its detection capabilities, which ensure protection by identifying malicious files and suspicious activities. The price point is also lower compared to Palo Alto for the same features.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Sep 29, 2024
Flag as inappropriateSecurity Engineer at TD SYNNEX
Provides good features like threat prevention, sandboxing, and DLP
Pros and Cons
- "The most valuable features of the solution are threat prevention, anti-bot, anti-malware, sandboxing, threat emulation, threat extraction, and DLP."
- "Since it has a three-way architecture, new customers find it very difficult to understand how to configure or manage the solution."
What is our primary use case?
We use the solution for threat prevention, antivirus, VPN, endpoint, and email security. Harmony Email Security and Harmony Endpoint are now under Check Point.
What is most valuable?
The most valuable features of the solution are threat prevention, anti-bot, anti-malware, sandboxing, threat emulation, threat extraction, and DLP. Check Point NGFW has a three-way architecture, which makes it the best. It is very simple to manage and use when integrated with the management server.
What needs improvement?
We face some challenges while guiding new customers regarding the solution's configuration. Since it has a three-way architecture, new customers find it very difficult to understand how to configure or manage the solution.
For how long have I used the solution?
I have been using Check Point NGFW for three to four years.
What do I think about the scalability of the solution?
An appliance called Maestro is available to scale the solution. We provide the solution for small, medium, and enterprise customers.
How are customer service and support?
The solution's technical support is supportive and satisfactory. We just need to log the case, and the support team will reply before 24 hours.
I rate the solution’s technical support eight and a half out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I also work with Palo Alto.
How was the initial setup?
The solution’s initial setup is very easy.
What about the implementation team?
The solution's deployment time depends on your organizational architecture. The deployment does not take more than three to four days and can be done in one to two days. It takes one or two engineers to deploy the solution.
What was our ROI?
We have seen a return on investment with Check Point NGFW.
What's my experience with pricing, setup cost, and licensing?
The solution's pricing totally depends on the customers' requirements and is more complex than that of other products.
What other advice do I have?
It is very easy to maintain the solution. Check Point NGFW can be easily managed by one administrator who knows the tool. I am satisfied with the AI and ML features available in Check Point NGFW.
Overall, I rate the solution ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Last updated: Jun 27, 2024
Flag as inappropriateSenior Network Security Engineer at EIT
Enables exceptional security with its comprehensive suite of features and ensures robust protection against cyber threats
Pros and Cons
- "One of the most advantageous features of Check Point firewall is its multi-interface capability."
- "There's a significant area for improvement when it comes to pricing."
What is our primary use case?
Our customers have been using it for the network security.
How has it helped my organization?
Unlike Fortinet, where the log loading process can take up to a month, Check Point stands out for its efficiency. While other solutions may only provide logs for a short period, such as one or two months, Check Point impressively retains logs for up to six months on some machines and at least three months on others. This extended log retention period is a significant advantage for our customers, providing them with valuable insights and enhancing their overall security posture.
What is most valuable?
One of the most advantageous features of Check Point firewall is its multi-interface capability. While traditional firewalls typically have a single interface, Check Point stands out by offering tools with multiple interfaces. This capability, now known as SmartConsole, allows users to manage policies, security objects, and routing points all from one dashboard. This contrasts with other firewalls where users often have to log in separately to access different functionalities. The hierarchical structure of communication and management in Check Point firewalls adds complexity, making it more challenging for attackers to exploit vulnerabilities. Additionally, Check Point introduced SD-WAN functionality in December 2013, further enhancing its capabilities and staying ahead of the curve in network security.
What needs improvement?
There's a significant area for improvement when it comes to pricing. While frequent updates and patches are released, which is commendable and adds significant value, the loading time for SD-WAN updates can be excessively long.
The feature we're eager to see enhanced in Check Point is reporting, particularly in terms of highlighting past reports. Currently, if we create a rule for a report in the morning, we expect to receive an email highlighting it. While we can set this up, the issue lies in segregating the project into separate reports.
For how long have I used the solution?
I have been working with it for five years.
What do I think about the stability of the solution?
Occasionally, we face certain issues and downtimes. Downtime varies depending on the type of changes or updates being made. For instance, a version upgrade typically requires only fifteen minutes for reboots. However, for patch updates or version updates, downtime can extend to at least one hour. In some cases, especially in custom environments, downtime may exceed two to three hours.
What do I think about the scalability of the solution?
It provides good scalability. Despite having only three customers, I've implemented the firewall for over a thousand users. These users are situated in factory environments, meaning there are thousands of endpoints, including those connected via VPN.
How are customer service and support?
I am relatively satisfied with the level of technical support provided. We primarily work with Indian support teams, and while some technical engineers are exceptionally intelligent and quick to resolve issues within ten to fifteen minutes, others may take longer. However, the crucial aspect is that they eventually provide an answer or escalate the issue if needed. When I contact support, I first inquire about the assigned person, and if I am familiar with them, I proceed with the interaction. Otherwise, I prefer to escalate the query to another region to avoid wasting time. I would rate it eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have experience working with Fortigate and Palo Alto in the past. In Sri Lanka, Check Point has a strong marketing presence, which influences customer decisions.
How was the initial setup?
The initial setup can be complex and may pose a challenge, especially for those without prior experience. Setting it up for the first time requires careful attention and a level of expertise to navigate effectively.
What about the implementation team?
The deployment process begins with configuring the firewall's IP and other settings. Once this initial configuration is complete, we proceed to the AI portal. In the AI portal, the first step is to configure the interfaces. After configuring the interfaces, we proceed to install the created interface. Next, we move on to the SmartConsole. To access the SmartConsole, we download it from the app portal. Once the SmartConsole is installed, we can easily create rules for logging purposes, manage objects, configure networking, and VPN, and other technical tasks from the SmartConsole. Routing and related tasks are typically handled in the data portal. One individual is enough for the deployment. The duration of the setup process varies depending on factors such as the complexity of the customer's environment and the site architecture. For instance, in a relatively simple scenario with just two VLANs and a couple of VPNs, the configuration could be completed within a few working days. Maintenance is essential, with upgrades and patch updates being mandatory at least once every six months. This ensures the system remains up-to-date and secure.
What was our ROI?
Our customers are pleased with the return on investment. The occasional bugs and updates, common to all firewalls including Check Point, are being addressed promptly. The platform is regularly updated to ensure optimal performance.
What's my experience with pricing, setup cost, and licensing?
The price is on the higher side.
What other advice do I have?
While the cost may be a consideration, the level of security provided by Check Point is exceptional. In my experience, I have not encountered any cyber attacks. The only negative experience was not related to the firewall but rather to customer issues with the router. It's important to remember that compromising security for cost savings can ultimately lead to vulnerabilities. Therefore, investing in high-security solutions like Check Point is worthwhile. Overall, I would rate it eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Feb 20, 2024
Flag as inappropriateSenior Enterprise Security Architect at Cyqurex Systems Ltd
A reliable and robust security solution with a wide range of capabilities
Pros and Cons
- "Its simplified management, enhanced remote support capabilities, and the ability to facilitate secure VPN connectivity for numerous offices and employees are highly beneficial."
- "The current model is predominantly hardware appliance-based, which can incur substantial costs"
What is our primary use case?
The primary objective was to replace the Cisco ASA firewalls with Check Point NGFWs. In addition to their firewall functions, these NGFWs also provide features like Web Application Firewall and Network Data Security. We used this approach to consolidate security measures into a single, comprehensive solution, much like having a master key at the main entrance rather than separate keys for each window and door. This streamlines security management and ensures a more efficient and robust overall security strategy.
What is most valuable?
There are several crucial advantages to using Check Point NGFW including its ease of use, as it provides a unified interface for managing multiple security functions. It offers impressive scalability to meet the demands of a large organization and can handle substantial traffic. Its simplified management, enhanced remote support capabilities, and the ability to facilitate secure VPN connectivity for numerous offices and employees are highly beneficial.
What needs improvement?
The current model is predominantly hardware appliance-based, which can incur substantial costs. These appliances must be purchased separately, contributing to a significant investment.
For how long have I used the solution?
Our most recent engagement with Check Point NGFW was a year ago when we implemented it for one of your financial sector clients.
What do I think about the stability of the solution?
The stability of the firewall has been exceptional, with very minimal disruptions. There was only one instance of downtime, and it wasn't attributed to any fault in the firewall itself or the hardware, but due to a configuration issue. I would rate it eight out of ten.
What do I think about the scalability of the solution?
The scalability of Check Point firewalls is a notable strength. These firewalls can handle a substantial number of connections. For instance, they can manage up to one million connections on the NDSW server. Regarding its VPN capacity, it can support around 5,000 to 8,000 users per box, which is quite impressive. This scalability makes Check Point firewalls well-suited for organizations with high connection and user requirements. I would rate it eight out of ten.
How are customer service and support?
Their support team has demonstrated an approximately 24-hour turnaround time, which is considered quite good. We have rarely needed to engage with Check Point support because most issues are resolved internally. Typically, we turn to OEM support only when we encounter challenges that are beyond our capabilities.
Which solution did I use previously and why did I switch?
I also have experience with Fortinet and Cisco, both of which have made significant developments recently. They have introduced software-based firewall and system solutions, which have garnered attention from customers. This shift in the competitive landscape has led to changes in customer preferences, with more organizations considering Fortinet as a viable option for their security needs.
How was the initial setup?
This process can be a bit complex at times, mainly because it depends on the specific client architecture and how they want to set it up.
What about the implementation team?
The deployment process can be rated at about six in terms of complexity. Several factors influence this complexity, but getting the infrastructure ready is often the most challenging aspect. To successfully deploy, you need to account for downtime, ensure proper backups are in place, and ideally test it in a sandbox environment before going live. After deployment, thorough checks and adjustments are necessary. It typically requires at least two days of parallel operation, where both the new and old equipment run simultaneously. In an environment with no existing infrastructure to replace, the process is generally smoother. Deployment typically involves a team of 2 or 3 people working full-time for 4 to 5 days, equivalent to nine hours a day. Maintenance is handled by a networking team, which includes a Network Operations Center. The team consists of approximately eleven people managing various network components, including L1, L2, and L3 devices.
What other advice do I have?
When considering a POC for a security solution, it's essential to assess the various use cases and functionalities it offers, such as NDSW which is particularly useful for protecting sensitive data. Check Point NGFW is not solely a firewall; it's a comprehensive security solution with various capabilities. It can address a wide range of security requirements, making it a valuable and versatile asset for organizations looking to enhance their security posture. I would rate it eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
OPNsense
Cisco Secure Firewall
Sophos XG
Meraki MX
Zscaler Internet Access
Palo Alto Networks NG Firewalls
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Sophos UTM
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
Buyer's Guide
Download our free Check Point NGFW Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does Check Point NGFW compare with Fortinet Fortigate?
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which would you recommend - Azure Firewall or Check Point NGFW?
- Is Check Point's software compatible with other products?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?
- When evaluating Firewalls, what aspect do you think is the most important to look for?
- Cyberoam or Fortinet?
I have very good command on Checkpoint NGFW